Webcasts


On Demand

Top 5 Identity and Access Management Challenges of 2021 and How to Overcome Them

In this webinar, we'll discuss top five identity and access management challenges IT admins will likely face in 2021 and how to overcome these challenges. Learn more.

Duration: 1 hour


A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation

Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist where he’ll share a comprehensive strategy for phishing mitigation and how securing your users can become your best, last line of defense. Learn more.


Top Security and Compliance Issues with Office 365

In this session, we'll look at 5 of the top security and compliance issues with Microsoft 365 and what you can do to make sure your company doesn't fall victim to data compromises using Microsoft 365 services. Learn more.

Duration: 1 hour


What's New/What's Hot/What's Not with Office 365/Microsoft 365 Security

In this session, you will learn about the security features that you should be using and about some new features that you might not yet be familiar with. Learn more.

Duration: 1 hour


Office/Microsoft 365 Security Summit

Stay up to date on the latest features and security issues with Office 365/Microsoft 365 in this information-packed half-day seminar.  Learn more.

Duration: 3 hours


Microsoft Teams Backup: 8 Facts you NEED to Know!

Microsoft Teams is now the center of our productivity universe — but should you back it up? Learn more.


Getting More From Your Microsoft Teams Investment

In this webcast we'll cover the obstacles you will likely encounter on your way to a full Teams deployment and tips for how to overcome those obstacles. Learn more.


Top Do's and Don'ts of Enterprise Cloud Migration

Join cloud solution architect and technical trainer Tim Warner for a content-rich, “no fluff” breakdown of proven “do this, not that” cloud migration approaches.  Learn more.

Duration: 1 hour


Enterprise Cloud Migration Summit

Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn what you need to know to get your enterprise safely cloud-enabled. Learn more.

Duration: 3 hours


Enterprise Cloud Migration Best Practices

Join this session as we look into topics including having a plan, being prepared, and understanding your application and data infrastructure environment.   Learn more.

Duration: 1 hour


What You Need to Know About Securing Active Directory

In this web seminar, we will discuss AD access points used in recent cyberattacks, how to look for warning signs that AD has been compromised, and steps to take in the event of an attack. Learn more.


Best Practices for Architecting and Securing Your Hybrid and Private Clouds

During this session, we will examine several best practices for architecting your hybrid and private cloud environment so it will be as secure and resilient as possible. Learn more.

Duration: 1 hour


Understanding the Hybrid and Private Cloud Dynamics

Cloud computing technology is evolving fast! Join this session as we answer your top questions and learn what the best solution for your business needs are. Learn more.

Duration: 1 hour


Cloud Architecture & Security Summit

The enterprise most likely has a mix of hybrid/private cloud infrastructure —or is striving to achieve it. Join this summit and learn more.

Duration: 3 hours


Microsoft 365 Data Protection – It’s Not Just Backup

Join Redmondmag.com Editor-in-Chief Scott Bekker, 14-time Microsoft Office Apps and Services MVP Matthew McDermott, and Spanning Director of Product Marketing Dave Wallen for a lively discussion around Microsoft 365 Data Protection. Learn more.


Multi-Cloud Management Summit

Join this half-day virtual event to learn from topics like: Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Learn more.

Duration: 3 hours


Best Practices for Multi-Cloud Environments

Join IT industry veteran Howard M. Cohen in exploring some of these best practices, why they’re each critical to your success, and how they enable you to recognize the full value of your multi-cloud strategy. Learn more.

Duration: 1 hour


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Navigate your Hybrid Workplace Strategy with Microsoft Teams and BlueJeans

In this webcast you will learn about key predications regarding the future of the workplace, the next of Microsoft Teams for collaboration and how to get the office ready for a productive hybrid workforce. Find out more.


Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA Products

Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid. Learn more.