UPCOMING WEBINARS
Navigating the New ASD Essential Eight Changes: A PAM Perspective with Delinea and emt.
Details
We are excited to invite you to a special webinar that will provide valuable insights into the recent updates and changes in the ASD Essential Eight controls, specifically focusing on how to address these changes for selling and upselling to end users. The webinar will be presented by Delinea, a leading Privileged Access Management (PAM) vendor, offering practical guidance for channel partners in Australia.
Webinar Details:
- 21 February 2024
- Time: 11:30 AM AEDT
- Duration: 1 hour
Agenda:
- Overview of ASD Essential Eight: Understand the significance of the Essential Eight controls in the Australian cybersecurity landscape.
- Recent Updates and Changes: Gain insights into the specific updates and changes in the Essential Eight controls.
- Implications for Channel Partners: Learn how to effectively communicate and address these changes with end users to enhance sales and upselling efforts.
- Panel Discussion and Q&A: Engage with industry experts to delve deeper into the topic and get your questions answered.
Speakers:
- Host: Ahmed Eltayeb, Delinea Partner Alliance Manager – ANZ.
- Presenter: Daniel Commormand, Delinea Lead Channel SE – ANZ.
- Guest: Aphrodite Lagoulis, Delinea VP – ANZ.
- Guest: Scott Hagenus, emt Distribution CEO.
This webinar will equip you with the knowledge and strategies to navigate the evolving cybersecurity requirements and leverage them for business growth.
On-Demand Webinars
Cyber Sec Webinar: Learn how to make value propositions to your customers for Netwrix IT security solutions.
Join in for Netwrix Partner Cybersecurity Sales Enablement Bootcamp on Tuesday, September 19 @ 11 AM – 12.30 PM AEST | 9.00 AM – 10.30 AM SGT, where a team of Netwrix subject matter experts will guide you through some of the robust security offerings as follows:
• PRIVILEGE SECURE: Secure privileged activity with Just-in-time and Just-Enough Access
• CHANGE TRACKER: Ensure the integrity of your entire infrastructure Authorisation and the cloud
• POLICYPAK: Centralised way to manage and secure endpoints
• PASSWORD SECURE: Manage Password Policies and Monitor Password Usage
Get to hear about common use cases; licensing; certification programs available; and how to leverage professional services.
Cyber Security Webinar: Your 5 Step Checklist for PDPA Compliance
Disrupt the Cyber Attack Kill Chain!
Join this informative webinar to get an overview of the effects of Human/User Behaviour on the phases of the Cyber Kill Chain, especially in your Active Directory Management
This panel style presentation with Layer 8 and Stealthbits brings together experts on human behaviour and cyber security experts as they discuss the
– Role of human behaviour within an organisations security structure,
-Ways threat actors exploit an organisation’s lapses in human behaviour and
-Real-world tactics on how you can stop the threat actors at various points on the Kill chain to help mitigate these types of security breaches.
Presented by Dan Blidner and Ricky Calder from Stealthbits & Jesse De Haan from Layer8 Security
Cyber Security Webinar: Your 5 Step Checklist for PDPA Compliance
The Personal Data Protection Act (PDPA) was established by the Parliament of Singapore in order to govern the collection, use, and disclosure of the personal data of its citizens. Since 2012, this law has helped promote the rights of individuals to protect their personal data, and the need of organizations to demonstrate documented data protection policies and processes and to prove those same policies and processes are actually implemented. The importance of data security and protection has only increased over the last 8 years, and it is more critical now, more than ever, to ensure you are compliant.
Join Adam Rosen, VP of Product Strategy at Stealthbits Technologies, as he reviews your 5 step checklist for PDPA Compliance and demonstrates how working with On Demand Systems (ODS) and leveraging Stealthbits Technologies’ solutions, you can:
- Discover the data you must protect
- Secure the data through Data Access Governance
- Monitor the data’s use to ensure protection
- Establish and enforce data protection policies to achieve compliance
Cyber Security Webinar: Technical Deep Dive! Thycotic New Release update and PAM Maturity Assessments
Join Thycotic and emt Distribution for an informative 90 minute Technical Deep Dive demonstrating new features and functionality in recent software releases, a look at Thycotic’s new software Identity Bridge software, and an update on the PAM maturity assessment. This must-attend webinar is essential for all Australian and New Zealand providers of Privilege Access Management services and PAM professional services
Agenda:
• PAM maturity assessment
• Secret Server – 10.9 release
• Identity Bridge – 1.0 release
• Privilege Manager – 10.8 release
• Account Lifecycle Manager – August 2020 release
SPEAKERS:
Kris Hansen, Strategic Accounts Director – Thycotic
Daniel Comarmond, Sales Engineer – Thycotic
The worldwide COVID-19 pandemic hasn’t necessarily changed how we do business, but almost instantly has changed where many of us do it from. Safe within the confines of our brick and mortar facilities and shielded LANs, we pushed stringent password security to the side in favor of other pressing projects. Now out in the open and spread across potentially thousands of locations, password security must rise to the top of the priority list.
Partnering with our APAC distributor, emt Distribution, Stealthbits Technologies encourages you to join Microsoft Regional Director and MVP for Developer Security, Troy Hunt, for an informative overview of password security and why prioritizing it now is more important than ever before. Learn more about his work on the Have I been Pwned (HIBP) database and how it can help keep your organization more secure. We’ll also have Rod Simmons, VP of Product Strategy for Active Directory (AD) from Stealthbits join to share his experience from the field and discuss the differences between on-premises password controls via AD and Microsoft Azure Password Protect, how your organization can align with popular NIST guidelines, and what stronger password policy means for risk reduction.
Join Charles Chase, an Independent IAM and PAM Consultant as well as one of Thycotic’s resident PAM experts Tim Carolan, while they discuss some of the use cases and benefits of moving from an on-premise solution to the Cloud. You will also gain valuable insight around why others have migrated to the Cloud and how the move can increase your scalability and flexibility.
During this valuable session your will learn:
- The financial benefits of moving from On-Premise to Cloud ‘PAM as a Service’ offering.
- How moving to the Cloud can increase your security position in a remote working environment.
- What a migration project looks like and the required resources, what are the financial benefits of moving from on-premise to Cloud ‘PAM as a service’ offering
Thycotic Channel Update – New Solutions Preview
Join Thycotic Strategic Alliance Director, Kris Hansen for a Thycotic Channel Introduction. This session will give you and your team the first look at Thycotic’s new PAM technologies that have been added to the portfolio. With both enhancements to Thycotic’s existing product line as well as 3 new stand-alone solutions, this session will cover how to position the product and how to obtain pricing. This webinar will also provide you with changes and updates to the Thycotic Channel program and how it can help you win more business with Thycotic PAM solutions.
Subscribe to our newsletter to keep up to date with all upcoming webinars, videos, blog posts, article and more
emt Distribution presents cybersecurity webinars that are thoughtful, relevant and topical for cybersecurity professionals in Australia, New Zealand, Asia Pacific, Singapore, and Hong Kong. emt Distribution’s webinars, advisories and on-demand resources tackle today’s cyber threats and how to mitigate them through the ASD and ACSC essential eight framework