The COVID-19 outbreak has swept the world and countries are scrambling to cope with infections and deaths. How is COVID-19 an adversity for businesses on the cyber security front and an opportunity for cyber criminals?
Watch this on-demand webinar as we show you real-life examples of cyber attacks riding on the waves of COVID-19 and best practices to help you avoid becoming a victim of a COVID-19 themed cyber attack.
To support businesses enable a safe and secure mobile workforce, you are also entitled to complimentary use of selected security solutions. More details will be shared during the webinar.
Register for Event
For more information, contact Shaylin Lutrario at (201) 474-4281
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. For the attacker, the path of least resistance is to leverage a combination of credentials and available connections between one system and another natively available within the network, often referred to as "living off the land."
At the root of this are the challenges inherent in identity access management (IAM) and privilege control. Even organizations that have deployed privileged user management or privileged access management (PAM) tools still struggle with local credentials stored on systems that can be abused.
This webcast - co-presented with SANS - outlines methods for improving the process of monitoring and managing threats as well as how to better control identity access management (IAM) and privileged accounts by utilizing the Illusive Networks Attack Surface Manager (ASM).
March 31, 2020 9:00AM PT | 12:00PM ET
Ransom-Free, Rapid Recovery of Immutable Data.
Ransomware attacks are accelerating at unprecedented rates, morphing their variants to evade detection, and are now successful targeting your last line of defense – backup copies.
End the Extortion.
Join our industry experts for a threat briefing and the latest countermeasures being deployed to insulate and rapidly recover critical data – helping you neutralize the most crippling of extortion threats.
April 2, 2020 - All Day Virtual Event
This one-day event has several inspiring keynote speakers. We’ll have leading experts from around the world, including speakers from Microsoft, Nutanix and VDI Like a PRO.
There will be technical and business breakout sessions as well. Attend a deep dive in the technical track or learn about experiences from the field, with real customer cases in the business track.
The exclusive focus of this event will be the performance and tuning of virtual desktop environments. You’ll get the opportunity to talk to thought leaders in the industry and connect with peers in the EUC community.
We will also have a showcase of leading vendors in the VDI space for you to discover the latest solutions.
April 3, 2020 11:00 AM in Eastern Time (US and Canada)
How to work with Lakeside SysTrack for enabling support and monitoring for remote work scenarios.
Apr 3, 2020 11:00 AM in Eastern Time (US and Canada)
SailPoint is delivering the evolutionary advancement of Identity Governance through SailPoint Predictive Identity. Come hear how SailPoint Innovation is changing how Identity Governance Controls are implemented and performed.
Wed, Apr 8, 2020 11:00 AM - 11:45 AM EDT
Clearing the Path to Micro-Segmentation Software-Defined Segmentation Done Fast, Easy & Right
There are many misnomers on what Micro-Segmentation (also known as software-defined segmentation) entails, it’s broad spectrum of use cases and what features are essential when selecting a software-defined segmentation solution. We will dive into the concept of software-defined segmentation and the challenges it brings about, along with outlining the essential components and steps that should be on your list when embarking on a segmentation project to guarantee an improved security posture.
Key takeaways: The challenges of software-defined segmentation Software-Defined Segmentation use cases Learn key software segmentation roll-out steps Understand the solution requirements for software segmentation How to carry out software segmentation correctly, quickly and easily
April 9, 2020 10:00 AM PT / 1:00 PM ET
Applications power our digital economy. Through what is broadly referred to as digital transformation, businesses across all industries are becoming app-centric with the goal of moving faster, boosting efficiency, and securely delivering amazing digital experiences to not only customers and employees alike.
But without powerful application services behind the scenes, your apps are like cars without fuel.
In this webinar, we’ll cover:
We recommend virtually gathering your entire team so you can listen and connect on this important topic.
For more information about this or any of Gotham’s Services, please click the link below and complete the contact form.
Be the first to know about our latest events, webinars, and job openings!
Gotham Technology Group, LLC
5 Paragon Drive
Montvale, NJ 07645