Webcasts


On Demand

Trends in Server Virtualization: A conversation with IDC

Join speakers, Gary Chen and Peter Lauterbach, for a discussion on industry trends and where and how technologies like Red Hat& OpenShift& Virtualization can help navigate a path forward.


Revolutionize Your Security Risk Prioritization: Continuous Threat Exposure Management (CTEM)

Streamline security with unified CTEM risk management. Derek Melber shares how to merge various security aspects into one view, reducing risks and costs while improving overall security. Learn more!


Transforming Employee Experience with Microsoft Viva

Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.


NIST SP 800-53: Essential Security Controls for the Current Threat Landscape

Join our webinar to take a look at the NIST SP 800-53 and learn how it can help federal agencies and other organizations protect themselves against attacks.


Still Developing Software the Old Way? Best Practices for Migrating to DevSecOps

In this webinar we explore best practices for seamlessly integrating security into DevOps to ensure that software development doesn't compromise security in its quest for speed.


Ransomware Recovery Summit: What To Do After an Attack

In this free, three-hour summit, our experts will outline the steps you need to take in the aftermath of an attack, how to recover your data, and the changes you need to implement to make sure it doesn’t happen again. Learn more.

Duration: 3 hours


How To Build a Responsible Ransomware Response Plan

Join Ian Thornton-Trump, CISO at Cyjax, in this exclusive session, as he walks through the organization’s locker room when the home team suffers the biggest loss of their careers.

Duration: 1 hour


You’re Doing Endpoint Security Wrong: How To Identify and Fix IT’s Biggest Pain Points

Unified endpoint management is critical for the security of your organization and the efficiency of your IT team. Let our experts show you how – register today!


Expert Active Directory/Azure AD Security & Management Insights

In this session, we will be looking at how you can properly secure and manage and secure your AD and Entra environments, so your systems, services, and data remain safe and secure. Join in to learn more!

Duration: 1 hour


Azure AD/Active Directory Security & Management Summit

The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!

Duration: 3 hours


Top Active Directory/Azure AD Security & Management Best Practices

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment.

Duration: 1 hour


Coffee Talk: Malware, Ransomware & Microsoft 365: What You Need to Know

Sign up for this free Coffee Talk to learn about the most notable Microsoft 365 vulnerabilities and attack methods today, and the proven best practices to stop them from doing your organization serious harm. Register today!

Duration: 1 hour


Endpoint Management Strategies for Secure, Simplified Environments

Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.


Cloud Security Best Practices for 2023 and Beyond

Together, attendees will engage in an enriching experience, empowering them to safeguard their cloud infrastructures and stay ahead in the dynamic world of cloud security.

Duration: 1 hour


Mid-Year Cloud Security Check: Top Emerging Attacks and Modern Best Practices Summit

Register for this free, three-hour summit to hear top independent experts share the biggest security trends affecting the cloud today, ways to mitigate attacks if they happen, and how you can stop them in their tracks before they do.

Duration: 3 hours


Managing Cloud Costs in 2023: Expert Advice Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review, and AWSInsider.net with independent experts as they bring you this free-half-day summit that will show you real-word tips, advice, best practices and gotchas all focused on enterprise cloud cost management realities and savings.

Duration: 3 hours


Security on Autopilot: Hybrid Cloud Automation Tips, Tricks and Best Practices

This free virtual summit will answer all of your automation questions, giving you expert-level insights on the best way to implement it for your organization and how you can take advantage of all of its security capabilities. Learn more!


The Biggest Hurdles of Cloud Migration (and How To Avoid Them)

This session will expose the challenges in cloud migration, encompassing strategic, technical, and human factors. Ideal for IT professionals, business leaders, and strategists, this session aims to equip attendees with practical insights for a smoother and more successful cloud migration journey.

Duration: 1 hour


Top 10 Dos and Don'ts of Cloud Migration Planning

This discussion looks at the top 10 do's and don'ts and best practices for cloud migration planning, including from on-prem to public, hybrid, and across multiple clouds. Don't miss out!

Duration: 1 hour


Cloud Migration 101 Summit

Learn how to avoid ALL of these problems straight from the experts in this free, three-hour summit. Get real-world guidance for your cloud migration, from streamlining your data transfers, to making sure all of your security bases are covered, to salvaging all of your legacy apps, and more. We’ve got you covered – sign up today!

Duration: 3 hours