Live Webcasts, Webinars and Podcasts
Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.
Like UNIX, at its core, Linux’s secure model is basicallymonolithic. You either have root access or you don’t. But root access is too powerful for so many reasons. And routinely using the actual root account – while easy and still frighteningly common – is so dangerous it borders on negligent. Auditors know about root and what questions to ask. In fact some auditors already have their risk findings written up regarding root and privileged access before they even begin assessing your environment.
The good news is that there are a variety of things built on top if Linux to make privileged access more granular, more accountable, more auditable and overall more secure and in this webcast Randy Franklin Smith will show you how root access and least privilege management works in Linux. You will learn about how administrators can still do their work efficiently without logging on as root. Randy will show you how sudo work and how you can use sudo to:
- limit which commands users can execute
- ensure accountability between admins
- eliminate logons as root
- create least privilege profiles that allow people to get their work down without sacrificing security
We will also discuss things like:
- How to monitor misuse of root access
- How to protect root accounts and passwords
- Controlling shell access
- Auditing logons, commands and other activity
Join us for this technical and practical webcast. Then learn from BeyondTrust how you can take privileged access control to the next level and implement true least privilege effortlessly across multiple systems from a central point of control.
Vulnerability management solutions are now “standard issue” in practically all IT security departments. When it comes to scanning for security exposures, these products are essentially commodities and can all do it well. So why do security professionals still have such mixed results with VM solutions?
Please join BeyondTrust and guest speaker Rick Holland, principal analyst at Forrester Research, for a webcast that will examine what makes some vulnerability management practices successful and what makes others fail. During the presentation, you’ll learn:
- Why vulnerability scanning isn’t vulnerability management
- What you can do to make better sense of vulnerability data
- Where breakdowns happen between “finding” and “fixing”
- Which policies are critical to effectively bridging VM with IT operations
- How to get closer to true Continuous Monitoring
- This webcast is ideal for security leaders seeking to modernize their vulnerability management processes for optimal risk reduction and compliance.
Everyone will receive a link to a recording of the presentation, so be sure to register even if you can’t make the live session!
During this live hacking session, the TrueSec Security Team, will share their experiences of the worst security mistakes they have encountered during their careers and will demonstrate what these vulnerabilities are and how they were targeted during live incidents or discovered during penetration tests.
This is the perfect session for an MVP guide on what you don't want to have in your IT environment to avoid exposure to potential cyber-attacks.
Over the years, as IT operations have grown to be mission-critical aspects of most businesses and organizations, security teams have seen a marked increase in attacks that leverage privileges. Whether privileged business unit users or IT administrators, privileged accounts can be used by malicious insiders and external attackers alike to cause enormous damage. Many data breaches in the last several years have included privilege abuse components, and the problem is getting worse all the time.
In this webcast, Dave Shackleford, SANS Instructor and Voodoo Security Founder, will discuss some of the more interesting examples of privilege abuse in known data breaches and attacks over the last several years. We'll then delve into areas of privileged access that you may not even know you have, and finally lay out a strategy to start getting a handle on privileged account management in your organization in 2015.
Security audits are the best opportunity to become familiar with the common (and uncommon) Windows security mistakes made by sys admins. Unfortunately, too often the common mistakes are actually very serious and can even lead to major security breaches. But where do you start? How do you avoid such mistakes? Reasons for misconfigurations can range from lack of time or knowledge, to the inability to monitor systems effectively. Other cases could show a misuse of privileges or lack of password management. Whatever the scenario might be, as a Windows Sys Admin, you have to be prepared for a plethora of mistakes.
Join Security MVP, Paula Januszkiewicz, in this exciting one hour session and learn more about the commonly seen 'infrastructure sins'. Of course there are more than 10, but if you start to fulfill all of these shown on the session, your network will become significantly more secure! This is a webcast you don't want to miss.
If your company has valuable information (IP, PII, credit card, banking information, etc), you probably have been or soon will be a victim of an advanced targeted attack. Given the large number of high impact notable breaches, many corporate leaders have become aware the threat and are willing to take actions. With the plethora of security solutions, marketing hype and limited budgets, what are the most cost effective things that you should do?
In this webcast, Larry Brock of Brock Cyber Security Consulting and former CISO of DuPont, will review the top breaches, root issues and discuss several actions that companies should do to help defend against these types of attacks. He will also touch on:
- Addressing the risk of users with administrative privileges
- Reducing the risk of sharing administrative credentials
- Protecting what matters
- Controlling egress from your network
- Detecting cyber attacks early
- Discovering your weaknesses
Marcus and Hasain will demonstrate how hackers can compromise an entire IT environment using password dependencies and weak credentials. This live session will demonstrate an attack starting from compromising a simple client to complete control over an Active Directory Domain.
A not to be missed webcast if you want to understand passing-the-hash attacks and even more sophisticated alternatives used by hackers to gain control over your network. Don't miss the opportunity to see for yourself the potential risks your organisation could be unknowingly exposing itself to.