Why You Need to Attend our Cybersecurity Webinars in 2023!
BeyondTrust hosts a robust cybersecurity webinar program, which has been recognized as one of the top free resources for cybersecurity knowledge. We focus on providing varying webinar options, from roundtable chats to expert interviews, and cover a range of topics, including cyber insurance, the biggest threat actors, and cloud security. Many BeyondTrust-hosted webinars provide the added benefit of qualifying as a CPE accreditation with organizations like ISACA.
In 2022, BeyondTrust hosted over 100 webcasts across the globe, attended by tens of thousands of your IT and security peers. Dozens of guest speakers shared their unique industry experiences and offered tips and strategies from their areas of expertise, all in the name of teaching cybersecurity professionals across the world how to better protect their organizations; improve compliance; and continue to develop their skills, teams, and careers.
What better way to kick-start your cybersecurity growth and education for 2023 than by digging into our most in-demand IT security webinars of 2022? Here are the topics that continue to make the trends, and the twenty BeyondTrust webinars that made the biggest impact on our viewers in 2022.
Cybersecurity webinar topic trends over the past year
Today we are ranking the top 20 most popular webinars from 2022, but here were the top 5 topics that continuously made their way to the forefront of our audiences' minds:
- Can moving to the Cloud help diminish the risk of a cyber breach?
- The new risks and challenges the explosion in access brings
- Why removing admin rights remains a powerful, proactive approach to mitigating vulnerabilities
- How to securely connect an external vendor into your environment using managed accounts
In 2022, as we will reveal below, ransomware webinars continued to resonate strongly with our audience, and zero trust and cyber insurance ascended to become some of the most in-demand topics. Remote access topics remained popular as well as organizations continued supporting hybrid and fully remote workforces.
Top cybersecurity webinars of 2022
Here are the twenty most popular cybersecurity webinars of 2022, ranked based on viewer attendance and response.
1. Crouching Admin, Hidden Hacker: Privileged Access & the Unnoticed Masters, with Paula Januszkiewicz
Are there cyberattacks that are effective, reliable, and almost always work? Of course! Even when an organization’s infrastructure is well managed, patches are regularly installed, and the network is monitored – there are hackers that still find their way quietly in; be it via a misconfiguration, social engineering, or long-forgotten privileged account. There is always a hidden hacker waiting to strike!
2. Ultimate IT Security’s Cyber Insurance Summit, with Joseph Brunsman and Shawn Tuma (BT sponsored)
Made up of three 1-hour sessions, this summit brings together two cyber insurance experts on to help educate you on cyber insurance, its role within a cybersecurity strategy, what kinds of solutions are necessary to obtain a policy, and how cyber insurance fits into your response plans.
3. Cloud Misconfigurations: The Often Forgotten (but Easily Discoverable) Security Risk, with Paula Januszkiewicz
According to the National Security Agency (NSA) report on mitigating cloud vulnerabilities, misconfigurations came in as the top cloud vulnerability. The consequences of cloud misconfigurations can lead to major security hazards and even detrimental (and expensive!) downtime.
4. Zero Trust = Zero Passwords? with Raef Meeuwisse
Passwords are shared, stolen, and reused between personal and work machines without rest - making them a tempting (and easy) target for hackers. Is a password-based environment negatively impacting your Zero Trust program?
5. The 2022 Microsoft Vulnerabilities Report –Dissected [Part 1], with Morey Haber and James Maude
Now in its ninth year, the 2022 Microsoft Vulnerabilities Report provides a unique analysis of the vulnerability landscape in Microsoft’s ecosystem. This year’s report findings will help you to better understand and address risks within the Microsoft ecosystem.
6. Unlimited Sherlock? Deep-Dive into Forensics Operations to Track Down Hackers, with Paula Januszkiewicz
In this current climate of spoofed domains and cleverly faked emails, demand for digital forensics skills has never been higher. Organizations are wising up to the fact that by discovering how an attacker gained entry to a system, similar attacks can be prevented. During this session, Paula will show you how to think like a hacker so you can evaluate your infrastructure for exploitable vulnerabilities and how to recover the evidence attackers leave behind.
