Webcasts


On Demand

Real-World Best Practices for Ransomware Defense & Remediation

You do not want to be in the headlines for having a ransomware attack. Thankfully, 90% of ransomware attacks haven’t resulted in any loss. During this session, we will discuss some concrete, real-world tactics for presenting your best defense against ransomware as well as how to remediate an attack when one does occur. Join us to learn more!

Duration: 1 hour


Putting Knowledge to Work: How Applied AI Enables Collaboration

This podcast explores the impact of the pandemic on enterprise collaboration in general, but with a focus on financial and professional services organizations that turned to Microsoft Teams and SharePoint solutions for the entirety of their collaboration needs. The discussion covers the key challenges those companies faced with this change in the workplace landscape, both technical and cultural. Learn More!


Best Practices for Securing Azure AD/Active Directory in 2023

In this Webcast, you will learn key best practices for securing your Active Directory and Azure AD environments. Some of the topics of discussion include important considerations for using Azure AD Connect, how creating isolation boundaries within the AD environment can improve security, and practical steps that you can take today to proactively head off attacks. Don't miss it!

Duration: 1 hour


Remote Workforce & Microsoft Teams Summit

Join the editors of Redmondmag.com will bring together independent experts to walk you through what's new in Microsoft Teams for remote workforce management plus best practices you need to know surrounding management, security and recovery.

Duration: 3 hours


Top Microsoft Teams Remote Workforce Best Practices

To learn various best practices that you can implement as a way of helping your users to work more efficiently in Microsoft Teams.

Duration: 1 hour


Coffee Talk: Digital Transformation & AIOps: The Future of IT

In this session, we’ll examine the growth of AIOps, discussing not only how it can be applied to accelerate improvement to networks, but also how cautious humans can assure that it remains under control and positively productive.

Duration: 1 hour


The Future is XDR: How to Conquer the SOC Transformation

Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.


Coffee Talk: The Future of Unified Communications & Teams

In this session, Senior Resultant Howard M. Cohen takes on this excellent challenge and talks about the future UC developments he sees as most likely. Stimulate your imagination to inform your future planning. Join use for a look at the Future of United Communications & Teams.

Duration: 1 hour


Reduce your cyber insurance premium with endpoint MFA

Multi-factor authentication is now a prerequisite for organizations to avail cyber insurance coverage at reduced premiums. In this webinar, we'll discuss how deploying MFA can help mitigate credential-based attacks and data breaches and reduce your cyber insurance premium.

Duration: 1 hour


Turning to Technology to Respond to a Huge Rise in High Profile Breaches

This invitation-only event is designed to facilitate an open discussion among industry peers focusing on the events and responses surrounding some of Australia’s most prominent breaches in 2022, establishing an effective framework following the Australian government's substantial increase in data breach fines, and more.


7 Ransomware Mistakes Enterprises Make Before, During and After an Attack

Join this session and we’ll share a mix of ransomware related business, organizational, procedural, and technical decision we wish enterprises just wouldn’t make.

Duration: 1 hour


Coffee Talk: Threat Alert: Monthly Top Attack Overview

Armed with the latest cyber threat intelligence from Cyjax, Ian Thornton-Trump CD, will outline what he sees as a resurgence in Russian state sponsored or state condoned cyber-attacks and why there may be very turbulent times ahead as we head into Spring 2023.

Duration: 1 hour


Coffee Talk: Why Cloud Firewalls & Why Now

Join Ian Thornton-Trump CD, CISO of Cyjax who has recent experience with a global deployment of Cloud based firewall technology and learn from his successes and challenges.

Duration: 1 hour


Recovering AD: The missing piece in your ITDR plan

In this webinar, Guido Grillenmeier (Semperis Principal Technologist, EMEA) will discuss the role of AD recovery in ITDR, considerations for building a comprehensive recovery plan, and a real-life example of why AD recovery planning is vital to operational resilience. Register Today!

Duration: 1 hour


Contact Center as a Service: The Microsoft Teams Connection

In this informative Tech Talk, contact center experts explain how companies can clear these hurdles with real-world strategies for Teams that will improve productivity and customer satisfaction. Businesses can do more with less using Microsoft Teams, as long as they know how to use it to its fullest potential. Register today to find out how! 

Duration: 1 hour


Best Practices for AWS Monitoring

In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!


How ITDR Helps Battle Identity Theft

This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!

Duration: 1 hour


The Road to Digital Resilience: Right-Sizing Hybrid Cloud Application Deployments

This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!


Disaster Recovery: Your New Ticket to Cyber Insurability

This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.


Applying the MITRE ATT&CK framework for threat detection and response

Learn how to use the MITRE ATT&CK framework within your SIEM solution to derive actionable insights. Leveraging your security analytics tools can help you improve threat detection and formulate an impenetrable defense mechanism. Get started now!