Events

  • Introduction to Stealthbits Technologies

    Stealthbits Technologies, Inc. is a customer-driven cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, our highly innovative and infinitely flexible platform delivers real protection that reduces security risk, fulfills compliance requirements, and decreases operational expense.

    Join this informative session led by Stealthbits' Chief Marketing Officer, Adam Laub, to learn about our mission, solutions, products, and why the world's most notable brands rely on Stealthbits to secure their most valuable (and often most vulnerable) assets - credentials and data.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, August 4, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Adam Laub
        Chief Marketing Officer
        Stealthbits Technologies

    Stealthbits' Data Access Governance Solution Overview

    Access and permissions to data are excessive and management is highly complex and error prone. The location of sensitive data is largely unknown (especially across unstructured data repositories) and is also the primary target in virtually every breach scenario. With increasing external pressures via existing and new regulations, 3rd party demands, and customer concerns, the need to gain control over data of all types has never been more dire.

    A well-executed Data Access Governance (DAG) program is the solution to the problem. DAG is about making access to data exclusive. It's about limiting the number of people who have access to data - and their permissions to data - to the lowest levels possible. Stealthbits' Data Access Governance solution provides organizations with the capabilities and approaches needed to identify, secure, and maximize the value of data wherever it resides.

    Join Adam Laub, Chief Marketing Officer, as he reviews the difficult data security and privacy challenges organizations face today and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, August 11, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Adam Rosen
        VP of Product Strategy
        Stealthbits Technologies

    Back to "The Basics"

    Pragmatic advice from Gavin Ashton, author of "Maersk, me, & notPetya"

    June 27, 2017 was far from a basic day for Gavin Ashton. As the Identity & Access Management SME and Service Owner for one of the world’s largest freight transport and logistics conglomerates, the day marked the beginning of two, intimately intertwined experiences. In the days and weeks to follow, he learned how to recover from a devastating ransomware attack that wiped out virtually everything of consequence. Over the course of many months, he subsequently learned about the effects – both negative and positive – such an event can make on an organization and an individual.This period of enlightenment taught Gavin about what’s really important, what cooperation really looks and feels like, and what really works for the IT professionals tasked with managing and protecting their organizations’ IT infrastructure from compromise and catastrophe.

    Join Identity & Security Expert and author of the viral “Maersk, me, & notPetya” blog post, Gavin Ashton, for a 60-minute crash course on why “Do[ing] the basics” is any organization’s best option for mitigating the risks associated with credential compromise and advanced threats. Stealthbits’ Field CTO, Gerrit Lansing, will also provide attendees a useful and valuable real-world practitioners guide to leverage when implementing Gavin’s advice, providing specifics on the approaches and tactics organizations can leverage to quickly secure what matters most.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Thursday, August 13, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Gavin Ashton
        Identity & Security Expert
        Author

      • Gerrit Lansing
        Field CTO
        Stealthbits Technologies

    Stealthbits' Active Directory Management & Security Solution Overview

    Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure. AD contains the most critical credentials, which is why attackers have developed sophisticated attack tactics, techniques, and procedures that work with remarkable success. Active Directory’s inherent complexity leaves it prone to misconfiguration, exposing it to security risk that most organizations can’t handle due to the lack of resources necessary to monitor AD properly and protect it.

    Stealthbits believes AD is secure and efficient when it's clean, understood, configured properly, monitored closely, and controlled tightly. Our industry-leading suite of AD solutions enable organizations to effectively manage and secure AD at the levels required to mitigate the risks of advanced attacks, compliance failure, and operational outage.

    Join Rod Simmons, Stealthbits Technologies' VP of Product Strategy - Active Directory, as he reviews the many challenges organizations face in the management and security of AD and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, August 18, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Rod Simmons
        Stealthbits Technologies' VP of Product Strategy - Active Directory
        Stealthbits Technologies

    AD Threat, Policy Enforcement, and Cloud Visibility Enhancements to Keep You a Step Ahead

    In the latest releases of StealthDEFEND®, StealthINTERCEPT®, and Stealthbits® Activity Monitor, Stealthbits has added new and enhanced AD attack detections to our comprehensive library of detectable attacks. Additionally, Stealthbits has provided new tools to remove the signal-to-noise ratio within important datasets like Active Directory LDAP activity, allowing you to more easily pinpoint attack behaviors. Auto-response playbooks provide immediate reaction and containment of detected attacks and new follow-up actions can be linked and auto-triggered based on the results of previously executed responses.

