Hi [[ session.user.profile.firstName ]]

Is Your Tuesday Patched Enough? An Analysis of Microsoft Security Updates in '19

On the second Tuesday of every month, commonly referred to as “Patch Tuesday,” Microsoft releases fixes for vulnerabilities affecting their products. Every year, BeyondTrust produces a comprehensive report with a compilation of all vulnerabilities and a holistic view of their trends and possible mitigation strategies. Join this executive lunch to discover the surprising findings of the 2020 report, and learn:

· The annual vulnerabilities trend analysis since 2013

· Results from 499 vulnerabilities analysed across Windows OS versions

· Why there’s been 78% increase in vulnerabilities since 2013

· How you can fix 100% of critical vulnerabilities in Microsoft Office

· The Top 5 Best Practices for securing desktops, Windows, Unix & Linux servers and network devices
Recorded Apr 9 2020 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ajay Kumar, Regional Director for Security Engineering – APJ, BeyondTrust
Presentation preview: Is Your Tuesday Patched Enough? An Analysis of Microsoft Security Updates in '19

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Why Managing Passwords Isn’t Enough - A Universal Approach to PAM | BeyondTrust Recorded: Jun 4 2020 65 mins
    Gene Ng, Regional Vice President - APJ & Ajay Kumar, Director, Solutions Engineering - APJ, BeyondTrust
    Attend this webinar to learn how a new approach to Privileged Access Management – the Universal Privilege Management model – can help you to secure every user, session, and asset across your entire IT environment. Covered topics will include:
    •Technology Demonstration - Keys to a frictionless PAM solution that is invisible to end users
    •Why relying on password management alone leaves dangerous gaps in protection
    •Disrupting the cyber-attack chain with privileged access security controls
    •Steps to achieving rapid leaps in risk reduction
  • How to Secure Privileged Session Access to Cloud-based VMs Recorded: May 21 2020 55 mins
    Randy Franklin Smith, Ultimate Security IT
    In this webinar, we will look at several different ways to more safely provide admins with SSH/RDP access to VMs in the cloud. Learn how BeyondTrust privileged Remote Access (PRA) cloud-based solution provides comprehensive privileged session management and essential vaulting capabilities, enabling organizations to manage both privileged sessions and passwords for any environment.
  • Risky Business: How much access for third-party vendors is too much? Recorded: May 14 2020 60 mins
    Derek A. Smith, Founder, US National Cybersecurity Education Center
    Watch this webinar to understand how third-party vendor access poses risk to your network and how movement to the Cloud plays a big role in your security strategy. You will learn the best strategy for ensuring secure remote access with BeyondTrust and top mitigation strategies to implement when dealing with a vendor access breach.
  • Attacking and Defending a Windows System Recorded: Apr 15 2020 57 mins
    Jay Beale, Co-Founder and CTO of InGuardians
    Watch this webinar with a technology demo to understand the importance of enforcing Least Privilege on Windows and Mac desktops, to effectively stop cyber-attacks. You will learn how to eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering end-user productivity. Last but not least, this is a good chance to enhance both your attack and defense skills!
  • Is Your Tuesday Patched Enough? An Analysis of Microsoft Security Updates in '19 Recorded: Apr 9 2020 44 mins
    Ajay Kumar, Regional Director for Security Engineering – APJ, BeyondTrust
    On the second Tuesday of every month, commonly referred to as “Patch Tuesday,” Microsoft releases fixes for vulnerabilities affecting their products. Every year, BeyondTrust produces a comprehensive report with a compilation of all vulnerabilities and a holistic view of their trends and possible mitigation strategies. Join this executive lunch to discover the surprising findings of the 2020 report, and learn:

    · The annual vulnerabilities trend analysis since 2013

    · Results from 499 vulnerabilities analysed across Windows OS versions

    · Why there’s been 78% increase in vulnerabilities since 2013

    · How you can fix 100% of critical vulnerabilities in Microsoft Office

    · The Top 5 Best Practices for securing desktops, Windows, Unix & Linux servers and network devices
  • Buying Privileged Access Management: the Good, the Bad, and the Necessary Recorded: Apr 1 2020 46 mins
    Brought to you by BeyondTrust | Guest Speaker: Nick Cavalancia, Founder & CEO, Techvangelism
    As you consider a Privileged Access Management (PAM) solution to help thwart attackers and improve security operations, what features should make your shortlist? In this webinar, you will discover the “buyer’s guide” discussion by covering the considerations of getting the right one.
  • Demo video - Cloud Vault, Password Management for Privileged Remote Access Recorded: Mar 27 2020 4 mins
    BeyondTrust Senior Security Engineer
    In this technology demo you'll see how the BeyondTrust Vault eliminates the need for privileged users to remember or share credentials for the systems they need to access. Provides organisations a simple, fast way to manage credentials and access from the cloud.
  • How to Securely Enable Remote Work in the COVID-19 Era Recorded: Mar 23 2020 3 mins
    BeyondTrust Senior Security Engineers
    As employees across Asia Pacific and ANZ are being asked to work from home due to the COVID-19 outbreak, companies, universities and government organisations are being forced to implement new remote working policies. However, an expanding remote workforce can increase your security risk, especially if IT and Support employees use non-secure remote access tools as temporary measures. Watch this video to learn how Secure Remote Access tools can help.
  • Solution Demo - BeyondTrust Endpoint Privilege Management for Desktops Recorded: Mar 21 2020 14 mins
    BeyondTrust Senior Security Engineers
    Watch this tech demo video to understand the importance of enforcing Least Privilege on Windows and Mac desktops, to effectively stop cyber-attacks. You will learn how to eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering end-user productivity.
  • Solution Demo - BeyondTrust Password Safe and Session Recording Recorded: Mar 20 2020 27 mins
    BeyondTrust Senior Security Engineers
    In this technology demo you'll see how the BeyondTrust Password Safe helps organisations to discover, manage, audit, and monitor privileged accounts of all types. Learn how to use this powerful tool to reduce the risk of privileged credential misuse through automated password and session management, as well as secure, control, monitor, alert and record access to privileged accounts.
  • Solution Demo - BeyondTrust Remote Support Recorded: Mar 20 2020 24 mins
    BeyondTrust Senior Security Engineers
    In this technology demo you'll see how BeyondTrust Remote Support solution allows IT admins to resolve issues more quickly, improving productivity and end-user satisfaction. Learn how this great solution helps you to see and control remote devices, see your customer's screen and fully interact with the remote desktop; troubleshoot issues and fix end systems on or off your corporate network.
  • The Journey to Universal Privilege Management Recorded: Mar 5 2020 10 mins
    Morey Haber, CTO & CISO, BeyondTrust
    Watch this video to learn how BeyondTrust breaks the attack chain and the core Privileged Access Management use cases covered by our universal privilege management model.
BeyondTrust Software Asia Pacific Pte. Ltd - Channel
BeyondTrust Software Asia Pacific Pte. Ltd - Channel

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is Your Tuesday Patched Enough? An Analysis of Microsoft Security Updates in '19
  • Live at: Apr 9 2020 2:00 am
  • Presented by: Ajay Kumar, Regional Director for Security Engineering – APJ, BeyondTrust
  • From:
Your email has been sent.
or close