Beyond Trust – Digital Nova Scotia – Leading Digital Industry

A Snapshot of Microsoft Across the Decade

Nova Scotia, Canada

For the past decade, BeyondTrust has annually compiled a holistic view of the vulnerabilities within Microsoft’s ecosystem to help you understand, identify, and address the risks to your organization. Their 10-year anniversary edition of the report dissects the 2022 Microsoft vulnerabilities data, highlights some of the key shifts since the inaugural report and assesses how to best protect your organization. Join BeyondTrust’s Chief Security Strategist, Chris Hills and Lead Cyber Security Researcher, James Maude in this upcoming webinar as they examine how the past ten years of vulnerability trends, along with emerging technologies, like cloud and AI, collectively influence how we should think about cybersecurity and risk management in 2023 and beyond. Chris and James break down: 10 years of Microsoft vulnerability trends and key data highlights from the report What we can learn from “The Vulnerability Snowball Effect” The top 5 mitigation strategies for protecting your organization from vulnerabilities and threats Key insights from some of the world's leading cybersecurity and Microsoft experts All attendees will receive a complimentary copy of the 2023 Microsoft Vulnerabilities Report! Meet the Presenters! James Maude,Lead Cyber Security Researcher James Maude is the Lead Cyber Security Researcher at BeyondTrust’s Manchester, U.K., office. James has broad experience […]

Defending Linux and Unix Systems: Hands-On Strategies Against Cybercrime and Compliance Challenges – with Demos!

Nova Scotia, Canada

As Linux usage continues to surge, so does the prevalence of ransomware and other cyberattacks targeting Linux systems. To address this escalating concern, BeyondTrust invites you to join their webinar, Defending Linux and Unix Systems: Hands-On Strategies Against Cybercrime and Compliance Challenges. Delve into the world of Linux cybersecurity with their expert CTO from InGuardians, Jay Beale, as they explore the evolving threats facing real-world deployments and demonstrate real-world attacks. During this session Jay will demonstrate attacks and discuss: The latest threats and cyberattacks to be aware of on your Unix and Linux systems The current and near-future state of regulations, with their impact on organizations How to manage privilege to improve security and reduce your risk to cybercrime, while ensuring compliance too In this webinar, BeyondTrust speakers will also help you discover the pivotal role of Endpoint Privilege Management in fortifying defenses by precisely controlling and managing user privileges, containing lateral movement, and collecting unimpeachable audit data.

Tracing Cyberattacks: Techniques for Extraction and Analysis of the Evidence

Why cyberattacks are so difficult to trace back? They are usually made by smart hackers who finish the raid without a noticeable trace. Sometimes they get caught, but most of the time they still run free. So, what to do when the bad guys are trying to access corporate data? During this super intense session hosted by Beyond Trust, the audience will learn how to establish informative monitoring that can alarm you if something goes wrong in your environment. They will be brought to the advanced level of monitoring the Windows operating system so that next time when something happens in their infrastructure, they will be able to collect data traces correctly. Beyond Trust will review the signs and symptoms of your systems being attacked as well as demonstrate ways of detecting intrusion patterns. During the session Paula Januszkiewicz, CEO and Founder of CQURE, Microsoft MVP and RD, Cybersecurity expert, will demonstrate the most up-to-date attacks, corresponding with techniques of discovery. It is going to be a super engaging session that showcases the best practices for information extraction. Participants will receive ready-to-launch instructions about how to extract information from various places in the operating system and monitoring solutions. After this session, […]

Key Steps of Must-Have PAM Capabilities to Secure Identities and Access

Identity is the new perimeter— and privileged access management (PAM) is the keystone of modern identity and access security. The reality of today’s threat landscape is that: The attack surface continues to expand and evolve – As the traditional perimeter has dissolved, the privileged threat surface has vastly expanded and grown more complex. Privileges continue to proliferate and become exposed in new ways - Almost every attack today requires privilege for the initial exploit or to laterally move within a network—and privileges are everywhere. Identities are increasing in number and complexity and coming under attack from more angles than ever before. Attackers are rapidly advancing in agility beyond just simple automation - While many breaches can still be prevented by simple security fundamentals, machine Learning (M/L) and Artificial Intelligence (AI) are changing the game, vastly enhancing attacker toolsets and empowering human-operated attacks. Join Beyond Trust to understand where to begin your PAM project, how to progress to a better security posture, and what business outcomes to expect. Raef will also explain the PAM basics that will mitigate most risks, highlighting the most important features and capabilities of a complete PAM solution to help you strengthen your Identity Security and account for every plane of […]

