26 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Ransomware Defense: Protecting Critical...
The sharp rise in ransomware attacks on the critical infrastructure sector has cost millions of dollars in terms of payment and recovery in the past year. Ransomware attacks grew an astounding 485% in 2020 compared to 2019. As these attacks increase in persistence and scale, the federal government and NIST guidelines to improve cybersecurity and curb ransomware provide the required security measures to protect against such disruptive attacks....
October 13, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Leadership Lessons for Elite Teams
ThycoticCentrify invites you to our upcoming webinar featuring Brent Gleeson, a Navy SEAL combat veteran and leadership coach, as he presents, “Leadership Lessons for Elite Teams.” Brent will share stories and lessons learned from the battlefield, and how those best practices apply to leadership at any level, across any type of organization or team. Brent will leave attendees with at least three key takeaways that they can start ap...
April 28, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
PAM-demic Cybersecurity a Year after th...
Cloud transformation and granting secure remote access were two initiatives accelerated by cybersecurity professionals in 2020. Faced with a pandemic, virtual and remote became the new normal. While 48% of organizations accelerated their cloud migrations due to the pandemic, the urgency of businesses to adapt to the new normal often meant security was left behind. In this Centrify CyberCast, Dr. Chase Cunningham will share his insights on how...
March 18, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Valentine's Day Virtual Mixology ...
Elevate your at-home cocktail-making and cooking skills just in time to impress your Valentine at this fun and interactive class designed for information security professionals. Learn about the tools, techniques, and recipes mixologists and chefs use from your very own kitchen.We will provide a list of a few simple ingredients and tools in advance so we can whip up some delicious cocktails and a special entrée together! Don't drink alco...
February 10, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Navigating Through the Mind of a 2021 Hacker
The number of data breaches has skyrocketed in recent years, with global cybercrime-related damages expected to exceed $6 trillion annually by 2021. Just this past month, we faced a major supply chain attack, leveraging SolarWinds Orion software to deliver malware and compromise hundreds of organizations worldwide. While this campaign was allegedly carried out by a nation-state, it followed a common anatomy of a hack that consists of key basic...
February 3, 2021
Organizer: Centrify
Location: Webcast
Add Favorite
Cloud PAM Confidence
GOING TO THE CLOUD? There are so many complex decisions companies, IT staff and Security professionals must make; your PAM solution does not have to be one of them. WHAT DOES A BEST-IN-CLASS PAM SOLUTION LOOK LIKE? Works across multiple Cloud Service Providers while providing the same level of protection in your existing datacenters Simple implementation that does not require large amounts of Infrastructure Can integrate with your existing wor...
September 15, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
PAM 101
What is Privileged Access Management (PAM)? With so many names, acronyms and vendor capabilities, understanding PAM can be a challenge. Join us for this live webinar to learn what Privileged Access Management is and how PAM can enable you to reduce risk within your environment. We will review over the following key areas: What is Privileged Access Management Key objectives we see in every PAM project The history and evolution of PAM Key "gotch...
August 26, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
CyberCast Live: Enabling MFA Everywhere
Forrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged credentials. As a result, cybersecurity experts have recommended augmenting usernames and passwords with multi-factor authentication (MFA) to add an additional layer of security for access control. By adopting an “MFA Everywhere” approach, organizations can establish a reliable deterrent and ultim...
August 11, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Identity-Centric PAM: The Catalyst to B...
The healthcare industry is a prime target for threat actors, as it deals with a vast amount of highly sensitive data which needs to remain current and accurate, as life or death decisions may depend on it. In turn, healthcare records are a hot commodity on the Dark Web, often going for a far higher price than credit cards. That’s why it’s no surprise that healthcare is a heavily regulated industry. Those who work in this vertical n...
July 30, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
CyberCast Live: Minimizing Phishing Exposure
Modern Phishing Campaigns And Effective Prevention Phishing scams and schemes are becoming more creative every day as businesses and individuals find themselves the target of new tactics and techniques. User education and beefing up an organization’s email security systems are two essential steps that can minimize the exposure to phishing campaigns. However, recent research indicates that these preventive measures are not effective, as n...
July 14, 2020
Organizer: Centrify
Location: Virtual
Add Favorite
Back to Search Begin New Search