25 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
MFA: Moving the World Beyond Passwords
Another World Password Day has come and gone, but do we really "celebrate" passwords or are they something we wish would just go away? Andrew Shikiar, the Executive Director & CMO of the FIDO Alliance, joins us share how the FIDO Alliance helps reduce the world’s over-reliance on passwords, focusing on their latest set of technical specifications - FIDO2. This is the industry’s answer to the global password problem, addressing...
June 18, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Mission: Possible - More Compliant with...
Government agencies hold a vast amount of sensitive information, ranging from personnel records, budgetary data, inter-community communications to intelligence findings related to terrorists and hostile nations. In turn, governments all over the world are continually under threat of cyber-attacks launched by rival nation-states, terrorist groups, hacktivists, and cyber criminals. In addition, they are facing insider threats as showcased by Edw...
May 28, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
DoD Webinar: VPN-Less Secure Remote Acc...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS WITHOUT A VPN. Current work-from-home requirements have resulted in government agencies enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Agencies of all sizes are at increased risk and need to secure remote access for privileged users, whose...
May 20, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
CyberCast LIVE: Minimizing Ransomware E...
KILL TWO BIRDS WITH ONE STONE:RANSOMWARE & PRIVILEGED ACCESS ABUSE While security awareness programs, regular updates to anti-malware, application whitelists, and data back-up cover your security basics, organizations need to understand that ransomware is just one form of exploit that can easily be replaced by another. According to Forrester, an estimated 80 percent of data breaches are tied to privileged access abuse. By implementing Iden...
May 14, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Cybercast Live: Secure Remote Access fo...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
April 13, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Human Insights on the RSA Human Element
The theme of the 2020 RSA Conference is the Human Element because humans are not only the most frequent cause of cyberattacks, but also the most powerful tool in preventing them. Each RSA Conference brings together thousands of your peers, offers hundreds of opportunities to learn from the industry’s most respected experts, and introduces attendees to the latest, most disruptive and cutting-edge cybersecurity approaches and solutions. Wh...
March 5, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
The Anatomy of a Hack: Perception vs. Reality
Learn the anatomy of a hack.Prevent a data breach. It’s a common belief that data breaches require a tremendous amount of sophistication to “break” through the almost impenetrable perimeter defenses that organizations have put in place. Hackers don't break in. They log in! Post-mortem analysis concludes that the source of a hack is most often compromised credentials, and the data proves it: 74 percent of respondents acknowled...
February 13, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Cybersecurity Best Practices: The Basic...
Cybersecurity Best Practices: The Basics and Beyond October is National Cybersecurity Awareness Month and a great time to take a critical look at your cybersecurity at home, in the office, and everywhere you go. Many people adopt different attitudes and practices regarding their personal and professional cybersecurity. It's our responsibility to protect not only ourselves but also our organizations. The first step is to be aware of modern thre...
October 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Myths of Privileged Access Management...
IT professionals engaged in cloud migration projects are legitimately concerned about security. Their organizations may have deployed a Privileged Access Management (PAM) solution to secure on-premises infrastructure yet worry remains whether legacy PAM can adapt to secure the entire hybrid enterprise. But with information overload it is hard to tell fact from fiction. To help uncover the facts, we’re hosting a webinar on August 29th whe...
August 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Steps to Minimize Your Exposure to Ra...
Ransomware attacks are dominating the headlines in 2019: City of Baltimore, ASCO Industries, and the Weather Channel are just a few of the examples. Holding someone or something for ransom is a simple yet effective criminal strategy used for thousands of years. Today, cybercriminals are applying these ancient techniques to modern technologies. And according to the FBI’s Internet Crime Complaint Center, the damages associated with ransomw...
July 25, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search