Hi [[ session.user.profile.firstName ]]

Varonis Systems

  • Date
  • Rating
  • Views
  • 7 Common IAM Mistakes
    7 Common IAM Mistakes
    Adrian Pinderhughes Recorded: Dec 6 2018 48 mins
    Identity and Access Management (IAM) is a key factor in managing security: it helps manage access to applications and systems, but falls short when applying that same solution to enterprise data. How can you address the shortfalls – and get the most out of your IAM?
  • Data Theft Under the Radar
    Data Theft Under the Radar
    Mo Abdullahi Recorded: Dec 5 2018 28 mins
    Online security can be a world of uncertainty: we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decades ago (SQL injection, ransomware from the 80’s).
    Join Varonis experts for a virtual keynote that explores how security threats are evolving - and what we need to be especially conscious of in the modern era.
  • How GDPR Affects Data Protection in the US and Canada
    How GDPR Affects Data Protection in the US and Canada
    Rob Sobers Recorded: Nov 14 2018 47 mins
    Recorded webinar reviews the implication of GDPR on US and Canada.
  • How Varonis Helps with GDPR
    How Varonis Helps with GDPR
    Ben Hollands Recorded: Nov 1 2018 34 mins
    Watch our webinar to see how Varonis maps to GDPR articles, and what we’ve learned from the first 100 days of the GPDR.
  • Secure Active Directory in 4 Steps
    Secure Active Directory in 4 Steps
    David Philpotts Recorded: Oct 18 2018 36 mins
    Attend this session and you’ll learn 4 tried-and-true steps you can take to secure your Active Directory and learn how to spot & fix AD misconfigurations, identify, prevent, and investigate advanced AD attacks.
  • Troy Hunt Keynote: The Modern State of Insecurity
    Troy Hunt Keynote: The Modern State of Insecurity
    Troy Hunt Recorded: Oct 10 2018 60 mins
    Troy Hunt, creator of “Have I been pwned”, gives a virtual keynote that explores how security threats are evolving - and what we need to be especially conscious of in the modern era.

    In this extraordinary virtual keynote, you’ll learn:

    Real world examples of both current and emerging threats
    How threats are evolving and where to put your focus
    How to stem the flow of data breaches and protect against malicious activity
  • How Varonis Helps with GDPR
    How Varonis Helps with GDPR
    Ben Hollands Recorded: Oct 2 2018 34 mins
    See how Varonis maps to GDPR articles, and what we’ve learned from the first 100 days of the GPDR.
  • From Zero to Active Directory Hero
    From Zero to Active Directory Hero
    Matt Radolec Recorded: Oct 1 2018 49 mins
    The most important question in security is, “Is my data safe?” The answer lies with your data, and, increasingly, with Active Directory.

    Active Directory holds what attackers need in order to access data - user account credentials - it’s the most critical component to a windows network, and one of the most challenging to defend.
  • Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ
    Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ
    John Carlin Recorded: Sep 27 2018 73 mins
    From the hack of SONY Entertainment, to Russian interference in the 2016 election, John Carlin led investigations into these breaches and was responsible for protecting the nation against terrorism, espionage, and cyber and other national security threats.

    John's days of chasing cyber-terrorists for the DOJ as Assistant Attorney General for National Security might be over, but he’s joining us to share an insider’s perspective on cyber threats in the public and private sector.

    Learn:
    Where cybersecurity preparedness falls short (public and private sector)
    Practical takeaways to meet the cybersecurity needs of C-Suite executives
    How to manage the evolving threat landscape - and what you can do to stay secure
  • How Security Teams Use Varonis
    How Security Teams Use Varonis
    Adrian Pinderhuges Recorded: Sep 26 2018 58 mins
    Want inside tips on how to get the most out of DatAlert?
    Join and learn how to use DatAlert through and through - from understanding the dashboard and user alerts to prioritizing your investigations.

Embed in website or blog