Webcasts


On Demand

Protecting Your Organization Against Zero-Day Vulnerabilities

Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.


The New Reality: How Covid-19 Changed Everything

Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward.  Learn more.

Duration: 1 hour


Transforming Your Remote Workforce Summit

The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow.  Learn more.

Duration: 3 hours


4 Hybrid Identity Security Pitfalls You Probably Already Forgot About

Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.


Secure and Extend Your AD Environments: Starling CertAccess + Active Roles

Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.


Next-generation Approaches to End-User Computing in 2021

Join us for this session as we discuss how the pandemic began to grip the world in early 2020 and kicked off a forced march to remote work. Learn more.

Duration: 1 hour


The Good, Bad, and the Ugly of the Rush to Remote Work

For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.

Duration: 1 hour


VDI or Daas? The Future of EUC is Hybrid

In this 30 minute discussion, we'll cover the advantages of a hybrid and multi-cloud EUC solution. Learn more.

Duration: 1 hour


Future of Desktop Infrastructure Summit

Join the editorial staff of Virtualization & Cloud Review and Redmondmag.com as well as independent experts for this half-day informational summit packed with real-world advice and insights you can't afford to miss! Learn more.

Duration: 3 hours


Applying the MITRE ATT&CK Framework to Your Active Directory

With the accelerating pace and increasing sophistication of cyberattacks, having a common framework for your security strategy helps you cope with the changing threat landscape. Learn more.


Microsoft Azure Stack HCI Summit

IT decision-maker attendees of this Redmondmag.com Microsoft Azure Stack HCI Summit will find out about key advantages of the Microsoft hybrid cloud approach for HCI, and best practices and use cases involving Azure Stack HCI.

Duration: 2 hours


Threat Detection Tuesday - What's In Your Toolbox?

Join BlueVoyant’s Owen Allen and Mike Scutt for a deep dive into some of the tools and techniques used by BlueVoyant Threat Hunters to identify breaches and threats more quickly. Learn more.

Duration: 1 hour


Managing Your Microsoft Dynamics 365 Data: Retain, Recover, and Be Ransomware-Ready

During this session, they’ll discuss how Microsoft Dynamics 365 is transforming business operations in the cloud and how the newest Metallic SaaS offering extends native capabilities for purpose-built protection, rapid recovery from attack, and long-term data retention to meet SLA compliance. Learn more.


Top Cloud Backup & Recovery Best Practices for Every IT Pro

In this session, we will look at best practices, tips, trends and techniques pertaining to cloud backup and recovery so you can be prepared when something happens. Learn more.

Duration: 1 hour


Modern Cloud Backup & Recovery Summit

This free, half-day summit is for every IT pro who isn't 100 percent confident their cloud backup recovery can withstand natural (or not-so-natural) disasters, ransomware, other hacks, or even just the weakness of the cloud systems themselves. Learn more.

Duration: 3 hours


A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware. Learn more.


Prevent Active Directory Password Attacks: Steps and Tools

Password attacks are one of the most common reasons for data breaches even in 2021. The best way to get ahead of cybercriminals is to think like them. In this webinar, we'll show you how. Learn more!


Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021

Join Ian Thornton-Trump CD for the first session of our Azure AD & Active Directory Security Summit for a walk-through of a recent US Government Agency compromise and how monitoring of the Windows Security Event log could have revealed the unauthorized activity - on many occasions. Learn more.

Duration: 1 hour


Azure AD & Active Directory Security Summit

This half-day summit brings together the editorial staff of Redmondmag.com and independent experts to educate IT pros on what they need to know to protect their enterprise. Learn more.

Duration: 3 hours


Threat Detection Thursday - Breaking All The Rules!

This session will provide an overview of detection types, applicability, and rule aggregation to help you better focus on events that matter. If you can't tell your RBA from your UBA, join us on our journey to detection excellence! Learn more.

Duration: 1 hour