Hi [[ session.user.profile.firstName ]]
Sort by:
    • Privileged Account Security: Safeguarding User Credentials and its Data
      Privileged Account Security: Safeguarding User Credentials and its Data Juan Asenjo, Sr. Solutions & Partner Marketing Manager, Thales eSecurity and Martin Cannard, Sr. Product Manager, BeyondTrust Recorded: Apr 12 2018 3:00 pm UTC 60 mins
    • A complex dynamic of attack vectors threaten today’s IT environments like never before. Faced with this challenge, organizations need to protect their most sensitive applications and data without sacrificing business agility. Privileged Access Management (PAM) has emerged as an approach that can provide the best defense against potential attackers, by protecting all layers of the typical computing model. PAM solutions manage user access, safeguard file systems, ensure process segmentation, and provide encryption capabilities to protect users, assets, files, and applications. However, vulnerabilities can enable attackers to exploit privileged accounts, and abuse of these can open conduits for data breaches that threaten enterprise security.
      As data breaches continue to make headlines, far-reaching security mandates such as the General Data Protection Regulation (GDPR) are becoming stricter, forcing organizations to rethink their cybersecurity strategy.
      This webinar will examine how organizations can strategically block threats along traditional computing models to fortify security without re-engineering applications, databases or infrastructure. The presentation will focus on secure access control, auditing, alerting, and recording of privileged account activity. Management of cryptographic keys that protect access credentials, and the protection of sensitive data to ensure that only authorized users and applications can be allowed to access these files, will also be discussed.

      Join the webinar and learn how to:

      • Manage all privileged user access and control file systems
      • Establish a robust root of trust for credential management
      • Enhance security with key management and encryption
      • Facilitate security auditing and regulatory compliance
      • Meet FIPS 140-2 and Common Criteria standards

      Read more >
    • Global State of Privileged Account Management
      Global State of Privileged Account Management Steve Kahan Recorded: Nov 8 2016 6:00 pm UTC 40 mins
    • According to the 2016 Verizon Data Breach Report, 63% of confirmed data breaches involved leveraging weak, default or stolen passwords.

      Join Thycotic in a 45-minute educational training session that reveals the specific shortcomings in the current state of privileged account security and provides recommendations for how to address the most common failures.
      During the training session, you will learn session:
      · Why privileged accounts are an attractive target for attackers
      · Overview of the Privileged Password Vulnerability Benchmark
      · See the overall grades of 600+ organizations who took the Privileged Password Vulnerability Benchmark
      · Review the specific gaps in privileged account security practices
      · Provide best practice recommendations to reduce the risk
      · Provide access to a several free tools that you can leverage to get immediate improvements

      As a bonus, we will provide access to the Privilege Password Vulnerability Benchmark so your members get immediate feedback on two dimensions:
      · Organizations will get a grade based on their benchmark answers (A-F)
      · Organizations will also get a report to see how their answers to each benchmark question compares to others in their peer group

      Read more >
    • Metrics that matter: Mastering mobile marketing KPIs
      Metrics that matter: Mastering mobile marketing KPIs Sheila Bhardwaj, Director of Account Management, TUNE Recorded: Oct 20 2016 5:00 pm UTC 60 mins
    • In an era when analytics and business intelligence allows just about anything to be measured, how do you determine the metrics that matter to your app’s marketing performance? Apps have the potential to drive major value for your company, with the global revenue from mobile apps stores set to reach $52 billion this year. How do you ensure you’re capitalizing on the potential that a popular, engaging app can offer? Avoid analysis paralysis by focusing on a few key performance indicators (KPIs).

      Join Gwen Murray, Mobile Marketing Lead at Staples, and Sheila Bhardwaj, Director of Account Management at TUNE, for a webinar that will teach you everything you need to know about mobile marketing KPIs, including how to decide on the right ones based on your goals, app, and business. If you’re a mobile marketer looking to understand which KPIs are available and how to use them, you won’t want to miss this.

      By registering for this webinar you'll:


      * Learn the most widely used mobile marketing KPIs
      * Understand KPIs to target depending on your type of app, goals, and user lifecycle stage
      * Know unique KPIs that can help demonstrate value even if not a mobile-first business
      * Get action items for your new KPI data geared toward moving the needle for your business
      * See how your app stacks up against key industry benchmarks.

      Speakers:
      * Gwen Murray, Mobile Marketing Lead, Staples
      * Sheila Bhardwaj, Director of Account Management, TUNE
      * Wendy Schuchart, Analyst, VentureBeat

      Read more >
    • Account Takeovers | Is Your Retail Website Safe?
      Account Takeovers | Is Your Retail Website Safe? Thomas Platt, Traffic Management and Web Security Expert Recorded: Jun 21 2018 10:35 am UTC 32 mins
    • Account takeover fraud isn’t going to stop and the tactics engaged by cyber criminals are becoming more sophisticated every day. The retail market is heavily targeted by criminals and in 2016 alone there were over 3 billion credentials stolen with malicious intent.

