Integra Networks, a Plurilock Company

Learn More
1

Get in touch with us

Address

2733 Lancaster Rd, Suite 220
Ottawa, Ontario,
K1B 0A9

Office hours

Workdays at
9:00am – 6:00pm
Call us
+1 866 657 7620
+1 613 526 4945

Let’s get connected

Get in Touch

Webinar

  1. Events
  2. Webinar

Views Navigation

Event Views Navigation

Today

Differentiation through Innovation with Lenovo

The acceleration of technology change is disrupting all industries and provides an opportunity for organizations of any size to truly differentiate their business. Learn how Lenovo's ThinkAgile™ portfolio is continuously innovating to help customers differentiate their businesses and stay ahead of changing needs. Register Today

Tenable Nessus User-Education Session

The following complimentary education session for current Government of Canada Tenable Nessus® Professional users will address emerging security requirements. The Challenges Associated with Nessus Professional It is well-known that Nessus Professional users may struggle with specific challenges—including the regular maintenance required to keep the scanner updated (Nessus and OS), as well as the ability to […]

Webinar: Top Reasons to upgrade from Nessus to a Tenable Enterprise Platform

Scanning with Nessus is just the first step in your Vulnerability Management program. Learn how your enterprise level organization can evolve to the next level. When was the last time you confidently knew which vulnerabilities to remediate first? With Predictive Prioritization, you’ll know the 3% of vulnerabilities likely to be exploited and focus on what […]

Webinar: Highly Portable, Ruggedized and Secure 
Telecommunications and Data Center Solutions

Extreme-condition environments require deployable telecommunications and mobile data center solutions—built for interoperability and advanced cellular and IP networking. These types of solutions are paramount for the success of military operations, emergency response, disaster relief, humanitarian aid, law enforcement and other public safety agencies. This includes simultaneous secure connectivity to both carrier-provided and dedicated Public Safety […]

Security Briefing: Secure Active Directory (AD) and Disrupt Attack Paths

Behind every breach headline is an unsecured Active Directory (AD) deployment—attackers’ new favoured target for elevating privileges and facilitating lateral movement, by leveraging known flaws and misconfigurations.  Unfortunately, most organizations struggle with Active Directory security due to misconfigurations piling up as domains increase in complexity, leaving security teams unable to find and fix flaws before […]

Secure Active Directory (AD) to Disrupt Attack Paths

Special Guest: Derek Melber, Chief Technology and Security Strategist, Tenable The reality is many well-publicized breaches have roots in Active Directory (AD)—with attackers gaining AD access, resulting in escalated privileges and lateral movement throughout the enterprise. This happens largely because organizations struggle with AD misconfigurations due to increases in domain complexity—leaving security teams in a […]

Cyber Threats: The Danger of Hybrid Work Environments

It's no surprise that the hybrid work environment is here to stay. Whether that means work-from-home or any number of alternate environments, knowledge workers moving forward will be forever split between the traditional office and remote locations. Now, this new approach is challenging security teams to rethink legacy strategies to better support and manage the […]

Mitigating Cyber Security Threats in Hybrid Work Environments

As hundreds of thousands of knowledge-based workers begin to migrate back to in-office work environments this year and next, the work-from-home practices of the past 18+ months are not going away. In fact, the "new normal" dictates that the majority of office workers will still spend at least 2-3 days per week working remotely. To […]

How to Stop Active Directory Ransomware Attacks in Real Time

Active Directory (AD) is a major component within all IT infrastructure. It is ever-connected to the majority of mission-critical applications, services, and devices. More so, AD is the central component of Identity Access Management (IAM) and underlying security protocols. The challenge: by its nature, AD is always changing—and it’s this constant change that continues to […]

Thinking Like an Attacker: Understanding Attack Paths & Immediate Privilege Escalation

Securing Active Directory often involves the ongoing management of lists and spreadsheets. However, cybercriminals approach an attack from a completely different mindset—focusing on an attack path, not a list. Organizations can flip the proverbial script on attackers by thinking like an attacker—beating them at their own game. In this workshop, we will decrypt attack paths […]