Webcasts


On Demand

Best Practices for Architecting and Securing Your Hybrid and Private Clouds

During this session, we will examine several best practices for architecting your hybrid and private cloud environment so it will be as secure and resilient as possible. Learn more.

Duration: 1 hour


Understanding the Hybrid and Private Cloud Dynamics

Cloud computing technology is evolving fast! Join this session as we answer your top questions and learn what the best solution for your business needs are. Learn more.

Duration: 1 hour


Cloud Architecture & Security Summit

The enterprise most likely has a mix of hybrid/private cloud infrastructure —or is striving to achieve it. Join this summit and learn more.

Duration: 3 hours


Microsoft 365 Data Protection – It’s Not Just Backup

Join Redmondmag.com Editor-in-Chief Scott Bekker, 14-time Microsoft Office Apps and Services MVP Matthew McDermott, and Spanning Director of Product Marketing Dave Wallen for a lively discussion around Microsoft 365 Data Protection. Learn more.


Multi-Cloud Management Summit

Join this half-day virtual event to learn from topics like: Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Learn more.

Duration: 3 hours


Best Practices for Multi-Cloud Environments

Join IT industry veteran Howard M. Cohen in exploring some of these best practices, why they’re each critical to your success, and how they enable you to recognize the full value of your multi-cloud strategy. Learn more.

Duration: 1 hour


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Navigate your Hybrid Workplace Strategy with Microsoft Teams and BlueJeans

In this webcast you will learn about key predications regarding the future of the workplace, the next of Microsoft Teams for collaboration and how to get the office ready for a productive hybrid workforce. Find out more.


Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA Products

Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid. Learn more.


Migrating Your Microsoft 365 Tenant Through Mergers & Acquisitions

Mergers, acquisitions, and divestitures are common business activities that can have a huge impact on your Microsoft 365 tenant. Learn more.


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Would Your Organization Fail the Active Directory Security Assessment?

Join Microsoft identity experts as they walk through the most common weak spots in Active Directory configurations—and how to fix them. Learn more.


Building Your Distance Learning Experience

In the era of distance learning, education institutions have been forced to quickly adapt how their students learn as well as how their educators teach into a completely digital experience. Learn more.


The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

Join this webcast for a discussion on how AD engineers and architects can expand their roles and add value to the company by focusing on developing and implementing a strategy to ensure that AD is secure from malicious intruders. Learn more.


Why PSTs are Such a Bad Idea in the Cloud

Join us for a discussion about why we think PSTs are an obsolete and potentially dangerous storage location for email. Learn more.


Migrating Active Directory in a Work-From-Anywhere World

There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.


The FBI's Recommendations to Prevent BEC Attacks on Office 365 Users

Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.


The War on Ransomware Continues: Tips and Best Practices with Veeam v11

In this webinar, we'll share the latest tips for beating ransomware by assessing the threatscape and steps you can take to protect your data. Learn more.


The Modern SOC and the optimization of Microsoft Security

Company exposure today can appear in many sizes and forms. As a business ecosystem expands so do the risks, whatever the size of the company. By using the latest thinking from Microsoft, BlueVoyant is helping customers optimize their Microsoft 365 E5 license. By working with an expert to unite the security tools from one manufacturer, you can not only save money, time and resources but concentrate on managing those risks that actually have the potential to disrupt your business. Learn more.


The Latest on the Microsoft 365 E5 Security Licensing Journey

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he recaps their M365 E5 license bundle conversation from last October and shares insights on announcements made at Microsoft Ignite around Endpoint Management, Information Protection, and Identity and Access Management. Learn more.