Hi [[ session.user.profile.firstName ]]

Compliance in the Cloud: How to Secure Identities & Meet Regulatory Requirements

Cloud technology offers a host of benefits, including flexibility and accessibility. But it also brings new compliance challenges and security risks. Although cloud providers claim that their technology is mature enough to handle any security-related issues, ensuring data integrity in the cloud and proving it to compliance auditors are still top concerns for most organizations.

Join us to get deep insight on:
•How you can share responsibility for IT security with cloud providers
•How to protect the sensitive data you store in the cloud
•How to meet compliance requirements for data in the cloud
Recorded Oct 24 2018 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mason Takacs
Presentation preview: Compliance in the Cloud: How to Secure Identities & Meet Regulatory Requirements

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Compliance in the Cloud: How to Secure Identities & Meet Regulatory Requirements Recorded: Oct 24 2018 45 mins
    Mason Takacs
    Cloud technology offers a host of benefits, including flexibility and accessibility. But it also brings new compliance challenges and security risks. Although cloud providers claim that their technology is mature enough to handle any security-related issues, ensuring data integrity in the cloud and proving it to compliance auditors are still top concerns for most organizations.

    Join us to get deep insight on:
    •How you can share responsibility for IT security with cloud providers
    •How to protect the sensitive data you store in the cloud
    •How to meet compliance requirements for data in the cloud
  • [A Hacker Explains] How Attackers Exploit Office 365 Vulnerabilities Recorded: Oct 10 2018 62 mins
    Liam Cleary, Jeff Melnick
    Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy.

    In this webinar, you’ll discover:
    - Some of the most common Office 365 security attacks
    - How to use the Attack Simulator to test your end users
    - How to spot attacks in early stages so you can take steps to prevent a breach
  • [A Hacker Explains] How Attackers Get Elevated Permissions Recorded: Oct 9 2018 62 mins
    Liam Cleary, Jeff Melnick
    Often, to inflict damage on critical systems or steal the data they want, attackers need administrative-level access. Gaining those permissions is not a simple task, since most operating systems now have built-in protections against privilege escalation. But many attackers do succeed.

    During this webcast, you will discover:
    •Top methods that attackers use to escalate their privileges
    •How to defend against these techniques
    •How you can quickly identify and investigate privilege escalation
  • [A Hacker Explains] How Attackers Move through the Network Undetected Recorded: Oct 8 2018 71 mins
    Liam Cleary, Jeff Melnick
    Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

    By the end of this session, you will know:
    •What techniques attackers use to traverse the network without raising alarms
    •What native Microsoft tools can help you spot covert attacks
    •How you can identify the hiding attacks by using Netwrix Auditor functionality
  • [A Hacker Explains] How Attackers Break in Recorded: Oct 8 2018 69 mins
    Liam Cleary, Jeff Melnick
    Today, hacking tools are so easy to find and use that attackers no longer need specialized skills and knowledge; they simply deploy the tool of their choice. As a result, attacks are more frequent than ever, and it’s critical for internal information technology and security teams to spot them quickly. The key to protecting your environment is knowing what types of attacks to look for.

    In this webinar, you will learn:
    •What common attack methods can be used to compromise a network, server or device
    •How to identify the threats to your information security space
    •How to mitigate the risk of the attacks
    •What tools can help you to identify attacks
Identify, Classify and Secure Sensitive Data
TBC

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Compliance in the Cloud: How to Secure Identities & Meet Regulatory Requirements
  • Live at: Oct 24 2018 3:00 pm
  • Presented by: Mason Takacs
  • From:
Your email has been sent.
or close