Webcasts


Upcoming

Cloud CRM Security Essentials Summit: Strategies for Protecting Your Most Valuable Data

Don't leave your CRM data exposed. Join our expert-led summit to gain actionable insights and proven strategies to protect your cloud-based CRM from today’s most pressing security threats. Reserve your spot now and stay ahead of the risks.

Date: 07/08/2025

Time: 10:00 AM

Duration: 2 Hours


From Azure to AWS, Closing the Security Gaps in Your Cloud Database Summit

Don’t let hidden vulnerabilities put your cloud database at risk. Join our free virtual event to get expert guidance on securing your data, closing access gaps, and tackling compliance challenges head-on. Reserve your spot now and start building a cloud-ready security strategy.

Date: 07/16/2025

Time: 10:00 AM

Duration: 10:00 AM


Next-Gen Database Security Strategies for the Intelligence Era Summit

Stay ahead of today’s evolving threats with smarter, data-driven defense. Join our expert-led event to uncover how advanced analytics and posture management can help you detect and stop database attacks before they happen. Don’t wait, secure your spot now and strengthen your security strategy.

Date: 07/29/2025

Time: 10:00 AM

Duration: 2 Hours


2026 IT Security Outlook Summit

Stay ahead of the evolving IT security landscape! Join this free virtual summit to explore the top threats, technologies, and strategies shaping cybersecurity in 2026. Register now to gain expert insights and ensure your defenses are ready for the future!

Date: 12/12/2025

Time: 9:00 AM

Duration: 3 Hours


On Demand

QR Codes Exposed: From Convenience to Cybersecurity Nightmare

Join us for this eye-opening webinar where Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, will peel back the layers of QR code attacks and arm you with the knowledge to fortify your defenses.

Duration: 1 hour


Closing the Gap for Government Agencies: 5 Ways to Automate Cyber Resilience

Don’t let identity infrastructure vulnerabilities put your agency at risk! Join Gil Kirkpatrick in this session to discover five key security steps you can automate to strengthen your defenses, detect threats faster, and recover from attacks with confidence. Secure your spot now and take the next step toward cyber resilience!

Duration: 1 Hour


The Definitive Microsoft 365 Data Resilience Playbook Summit

Don't leave your Microsoft 365 data resilience to chance—join us for The Definitive Microsoft 365 Data Resilience Playbook Summit and get the expert insights you need to strengthen your recovery strategy. Learn how to protect against ransomware, accidental deletions, and compliance gaps with proven best practices. Secure your spot today and ensure your business is prepared before disaster strikes!

Duration: 3 Hours


Standardize for Innovation: Transitioning to Red Hat Enterprise Linux

Join us in this four-part event as we share the benefits and advantages of migrating from a community Linux® distribution to Red Hat® Enterprise Linux®. We encourage you to attend each session to fully understand the benefits of migrating and the support Red Hat can offer.

Duration: 4 hours


Disaster Recovery 101: Top Tips & Strategies for Microsoft IT Pro Summit

In this free educational summit, you'll get expert-level advice for disaster-proofing your Microsoft investments. Learn about the best native tools to safeguard your Microsoft data and apps, plus actionable insights for real-world scenarios. Don't wait -- register today!

Duration: 3 hours


From Noise to Action: Tuning SIEM Alerts to Focus on High-Risk Network Events

This session will explore how to transform chaotic alert streams into actionable intelligence. It will cover alert prioritization frameworks, focusing on events such as unauthorized GPO modifications, suspicious Kerberos ticket requests, and registry changes. The session will also address government-specific threat indicators, including predefined rules for detecting ransomware preparation, data exfiltration, and insider threats. Additionally, it will delve into automated triage, demonstrating how to escalate only the 1% of alerts that require human intervention.

Duration: 1 hour