Identity security can thwart 80% of cyberattacks

Online event

* Implement privilege creep prevention measures. * Enable multi-factor authentication for all users. * Restrict access to privileged actions based on risk controls. * Audit user activity for anomalous and suspicious behavior.

How to automate response to cyberthreats and increase your security maturity

Online event

* The need for automated response to achieve threat mitigation and remediation. * What do you need to consider while building an automated response workflow? * How to ensure that security analysts collaborate efficiently as they solve a problem. * How to track the state of an incident continuously. * Integration of a SIEM solution […]

Getting you up to speed with the latest features of ADAudit Plus

Online event

* Synology, Hitachi NAS, and Huawei OceanStor auditing. * Enhanced User Work Hours report. * Advanced DNS auditing. * AD replication auditing. * PowerShell script block auditing. * Detect Netlogon vulnerabilities. * Secure access to ADAudit Plus: TFA and SSO. * Audit remote workstations without using VPN. * Automatic configuration of servers and workstations. * […]

User provisioning made easy by integrating business applications

Online event

Automate employee provisioning.Instantly update your Active Directory with the changes made to the employee account details in your HCM solution.Automatically deprovision employees’ accounts and remove associated privileges as and when they leave the organization.

5 tactics of the MITRE ATT&CK framework to look out for

Online event

* What is the MITRE ATT&CK framework? * Tactics and techniques of the framework * Getting to know five crucial tactics given below and their related techniques: * Privilege escalation * Defense evasion * Credential access * Lateral movement * Command and control

The role of delegation and automation in IAM

Online event

* Implement least privilege delegation for IAM. * Build a checklist for effective identity creation and management. * Enforce supervision on automated IAM tasks.