2019 Vulnerability Management Predictions

Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management,  discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this webinar! Michelangelo & Parag Covered: Vulnerability scanning goals. Determining asset value. Attack Predictions: when will a vulnerability become dangerous? Vulnerability categorization. Remediation Goals.
Watch Now



Zero Trust Security For Your Distributed Workforces

2020 has caught many businesses off guard. Users, data, devices, critical business applications and networks have left the office and become more distributed. This shift in the way we work & do business has resulted in companies losing visibility into what was happening in their corporate and their employees’ personal networks, devices, and applications. This shift has also seen several cybercriminals and sophisticated hacking groups rapidly adjusting their technique
Watch Now

11 Ways to Defeat Two-Factor Authentication


Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Watch Now

Identity Security on the Rails: Simple Solutions to Disrupt Identity-Based Attacks

In today’s distributed work environment, Identity is the new perimeter, so it should come as no surprise that attackers consider identities both on-premises and in the cloud as High-Value Targets. With a valid identity, attackers can move laterally, escalate privileges, identify critical servers, and execute damaging attacks. Fortunately, Identity Security addresses identity risks and detects identity-based attacks.
Watch Now

Whitehouse-driven Cyber Security Strategy and How it affects your Business

Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now