7. Reviewing the Incident Response Readiness Status: Hacker's View on Your Infrastructure, with Paula Januszkiewicz
As the amount of the breaches and digital crimes is booming in the current world situation the demand for skilled Forensics Experts has never been higher. In order to stay on top of the attackers, the knowledge of Individuals and the Teams responsible for collecting digital evidence has to be constantly enhanced and updated. This cutting-edge session will demonstrate what data to collect and how to be productive in threat investigation.
8. Cyber Insurance: Preparing for Your 2022 Renewals, with Tom O’Neill
With the higher premium costs and firmer due diligence underwriters are performing before approving cyber insurance policies, we’re seeing first-hand that renewal conversations are happening 6+ months before policy expiration dates. The takeaway? It’s a big job, so start your cyber insurance process early.
In this on-demand webinar, listen to guests, Tom O’Neill, Management Liability Coverage Specialist from Fred C. Church, Inc., and Chris Hills, Chief Security Strategist from BeyondTrust, discuss common cyber insurance questions they’re hearing directly from customers, how to prepare for your 2022 renewals, and tips on how-to make the application process a little less stressful.
9. What’s New! Remote Support 22.3 Release Webinar, with Duane Simms
Watch as the BeyondTrust Product Management team takes you through the new features and enhancements in Remote Support 22.3. This new release can allow a customer to begin an elevated session automatically and securely. This feature will actively improve the support experience for the customer and increase the ability of the representative to solve the customer’s issue quickly. Come learn about these and more new and exciting improvements to BeyondTrust’s best in class Remote Support solution.
10. The 2022 Microsoft Vulnerabilities Report - Dissected [Part 3], with Paula Januszkiewicz
In The 2022 Microsoft Vulnerabilities Report - Dissected [Part 3], watch renowned hacker, pen tester, and cybersecurity expert, Paula Januszkiewicz as she discusses the dozens of new challenges for modern organizations proceeding from the COVID-19 pandemic. One of them being maintaining business continuity during the sudden shift to remote and hybrid work. During this time of hybrid and remote work, a record of 86% of organizations suffered from a successful attack. With the surge in cybercriminals' activity, it is clear that a true Modern Workplace environment needs to not only be productive and creative, but first and foremost: secure.
11. The 2022 Microsoft Vulnerabilities Report – Dissected [Part 2], with Sami Laiho
In The 2022 Microsoft Vulnerabilities Report - Dissected [Part 2], join Sami Laiho, Senior Technical Fellow and Microsoft MVP, and a world leading expert in Windows Security in this upcoming webinar as he goes through his experience in removing admin rights from end users. Sami has been removing admin rights from companies for exactly two decades now. His customers range from one-person shops to enterprises with more than half a million endpoints. This year Sami has already removed admin rights from more than a million endpoints!
12. Attacking and Defending Linux: Breaking out of the Matrix Edition, with Jay Beale
In this demo-filled webinar, renowned Linux hacker and cybersecurity expert, Jay Beale will attack a new "boot2root" Linux virtual machine called, "Matrix Breakout". Attendees will watch Jay’s live demos on how to attack on a single player capture the flag (CTF) virtual machine, collect flags through a multi-step attack path including a container breakout, and break the attack as a proactive defender. Watch to be entertained and learn skills you can use yourself!
13. When Operational Technology Cybersecurity Goes Wrong, with Raef Meeuwisse
In this on-demand webinar, Raef Meeuwisse, an OT Cybersecurity Expert, analyzes the root causes of some of the largest security failures that have caused wide-scale disruption and even death in manufacturing, clinical and industrial control systems (operational technology) environments.
