Ransomware attacks and the dangers of third party access
Third-party access: the risk of ransomware attacks
Cyber insurance: is it worth it?
is cyber insurance now simply a must-have you can’t afford to ignore?
The Ransomware Threat: A Recipe for Success in the NHS
The NHS is a prime target for cyber criminals. Learn how the NHS is protecting itself with the help of Osirium.
Preparing for NIS2 - Osirium and ITogether webinar
NIS2 applies to more industries and has more severe penalties. Learn the changes and how PAM is crucial for compliance
Automating Active Directory Management Webinar
Active Directory (AD) tasks are some of the most common requests to IT Help Desks. This webinar shows how to lighten the load with IT Process Automation
How to prevent a ransomware attack - Osirium and PwC
Ransomware is the fastest growing threat to businesses, so how do they work and how can they be prevented? This Osirium and PwC webinar shows how.
Third parties and your infrastructure
It's critical to be able to work with third-party vendors and partners but often they have too much access to vital IT systems. Find out how to remove the risk in this webinar.
Why PAM should be in place (French)
Learn how to protect your critical infrastructure, secure vendor and third party access, and mitigate ransomware attacks. (French presentation)
Why PAM should be in place (Dutch)
Learn how to protect your critical infrastructure, secure vendor and third party access, and mitigate ransomware attacks. (Dutch presentation)
Stopping Ransomware Attacks for Universities
Educational establishments are under constant threat of cyberattacks. In this webinar, we'll look at how Privileged Access Security is a key solution.
IAM and PAM Strategies for 2021
This joint webinar by PwC and Osirium discusses key recommendations for IAM and PAM strategies in 2021
PAM Project Success
This webinar discusses practical lessons learned and recommendations to help improve rollout of PAM
This webinar discusses the many lessons learned from the transition to working remotely. It includes specific recommendations to keep organizations secure and staff working productively.