Webcasts


On Demand

Don't Just Restore Data. Rebuild Your Cloud Environments With Commvault

Experience the future of cloud recovery with Commvault Cloud Rewind! Join our webinar for an exclusive live demo and learn how to reduce recovery costs, map and protect your cloud environment, and achieve seamless one-click recovery. Don’t wait—register today and take control of your cloud's resilience!

Duration: 1 Hour


Tech Talk | Azure Virtual Desktop Unlocked: Streamlining Management, Security, and Cost Control

Whether you’re an IT admin or a decision-maker exploring cloud VDI, this session will show you how an automation-driven approach simplifies AVD management and empowers teams to focus on strategic tasks instead of manual maintenance.

Duration: 1 hour


Meet Veeam Cyber Secure! Comprehensive Support Before, During, or After a Ransomware Attack

Equip yourself with all the essential information you need to protect, prepare, and build resilience against cyberattacks. Don’t miss this opportunity to enhance your cybersecurity plan!

Duration: 1 hour


Cloud Observability 101 Summit: How Well Do You Know Your Cloud Data?

Join us at this free summit to learn how cloud observability can help you take control of your cloud environment. Our panel of experts will provide actionable insights on keeping your data secure, compliant, and efficient. Register now to safeguard your cloud and stay ahead of potential risks!

Duration: 2 Hours


Recon 2.0: AI-Driven OSINT in the Hands of Cybercriminals

Join James McQuiggan, Security Awareness Advocate at KnowBe4, as he explores how attackers utilize AI and OSINT to quickly identify and prioritize targets. Learn how to develop robust cybersecurity strategies to counter AI-enhanced threats.

Duration: 1 hour


Proving the Value of Security Awareness Training to Your CFO

Join us for this webinar where Joanna Huisman, SVP of Strategic Insights and Research at KnowBe4, helps you understand the value and articulate the return on investment that security awareness training (SAT) programs can deliver.

Duration: 1 hour


Tech Talk | Microsoft Unified Support Myths - How to get more support for less budget

In this live, information-packed webinar, we'll dispel some of the biggest myths surrounding Microsoft Unified Support and share insights on how companies can maximize their support budgets without sacrificing quality.

Duration: 1 hour


Ins and Outs of Managing Unstructured Data Summit: What Enterprise IT Teams Need To Know

Take control of your unstructured data! Join our free, expert-led virtual summit to learn actionable strategies for securely storing, managing, and disaster-proofing your data. Don’t miss out—register today!

Duration: 3 Hours


Important Changes Coming to Windows

In this on-demand webinar, Matt Spero, Partner Business Development Manager at Insight, will delve into changes coming to Windows along with the AI-enabled and Windows 11 Pro device roadmap. Join in to learn more!


Zero Trust for Enterprise Data Resilience

Join us and zero trust expert, Jason Garbis, for a practical review of how you can implement ZTDR today.

Duration: 1 hour


Endpoint Security Refresh Summit: New Best Practices for Modern Enterprises

Learn how to harden your security posture in this free summit, where our panel of top experts will share their most useful best practices for securing all of your endpoints.

Duration: 1.5 hours


SaaS Data Protection 101 Summit: How To Prevent Disaster (and Recover When It Happens)

Join us to learn how to keep your SaaS data secure, compliant, and resilient. This expert-led, three-hour summit will guide you through essential defense-in-depth strategies, from the core principles to top solutions for sustainable protection. Don't miss out—register now to safeguard your organization's SaaS data.

Duration: 3 Hours


Tech Talk | Securing the Rise of Machine Identities: How Automation, AI, and Bots are Changing Cybersecurity

Join us for this insightful Tech Talk to learn how to safeguard your organization against growing cyber threats targeting machine identities. Discover practical strategies and automated solutions that enhance security, reduce risks, and streamline the management of service accounts, bots, and RPAs. Don't miss this opportunity to hear from industry experts and stay ahead of emerging trends!

Duration: 1 Hour


Defense-in-Depth 101 Summit: Trends, Strategies and Best Practices IT Teams Need To Know

Discover the keys to a stronger cybersecurity strategy at the Defense-in-Depth 101 Summit. Learn how to adopt a sustainable, multi-layered defense that keeps attackers out and your organization secure. Don’t miss expert insights, practical tips, and best practices—register now!

Duration: 3 Hours


Prepare for an AI-Powered World with Microsoft Azure

To harness AI’s full potential, enterprises require a robust and secure infrastructure. Microsoft Azure provides a dedicated cloud AI platform equipped with pre-trained models, scalable compute capabilities, and comprehensive data management services. Join in to learn more.

Duration: 1 hour


Shutting Down Session Hijacking and Credential Theft

Cybercriminals are constantly finding new ways to hack into Microsoft 365 accounts. In 2023, valid credential abuse was the top method used for initial access, accounting for 30% of incidents. Session hijacking vulnerabilities were identified in 15% of all security misconfigurations. Huntress is dedicated to providing you with the tools you need to combat today’s adversaries.


Back to School with Huntress Managed EDR

This webinar is designed for IT professionals, cybersecurity teams, and organizational leaders who are looking to enhance their endpoint security posture. Whether you are new to EDR or seeking to optimize your current strategy, this session will provide valuable insights into how Huntress Managed EDR can safeguard your environment.


That Phishy Feeling: Learning to Spot Modern Phishing

Your business’ security is only as strong as its weakest link, and more often than not, that weakest link is actually your people. According to Verizon's 2023 Data Breach Investigations Report, 74% of all data breaches involved people - well-meaning users, who accidentally clicked on a malicious link, inadvertently shared a password, or fell victim to social engineering.


Solving the SIEM Problem: A Hard Reset on Legacy Solutions

Every day, we’re bombarded by massive amounts of information. From daily news and stocks, to the latest box scores, keeping up with it all is a full-time job. Your IT infrastructure is no different. Millions of logs circulate through your IT systems, including firewall data, system logs, and endpoint events to name a few.


Account Takeover: What it Is, Why it Matters, and How to Prevent It

Check out this Huntress webinar for a live demonstration and behind-the-scenes look at Huntress Managed Detection and Response (MDR) for Microsoft 365.