14. Tech Talk Tuesday: Privileged Access Discovery App, with Dan Morgan
Stolen privileged credentials or compromised remote access tools are used in nearly every data breach. Understanding your privileged access security challenges is a crucial step for organizations. Objectives including risk management, threat mitigation, zero trust security, and cyber insurance qualification depend on privileged account security. Join this session to learn about how BeyondTrust’s Privileged Access Discovery Application can help you run unlimited scans – on up to 1,000 network targets at a time. Find out vulnerable accounts and tools living on your network.
15. Zero Trust: Building Your Security Mesh with All Star Players, with Kevin Alexandra
Watch our session with Ping Identity to understand how to find your star players and how you can maximize the value of each to help you ensure maximum control. A Zero Trust approach is about least privilege, efficiency, and constant and consistent visibility into who is doing what.
16. In Digital Transformation, All Roads Lead to Identity, with Dave Shackleford
The explosion in access brings new risks and challenges that organizations will have to plan for and navigate to take advantage of new technologies on their digital transformation journeys. In this webinar, Dave Shackleford of Voodoo Security will highlight some of the most innovative and exciting trends in digital transformation today, with some emphasis on cloud service implementation and DevOps. The discussion will focus on the types of identity-focused risks that can surface when implementing new technologies and IT practices, and how we can plan to tackle them head-on with planning, control and process definition, and leading technologies available right now.
17. Women in Security Networking Event: Secure Design Concepts and Hot Chocolate, with Tanya Janca
During this interactive session Tanya discusses: The Foundation – Assume breach, Zero Trust, Defense in Depth, Least Privilege, Supply chain Security, Security by Obscurity, Attack Surface Reduction, and Usable Security.
18. An Analyst’s Angle: What is the Next Essential Step in your Cloud Security Strategy? with Andras Cser
As more organizations adopt a multi-cloud strategy, they recognize that this brings a new set of security concerns. Today’s cloud environments are dynamic, complex and services are ever-expanding. All these factors mean you must think about security differently.
19. Attacking and Defending Linux: Batman Edition! with Jay Beale
In this demo-centered webinar, Jay Beale will attack a "boot2root" Linux virtual machine themed on the Batman movies. In the webinar’s main demo, Jay will attack a single-player capture the flag (CTF) virtual machine, collecting flags as he breaks in, enumerates the system, and escalates privilege. Next, Jay will teach a proactive defense that you can use yourself to break the attack. Come learn skills you can use yourself, then download the same virtual machine and try it all out!
20. Tech Talk Tuesday: Rethink How Administrative Rights Are Used, with Jason Silva
We all understand that giving administrative access to end-users is not a best practice; but it’s all too often done as a matter of convenience. We also know that convenience is the enemy of security, and some cases, that of an IT workers free time. It doesn’t have to be all or nothing. Join this technical product clinic on how to strike a balance between enabling users and administrators to be productive and protecting sensitive systems and data by eliminating unnecessary privileges.
What can we expect for 2023?
We are already well on our way to building out a webinar schedule of compelling cybersecurity topics for 2023—and it’s already looking like a great year ahead. We have some of the industry’s foremost independent thought leaders lined up to talk about the big issues on the horizon for the new year: cyber insurance, ransomware, IT service desk trends, and more.
Have a topic you’d like to see covered? We welcome you to submit your topic ideas here!
As you’re gearing up for a new year, it’s an apt time to re-educate and take stock of the cybersecurity and threat trends likely to emerge. Check out what our expert IT security forecasters have to say about with their annual cybersecurity predictions (for 2022 and beyond).
Thank you for being a part of our global webinar network. Our webinars wouldn’t be what they are today without our loyal customers and the BeyondTrust extended community! Have a safe and happy New Year!!
Nancy Compean, Manager, Marketing Programs
As the Marketing Programs Manager, Nancy supports BeyondTrust’s highly effective world-wide webinar program to continue advancing its success. Nancy plays a crucial role in driving lead generation and brand awareness for BeyondTrust and excels at crafting engaging webinar experiences that captivate audiences with relevant topics and industry trends.