Beyond Trust – Page 2 – Digital Nova Scotia – Leading Digital Industry
Digital Nova Scotia
  • Home
  • About
    • Meet Our Team
    • Board of Directors
  • Membership
    • Membership Options
    • Referral Program
    • Member Directory
    • Member Marketplace
  • Events
  • Programs
    • Digital Assistance & Adoption
      • Forestry Digital Adoption Program
      • Digital Twin for an Organization Adoption Program
      • Tourism Digital Assistance Program
      • Tourism Digital Assistance Program – Communities
      • Digiport
      • Digital Days
    • Skill Building
      • Deliver a Training Session
      • Next Level Skills Programs
      • Google Learning Program for Businesses
      • AI Microcredential Program
      • PMP Certification Prep Training
      • skillspass
      • Skills For Hire Atlantic
      • LevelSec
    • Digital Discovery Camp
    • Diversity & Inclusion
      • Creating an Inclusive Culture
      • Digital Skills for Women+
      • TechQuity Award
    • Trade Missions
    • Tech Forward Awards
  • News
  • Job Portal
  • Resources
    • All Hands on Tech Podcast
    • Tech Ecosystem
    • Tech Market Dashboard
    • Requests for Service
    • Digital Essential Skills Tool
    • Technical Skills Assessment Tool
    • Non-Technical Skills Assessment
  • Contact

Beyond Trust

Beyond Trust

8 events found.

Beyond Trust

« All Events

Events from this organizer

Today
  • June 2022

  • Thu 30
    June 30, 2022 @ 12:00 pm - 1:00 pm ADT

    Zero Trust: Building Your Security Mesh With All Star Players

    Online

    Being intelligent with identity is crucial to any security or IT project. Our webinar series is designed to look at identities in relation to the market hot topics, and provide you, with clear takeaways on what you need to do now. As envisioned by NIST (SP 800-207), Zero Trust security models eliminate persistent trust and enforce continuous authentication, least privilege, and adaptive access control. This strategy also applies segmentation and micro-segmentation for secure access. A zero-trust approach is about constant visibility into who is doing what on your network. This ensures maximum control over network security and network access. One thing analysts, enterprises, and customers alike can agree on is that the journey to Zero Trust must start with Identity and Privilege. But choosing the right technologies to incorporate into your security mesh can feel a little like choosing a team to play a baseball game without anyone playing together before. You have a finite amount of members you can have on your team and you want the best person for each position, but without practice you have no idea who that is. So how do you choose your winning team? Much like baseball, you’d choose your team based on […]

  • February 2023

  • Wed 1
    February 1, 2023 @ 1:00 pm - 2:30 pm AST

    Adventures in the Underland: Uncommon Hacker’s Persistency Methods and Countermeasures

    Online

    Persistence is one of the main aspects that hackers pay special attention to during the malware development and attack phase. The goal is very simple: to be as stealthy as possible. Usually, attackers aim to maintain the presence in the target's network by installing malware on various workstations and servers. However, the main challenge for them is that the malicious code needs to be available also after reboot, so the best solution would be to put it in a place that is not discovered by most of the monitoring tools. Sneaky, right? And when this persistency remains, the problems begin, and ransomware comes to action. Since there are so many places on Windows to stay hidden even from well-known monitoring tools, it would be great to become familiar with at least some of them, especially the uncommon ones! During this session, Paula Januszkiewicz, CEO and Founder of CQURE, Microsoft MVP and RD, Cybersecurity expert demonstrates several less common persistence methods we all should be aware of! All the scenarios which will be shown are taken from real life, so don't miss it and leave with suggestions & ideas how to attain the next level of security in your workspaces.

  • Tue 21
    February 21, 2023 @ 2:00 pm - 3:30 pm AST

    Removing Endpoint Admin Rights from Technical Users: Stopping the Attack While Enabling the User

    Online

    It's common knowledge that removing local admin rights is one of the most straightforward ways to protect an organization from cyberthreats. Without elevated privileges, threat actors can’t easily (if at all) identify admin accounts that can be used to move laterally and further an attack. In essence, without local admin rights, the endpoint is the end of the line for an attacker. It’s easy to remove local admin rights for end users that are in Marketing or Sales. But once you start trying to remove rights from technical users like development or QA that require more rights than just a local user, it becomes extremely difficult. It’s one of the reasons threat actors target these kinds of users in spear phishing attacks and job-themed social engineering attacks – the assumption is that the victim already has admin rights on the endpoint. So, how can you remove local admin from even the most technical user and still keep them working? In this Real Training for Free session, 4-time Microsoft MVP, Nick Cavalancia takes my seat and first will cover: Why local admin rights are a critical point in a cyberattack What MITRE ATT&CK TTPs rely on having local admin rights Up […]

  • March 2023

  • Thu 16
    March 16, 2023 @ 1:00 pm ADT

    Cybersecurity Trends for 2023 and Beyond

    Online

    Join Patrick Schneider, Sr Solutions Architect at BeyondTrust, as he discusses the top cybersecurity trends for 2023 and the years to come. Learn more about what security and technology surprises he thinks lie in store for 2023 and the remainder of the roaring 20’s, plus his preparedness plans for those predictions, including: The rise of ransom-vaporware The foundation of MFA invincibility fails The death of default/personal passwords And much more… Can't make it? No problem, the event will be recorded and shared with anyone who registered.

