Beyond Trust – Page 2 – Digital Nova Scotia – Leading Digital Industry

Zero Trust: Building Your Security Mesh With All Star Players

Online

Being intelligent with identity is crucial to any security or IT project. Our webinar series is designed to look at identities in relation to the market hot topics, and provide you, with clear takeaways on what you need to do now. As envisioned by NIST (SP 800-207), Zero Trust security models eliminate persistent trust and enforce continuous authentication, least privilege, and adaptive access control. This strategy also applies segmentation and micro-segmentation for secure access. A zero-trust approach is about constant visibility into who is doing what on your network. This ensures maximum control over network security and network access. One thing analysts, enterprises, and customers alike can agree on is that the journey to Zero Trust must start with Identity and Privilege. But choosing the right technologies to incorporate into your security mesh can feel a little like choosing a team to play a baseball game without anyone playing together before. You have a finite amount of members you can have on your team and you want the best person for each position, but without practice you have no idea who that is. So how do you choose your winning team? Much like baseball, you’d choose your team based on […]

Adventures in the Underland: Uncommon Hacker’s Persistency Methods and Countermeasures

Online

Persistence is one of the main aspects that hackers pay special attention to during the malware development and attack phase. The goal is very simple: to be as stealthy as possible. Usually, attackers aim to maintain the presence in the target's network by installing malware on various workstations and servers. However, the main challenge for them is that the malicious code needs to be available also after reboot, so the best solution would be to put it in a place that is not discovered by most of the monitoring tools. Sneaky, right? And when this persistency remains, the problems begin, and ransomware comes to action. Since there are so many places on Windows to stay hidden even from well-known monitoring tools, it would be great to become familiar with at least some of them, especially the uncommon ones! During this session, Paula Januszkiewicz, CEO and Founder of CQURE, Microsoft MVP and RD, Cybersecurity expert demonstrates several less common persistence methods we all should be aware of! All the scenarios which will be shown are taken from real life, so don't miss it and leave with suggestions & ideas how to attain the next level of security in your workspaces.

Removing Endpoint Admin Rights from Technical Users: Stopping the Attack While Enabling the User

Online

It's common knowledge that removing local admin rights is one of the most straightforward ways to protect an organization from cyberthreats. Without elevated privileges, threat actors can’t easily (if at all) identify admin accounts that can be used to move laterally and further an attack. In essence, without local admin rights, the endpoint is the end of the line for an attacker. It’s easy to remove local admin rights for end users that are in Marketing or Sales. But once you start trying to remove rights from technical users like development or QA that require more rights than just a local user, it becomes extremely difficult. It’s one of the reasons threat actors target these kinds of users in spear phishing attacks and job-themed social engineering attacks – the assumption is that the victim already has admin rights on the endpoint. So, how can you remove local admin from even the most technical user and still keep them working? In this Real Training for Free session, 4-time Microsoft MVP, Nick Cavalancia takes my seat and first will cover: Why local admin rights are a critical point in a cyberattack What MITRE ATT&CK TTPs rely on having local admin rights Up […]

Cybersecurity Trends for 2023 and Beyond

Online

Join Patrick Schneider, Sr Solutions Architect at BeyondTrust, as he discusses the top cybersecurity trends for 2023 and the years to come. Learn more about what security and technology surprises he thinks lie in store for 2023 and the remainder of the roaring 20’s, plus his preparedness plans for those predictions, including: The rise of ransom-vaporware The foundation of MFA invincibility fails The death of default/personal passwords And much more… Can't make it? No problem, the event will be recorded and shared with anyone who registered.

Crouching Admin, Hidden Hacker: Privileged Access & the Unnoticed Masters | Part 2

Online

Crouching Admin, Hidden Hacker: Privileged Access & the Unnoticed Masters Part 2 Are there cyberattacks that are effective, reliable, and almost always work? Of course! Even when an organization’s infrastructure is well managed, patches are regularly installed, and the network is monitored – there are hackers that still find their way quietly in; be it via a misconfiguration, social engineering, or long-forgotten privileged account. There is always a hidden hacker waiting to strike! In this webinar with hacker, pen tester, Enterprise Security MVP and cybersecurity expert, Paula Januszkiewicz, learn: What are the biggest mistakes people make in multi-cloud and infrastructure security? Can moving to the Cloud help diminish the risk of a cyber breach? And how can you measure its effectiveness? How do hackers exploit misconfigurations to gain privileged access to accounts? How to protect against ransomware, malware, APTs, and even malicious insiders with a Zero Trust approach to security. Leave this webinar with world-class tips on how to attain the next level of security in your workplace…no crouching admin necessary.

Bridging a Dangerous Gap Between Incidents and Cyber Crises

Online

The number of cyberattacks and breaches rises every year. The complexity and sophistication of attacks is also rising, and businesses have to reckon with extortion, regulatory reporting, and legal implications of each breach. Unfortunately, very few are prepared to deal with major attacks and breaches can produce catastrophic consequences. But there is a way to better mitigate risks: extending your technical incident response program to cover executive teams and their plans for leading through cyber crises. Join this session to learn: Cyber crisis that developed into catastrophes What went wrong? How could it have been handled differently? What preparatory steps would enable teams to take control? Core elements of a cyber crisis plan The difference from technical incident response plan Understanding the critical role executive level plans have How to reduce adverse effect How to save money How to have a limiting impact to internal teams

Mapping PAM to Cyber Insurance Requirements

Online

The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to re-examine their rates, premiums, and coverage. Insurers are looking closely at what industry classes they are willing to write as well as tightening underwriting requirements. During this session they will hear from David Hallstrom, National Cyber Advisor - Executive & Professional Risk Solutions (EPS), USI Insurance Services and Chris Hills, Chief Security Strategist, BeyondTrust as they discuss how the cyber insurance market is changing, why it is changing, and the new expectations for a company seeking to obtain, or maintain, cyber liability coverage. Learn how your organization can not only reduce cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.

Better Together: Security Insights from IT/OT Convergence

Nova Scotia, Canada

For many years IT (information technology) networks have operated independently of OT (operational technology) networks. But digital transformation and the cloud drove convergence of the two as OT networks were connected to other networks and (ultimately) to the Internet. While this convergence brings new opportunities, it has also fostered a need for IT and OT teams to work together to ensure operations are protected and available. In a world where bad guys can search for misconfigured or vulnerable OT infrastructure using technologies like Shodan, the OT side of the house can represent both tempting targets and a pathway into the organization for lateral movement. In this session hosted by BeyondTrust, Diana Kelley will take a look at the differences between IT and OT and at the important characteristics that are shared across both. Rather than being at odds with each other, IT and OT teams can be better together. Topics to be discussed: Why availability is so important in an OT environment How segmentation in OT differs from IT Need for on-premise OT security controls Real world examples of IT/OT security team collaboration