Live Webinars, Webcasts and Podcasts
Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.
Join us for our live webinars, where you will hear about the latest security issues from industry experts concerning both privileged account management and vulnerability management.
CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.
Meet Our Experts
SANS Instructor, Founder at Voodoo Security
Dave Shackleford is the owner and principal consultant of Voodoo Security and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. He has previously worked as CSO for Configuresoft, CTO for the Center for Internet Security, and as a security architect, analyst, and manager for several Fortune 500 companies.
Group Policy MVP and Contributing Editor at Windows IT Pro Magazine
Darren Mar-Elia is the CTO and Founder of SDM Software, a Microsoft systems management solutions company. Darren has 30 years of IT and Software experience in the Microsoft technology area, including serving as a Director of Infrastructure at Charles Schwab, IT Architect at Autodesk, CTO of Windows Management Solutions at Quest Software, and Senior Director of Product Engineering at DesktopStandard. He has provided architecture and engineering for solutions ranging from private cloud to virtual desktop to network engineering. He has been a Microsoft MVP in Group Policy technology for the last 11 years, and has written and spoken on Windows Server, Active Directory, Group Policy and PowerShell topics around the world. He has been a Contributing Editor for Windows IT Pro Magazine since 1997. He has written or contributed to 13 books on Windows and enterprise networking topics. Darren also speaks frequently at industry conferences on Windows infrastructure topics.
Security MVP, CEO at CQURE
Paula Januszkiewicz, CEO CQURE, penetration tester and mentor of CQURE Academy. Paula is also an Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She is also a top speaker at many well-?known conferences including TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime, etc., and is often rated as number-?one speaker. Paula is engaged as a keynote speaker for security related events and she writes articles on Windows Security. Her company CQURE has now 3 locations New York, Dubai and Warsaw. Paula has conducted hundreds of IT security audits and penetration tests, including those for governmental organizations, she is a renowned security consultant. Her distinct specialization is related to Microsoft security solutions in which she holds multiple Microsoft certifications, besides being familiar with and possessing certifications in other related technologies and operating systems. Paula is passionate about sharing her knowledge with others. In private, she enjoys researching new technologies, which she converts to authored trainings. She wrote a book about Threat Management Gateway 2010, and is working on her next book. She has access to a source code of Windows! Every year she makes over 200 flights (2013 -? 248) to gain more and more experience, provides penetration tests and consults Customers about how to secure their infrastructures. Her favorite saying is: "I have a tool for that!"
Randy Franklin Smith
Randy Franklin Smith is an internationally recognized expert on the security and control of Windows and Active Directory security who specializes in Windows and Active Directory security. He performs security reviews for clients ranging from small, privately held firms to Fortune 500 companies, national, and international organizations. Randy is the publisher of UltimateWindowsSecurity.com and founder and CEO of LOGbinder software.
Dr. Cole is an industry-recognized security expert with over 20 years of hands-on experience. Dr. Cole has experience in information technology with a focus on helping customers focus on the right areas of security by building out a dynamic defense. Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cyber security consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security. Dr. Cole was the lone inductee into the InfoSec European Hall of Fame in 2014. Dr. Cole is actively involved with the SANS Technology Institute (STI) and is a SANS faculty Fellow and course author who works with students, teaches, and develops and maintains courseware.
Derek A. Smith
Director of Cybersecurity Initiatives
Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently the Director of Cybersecurity Initiatives for the National Cybersecurity Institute at Excelsior College, responsible to perform complex duties relating to the development and coordination of cyber initiatives at NCI. Formerly, he has worked for a number of IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He has also taught business and IT courses at several universities for over 20 years. Derek has served in the US Navy, Air Force and Army for a total of 24 years. He completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education.
Dr. Mansur Hasib
CISSP, PMP, CPHIMS
Dr. Mansur Hasib is the only cybersecurity and health information technology professional in the world with 12 years experience as Chief Information Officer, a Doctor of Science in Cybersecurity, and the prestigious CISSP, PMP, and CPHIMS certifications. A global thought leader, Dr. Hasib has led technology and cybersecurity strategy for almost 30 years in healthcare, education, biotechnology, and energy. He is a frequent speaker at local, national, and international conferences.
