Webinars

Webinars

  • Going Back to Basics: Solid Endpoint Security Practices for SMB Success

    Mitigating the risks that attacks pose to an entity can be the difference between an SMB growing and succeeding - or it falling victim to a malicious attack and leaving business owners dealing with the aftermath for months. And when it comes to IT security and keeping your business and customers safe, it’s becoming increasingly apparent that the way to ensure you fall into the first camp - growing and succeeding - is to go back to basics and make sure that you have a solid endpoint foundation. The right endpoint foundation is cost-effective, requires the least skill set and enables businesses to build their security strategies up from there. In this fireside chat, Andrew Namisi, Senior Presales Engineer at Kaspersky and John Bruggeman, Chief Information Security Officer, Consulting at CBTS are joining forces to share vital information on endpoint security strategies for the SMB. Join them to hear: - What a solid endpoint foundation looks like in 2023 - Why SMBs need to do basic blocking and tackling, as well as prevention and detection - When and why SMBs need to implement endpoint detection and response (EDR), and when they need to - look at managed detection and response (MDR) - What an SMB-specific endpoint protection platform (EPP) can offer - How SMBs can guard against ransomware in a cost-effective way - And more Read More

  • Privilege vs Productivity: How to Elevate Local Admin Rights Securely

    Business and technical end-users often require local admin rights to perform tasks or access applications. Adding standard users to the local administrator group may provide workers the permissions they need but creates significant security risk and may violate regulatory compliance. Microsoft’s Local Administrator Password Solution (LAPS) also creates risk, as bad actors can easily exploit temporary privileged access. Without the right balance of privilege and productivity, organizations are forced to sacrifice security for operational efficiency. Fortunately, advanced endpoint privilege management technology provides organizations with the tools they need to securely elevate local admin rights on an as-needed basis. With advanced endpoint privilege management, domain administrators can elevate local admin rights for only the applications and processes end-users need. By elevating admin rights for specific applications and tasks, organizations can sustain organizational productivity without the risk of over-privileged users. Join Jeremy Moskowitz, 17X Microsoft MVP, for a demonstration of how this technology works and can be used to address common endpoint security and productivity challenges. During this webinar you will learn how advanced endpoint privilege management technologies: - Elevate admin rights for specific applications and processes across domain-joined, non-domain joined, MDM enrolled, and virtual environments - Overcome the security risks associated with LAPS and local administrator groups - Enable end-users to request elevated permissions on an as-needed basis - Manage read, write and execute permissions for USB sticks and external storage drives. Read More

  • Discover the latest cyber threat trends

    What does your cybersecurity posture look like in 2023? Tune into this webinar from Towerwall Founder and CEO Michelle Drolet as she discusses the latest cyberthreat trends and provides the necessary insights to defend against evolving attacks. Based on the research and real-world experiences, we will discuss: • The lasting cyber impact of the war in Ukraine. • The maturity of the “as-a-service” industry and how it has put advanced threat tactics into the hands of nearly any criminal. • How ransomware operators have evolved their activities and mechanisms, both to evade detection and to incorporate novel techniques. • A deep dive into the abuse of legitimate security tools by criminals to execute attacks. • An analysis of the threats facing Linux, Mac, and mobile systems. Read More

  • Protect your endpoints with evolutionary XDR

    What is XDR? What is extended detection and response? What does that even mean? The evolution of of endpoint protection (EPP) to managed detection and response (MDR) to eXtended detection and response (XDR) is natural and expected. Just as it was great to protect your desktops and servers -- the endpoints of your network -- with antivirus software, it naturally evolved into requiring 24x7 endpoint monitoring all 365 days of the year. Now that more and more companies are monitoring the network and firewall on a continuous basis, incorporating those threat intelligence feeds into your MDR solution to give you XDR is natural as well. But what all do you get with this evolutionary step? Tune into this session from expert John Bruggeman who will explore the major vendors in the XDR space, what they do and don't provide, and how you can make the right choice for your environment. Read More

  • Beyond the Endpoint – Tackling Your Biggest Cybersecurity Problems

    An overreliance on endpoint detection and response (EDR) alone is bound to leave holes in your cyber defense. That’s because cybersecurity incidents now originate from almost anywhere in the IT stack. In the case of our 4,500+ customers, over 60% of essential threat event and detection data comes from beyond the endpoints. Join us to learn how evolving threats are outpacing common defense strategies, leading many security organizations to rethink how to strategically upgrade their security and which security partner is best positioned to support them. We’ll also discuss the shortfalls of EDR protection alone — and how many organizations are looking beyond the endpoint for a more effective and efficient approach to cybersecurity. What you’ll learn: Why cybersecurity needs to move beyond the endpoint to keep pace with evolving threats and a growing attack surface The pitfalls of relying too heavily on endpoint detection and response (EDR) in your cyber defenses How to strategically improve your cybersecurity and choose the right security partner Read More

