Your 5 Step Checklist for PDPA Compliance
Disrupt the Cyber Attack Kill Chain!
Join this informative webinar to get an overview of the effects of Human/User Behaviour on the phases of the Cyber Kill Chain, especially in your Active Directory Management
This panel style presentation with Layer 8 and Stealthbits brings together experts on human behaviour and cyber security experts as they discuss the
– Role of human behaviour within an organisations security structure,
-Ways threat actors exploit an organisation’s lapses in human behaviour and
-Real-world tactics on how you can stop the threat actors at various points on the Kill chain to help mitigate these types of security breaches.
Presented by Dan Blidner and Ricky Calder from Stealthbits & Jesse De Haan from Layer8 Security
Your 5 Step Checklist for PDPA Compliance
The Personal Data Protection Act (PDPA) was established by the Parliament of Singapore in order to govern the collection, use, and disclosure of the personal data of its citizens. Since 2012, this law has helped promote the rights of individuals to protect their personal data, and the need of organizations to demonstrate documented data protection policies and processes and to prove those same policies and processes are actually implemented. The importance of data security and protection has only increased over the last 8 years, and it is more critical now, more than ever, to ensure you are compliant.
Join Adam Rosen, VP of Product Strategy at Stealthbits Technologies, as he reviews your 5 step checklist for PDPA Compliance and demonstrates how working with On Demand Systems (ODS) and leveraging Stealthbits Technologies’ solutions, you can:
- Discover the data you must protect
- Secure the data through Data Access Governance
- Monitor the data’s use to ensure protection
- Establish and enforce data protection policies to achieve compliance
Technical Deep Dive! Thycotic New Release update and PAM Maturity Assessments
Join Thycotic and emt Distribution for an informative 90 minute Technical Deep Dive demonstrating new features and functionality in recent software releases, a look at Thycotic’s new software Identity Bridge software, and an update on the PAM maturity assessment. This must-attend webinar is essential for all Australian and New Zealand providers of Privilege Access Management services and PAM professional services
• PAM maturity assessment
• Secret Server – 10.9 release
• Identity Bridge – 1.0 release
• Privilege Manager – 10.8 release
• Account Lifecycle Manager – August 2020 release
Kris Hansen, Strategic Accounts Director – Thycotic
Daniel Comarmond, Sales Engineer – Thycotic
The worldwide COVID-19 pandemic hasn’t necessarily changed how we do business, but almost instantly has changed where many of us do it from. Safe within the confines of our brick and mortar facilities and shielded LANs, we pushed stringent password security to the side in favor of other pressing projects. Now out in the open and spread across potentially thousands of locations, password security must rise to the top of the priority list.
Partnering with our APAC distributor, emt Distribution, Stealthbits Technologies encourages you to join Microsoft Regional Director and MVP for Developer Security, Troy Hunt, for an informative overview of password security and why prioritizing it now is more important than ever before. Learn more about his work on the Have I been Pwned (HIBP) database and how it can help keep your organization more secure. We’ll also have Rod Simmons, VP of Product Strategy for Active Directory (AD) from Stealthbits join to share his experience from the field and discuss the differences between on-premises password controls via AD and Microsoft Azure Password Protect, how your organization can align with popular NIST guidelines, and what stronger password policy means for risk reduction.
Join Charles Chase, an Independent IAM and PAM Consultant as well as one of Thycotic’s resident PAM experts Tim Carolan, while they discuss some of the use cases and benefits of moving from an on-premise solution to the Cloud. You will also gain valuable insight around why others have migrated to the Cloud and how the move can increase your scalability and flexibility.
During this valuable session your will learn:
- The financial benefits of moving from On-Premise to Cloud ‘PAM as a Service’ offering.
- How moving to the Cloud can increase your security position in a remote working environment.
- What a migration project looks like and the required resources, what are the financial benefits of moving from on-premise to Cloud ‘PAM as a service’ offering
Thycotic Channel Update – New Solutions Preview
Join Thycotic Strategic Alliance Director, Kris Hansen for a Thycotic Channel Introduction. This session will give you and your team the first look at Thycotic’s new PAM technologies that have been added to the portfolio. With both enhancements to Thycotic’s existing product line as well as 3 new stand-alone solutions, this session will cover how to position the product and how to obtain pricing. This webinar will also provide you with changes and updates to the Thycotic Channel program and how it can help you win more business with Thycotic PAM solutions.
Subscribe to our newsletter to keep up to date with all upcoming webinars, videos, blog posts, article and more
emt Distribution presents cybersecurity webinars that are thoughtful, relevant and topical for cybersecurity professionals in Australia, New Zealand, Asia Pacific, Singapore, and Hong Kong. emt Distribution’s webinars, advisories and on-demand resources tackle today’s cyber threats and how to mitigate them through the ASD and ACSC essential eight framework