Live Webcasts, Webinars and Podcasts

Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.


Receive CPE Credit when you attend our live webcasts

Join us for our live webcasts, where you will hear about the latest security issues from industry experts concerning both privileged account management and vulnerability management.

CPE Credit Qualification: Many of our webcasts qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webcast and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

The Risk of Cyber Intrusion from Hackers Through Passwords and Weak Credentials Mistakes w/ Enterprise Security MVPs, Marcus Murray & Hasain Alshakarti
February 24, 2015
9:30am GMT

Marcus and Hasain will demonstrate how hackers can compromise an entire IT environment using password dependencies and weak credentials. This live session will demonstrate an attack starting from compromising a simple client to complete control over an Active Directory Domain.

A not to be missed webcast if you want to understand passing-the-hash attacks and even more sophisticated alternatives used by hackers to gain control over your network. Don't miss the opportunity to see for yourself the potential risks your organisation could be unknowingly exposing itself to.

Passwords: The Past, Present, and Future w/ SANS Instructor, Dave Shackleford
February 24, 2015
10am PT/1pm ET

Passwords play an important role in many people's daily lives. Most people use traditional usernames and passwords to log into email services, business applications, file shares, and social applications in their personal lives. If you ask your friendly neighborhood security professional, however, passwords are on par with one of the lower levels of Dante's Inferno. What makes them so bad? And how did we get in this mess?

In this webcast, join Dave Shackleford, SANS Instructor and founder at Voodoo Security where he'll dig into the history of password-based authentication, and look at why passwords are such a problem today. Between data breaches that include compromised accounts, insider threats from poor user and credential management, and everything in between, passwords can contribute to a number of headaches for security professionals. So what can we do to get control over our passwords? Dave will also touch on some ways that you can improve your overall account and authentication security strategy in the future.

Recreating the Carbanak Breach & Techniques for Mitigating Similar Attacks w/ the BeyondTrust Research & Development Team
March 4, 2015
10am PT/1pm ET

Dubbed by Kaspersky Lab as the "most successful criminal cyber campaign we have ever seen", the Carbanak Bank Breach affected up to 100 financial institutions worldwide with an estimated $1 billion in losses.

Join BeyondTrust Research and Development team for an in-depth live webinar that will explore the attack vectors used in the Carbanak Bank Breach and share successful mitigation techniques needed to prevent this type of attack. Approaches to vulnerability management, least privilege, and file integrity monitoring will also be explored.

Please join BeyondTrust's Andrey Kolishchak, Lead Endpoint Developer and Morey Haber, Program Manager for this in-depth and technical discussion on effective defense measures for this type of modern attack. This will be a technical webinar and one you won’t want to miss!

They're Everywhere! They're Everywhere! The Insider Threat in Government Agencies - Hype or Hope? w/ Information Security Expert, G. Mark Hardy
March 5, 2015
10am PT/1pm ET

Inside the government we hear a lot about the "insider threat," but is it really that big of a deal? After all, there are 7 billion more outsiders than insiders. However, insiders already start with some level of access and trust which can be abused to cause far greater damage. Compliance is not the solution -- fully compliant systems are hacked daily. Rather, we need to develop resilience to threats that allows us to prevent, detect, deny, and respond to whatever comes our way. This especially rings true in Government agencies today.

The Critical Security Controls (CSC) represent a world-class framework for configuring and dealing specifically with the insider threat. Join SANS Instructor and Government Security Expert, G. Mark Hardy in this upcoming webcast where he will show that by following these guidelines and restricting privileges to only those needed to do a job (and reporting and auditing what actions are taken), government agencies can significantly reduce the likelihood of abuse of insider credentials, even by outside attackers. Yes, there is hope, and you can deliver on that promise by taking action now. This is a webcast you don’t want to miss!

**CPE Credit Qualification** This webcast qualifies as 1 CPE credit.If you provide your (ISC)2 ID certificate number when you register for the course/s, your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

The Dark and Bright Side of Enterprise Password Management w/ Security Expert MVP, Paula Januszkiewicz
March 10, 2015
10am PT/1pm ET

Can you count on one hand just how many passwords of mid-complexity you need to memorize in order to do your job, on a daily basis? How are you managing those passwords effectively and securely within the Enterprise?

Join Security MVP, Paula Januszkiewicz, in an upcoming webcast where she will walk attendees through best practices for managing passwords (and prevent a hash attack) plus demo where passwords are stored and how to decrypt them.

During this webcast, Paula will also touch on:

  • Where the technology weaknesses are and how to take passwords from the Operating System to perform several operations
  • The unexpected places your passwords reside and how to mitigate pass-the-hash attacks
  • How password attacks are performed and the typical paths for credentials to leak

This webcast will be heavily demo focused and is one you won’t want to miss!

Group Policy Backup and Restore: Are you ready for the disaster? w/ Jeremy Moskowitz, Group Policy MVP
March 18, 2015
10am PT/1pm ET

Let me lay it out there: Most people aren’t backing up their Group Policy world. It’s not super difficult to do; you just need to do it. And when a problem occurs, are you ready to actually perform the work to get that Group Policy Object back in business and working and performing its duties?

Join Group Policy MVP, Jeremy Moskowitz of, and learn several ways to backup your GPOs, and ensure that when disasters occur (and they always do) that you’re prepared and ready to act. This is a webcast you don't want to miss!

A Security Expert's Guide: The Windows Events You Should be Tracking and Why w/ Windows Security Expert & MCSE, Russell Smith
March 19, 2015
10am PT/1pm ET

Are you able to identify who is doing what across your Windows servers? How well are you able to audit and report on events across all your privileged accounts? One of the ways to monitor such activities is to centralize the events so they can be read from one location. But what events should you be tracking in the first place and why? 

Join Windows Security Expert and MCSE, Russell Smith, who will discuss the Windows Events you should be tracking right now and why. He will also show you how to set up Event Log subscriptions so you have better monitoring across your Windows environments. Additionally he will cover:

  • What types of Windows events you should be tracking (account creation, Security services disabled, RDP enabled, etc.)
  • What kind of information is recorded in Windows Event Logs and why they should be monitored
  • How to view Windows Event Logs

BeyondTrust’s, Morey Haber will then walk attendees through a brief overview of PowerBroker for Windows and how the product can effectively track the Windows events Russell discusses earlier. This is a webcast you don’t want to miss!

"The Insider Threat is Real" w/ Director of Cybersecurity Initiatives, Derek A. Smith
April 8, 2015
10am PT/1pm ET

This webcast qualifies as 1 CPE credit.If you provide your (ISC)2 ID certificate number when you register for the course/s, your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

For years organizations have worked diligently to lock down their perimeters from external threats only to find out that the most devastating enemy is already inside their doors.

Notable breaches and results from the annual Verizon report only prove what we already know: That a comprehensive security program must include an understanding of insider activity such as anomalous, suspicious, or nontechnical behaviors.

In this webcast, Derek A. Smith, Director of Cybersecurity Initiatives, National Cybersecurity Institute at Excelsior College, will:

  • Provide an overview of insider threats 
  • Discuss insider threat motivations and criminal fundamentals 
  • Introduce the most common types of insider threats
  • Share ways to identify insider threats and protect organizations from them 
  • Identify insider threat risks, vulnerabilities and weaknesses within an organization, and provide actionable risk mitigation strategies to detect, deter and mitigate the insider threat 

Join us for this informative webcast!

**CPE Credit Qualification** This webcast qualifies as 1 CPE credit.If you provide your (ISC)2 ID certificate number when you register for the course/s, your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.