  • Shifts in the Threat Landscape

    The events of the past few years have shifted the threat landscape. Understanding your attack surface starts with recognizing the motivations behind current threats and where malicious actors plan to take them. Join this session to learn: - The current shifts we’re seeing in the threat landscape - Where you can maximize your threat defenses - Strategies to minimize cyber risk and build a better threat defense model Speaker: Jon Clay; VP, Threat Intelligence, Trend Micro Jon Clay has worked in the cybersecurity space for over 26 years. Jon uses his industry experience to educate and share insights on all Trend Micro externally published threat research and intelligence. He delivers webinars, writes blogs, and engages customers and the public on the state of cybersecurity around the world. An accomplished public speaker, Jon has delivered hundreds of speaking sessions globally. He focuses on the threat landscape, cybercriminal undergrounds, the attack lifecycle, and the use of advanced detection technologies in protecting against today’s sophisticated threats. Read More

  • SASE & Zero Trust -SUMMIT 2023 – SYDNEY UNLOCKING SECURITY AGILITY

    Gartner has released a statement that one-third of new SASE deployment will be based on a single vendor SASE by 2025. The emergence of the hybrid workforce has rendered traditional VPNs obsolete, as they can no longer keep up with the growing demand for remote access and end up allowing users to access all applications, thereby increasing the attack surface and the likelihood of lateral threat movement. CIOs have made it their top priority to implement a Zero Trust Network Access (ZTNA) strategy using a SASE/SSE approach, so that they can continue to concentrate on providing users, regardless of their physical location, with consistent contextual application access. Join this live SASE summit to explore: - The role that Fortinet plays in securing hybrid workforces through consistent convergence of networking and security - What makes the Zero Trust Network Access (ZTNA) method universally reliable for providing access wherever it is needed - The reason of why a best-of-breed, single vendor SASE approach is essential for today’s cyber landscape Read More

  • How PingOne DaVinci Can Accelerate Your Passwordless Journey

    In today’s world, digital experience is everything. It can mean the difference between winning a customer or simply getting work done. But for years, IT and the business have been at odds on how to deliver exceptional identity experiences. With DaVinci, our new identity orchestration service, you can design seamless, secure identity experiences while bypassing many of the common technical hurdles. Join this webinar, where we’ll focus on tackling customer and workforce passwordless use cases and show how DaVinci can expedite your passwordless goals. Technology advances, such as orchestration, have made passwordless available for a wide variety of use cases and requirements for Ping customers. We’ll highlight some of the passwordless options available to you, demo the end user experiences and take live questions. Read More

  • Securing your Business with Zero Trust

    Employees are highly mobile and critical applications have moved to the cloud. While these shifts create new opportunities for businesses, they also create new challenges for legacy security and network models. Cloudflare One is built for the modern business and its composable architecture meets customers where they are in their zero trust journey. As customers all over the world adapt to hybrid work in the wake of COVID-19 Cloudflare One radically simplifies IT administration, end user burden, and employee onboarding anywhere and everywhere employees need to connect. Join us and hear from the experts on: - How organizations of any size can use Cloudflare One for a natively integrated Zero Trust Edge platform to protect and accelerate the connectivity of devices, applications, and entire networks to keep hybrid workforces secure and productive. - What do the most successful zero trust deployments have in common? - What common roadblocks do buyers encounter? Read More

  • Investing in the Right Partners During Economic Uncertainty

    As ecosystems expand, it is now more important than ever that Partner Marketing organizations have strategies in place to identify, develop and invest in those partnerships that help them grow and achieve success. Join Robin Wolf, Sr. Director of Partner Marketing at NVIDIA, as she sits down with Partner Marketing executives Patty Grow of Amazon Web Services (AWS), Joseph George of HPE, Tyler Briggs of Box and John Manos of Virtusa as they discuss how they invest and prioritize partners over others to support the market demands of growth with and through partners. This session will address: • Why certain partners are prioritized over others to become strategic partners. • How to sustain strategic partnership growth and overcome obstacles during economic uncertainty. • Strategies a Partner Marketing team must take to successfully activate partners. Speakers: Robin Wolf, Senior Director of Partner Marketing, NVIDIA Patty Grow, Head of Partner Marketing, AWS Tyler Briggs, Senior Director of Partner Marketing, Box Joseph George, Global VP of Alliances and Product Marketing, HPE John Manos, Global VP of Partner Marketing, Virtusa Read More