Hi [[ session.user.profile.firstName ]]

Duo Security

  • Date
  • Rating
  • Views
  • People-Centric Information Security Best Practices
    People-Centric Information Security Best Practices
    Josh Green, Solutions Engineer - Duo Security Recorded: May 24 2018 33 mins
    In a survey of 722 IT leaders by CIO Magazine, four out of five respondents were concerned about shadow IT projects lacking proper IT oversight in their organizations*. This concern is justified -- when users create "shadow IT" workarounds or avoid security processes altogether, it can leave organizations at risk.

    Security teams are learning that when you account for the human element, you can develop policies that users actually want to adopt. Join us for a discussion on how you can build a strong security culture by learning from user behavior research, and employing concepts like gamification to collaborate with your users.
  • Stop Phishing Attacks: What You Need To Know
    Stop Phishing Attacks: What You Need To Know
    Jordan Wright, Senior R&D Engineer - Duo Security Recorded: May 1 2018 47 mins
    We’ve all seen the emails: someone shared a Google doc with us, our bank wants to verify our password, we’ve received an “important” attachment, you name it.

    Phishing is common. It’s common because it’s easy. Not only is phishing common, but it’s getting worse. There’s no “magic bullet” to eliminate phishing as a threat, so what can you do to mitigate your risk?

    Join Jordan Wright for a hands-on, method-focused deep dive into how you can reduce the threat posed by phishing. This will cover mitigation tactics at each stage of a phishing attempt, from before an email reaches the inbox to what you can do after a user clicks the phishing link.
  • Simplify Managing Your Hybrid IT Security Environment
    Simplify Managing Your Hybrid IT Security Environment
    Zoe Lindsay, Security Advocacy Manager - Duo Security Recorded: Apr 11 2018 23 mins
    After you’ve solved your core authentication needs, what’s the next step in securing access to your critical resources? Your users are validated, but they still connect through a network from potentially vulnerable computers and mobile devices.

    So how do you identify which of these devices are compromised endpoints?

    In a 2017 SANS survey of IT professionals, 79% said hunting for compromised endpoints is “difficult or impossible.” Finding the right balance of security and user convenience is daunting, especially with BYOD and hosted applications added to the mix. The good news is that there are ways to make this easier, and this webinar will show you how.
  • The State of Microsoft Software Security in the Age of BYOD
    The State of Microsoft Software Security in the Age of BYOD
    Kyle Lady, Senior Security Researcher, Duo Security Recorded: Dec 20 2016 30 mins
    The security of Microsoft products has been the target of jokes in IT and infosec for years. While modern Microsoft software has significantly more advanced security properties, how fast are old devices and software going the way of Clippy? Are your Microsoft environments actually safe? What combinations of Microsoft products are IT admins and users really running, and what impact does that have on security?

    Join this presentation and learn the risks that Duo Security found by looking at more than one million Microsoft devices deployed in an enterprise environment.
  • Cure Your Doctors’ Headaches and Improve Your Hospital’s Access Security
    Cure Your Doctors’ Headaches and Improve Your Hospital’s Access Security
    Umang Barman, Product Marketing Manager Recorded: Nov 29 2016 28 mins
    Industry data suggests 91% of doctors' use personal smartphones and tablets for patient care. These personal devices or BYOD enable doctors’ to reach patients anytime and from anywhere. However, IT does not control or manage these devices. Recently, Catholic Health Services of the Archdiocese of Philadelphia was fined $650,000 for a lost unencrypted and password unlocked iPhone with patient data. With Duo Trusted Access Platform, you can allow doctors to use their own smartphones and tablets while also ensuring secure access.

    In this webinar, you will learn how to:

    -Get visibility into the security of smartphones and tablets used by doctors
    -Save doctors' time to approve e-prescriptions
    -Help meet HIPAA and EPCS compliance requirements
  • 3 Steps To Take Today To Better Protect Your Data
    3 Steps To Take Today To Better Protect Your Data
    Steve Manzuik, Director of Security Research, Duo Security Recorded: Nov 16 2016 41 mins
    According to Gartner, worldwide information security spending will reach $81.6 billion this year. Despite that, more than 80 percent of U.S. companies have been successfully hacked. Today’s attacks are bypassing traditional security defenses at an alarming rate. Social engineering methods, like phishing scams and other credential theft, may not be very sophisticated – but trends in corporate computing like BYOD, hybrid cloud environments, employees using public Wi-Fi, and have changed the landscape of security needs while broadening the potential attack vector.

