Webcasts


On Demand

An Insider's Guide to Choosing an EDR

Are you in the market for an EDR solution? Have you thought about having it managed by an MDR provider? Are all of these abbreviations very confusing? We don’t blame you—in the world of cybersecurity, there are way too many terms you’re expected to know without much explanation. In this session, learn about the pros and cons of different EDR and MDR solutions for those without a ton of technical experience. This advice is for anyone looking for a new EDR or MDR, but is made specifically for non-experts, so you can make the best choice for your organization whether you’re a seasoned pro or not.


A Look at Group Policy Attack Paths

In today’s technological landscape, Active Directory (AD) is a constant attack point for attackers. A common vector of attack against Active Directory is via group policy. Group policy can be used as a very effective direct or indirect method of executing remote code, modifying security settings, changing user permissions, and much more.


Ransomware Recovery Summit: What To Do After an Attack

In this free, three-hour summit, our experts will outline the steps you need to take in the aftermath of an attack, how to recover your data, and the changes you need to implement to make sure it doesn’t happen again.

Duration: 3 hours


Cloud Desktop Resilience Blueprint: Expert Insights and Strategies

Don’t navigate this complex landscape alone! Join this free, three-hour summit to learn from experts about the common pitfalls in managing cloud desktops, the best practices for enhancing resilience in Azure environments, and strategies to keep your organization ahead of emerging threats.

Duration: 3 hours


Data & Data Center Strategies for AI Era Summit

Join us to optimize your infrastructure for the AI era. AI is everywhere, profoundly impacting data management and data center infrastructure. Join our free virtual summit to learn from experts how to meet the new demands of AI applications.

Duration: 2 Hours


Making Generative AI Work: Practical Applications of GenAI in Everyday Business

Join our expert-led webinar series to unlock the potential of generative AI (GenAI) in your organization. You'll dive into real-world use cases, explore how to build custom AI agents, and learn actionable strategies for integrating GenAI into your business operations. Don't miss this opportunity to stay ahead of the curve and transform the way your company leverages AI!

Duration: 1 Hour


Data Security Refresh Summit: How To Update Your Defenses for Today’s Threats

Secure your spot at the Data Security Refresh Summit and arm yourself with the latest strategies to protect your organization’s data. This free, expert-led event will guide you through the newest solutions and help you pinpoint vulnerabilities in your data defenses. Don’t wait—register now and strengthen your security posture!

Duration: 3 Hours


Making The Return on Investment (ROI) Case For Security Awareness Training

Join us for this webinar where Joanna Huisman, SVP of Strategic Insights and Research at KnowBe4, helps you understand the value and articulate the return on investment that security awareness training (SAT) programs can deliver.

Duration: 1 hour


Tech Talk | Human Risk Management

In this live Tech Talk, veteran technology journalist John K. Waters talks with cybersecurity expert Brandon Reid about how organizations can manage and prevent sophisticated threats targeting human error within organizations more efficiently.

Duration: 1 hour


Game Changing M365 Backup Service: What Small Business Need to Know

Join us for an informative session on Veeam Data Cloud for Microsoft 365, our new as-a-service solution and discover how it can revolutionize your data backup and recovery strategy. In this webinar, we will explore robust features and capabilities, designed specifically to fit the needs of small businesses. Learn how this feature rich solution helps save time on managing your backup infrastructure and keeps things simple with a modern, secure and intuitive UI. Don't miss this opportunity to unlock the power of cloud backup and safeguard the future of your business.


Entra ID Toolbox: The Best Practices and Cheat Codes IT Needs To Know

Join us for this free, two-hour summit where you'll learn the most up-to-date Entra ID best practices, tried-and-true expert tips and the under-the-radar features that not enough IT pros know about.

Duration: 3 hours


Coffee Talk | Microsoft 365 Ransomware Survival Checklist: Recoverability Strategies for Today’s Attack Landscape

Don't let a Microsoft 365 outage disrupt your business. Join us for this free, one-hour Coffee Talk and learn how to safeguard your environment with a comprehensive recovery plan. Secure your spot today!

Duration: 1 Hour


Q3 Ransomware Strategy Summit: Top Threats and Best Protections

Take control of your ransomware defense strategy before it's too late! Join us for the Q3 Ransomware Strategy Summit to discover the latest attack trends and expert solutions to protect your organization. Reserve your spot today and arm your IT teams with the tools to safeguard your business against ransomware threats.

Duration: 3 Hours


The CISO's Guide to a Strong Security Culture

It’s time to stop being jerked around by fads and commit to doubling down on the real work. Join Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, as he sheds light on the top security issues and practices security leaders should be aware of. This is about concentrating your time, budget, and efforts where they’ll have the most benefit for your organization.

Duration: 1 hour


Business Continuity and Identity System Recovery

Secure identity system recovery is a key factor in determining how quickly your organization can get back to business as usual. Join this webinar with Semperis’ identity threat detection and response (ITDR) experts to learn:

Duration: 1 hour


Q3 Cybersecurity Review Emerging Attacks and How To Stop Them Summit

Stay ahead of the growing cyber threats that could put your organization at risk. Join us at this summit where leading experts will reveal the latest IT security trends and strategies to protect your business. Learn how to prevent devastating attacks, respond effectively if they occur, and safeguard your reputation. Don’t wait—register now and take proactive steps to secure your future!

Duration: 3 Hours


Tech Talk | AIOps in the Data Center Network: Driving Application Awareness and Assurance

In this live Tech Talk, IDC Research Director Mark Leary and Juniper Networks Senior Product Manager Shean Leigon talk to veteran technology journalist John K. Waters about target use cases and best practices for AI in data center operations. Don't miss it!

Duration: 1 hour


VMware Crossroads: Strategies and Options for Government IT Leaders

Are you looking for guidance on navigating the impacts of Broadcom’s acquisition of VMware? Join our webcast to hear from industry experts as they explore strategies to help government IT leaders adapt and thrive in this changing landscape. Don’t miss this opportunity to discover the best path forward for your agency!

Duration: 1 Hour


Coffee Talk | Modernize Your Backup & Recovery Strategy: Expert Tips & Best Practices

Refresh your data protection strategy today by joining our Coffee Talk! Discover the hidden risks of outdated solutions, emerging data threats, and expert tips to stay ahead. Register now and secure your spot!

Duration: 1 Hour


Moving to Nutanix from VMware for a Simpler, More Efficient Future

In this webinar, Nutanix experts will explain how the Nutanix Cloud Platform (NCP) solution, including the Nutanix AHV hypervisor, offers an alternative that enables seamless scaling and unified operations. Join in to learn more.