Live Webcasts, Webinars and Podcasts
Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.
As we approach the end of 2014, it’s important to look back on the year in cybersecurity and reflect on what we can do better. 2014 was a year full of cybersecurity news, with companies and government entities of all sizes being severely impacted by internal and external threats. With the volume and veracity of hacks and breaches that took place this year, we have to ask ourselves important questions as we move into 2015, including:
- How did our security programs measure up?
- Where did we fall short?
- How can we be better prepared and focused for 2015?
Join this engaging webcast with three seasoned security executives who will discuss their thoughts around the industry and their approach to tackling security in 2015. This interview and panel discussion will touch on their viewpoints from both vulnerability and privilege management perspectives, while addressing tough questions, including:
- How can companies better prepare for and mitigate insider threats?
- Are brute force attacks still an issue and something to look out for in 2015?
- What is the value of cyber intel?
- How can companies implement cybersecurity best practices?
- What is the end state for cybersecurity?
Panelists: Marc Sachs, Vice President for National Security Policy; Geoff Hancock, Senior Cybersecurity Executive; Marc Maiffret, CTO at BeyondTrust
Interviewer: Mike Yaffe, VP of Marketing at BeyondTrust
If you are like most agencies you are faced with the daily reality that compliance does not equal security. Yet that is the challenge you face when trying to eliminate admin privileges or get control over the use of shared administrator credentials. How do you attain least privilege to improve security while controlling and auditing shared account access to meet compliance objectives? And how do you accomplish all of this as efficiently as possible? Join G. Mark Hardy as he explores the challenges of controlling privileges to balance security and compliance requirements, what the range of options are and how BeyondTrust PowerBroker makes the process simpler and less risky.
Did you know you already have a way to restore objects if you (or your team members) inadvertently whack a user, a group or an OU? Maybe you've heard of the Active Directory Recycle Bin, but cannot find it on your servers. Or, maybe you know how to access it, but are unclear about what it can and cannot do.
Join an engaging webcast, led by Group Policy MVP Jeremy Moskowitz of GPanswers.com and learn how to use the Active Directory Recycle Bin and see what it can, and cannot do. Then learn from BeyondTrust, how you can increase your ability and protection when Active Directory objects are deleted.