On Demand
Cyber defence tools are one thing, cyber defence skills & knowledge are how to make a difference. Join this “cyber fit to fight” defensive webinar and change the game to start winning against the threat actors.
Duration: 1 hour
Join our upcoming webinar as we explore the core concepts of ITDR, going beyond the limitations of IAM to offer a more proactive and adaptive security solution. Discover how ITDR leverages threat intelligence gathered from all identity-related systems within your environment, enabling continuous and real-time monitoring of user activities.
Duration: 1 hour
Data volumes are growing exponentially, driving up observability platform costs and slowing response times. Most organizations underestimate the impact of excessive and poorly understood telemetry data. But help is on the way! Telemetry Pipelines can enhance the value and reduce the cost of handling this data. Learn more.
Duration: 1 hour
In this information-packed Tech Talk, enterprise software support experts Mike Jones and Josh Arras talk with veteran technology journalist John K. Waters about the challenges enterprises are facing in this potentially costly Premier-to-Unified transition.
Join us for a deep dive into Azure Virtual Desktop (AVD) security, where we will explore essential strategies to safeguard your virtual desktop environment. Register now!
Duration: 1 hour
In this session, we'll discuss ransomware attacks in the context of a comprehensive program leveraging recovery strategies against attacks you can’t always prevent. Keep the data safe and keep the users working. Attend to learn how.
Duration: 1 hour
In today’s technological landscape, Active Directory (AD) is a constant attack point for attackers. A common vector of attack against Active Directory is via group policy. Group policy can be used as a very effective direct or indirect method of executing remote code, modifying security settings, changing user permissions, and much more.
In this 45-minute, on-demand webinar, learn how to (safely) manage and secure licenses and user access. Learn more!
Most enterprise ITOps organizations desire a state of self-healing systems capable of identifying and resolving issues without human intervention. While the allure of eliminating known, repeatable incident response workflows offers immense promise, these initiatives often fail to get off the ground. Learn how IT operations can jumpstart automation programs that tie together BigPanda Incident Intelligence with Red Hat® Ansible® Automation Platform – so you can go from knowledge to automated response.
This webinar aims to equip educational IT professionals, administrators, and decision-makers with the knowledge and strategies needed to protect student data, ensure uninterrupted learning, and navigate the cybersecurity landscape effectively using Datto's powerful tools. Join us to fortify your educational institution's cybersecurity defenses and ensure a safe learning environment for all.
Duration: 1 hour
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Duration: 1 hour
Join this webinar for a new approach to building cyber resilience for the employees on the front lines of your organization.
Duration: 1 hour
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Duration: 3 hours
Join us for this free, half-day summit where some of the industry’s top independent experts will share their tried-and-true methods for designing, implementing and managing a disaster-proof Microsoft 365 backup and recovery plan. Make sure your Microsoft 365 data doesn’t get lost to the ether if (or when) disaster strikes – register today!
Duration: 3 hours
Microsoft 365 creates a far more granular environment in which users and their resources are often far more isolated than before, potentially creating far greater resilience than ever if managed properly. In this session, Senior Resultant Howard M. Cohen looks forward to suggest how we can better prepare our networks, our data, our devices, and our people to survive and successfully recover from all these modern disasters and more.
Duration: 1 hour
If you are an IT professional or a business leader, and you use Exchange, SharePoint, Teams, or other Microsoft 365 applications, you will benefit from this session. This session will help you ensure the security and availability of your Microsoft 365 data and services.
Duration: 1 hour
Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4’s SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.
Duration: 1 hour
Are you struggling to understand user complaints about application performance? Register Now to learn how monitoring end user experience can help you better optimize your applications and more! thank you
Duration: 1 hour
Our panel of experts and industry insiders will help you determine the best ways to plan, configure, migrate and manage your most critical infrastructure solutions for the cloud era. Whether you’re looking to learn more about cloud-based identity management with Entra or cloud-based VDI with Azure Virtual Desktop (or both!), we’ll guide you through the intricacies of building a more secure, scalable and cost-effective environment. Register today!
Duration: 3 hours
Join Scott Lilly, Quest Product Manager & Joe Sharmer, Quest Principal Strategic Systems Architect as they discuss options that don’t require a complete reimage of your devices.
Duration: 1 hour