  • Tue 28
    March 28, 2023 @ 1:00 pm - 2:30 pm ADT

    Crouching Admin, Hidden Hacker: Privileged Access & the Unnoticed Masters | Part 2

    Online

    Crouching Admin, Hidden Hacker: Privileged Access & the Unnoticed Masters Part 2 Are there cyberattacks that are effective, reliable, and almost always work? Of course! Even when an organization’s infrastructure is well managed, patches are regularly installed, and the network is monitored – there are hackers that still find their way quietly in; be it via a misconfiguration, social engineering, or long-forgotten privileged account. There is always a hidden hacker waiting to strike! In this webinar with hacker, pen tester, Enterprise Security MVP and cybersecurity expert, Paula Januszkiewicz, learn: What are the biggest mistakes people make in multi-cloud and infrastructure security? Can moving to the Cloud help diminish the risk of a cyber breach? And how can you measure its effectiveness? How do hackers exploit misconfigurations to gain privileged access to accounts? How to protect against ransomware, malware, APTs, and even malicious insiders with a Zero Trust approach to security. Leave this webinar with world-class tips on how to attain the next level of security in your workplace…no crouching admin necessary.

  • April 2023

  • Wed 19
    April 19, 2023 @ 11:00 am - 12:00 pm ADT

    Bridging a Dangerous Gap Between Incidents and Cyber Crises

    Online

    The number of cyberattacks and breaches rises every year. The complexity and sophistication of attacks is also rising, and businesses have to reckon with extortion, regulatory reporting, and legal implications of each breach. Unfortunately, very few are prepared to deal with major attacks and breaches can produce catastrophic consequences. But there is a way to better mitigate risks: extending your technical incident response program to cover executive teams and their plans for leading through cyber crises. Join this session to learn: Cyber crisis that developed into catastrophes What went wrong? How could it have been handled differently? What preparatory steps would enable teams to take control? Core elements of a cyber crisis plan The difference from technical incident response plan Understanding the critical role executive level plans have How to reduce adverse effect How to save money How to have a limiting impact to internal teams

  • May 2023

  • Wed 10
    May 10, 2023 @ 1:00 pm - 2:00 pm ADT

    Mapping PAM to Cyber Insurance Requirements

    Online

    The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to re-examine their rates, premiums, and coverage. Insurers are looking closely at what industry classes they are willing to write as well as tightening underwriting requirements. During this session they will hear from David Hallstrom, National Cyber Advisor - Executive & Professional Risk Solutions (EPS), USI Insurance Services and Chris Hills, Chief Security Strategist, BeyondTrust as they discuss how the cyber insurance market is changing, why it is changing, and the new expectations for a company seeking to obtain, or maintain, cyber liability coverage. Learn how your organization can not only reduce cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.

  • June 2023

  • Thu 15
    June 15, 2023 @ 11:00 am - 12:00 pm ADT

    Better Together: Security Insights from IT/OT Convergence

    Nova Scotia, Canada

    For many years IT (information technology) networks have operated independently of OT (operational technology) networks. But digital transformation and the cloud drove convergence of the two as OT networks were connected to other networks and (ultimately) to the Internet. While this convergence brings new opportunities, it has also fostered a need for IT and OT teams to work together to ensure operations are protected and available. In a world where bad guys can search for misconfigured or vulnerable OT infrastructure using technologies like Shodan, the OT side of the house can represent both tempting targets and a pathway into the organization for lateral movement. In this session hosted by BeyondTrust, Diana Kelley will take a look at the differences between IT and OT and at the important characteristics that are shared across both. Rather than being at odds with each other, IT and OT teams can be better together. Topics to be discussed: Why availability is so important in an OT environment How segmentation in OT differs from IT Need for on-premise OT security controls Real world examples of IT/OT security team collaboration

  • Today
  • Next Events
  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live
  • Export .ics file
  • Export Outlook .ics file
Digital Nova Scotia

201-1875 Upper Water St. Halifax. B3J 1S9

Copyright © 2026 Digital Nova Scotia, All Rights Reserved.

Web Design Halifax - Red Ear Media

  • Privacy Policy
  • Terms of Use