MCSE, MCSA, and Group Policy MVP
Jeremy Moskowitz, MCSE, MCSA, and Group Policy MVP runs www.GPanswers.com to answer tough Group Policy questions. He is also the Founder of PolicyPak Software (www.PolicyPak.com), which creates software to manage applications and user environments using your existing Group Policy, you systems management infrastructure or via the cloud. He has authored the most popular book bestselling book on Windows desktop management: Group Policy: Management, Troubleshooting and Security (www.GPanswers.com/book). Since becoming one of the world's first MCSEs, he has performed Active Directory, Group Policy and Windows infrastructure planning and implementation for some of the nation's largest organizations. Jeremy is a sought-after speaker and training for his Group Policy and Active Directory knowledge. He has spoken at Microsoft TechEd (USA and Europe), REDMOND Magazine?s TechMentor, Windows IT Pro Magazine?s Windows Connections, and others. Get in contact with Jeremy to speak at your company by visiting www.GPanswers.com. Learn more about PolicyPak at www.PolicyPak.com.
Security Expert, IT consultant
Russell Smith specializes in the management and security of Microsoft-based IT systems. In addition to being a Contributing Editor at the Petri IT Knowledgebase, Russell blogs for Netwrix, and is an instructor at Pluralsight. Russell has more than 13 years of experience in IT, and has written a book on Windows security, co-authored one for Microsoft?s Official Academic Course (MOAC) series, and was a regular contributor at Windows IT Professional magazine.
Principal, Brock Cyber Security Consulting, LLC
Mr. Brock is the principal at Brock Cyber Security Consulting, LLC. His primary focus is to help companies improve their capabilities to protect, detect and respond to attacks on their intellectual property from both insider and advanced cyber threats. Previously and for more than 11 years, he was the Global Chief Information Security Officer at DuPont. Prior to this role, he has work in other Information Technology Positions, Marketing, and Research & Development at DuPont and as a Security Officer within the USAF. Within DuPont IT, he was the CIO of the Nylon Flooring business unit. He has also led the development and implementation of several large systems including; manufacturing product control, materials management, engineering maintenance, quality management, and data warehouse systems. While working in the Corporate IT group, he led the migration to open-based systems for both networking and computing. In DuPont Research & Development, Mr. Brock led the development and deployment of imaging based systems, including a patented system to electronically move radiographs between hospitals and remote physicians. He served as an Information Security Officer within the U.S. Air Force and assigned to the National Security Agency (NSA). He served on active duty at the NSA for 4 years and then in a reserve capacity for 26 years. Mr. Brock has BS and MS degrees in Electrical Engineering and is a Certified Information Security Manager, CISM.
Chief Information Security Officer
CEO of Secure Ideas
Kevin Johnson is the CEO of Secure Ideas and an IANS faculty member. He has written and taught course for SANS, OWASP, Blackhat and Derbycon as well as leads a number of open source projects. He presents and speaks across the country.
With Dr. Mansur Hasib, CISSP, PMP, CPHIMS
May 6, 10:00 AM PT / 1:00 PM ET
Electronic health records are far more valuable to the modern cyber criminal. For the hacker, they fetch more value over a much longer period of time. For the victim – many who are still children -- the repercussions could last decades! And from what we have seen during the spate of sensational breaches in the last few months, they appear to be far easier to obtain. In early 2014 Community Health Systems yielded over 4.5 million records. Recently, Anthem yielded 80 million! A new "honoree" is being regularly recognized on the “Wall of Shame” at the Department of Health and Human Services website. Many of these breaches involve compromised credentials and abuse of privileges. The attackers get access to a user account. Then they leverage that access to get them into other accounts, until they find one that gets them to the data that they want.
