Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Live Demo - Lateral Movement: Breaking Down & Identifying Terry Jenvey, Director of Sales Engineering EMEA In this Live Demo will be breaking down the subject of lateral movement and help identify what it looks like for the organization. Lateral movement i... 2 days ago | 28 mins Why Identity Protection is essential for Zero Trust implementation David Muniz - Cybersecurity Specialist Zero Trust has been a hot cybersecurity topic for quite some time. Organizations have been implementing Zero Trust for some time, however, the movemen... 1 week ago | 48 mins How to Minimise the Risk from Privileged Activity [Netwrix SbPAM Demo] Michael Dawkins, Solutions Engineer at Netwrix A single misuse of a privileged account, whether negligent or malicious, can lead to costly business disruptions and data breaches. Want to dramatical... February 28, 2023 10:00am Zero Trust Initiatives For Identity-First Cyber Resiliency Tim Keeler, General Manager/CTO, Remediant, a Netwrix Company In 2023, the Zero Trust concept permeates cybersecurity departments across private and public organizations alike. When it comes to identity access ma... February 16, 2023 5:00pm Webinar: Complying with CSA’s Cybersecurity Code of Practice (CCoP) 2.0 Jason Teo, Regional Sales Director, Imperva & Wang Jie He, Senior Sales Engineer, Imperva As we enter into the new year 2023, one key priority for Critical Information Infrastructure (CII) operators to be mindful of, is the need to comply w... 7 days ago | 41 mins Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... 1 week ago | 25 mins Ransomware Trends in 2022 Dmitry Galov, Security Researcher at Kaspersky's Global Research and Analysis Team Ransomware operators are continuously updating their techniques and toolsets following the latest technical and social changes. To effectively prote... 1 week ago | 43 mins Windows 10 & Active Directory Security Best Practices for Preventing Ransomware Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) According to the Department of Homeland Security, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Moreover, the Departme... 3 weeks ago | 68 mins PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... 3 weeks ago | 62 mins LockDown 2022: Ransomware: Before, During, and After an Attack Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) Learn strategies and tactics for preventing ransomware attacks and managing attacks "if" they occur. 3 weeks ago | 60 mins Load more