Hi [[ session.user.profile.firstName ]]

Outlining a security monitoring plan for 2020

In this webinar, we'll discuss the key security information and event management (SIEM) trends and techniques that we'll see as we enter the next decade.
Recorded Mar 19 2020 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sid
Presentation preview: Outlining a security monitoring plan for 2020

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Outlining a security monitoring plan for 2020 Recorded: Mar 19 2020 36 mins
    Sid
    In this webinar, we'll discuss the key security information and event management (SIEM) trends and techniques that we'll see as we enter the next decade.
  • Ten events you should audit in hybrid Active Directory to prevent a breach Recorded: Feb 26 2020 53 mins
    Abi
    Cyberattacks have gotten more sophisticated. Attackers aren't always outside the network perimeter anymore, and features and tools introduced with the intention of benefiting the organization are being misused. While following basic auditing guidelines is essential, it's also important to understand the advancements in the current cyberattack landscape and the need for detailed auditing.

    In this webinar, you’ll see firsthand how failing to audit certain events can put your organization's security at risk and even lead to security breaches.

    In this webinar, we’ll cover:
    A hands-on demonstration of ten activities that could lead to a full-scale security breach if not audited.
    Native auditing limitations and possible reasons behind such audit failures.
    How to smartly audit attack attempts and set up instant alerts, helping to eliminate the possibility of a breach.
  • Limit Active Directory attack radius with efficient management practices Recorded: Feb 7 2020 51 mins
    Abi
    No organization is immune to attack. A Skyport Systems study found that successful attacks against Active Directory (AD) can be devastating because the blast radius reaches nearly every system in an enterprise. This is due to poor AD security practices and mismanagement by IT administrators.

    Security hardening is important for protection against breaches, but how we manage Active Directory plays an equal role in protection against attacks. In this webinar, we'll learn how certain critical AD management practices reduce the possibility of a breach and mitigate the extent of damage when an attack occurs. Inappropriate privileged access, unnecessarily broad access for roles or employees, inefficient cleanup of stale objects, and a serious lack of visibility and reporting into the AD infrastructure are some of the reasons organizations are vulnerable to security breaches.

    In this webinar, you'll learn how to:
    Gain valuable insights into your hybrid AD environment with tailor-made reports.
    Eliminate risk by securing privileged access and streamlining management activities in your hybrid environment.
    Double-check safety, with complete backup and recovery, in the event of data corruption or a security breach.
  • Satisfy both efficiency and security with 2FA Recorded: Jan 14 2020 33 mins
    Sharada Murthy
    Join our product expert in this session to learn how to boost your organization’s security with an additional layer of authentication.

    In this webinar, you'll learn how to:
    - Strengthen passwords with a granular password policy.
    - Enable two-factor authentication for both local and remote desktop
    logons.
    - Enforce granular 2FA based on OUs and groups in the Active Directory.
Easily manage, secure, report, and audit your Active Directory
We have complete and easy solutions for even your most difficult IT management problems,
from keeping your business safe, to ensuring high availability, to making your users happy.
We’re bringing IT together so you don’t have to.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Outlining a security monitoring plan for 2020
  • Live at: Mar 19 2020 5:15 am
  • Presented by: Sid
  • From:
Your email has been sent.
or close