Webcasts


On Demand

Incorporate Zero Trust and SASE into your IAM strategy to secure your hybrid workforce

Join us as we discuss the security challenges involved in catering to a hybrid workforce, how Zero Trust and Secure Access Service Edge should be at the forefront of your IAM strategy and how to keep up with the key trends to build a strong IAM framework for your organization. Learn more.


A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

Join Roger Grimes for this thought-provoking webinar where he’ll share the most common reasons for data breaches and a data-driven approach to determining your organization’s specific weaknesses. Learn more.


Top 10 Tips for Cloud Infrastructure Heading into 2022

Join the experts as they discuss the top 10 tips for Cloud Infrastructure in 2022 surrounding networking, site connectivity, security, administration and more. Learn more.

Duration: 1 hour


Architecting Security for the Cloud

Join us as an expert reviews the importance of not relying on only one control, and what additional measures can be used to protect you, or at least mitigate, against future problems.

Duration: 1 hour


Cloud Infrastructure in 2022 Summit

Join this summit to find out what your top infrastructure and cloud security concerns should be for the rest of 2021 and heading into 2022. Learn more.


Top Microsoft 365 Security, Backup & Recovery Mistakes

Join us as we look into the common mistakes or assumptions related to making sure your data in Microsoft 365 is safe and how to correct them. Learn more.

Duration: 1 hour


Microsoft 365 Security, Backup & Recovery Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. Learn more.

Duration: 3 hours


The New Best Practices for Microsoft 365 Security, Backup & Recovery

In this Webinar, you will learn a number of data protection strategies particularly with regard to data backups and security. Learn more!

Duration: 1 hour


Negate Cyber Attacks: Secure Vulnerabilities, Misconfigurations, Privileged Account Attacks

The steps of a cyber attack against an enterprise are always the same. The exploits attackers leverage are nearly the same as well. Therefore, it is due time that we start protecting our networks with more intelligent approaches. Let 17X Microsoft MVP Derek Melber give you a clear path to a more secure network. Learn more.


Defending Against Active Directory Attacks That Leave No Trace

In this session, an identity and access management expert will walk you through some attack techniques that bypass traditional monitoring solutions. Learn more.


AWS Cloud Security Summit

Are you prepared to manage your entire AWS cloud ecosystem securely? Make sure you're truly secure with this free half-day summit. Learn more.

Duration: 3 hours


AWS Security, Backup and Recovery Best Practices

Join us to learn how to protect yourself against ransomware and the latest security threats as we discuss AWS Architectures designed for data protection, backups, and disaster recovery. Learn more.

Duration: 1 hour


Threat Detection Thursday — Life of a Zero-Day in the BlueVoyant SOC

Join this panel Q&A commenting on the lessons learned from the angles of Improved Detection, Threat Hunting, and Accelerated Response. 


Ransomware: All About the Benjamins

2021 has been a weird one for ransomware. We've seen more ransomware groups than ever either taken down by law enforcement or decide to "retire" but ransomware attacks have not slowed down at all. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.

Duration: 3 hours


Fuel Digital Transformation: Changing Document Productivity Challenges into Opportunities

The shift to a hybrid workforce and digital workspaces has caused many organizations to heavily rely on PDF documents, e-signatures and workflows to replace manual in-office processes that no longer meet current business needs. Learn more.


Challenges and Best Practices for Protecting Azure Kubernetes Services

Enterprises all over the world are seeing more mission-critical cloud-native applications deployed on Kubernetes. Learn more.


Transforming Cloud Security with SASE

SASE is a security framework designed to counter threats that thrive in an environment which is invisible and distributed. Learn more.


Modernizing Privileged Access Management: Stopping Cyberattacks in Their Tracks

How can you implement privileged access management where both flexibility and effectiveness are achieved? Learn more.


Top 10 Security & Backup Tips for Microsoft Office 365 and SharePoint Online

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.

Duration: 1 hour