Xsuite: Privileged Identity Management for Modern Enterprises

"In this webcast, we’ll explain how Xsuite and privileged identity management can stop attackers at multiple points in the data breach lifecycle, preventing damage and disruption. Join us to learn:

- Who are privileged users and why are they important?
- How do attackers exploit privileged users and their credentials to carry out breaches?
- See a hands-on demonstration of Xsuite and how it can manage, control, and protect privileged users and credentials and your business assets."
Watch Now

Spotlight

This year’s Cyber Defense East Africa conference has been centered around addressing issues of cyber security in a bid to tackle digital insecurities.


OTHER ON-DEMAND WEBINARS

Cyber Security Special Webinar-How To Dial With Cyber Risk

Data Guidence Financial

DataGuidance, in conjunction with Sidley Austin, will hold a webinar on 17 July which will examine the legal aspects of cyber security risk as a source of corporate liability.Topics covered will include the recently announced UK Government “Cyber Essentials Scheme” which aims to encourage businesses to build cyber security into their operations, how to reduce cyber security risks through insurance and how to put in place governance structures and risk registers to evaluate and deal with cyber security as well as data protection compliance, information security reviews and vendor/supplier contract review programmes.

"A Great User Experience – Why it’s Critical for Successful Identity Management"

A successful Consumer-Scale Identity Management Deployment is far more than just adding more users. The user experience becomes critical in the success of the deployment as a new type of user begins to interact directly with the identity infrastructure. This webcast will show how to sell these projects to the business and how to create a user experience that will help ensure its success

The In’s and Out’s of Next-Gen NAC

"Do you think you know NAC? Well think again! When introduced a decade ago, Network Access Control (NAC) was all the rage – but did not live up to its promise. Not only have NAC platforms matured, but, broader adoption of wireless, mobile, and BYOD technologies, and the mass onslaught of advanced threats are driving an entire new generation of NAC solutions. The session is led by the book’s author Steve Piper, CEO of CyberEdge, and contributor Scott Gordon, CMO, ForeScout, who will be joined by Morris Altman, Director of Network Services, Internet Security Officer at Queens College of CUNY. - Learn why NAC is in resurgence and what platforms offer - Get a feel for selection and deployment do’s, don’t and gotcha’s - See how to move to a continuous monitoring and mitigation stance "

Improving Cybersecurity Posture While Staying on Budget

Nuspire Networks

Nuspire's Shannon Culp and Dan Hoban discuss planning and prioritizing security projects, staying on top of the ever-changing threat landscape, and staying on track with your budget while doing so.