      A growing number of high profile retailers have suffered from data breaches in the last year alone, leading to Verizon noting account takeovers as the biggest threat to web applications today.

      An account takeover can have a butterfly effect with credential stuffing leading to brute force attacks, identity theft and huge financial and reputational losses. If your website has a login page, there will be malicious bots attacking your page right now, trying to create and exploit security weaknesses.

      How TrafficDefender can help

      At TrafficDefender our experts beat the bots every day to ensure our clients are always one step ahead of criminal traffic.

      This webinar provides insight into the rise of account takeover attacks in the retail industry and what steps you need to implement to defend against the trillion pound cyber-crime industry.

      Watch the recording to learn more about:

      - The rise of account takeover attacks in the retail market.
      - The anatomy of an account takeover attack.
      - Best practice for identifying and preventing malicious bots from cracking customer accounts.

      Read more >
    • Account Takeovers | Are You A Victim Or An Enabler?
      Account Takeovers | Are You A Victim Or An Enabler? Thomas Platt, Traffic Management and Web Security Expert Recorded: May 1 2018 11:40 am UTC 25 mins
    • We’re nearly half way through 2018 and a week away from GDPR coming into force. With this in mind – how does GPPR and Account Takeovers affect you?

      As a business you are directly affected if your customer’s details are hacked and you could be faced with compensating or losing affected customers. At a minimum you would be expected to honour or reimburse any points that had been illegitimately redeemed.
      A data breach at another company could result in the stolen user names and passwords being used on mass by millions of bots around the world to probe other sites to look for matching combinations and gain access to those accounts.

      With GDPR coming into force this month, businesses with consumers in the EU are required to put reasonable protection in place to protect data. This includes proactively preventing attacks and putting measures in place against large scale brute force attacks.

      How TrafficDefender can help:
      As experts in automated traffic and cyber security, we have developed software to identify and manage malicious traffic and block account takeovers.

      Please join us to learn more about:
      How GDPR affects account takeovers
      The rise in account takeover attacks
      The anatomy of an account takeover account
      Best practice for identifying and preventing malicious bots from cracking customer accounts

      Read more >
    • Monitoring privileged accounts with Windows Security Log
      Monitoring privileged accounts with Windows Security Log Randy Franklin Smith (UltimateWindowsSecurity.com) Recorded: Mar 8 2018 10:00 am UTC 49 mins
    • Hackers have determined a number of ways to harvest privileged account credentials and use them to infiltrate networks. This makes monitoring privileged account usage critical to reducing your organisation’s cyber risk.

      The good news is that Windows provides event ID 4672, which is logged whenever an account signs in with admin user rights.

      Event ID 4672 contains valuable information, such as user name, computer name and privileges, and logon session ID. Administrative users will always have one or more of the rights that trigger event 4672.

      In this webinar, Windows Security Expert, Randy Franklin Smith, provides free technical training on detecting compromised accounts and demonstrates how to sift through event 4672 details.

      Register now to learn how to use Windows Security Log to monitor privileged access and threat hunt for suspicious logon sessions.

      Read more >
    • Monitoring privileged accounts with Windows Security Log
      Monitoring privileged accounts with Windows Security Log Randy Franklin Smith (UltimateWindowsSecurity.com) Recorded: May 9 2018 1:00 am UTC 49 mins
    • Hackers have determined a number of ways to harvest privileged account credentials and use them to infiltrate networks. This makes monitoring privileged account usage critical to reducing your organisation’s cyber risk.

      The good news is that Windows provides event ID 4672, which is logged whenever an account signs in with admin user rights.

      Event ID 4672 contains valuable information, such as user name, computer name and privileges, and logon session ID. Administrative users will always have one or more of the rights that trigger event 4672.

      In this webinar, Windows Security Expert, Randy Franklin Smith, provides free technical training on detecting compromised accounts and demonstrates how to sift through event 4672 details.

      Register now to learn how to use Windows Security Log to monitor privileged access and threat hunt for suspicious logon sessions.

      Read more >
    • How can you regain the control of your privileged accounts?
      How can you regain the control of your privileged accounts? Csaba Krasznay, PhD. Recorded: Jun 13 2018 2:00 pm UTC 57 mins
    • Balabit, a One Identity business,will present some shocking research statistics and instructive breach stories involving the misuse of privileged credentials.

      Balabit’s recent global research showed that 4 in 5 companies were hit by a breach in 2017. In this kind of landscape, with both cyber-attacks and privileged users proliferating simultaneously – and with the GDPR re-framing our relationship with data security – now’s the time for IT teams to get better control of their networks.

      In our 45-minute webinar session, you’ll hear about our key research findings and recommendations to reduce your risks related to privileged accounts. The webinar will be held by Csaba Krasznay, PhD., CISSP,
      Security Evangelist and Program Director of Cybersecurity Academy at the National University of Public Service in Hungary.

      Read more >