So why is healthcare suddenly so vulnerable? Join one of the nation’s leading experts in healthcare cybersecurity Dr. Mansur Hasib, CISSP, PMP, CPHIMS in a candid discussion of the recent breaches and the possible repercussions. Dr. Hasib has been widely cited in the media on these issues and has done considerable research in this area. His doctoral dissertation was a national study of cybersecurity in healthcare. He also served as Chief Information Officer in healthcare and has intimate knowledge of the healthcare space. Join us and find out:
- Why is healthcare so vulnerable all of the sudden?
- Why is healthcare data more valuable than credit card information?
- What happened at Anthem, Community Health Systems and several other major healthcare companies?
- How long should we be worried?
- What can healthcare companies do to better protect themselves?
- What can members of the public do?
With Russell Smith, Security Expert
May 12, 10:00 AM PT / 1:00 PM ET
Windows Server 2012 R2 is considered to be secure out-of-the-box, but that doesn't mean there isn't room for improvement. Microsoft's default server configuration aims to provide a reasonable balance between usability and security, but properly designed and managed systems can be further secured by tightening default settings and shutting off access to unused features.
In this webinar, Russell Smith explains how to use Microsoft's free Security Compliance Manager (SCM) tool to create and deploy your own security baselines, including user and computer authentication settings. By the end of the session, you will have learned how to:
- Update the security templates included with the tool.
- Create a custom template based on one of Microsoft's default templates.
- Compare templates and add new configuration settings.
- Create a Group Policy Object (GPO) from a custom template.
- This is a webinar you don't want to miss!
With Derek A. Smith, Cybersecurity Expert
May 13, 10:00 AM PT / 1:00 PM ET
Derek will share his experiences from being an incident coordinator at Booz Allen Hamilton and for the Transportation Security Administration to managing incident response as a government lead for computer network defense (CNDSP) at the Army Research Laboratory.
By using monitoring and detection measures with prompt intervention, government entities and companies can reduce the magnitude of incidents when they occur. This webinar will provide the information needed to develop an effective incident response strategy. It will provide basic coverage of all phases of incident response, from the pre-incident considerations and conditions to post incident analysis. You will learn security principles that help to minimize information loss and system disruption within government agencies.
The increasing complexity and diversity of systems, applications and networks has made them more difficult to defend. Situational awareness and incident response in your environment is of utmost importance. Recent security breaches highlight the need for Federal IT professionals to take an offensive approach to better protect government assets.
This webinar is ideal for Federal IT and Security professionals seeking strategies and how-to's to handle system and network breaches within the government sector.Register Now
With Jeremy Moskowitz, Group Policy MVP
May 21, 10:00 AM PT / 1:00 PM ET
There are three parts to being a Group Policy admin rockstar:
- It starts out with the creation (or edit) of a Group Policy Object
- Continues with really knowing "who did what" to a Group Policy Object
- Then learning "What happened to that Group Policy Object."
In this talk, learn about three (yes, THREE) tools to ensure you and your team are not stepping on each others' toes and knowing what's actually going on "out there." Come to this webinar, lead by Group Policy MVP Jeremy Moskowitz of GPanswers.com and learn how these tools fit together (again: some of which you might have already paid for) can help you out.Register Now
With Dave Shackleford, SANS Instructor
May 26, 10:00 AM PT / 1:00 PM ET
There's just no excuse for it anymore. We're in 2015, people - vulnerability management should be at the bottom of the Infosec Hierarchy of Needs, yet way too many organizations are treating this incredibly important pillar of a security program like an afterthought. As a security consultant, Dave Shackleford spends his time in other people's data centers and offices, trying desperately to help organizations improve the state of their information assurance programs. Sometimes he succeeds. Sometimes...things go sideways.
This webinar will examine those stories of failure. Why are organizations failing at seemingly simple tasks? Why do basic vulnerability management practices somehow turn into Sisyphus rolling a stone uphill? What can happen when the whole thing breaks down terribly?! Join us in this fun and informative webinar, where Dave will expose the deepest, darkest secrets of vulnerability management failure, and explore how we may be able to learn from these stories and start improving vulnerability management for the long run.Register Now