    To learn more about the many enhancements we’ve made across StealthDEFEND, StealthINTERCEPT, and Stealthbits Activity Monitor, register for the webinar, where we’ll cover:

    • Pass-the-Ticket (New) - Detect the theft of Kerberos Ticket Granting Tickets (TGT) and their use by a threat actor for lateral movement
    • Group Managed Service Account (GMSA) Exploitation (New) - Detect unauthorized retrieval of Group -Managed Service Account passwords
    • Golden Ticket & Forged PAC (Enhanced) – leverage new Ticket Granting Tickets (TGT) cache for more accurate detection
    • User Behavior Analytics (Enhanced) – detection speed and visualization of behavior anomalies over time have been improved
    • Automatic Threat Response via Playbooks – Playbooks are a series of response actions automatically following the detection of a threat. Now gain the ability to trigger follow-up playbooks based on whether the actions in the first playbook were successful or not
    • Enhanced LDAP Filtering – Remove LDAP query ‘noise’ and improve threat detection by filtered based on search scope, attributes requested and returned, and number of items returned
    • Active Directory Read Event Auditing – Gain the ability to enable surgical auditing of attribute read events that could indicate reconnaissance or other nefarious activities
    • FSMO Role Owner Changes – Detect when FSMO roles are moved or seized by a new system
    • Azure Active Directory Monitoring – Check for varying changes that could signal a threat (Stealthbits reports on over 800 events across different categories and services)

    Led by Rod Simmons, VP, Product Strategy over Stealthbits’ Active Directory Solution Portfolio, you’ll learn about how these new features work and the value they bring.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Wednesday, August 19, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Rod Simmons
        Stealthbits Technologies' VP of Product Strategy - Active Directory
        Stealthbits Technologies

    Stealthbits' Privileged Access Management Solution Overview

    Privileged Access Management (PAM) tools have proven to be essential components of information security and compliance programs, yet privileged account compromise remains a nagging issue despite broad scale adoption of password vaults.

    Stealthbits' approach to Privileged Access Management fills the gaps and overcomes the challenges of traditional PAM solutions, providing comprehensive visibility into an organization's privileged account footprint, surgical control over privileged account usage, and the ability to effectively eliminate the sizable threat surface privileged accounts represent through the reduction of privileged accounts.

    Join Martin Cannard, Stealthbits Technologies' VP of Product Strategy - Privileged Access Management, as he outlines the challenges organizations face with traditional PAM tools and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, August 25, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Martin Cannard
        Stealthbits Technologies' VP of Product Strategy - Privileged Access Management
        Stealthbits Technologies
  • The global COVID-19 pandemic has resulted in the cancellation of most in-person events, but you can still join us for a live webinar or access our on-demand product demos and past webinars anytime!

  • Stealthbits’ Active Directory Management and Security Solutions

    On-Demand Product Demos

    Learn More

    Stealthbits’ Data Access Governance Solutions

    On-Demand Product Demos

    Learn More

    Stealthbits' Privileged Access Management Solutions

    On-Demand Product Demos

    Learn More

  • Stealthbits Technologies Corporate Overview On-Demand Webinar

    On-Demand Webinar

    Learn More

    3 Modern Active Directory Attack Scenarios and How to Detect Them with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    4 Active Directory Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    4 Service Account Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    10+ Up-To-Date Ways to Harden Windows Against Modern Active Directory Attacks with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    Anatomy of a Hack: How TEMP.Mixmaster Attackers Use TrickBot and Ryuk To Poach Big Game

    On-Demand Webinar

    Learn More

    Are Standing Privileges Making You a Sitting Duck?

    On-Demand Webinar

    Learn More

    Attackers Are Bypassing MFA - What You Need to Know and How Your Remote Workforce is Affected

    On-Demand Webinar

    Learn More

    Best Practices for Auditing Active Directory

    On-Demand Webinar

    Learn More

    CQURE’s Overview of Stealthbits Cyber Kill Chain Attack Catalog

    On-Demand Webinar

    Learn More

    Detecting Pass-the-Hash Honeypots with Honeypots

    On-Demand Webinar

    Learn More

    Entitlement Reviews: The Secret Ingredient To A Successful Data Access Governance Program

    On-Demand Webinar

    Learn More

    FCW & Stealthbits: The Problem with Privileged Access Management

    On-Demand Webinar

    Learn More

    International Traffic in Arms Regulations (ITAR) Compliance

    On-Demand Webinar

    Learn More

    Introducing Stealthbits Privileged Activity Manager 1.2

    On-Demand Webinar

    Learn More

    Lateral Movement Techniques and How to Detect Them

    On-Demand Webinar

    Learn More

    Prioritizing Password Security for Your Suddenly Remote Workforce

    On-Demand Webinar

    Learn More

    Simple Worthwhile Database Security Practices

    On-Demand Webinar

    Learn More

    Storage Reclamation Across a Distributed Environment

    On-Demand Webinar

    Learn More

    What You Need to Know About NYCRR 500

    On-Demand Webinar

    Learn More