“Enter if You Dare”: Unveiling the Hidden Dangers Lurking in Your Data Center

Online

Join us! As Halloween creeps up on us, it's not just the ghosts and goblins that should send shivers down our spines. The real scares are happening in the world of cybersecurity, and they've been happening all year long. But fear not, because in this webinar, Dave Shackleford of Voodoo Security is going to take us on a spine-tingling journey through some of the most disturbing incidents and trends we've seen this year. And the best part? He's going to tell us what it all means for security professionals like us. We'll be diving deep into some seriously spooky topics, including: Major incidents of 2023 that left us quaking in our “boots” and what we’ve learned from them The terrifying world third-party risk and attack chains Why the most dangerous cybersecurity threat of the moment is identity & access risk Exploring risks to AND from machine learning and AI technology and how they can be both a blessing and a curse So, if you're ready to face your fears and learn about the most bone-chilling incidents and issues we face in security, then join us for this webinar. We'll be sharing some hair-raising suggestions for how we can improve our […]

Identity Security in a Digital Age: Evolutions, Challenges, and Future Prospects

Online

The digital age has brought about unparalleled convenience, connectivity, and opportunities. Yet, it also presents complex challenges in the realm of identity management and cybersecurity. Traditional perimeter-based security models are increasingly obsolete in today's hybrid digital environments. The rise of cloud services, IoT devices, and mobile workforces necessitates a fresh approach to identity protection and management. The evolving landscape has seen a shift towards identity-centric security frameworks, where understanding "who" is accessing "what" becomes central. With data breaches becoming more sophisticated and targeted, the importance of ensuring the right people have the right access to the right resources has never been more pronounced. In this session, we will delve deep into the intricate world of identity protection and management: The Evolution of Identity in Business: Understand how digital identities have evolved from simple username-password combinations to multi-faceted profiles involving biometrics, behavioral patterns, and more. Trends and Threats: A deep dive into the latest trends in identity management, from self-sovereign identities to decentralized systems, and the associated threats like identity theft, impersonation, and man-in-the-middle attacks. Moving Beyond Perimeters: Explore how businesses are shifting from perimeter-based defenses to identity-centric security models, emphasizing continuous authentication and authorization. Strategies for Robust Identity Security and […]

A Post Breach Analysis: Okta Support Unit

Online

About the session With increasing numbers of high-profile identity security attacks hitting the headlines, it is crucial to consider how to safeguard your organization. In today's attacks, identities, especially those with significant privileges, play a central role as attackers focus on exploiting identities and using social engineering instead of relying on exploits and malware. Join BeyondTrust’s Chief Technology Officer, Marc Maiffret and Director of Research, James Maude as they break down some of the common Tactics, Techniques, and Procedures (TTPs) that have been observed in recent Identity and Identity Infrastructure attacks including those that led to the discovery by BeyondTrust that Okta’s Support Unit had been breached. In this session learn about: The growing importance of identity security in today's landscape Research findings on Mercury and Scattered Spider How BeyondTrust's proactive approach helped uncover the Okta Support Breach Okta post breach analysis – privileges and personal accounts Best practices for securing identity infrastructure, including FIDO2 and access policies Successfully navigating the challenges of identity security not only calls for tools that can provide visibility, control over identities and privileges, risk reduction, and threat detection, but also requires a shift within the organization to connect the realms of identity, access, and […]

Tech Talk Tuesday: Identity Security Insights

Online

Maintaining a strong identity security is a significant challenge for organizations as they often lack comprehensive visibility into their full identity landscape. With the ever-growing number and intricate nature of identities in a constantly changing environment, organizations remain unaware of potential threats until it is too late. Join this technical product clinic on how to gain a comprehensive overview of identities, accounts, entitlements, and privileged accounts within your IT infrastructure and how to use these insights to better protect your identity landscape. In this session you will learn about: Centralized view of Identities and their entitlements Overview of Detections (Suspicious behavior of a threat actor) Overview of Recommendations (Aligning to Security Best Practices) During the first 15-minutes BeyondTrust’s Sr Solutions Engineer, Chris Weaver will demonstrate on how to learn how to effectively utilize BeyondTrust's Identity Security Insights solution.