    So what do you really need to protect your organization and stop cybercriminals?

    In this webinar, you will learn:

    -Why expensive security products may not actually protect you
    -How to quickly evaluate the security posture of your organization
    -Steps you can take today to protect your company, your data, and your employees
  • 3 Critical Protections for your Microsoft Cloud Migration
    3 Critical Protections for your Microsoft Cloud Migration
    Ruoting Sun, Product Marketing Manager, Duo Security Recorded: Oct 19 2016 59 mins
    As organizations migrate to cloud-based Microsoft services like Office 365, many are concerned that traditional on-premises security infrastructures are now inadequate. The most common workloads requiring this new security approach as they move to public cloud platforms are email, Windows Desktop, and directory services.

    In this webinar, you’ll learn 3 critical protections for securing your move to the Microsoft cloud:

    •Security for Exchange and Office 365 email environments, local and remote Windows desktop logon
    •Insight around endpoints and device health accessing your Microsoft apps and services
    •Integration with on-premises and Azure Active Directory for role-based access policies
  • Why Healthcare Data is One of the Easiest Targets for Hackers
    Why Healthcare Data is One of the Easiest Targets for Hackers
    Mike Hanley Program Manager for Research and Development at Duo Labs & Steve Won, Product Manager at Duo Security Recorded: Sep 20 2016 33 mins
    The Duo Labs research team has pinpointed some of the most significant reasons that medical records are among the easiest of any type of data to steal. For example, Duo Labs found that 76 percent of healthcare customers are running Windows 7, with 500+ known vulnerabilities to exploit.

    It only takes one outdated device for a hacker to exploit a known vulnerability. The real-world implication? A hacker gains access to patient records, including birthdates, social security numbers, medical, financial, and insurance information.

    Find out how to prevent hackers from gaining access to healthcare data instead of having to react to some of the recent ransomware attacks on healthcare organizations around the world. In this webinar, you will learn:

    The top 10 reasons healthcare data is so at risk
    How it only takes one “open door” to steal passwords, gain access to entire databases of patient information, and install malware, making your organization a ransomware target
    The top 5 fundamental and easy “good hygiene” steps you can take today
  • 10 Things I Learned by Phishing My Company
    10 Things I Learned by Phishing My Company
    Steve Edwards, Security Operations Manager at Duo Security Recorded: Sep 20 2016 55 mins
    Ninety-one percent of organizations in a recent TechValidate survey say they have seen phishing attacks on their organization in the past year. What’s more, 42% report more than 10 phishing attacks on their network in that time. What can be done to thwart this enormous threat and protect your data and users?

    Phishing simulation tools are a powerful way to see how many and which employees are prone to fall for phishing attacks. With this information in hand, you can determine how to train those who are susceptible to avoid these attempts, and provide the tools to protect against them.

    Hear from Steve Edwards, Duo’s Security Operations Manager, on his experience conducting internal phishing campaigns at education and tech organizations. In addition to interesting metrics and appropriate techniques that come from phishing simulations, Steve has 10 valuable lessons to share.

    Watch the recording for this webinar to learn several unexpected things about phishing, your company, and human psychology.
  • Why the Ohio State University Chose Duo
    Why the Ohio State University Chose Duo
    Helen Patton CISO, The Ohio State University & Patrick Garrity Director of Solutions Engineering, Duo Security Recorded: Sep 20 2016 53 mins
    Organizations with large, dispersed user populations face the challenge of protecting users in many different circumstances. When it comes to security, the human element is the most difficult to control, so having the right tools is essential.

    The Verizon 2016 DBIR reveals that 63% of breaches used weak, default or stolen credentials, and again they recommend two-factor authentication as one of the protective measures. But how can you get your privileged staff—not to mention others on campus—to accept something that creates a break in their workflow?

    In this webinar, you will learn:

    Why OSU selected Duo for two-factor and endpoint security
    How they eliminated the burden of provisioning
    The OSU approach to endpoint visibility

Embed in website or blog