Live Webcasts, Webinars and Podcasts
Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.
Did you know you already have a way to restore objects if you (or your team members) inadvertently whack a user, a group or an OU? Maybe you've heard of the Active Directory Recycle Bin, but cannot find it on your servers. Or, maybe you know how to access it, but are unclear about what it can and cannot do.
Join an engaging webcast, led by Group Policy MVP Jeremy Moskowitz of GPanswers.com and learn how to use the Active Directory Recycle Bin and see what it can, and cannot do. Then learn from BeyondTrust, how you can increase your ability and protection when Active Directory objects are deleted.
Secure password management has become a crucial process within the enterprise these days. But the demand of managing passwords for multiple networks, systems, and users is constantly evolving and burdening security teams. With such a burden, too often an approach used is to reuse the same passwords for different systems or access local accounts on users' workstations. We need to remember that wherever and whenever we enter the password in the password field, there is at least one mechanism that must recognize it in order to use it later for its designed purpose.
In this intensive webcast session with Security MVP, Paula Januszkiewicz, learn the encryption and decryption password techniques being used in systems, networks, and applications today. Paula will look at the various technology holes and weaknesses and try to take passwords from the places where they are used by the operating system and try to perform severalother operations. She will demonstrate how to locate passwords in some unexpected places and then show you what you can do to mitigate these risks.
This is going to be a webcast you don't want a miss. Have a cup of coffee before attending!
The widespread use of domain administrator privileges for everyday computing tasks by IT staff, poses one of the biggest security risks to organizations.
In this session Russell Smith, author of Least Privilege Security for Windows 7, Vista and XP, discusses how the careless use of domain administrator privileges can result in a compromised network. He will also share tips for managing Active Directory and performing administration tasks on domain controllers without giving IT staff perpetual domain administrator access.
In this session, you will learn about:
- Virtualization of domain controllers
- Delegation of privileges to manage Active Directory and domain controllers
- Just Enough Administration (JEA) and PowerShell Remoting
- Protected Users group and Authentication Silos in Windows Server 2012 R2
- Just in Time (JIT) administration – Windows Server vNext
Organizations often approach security like firefighters approach their job. Whoever calls and has the biggest problem, that is what the current focus becomes. While that firefighting may work to a point, it leads to a very disjointed approach to security. While many organizations have a firewall, IDS and vulnerability scanner, they often do not have a proper approach to securing their organization.
In this webcast SANS Instructor, Eric Cole, will walk attendees through the proper way of building a security infrastructure and setting up your organization for success in the year ahead.
The most critical part of a building is the foundation and the most critical part of an organization is the foundation. The core foundation for security includes 1) asset identification, 2) configuration management, and 3) change control. Once the foundation is in place proper access to critical data must be controlled and systems must be maintained by managing vulnerabilities across the critical systems.
At the end of this talk, you will have the proper approach to implementing a proper security program in 2015 and not repeat the sins of the previous year.
Like UNIX, at its core, Linux’s secure model is basicallymonolithic. You either have root access or you don’t. But root access is too powerful for so many reasons. And routinely using the actual root account – while easy and still frighteningly common – is so dangerous it borders on negligent. Auditors know about root and what questions to ask. In fact some auditors already have their risk findings written up regarding root and privileged access before they even begin assessing your environment.
The good news is that there are a variety of things built on top if Linux to make privileged access more granular, more accountable, more auditable and overall more secure and in this webcast Randy Franklin Smith will show you how root access and least privilege management works in Linux. You will learn about how administrators can still do their work efficiently without logging on as root. Randy will show you how sudo work and how you can use sudo to:
- limit which commands users can execute
- ensure accountability between admins
- eliminate logons as root
- create least privilege profiles that allow people to get their work down without sacrificing security
We will also discuss things like:
- How to monitor misuse of root access
- How to protect root accounts and passwords
- Controlling shell access
- Auditing logons, commands and other activity
Join us for this technical and practical webcast. Then learn from BeyondTrust how you can take privileged access control to the next level and implement true least privilege effortlessly across multiple systems from a central point of control.
Vulnerability management solutions are now “standard issue” in practically all IT security departments. When it comes to scanning for security exposures, these products are essentially commodities and can all do it well. So why do security professionals still have such mixed results with VM solutions?
Please join BeyondTrust and guest speaker Rick Holland, principal analyst at Forrester Research, for a webcast that will examine what makes some vulnerability management practices successful and what makes others fail. During the presentation, you’ll learn:
- Why vulnerability scanning isn’t vulnerability management
- What you can do to make better sense of vulnerability data
- Where breakdowns happen between “finding” and “fixing”
- Which policies are critical to effectively bridging VM with IT operations
- How to get closer to true Continuous Monitoring
- This webcast is ideal for security leaders seeking to modernize their vulnerability management processes for optimal risk reduction and compliance.
Everyone will receive a link to a recording of the presentation, so be sure to register even if you can’t make the live session!