The Significance of PAM and Identity Security in Navigating Trends & Cyberthreat Landscape

Online

About the session In the upcoming session, we will delve into the difficulties encountered by cybersecurity leaders in effectively managing security risks within intricate and ever-changing environments. This discussion will specifically address the challenges posed by Remote Work, Vendor Access, Elevation of Privilege, Vulnerability Awareness, and the Expansion of Hybrid and Multi-Cloud Infrastructures. We are pleased to have Chris Hills, Chief Security Strategist at BeyondTrust, as our speaker. Chris will provide valuable insights on emerging market trends related to identity and privilege, as well as the principles of zero trust security. Additionally, he will share a decade's worth of Microsoft vulnerability knowledge and shed light on the constantly evolving cyber insurance market. Furthermore, Chris will explore the composition of Privilege Access Management and its significance as a risk mitigation strategy. Attendees will gain a comprehensive understanding of what privilege access management entails and the key factors to consider when implementing it. We encourage you to join us for this informative session, which promises to offer valuable insights into the complex world of cybersecurity risk management. Meet the Presenter Christopher Hills Chief Security Strategist, BeyondTrust Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, […]

Year in Review and the Horizon Ahead: Tackling Cyber Threats Head-On

Online

About the session Hold onto your (white) hats as we look back at the highs and lows of the passing 2023 and prepare for the whirlwinds of the upcoming 2024! In this webinar, Paula Januszkiewicz, Founder and CEO of CQURE and a world-renowned cybersecurity expert will guide you through the labyrinth of the past year's most significant cybersecurity attacks. 2023 witnessed a surge in sophisticated attacks, ranging from Advanced Persistent Threats (APTs) to Zero-Day Exploits. Together with Paula, you’ll analyze them and learn to mitigate them better in the years to come. But that's not all! Our journey will go beyond learning from the past as Paula will share valuable insights and forecasts for 2024. What measures will become indispensable against the ever-evolving threats of ransomware, malware, phishing, and more? How will the cybersecurity landscape transform, and what strategies should organizations adopt to stay one step ahead? You’ll also discuss the chances and threats brought about by the rapid development of AI – a topic without which no conversation about the future is possible nowadays! Join Paula and take a moment to reflect about yesterday and tomorrow, because a lesson learned now can one day be a lifesaver! And as […]

Tech Talk Tuesday: Meet Cloud Mandates with BeyondTrust’s FedRAMP Authorization

Online

About the Session Security has always been at the core of BeyondTrust's solutions, and there are few business segments with stricter requirements than Federal, State, and Local government agencies. The Federal Risk and Authorization Management Program (FedRAMP) was designed as a government-wide compliance program that standardizes security assessments, authorization, and continuous monitoring of cloud products and services. BeyondTrust has achieved several FedRAMP authorizations and milestones recently and this webinar will cover the following topics: What is FedRAMP? Why is FedRAMP important? Why switch to BeyondTrust's FedRAMP offerings?

Paths to Privilege™: The Battleground in Identity Security

Online

About the Session Today’s organizations are facing more identity and access management headaches than ever before. Many are still maintaining some types of legacy identity platforms and applications, while new types of identity components are cropping up all the time. Despite the longstanding principles of least privilege and Privilege Access Management (PAM), the ever-evolving technology and threat landscape demands a deeper understanding of the indirect and often hidden paths attackers exploit. This complexity can leave both seasoned security professionals and those new to identity management wondering how to navigate the modern landscape. In this webinar, Dave Shackleford of Voodoo Security will break down: The various categories of identity that many enterprises are reliant on today, from traditional on-premises environments as well as cloud deployments. The types of privilege abuse that can (and does) easily occur Controls and considerations to help security teams better handle privileges within the entire identity estate. Following Dave’s presentation, BeyondTrust will reveal the concept of Paths to Privilege™ and explore the 5 fundamentals for protecting your paths to privilege. Learn why paths to privilege is today’s risk exposure point through things like vulnerable human & machine accounts, misconfigurations, remote access and excessive privileges. BeyondTrust will provide […]