Live & Recorded Webinars

Learn about the best practices of IT infrastructure auditing, get your questions answered and discover how Netwrix helps you gain visibility into your hybrid IT environment

Netwrix has become an Approved CPE Provider. Join our webinars and earn your CPE credits!

UPCOMING RECORDED

Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Join one of our top Netwrix system engineers as he demonstrates how to:

  • Quickly identify your biggest security gaps with the interactive Risk Assessment dashboard
  • Detect and investigate abnormal behavior with our alerts and Google-like search
  • Pass compliance audits with far less effort using our new Data Discovery and Classification feature
  • And much more

Sign up for the live demo now!

22
August
1pm EDT
22 August, 1pm EDT
Register Now

Forewarned is Forearmed: Detecting Windows Registry Attacks

You probably know that hackers have been using the registry’s Run and RunOnce keys for decades to automatically start their malware when a user logs on.  While those keys are still being used in attacks, there are many others you need to know about as well. In this webinar, Windows security expert Randy Franklin Smith will shine a light into several dark corners of the registry that bad guys are now exploiting.

In particular, we’ll review how the bad guys are exploiting the registry for privilege elevation, and the most recent way bad guys are leveraging the registry — as a storage location for their code, making their malware file-less. 

In this webinar, Randy will show:

  • Where to find up-to-date and complete lists of registry keys used for persistence – a list that keeps growing as years go by
  • Utilities for monitoring the registry
  • How to use Windows Auditing and the Security Log to monitor the registry
  • How bad guys hide code in the registry
  • Ways bad guys have elevated their privileges via vulnerable registry keys
  • How bad guys have injected malicious DLLs into legitimate processes via other registry keys
23
August
12pm EDT
23 August, 12pm EDT
Register Now

The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories: that the root cause of the incident was a non-malicious but uninformed person just like them. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches.

In this webinar, Liam Cleary will explain:

  • Common attacks that exploit unwitting end users: websites infected with malware, phishing e-mails, social engineering attacks and so on
  • Best practices for increasing the security intelligence of business users
  • Ways to avoid data theft by disgruntled workers and corporate spies
12
September
1pm EDT
12 September, 1pm EDT
Register Now

Know What Works: How to Succeed Despite the Shortage of IT Security Talent

While the insider threat is dominating the headlines and boardroom discussions, there’s another critical issue lurking in the shadows: a global shortage of experienced cybersecurity professionals. As organizations adopt cloud technologies, data volumes grow and IT complexity increases, this lack of talent can lead to data breaches, compliance failures and other costly errors.

By the end of this session, you will know:

  • How to find and hire the right people in your organization
  • How to increase the productivity of your IT security team
  • How to bridge the remaining skills gap with automated solutions that help detect security risks and anomalous user behavior before they result in a data breach
20
September
1pm EDT
20 September, 1pm EDT
Register Now

A Firm Foundation: Building a Culture of Cybersecurity Awareness

Too many organizations wait until an employee’s error results in a breach before they take employee security training seriously. Computer-based training and occasional email blasts are simply not enough. You need a company-wide security awareness program that encourages cooperation and communication, not just compliance to security policy and procedures.

Join this session as we share our experience with:

  • Bridging the communication and knowledge gap between security team and other business units
  • Raising the security consciousness and competency of business users
  • Efficiently teaching proper security behavior patterns
4
October
1pm EDT
4 October, 1pm EDT
Register Now

Frequently Asked Questions

How many CPE credits can I earn for watching a webinar?
Certificants can claim 1 CPE credit per hour for live webinars or recorded webinars.
Which Netwrix webinars enable me
to earn CPE credits?
You can earn CPE credits from any Netwrix webinar marked with the special CPE sign.