Archived Events
This demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment.
Our Tenable OT Demo covered the following:
Comprehensive visibility across converged IT/OT ...
In this workshop, Tenable focused on the nuts and bolts of Active Directory and how best to secure it. Session highlights included: Domain controllers and FSMOs, AD/Windows Security Model, PowerShell and Active Directory overview tips, and more!
Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote ...
Discover and prioritize Active Directory vulnerabilities and misconfigurations to disrupt attack paths before attackers exploit them. Tenable Active Directory security prevents and detects sophisticated attacks such as Brute Force, DCShadow, DCSync, password spraying, and more without agents and privileges. Agencies can ...
This demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment.
Tenable OT Demo highlights:
Learned how organizations gain complete visibility across converged ...
While Active Directory (AD) implementations vary across enterprises, there are a number of common challenges that organizations face. In this workshop Tenable focused on the nuts and bolts of Active Directory, and how best to secure it.
Session highlights included:
Domain Controllers ...
Cybersecurity is usually framed in terms of IT – from malware to phishing to ransomware, federal agencies are paying attention to securing their networks and endpoints. But leaders often overlook security measures for operational technology (OT) and industrial control systems (ICS), such as building automation systems, ...
Tenable and Carahsoft security experts had an informative webinar to learn how you can implement a proactive approach for preventing breaches and exploitation.
Our discussion covered:
Why education is such a vulnerable environment for ...
During this webinar our experts reviewed how you can leverage passive automation to properly inventory OT assets, their workflows, communication paths, and protect them to an air-gapped level of security – without operation compromise ...
In this webinar, Tenable and Carahsoft took a deep dive into why preventative security is essential for preventing breaches and exploitation, as well as the benefits of real time continuous assessment for eliminating the attack pathways that the Bad Guys use for lateral movement and privilege escalation.