ONLINE COURSE

Remote Workers 101

Top 10 Things to Keep Track of

Get Free Webinar Series
{{ firstError }}
We care about security of your data.
Privacy Policy

The global scramble to establish or expand remote working is creating an unprecedented opportunity for attackers. Since most data breaches stem from inappropriate user behavior and excessive user permissions, it’s more important than ever to be able to closely monitor the behavior of your users and quickly spot suspicious actions, as well as to be able to identify your most sensitive assets and secure them by adhering to the least-privilege principle.

Register for the webinar
Detecting Insider Threats
{{ firstError }}
We care about security of your data.
Privacy Policy
Register for the webinar
Breaking Off Cybercriminals' Plans
{{ firstError }}
We care about security of your data.
Privacy Policy

Detecting Insider Threats

While IT teams are busy trying to figure out how to keep the wheels turning, threat actors are seeking to exploit the “work from home” situation. Most often, the root cause of security incidents is non-malicious but negligent end users. However, disgruntled employees can also take advantage of economic and societal uncertainty to strike. It’s up to IT pros to understand the techniques attackers use, educate their users about how to avoid common traps, and put tools and processes in place to promptly detect insider threats and avoid breaches.

In this webinar, we will walk you through:

  • Best practices for preventing data leakage, given users’ tendency to prioritize convenience over security
  • Ways to identify covert attacks by monitoring VPN logon attempts and detecting suspicious activity in cloud applications
  • 5 things you have to keep a close eye to detect abnormal user behavior, and how Netwrix functionality can help

Webinar Presenters

Ilia Sotnikov avatar
Ilia Sotnikov
Vice President, Product Management

Ilia is driving product innovation and strategy at Netwrix. His technical background is extensive in the areas of Security, Identity and Access Management, Vulnerability Assessment, Regulatory Compliance, SaaS and Cloud Computing. Ilia has over 15 years of experience in IT management software market. 

Adam Stetson avatar
Adam Stetson
Solutions engineer

Adam has over 10 years of experience in the IT field performing Active Directory migrations, integrations and installations for various businesses. Adam now helps organizations strengthen IT security, streamline compliance and optimize operations.

Breaking Off Cybercriminals' Plans

While we’re all trying to adapt to the new “work from home” reality, hackers are eagerly seizing the opportunity to get into your network through your expanded attack surface. So far, most attacks are aimed at exploiting the lack of proper IT security hygiene practices among remote workers. The key to protecting your valuable assets is knowing exactly what types of attacks to look for.

By the end of this session, you will know:

  • Common tactics and techniques that exploit the anxieties and weaknesses of remote employees, including credential phishing, malicious attachments and links in emails, and websites infected with malware
  • 5 things you need to closely monitor to prevent data breaches
  • Ways to identify compromised accounts and brute-force intrusion attempts

Webinar Presenters

Ilia Sotnikov avatar
Ilia Sotnikov
Vice President, Product Management

Ilia is driving product innovation and strategy at Netwrix. His technical background is extensive in the areas of Security, Identity and Access Management, Vulnerability Assessment, Regulatory Compliance, SaaS and Cloud Computing. Ilia has over 15 years of experience in IT management software market. 

Bradford Eadie avatar
Bradford Eadie
Systems Engineer

Bradford works closely with companies to determine how to best implement Netwrix Auditor inside of their environment to fortify security, increase productivity and satisfy compliance requirements.

Get Free Webinar Series
{{ firstError }}
We care about security of your data.
Privacy Policy