У нас вы можете посмотреть бесплатно Let’s get to work: 100 days to secure your environment - Episode 1 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Welcome to Week 1 of the "100 days to secure your environment" webinar series—your guide to a more secure IT environment. In this episode, we outline a cybersecurity action plan for the first seven days on your way to hardening your environment. Key topics include: Identifying cyber “quick wins” Creating a secure test group Collecting data with ThreatLocker Avoiding common Allowlisting mistakes Properly deploying agents and configuring learning mode We look forward to taking you on a step-by-step journey to help secure your environment and locking out cybercriminals at the gate. 00:00 – Welcome to 100 Days to Secure 00:40 – Why this plan matters for IT leaders 01:20 – Our real goal: stop every business-ending cyberattack 02:00 – How to avoid killing your IT team’s approval rating 02:40 – What is a task group (and why donuts help) 03:30 – Building a safe test org with guinea pigs 05:15 – Why you should never roll out wide without testing 06:00 – What data to collect in Week 1 (file access, USBs, scripts) 07:00 – Track elevations & admin rights before restricting them 08:00 – Avoid low-risk assumptions (even speaker devices!) 09:10 – How to create your test org in ThreatLocker 10:20 – Deploying the agent & collecting telemetry 11:30 – Learning mode explained (and why “indefinite” is risky) 12:45 – Setting learning periods: 21 vs 45 days 14:00 – Ransomware risk when learning mode is left unchecked Try ThreatLocker for yourself: https://www.threatlocker.com/book-a-t... Subscribe for more webinars: / @threatlocker #ZeroTrust #CyberSecurity #ThreatLocker #ITSecurity #EDR #ApplicationControl #EndpointSecurity #Allowlisting #CyberResilience #CISOstrategy #secureyourbusiness Facebook: / thethreatlocker LinkedIn: / threatlockerinc Twitter: / threatlocker Instagram: / threatlocker YouTube: / threatlocker ©2025 ThreatLocker® Inc., All Rights Reserved.