The Definitive Ransomware Checklist Summit: What To Do Before, During and After an Attack

Join this free, three-hour summit to learn the bases you need to cover so your organization’s data is as insulated against compromise as possible, the exact steps to take as soon as a ransomware attack makes itself known, and the post-attack process to make sure another one doesn’t happen again.

Date: 11/08/2023

Time: 9:00 AM

Duration: 3 hours

Q4 Multicloud Security Check Summit: The Top Threats to Your Multicloud Right Now

Don’t let down your guard down! Register for this free, expert-led summit to hear top independent experts share the biggest security trends affecting the multicloud today, the quickest ways to secure your cloud data against attacks, real-world multicloud best practices, and the newest tools available to ensure your multicloud environment doesn’t get compromised.

Date: 12/08/2023

Time: 9:00 AM

Duration: 3 hours

2024 Ransomware Outlook Summit

Is your team ready for the new wave of ransomware attacks? Register for this free, expert-led summit to learn everything you need to know about emerging attack methods, the biggest targets, the most likely culprits, and the tried-and-true ways to reduce your risk and bounce back from an attack if (or when) one happens. Don’t delay – sign up now!

Date: 12/15/2023

Time: 9:00am

Duration: 3 hours

Trust No One Summit: Why You Should Modernize Your Security Posture with Zero Trust (and How To Do It)

Join this free, three-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. Learn more!

Date: 01/19/2024

Time: 9:00 AM

Duration: 3 hours

On Demand

Why Zero Trust & Why Now Summit

Join this free, two-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. From implementation best practices, to key technologies, to end user training, our experts will answer all the zero trust questions you have so you can level up your security. Register today!

Duration: 2 hours

The Case for Zero Trust: What It Is and Why You Need It

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP (CDM), as he discusses the challenges of traditional security approaches for expanding hybrid IT environments and how Zero Trust Architectures (ZTA) are in your future (if not already). Greg will discuss industry trends, customer pain points, techniques, tips, and best practices for leveling up your security game and defenses by transforming to a zero trust approach.

Duration: 1 hour

Protect Your Organization from Identity-Based Attacks

Many organizations understand that there’s a link between identity and security, but few fully grasp how foundational identity is to a modern security strategy. Join this session to learn more about how the right identity solution provides protection, detection, and response for today’s identity-based attacks.

Duration: 1 hour

Multicloud Data Migration 101

Choosing the proper solution depends on a number of factors, including the engineering level of your organization, your tolerance for risk, and the volume of your data. Learn about these strategies and help your team make the best decisions for your multi-cloud experience.

Trends in Server Virtualization: A conversation with IDC

Join speakers, Gary Chen and Peter Lauterbach, for a discussion on industry trends and where and how technologies like Red Hat& OpenShift& Virtualization can help navigate a path forward.

Take Your Enterprise Apps to the Next Level: Intelligent Applications

Join us for an engaging webinar designed to empower business leaders, IT professionals and innovators with the strategies and insights needed to propel your enterprise applications into the future.

Revolutionize Your Security Risk Prioritization: Continuous Threat Exposure Management (CTEM)

Streamline security with unified CTEM risk management. Derek Melber shares how to merge various security aspects into one view, reducing risks and costs while improving overall security. Learn more!

Key Considerations for Managing Massive Backups

The challenges and complexity of maintaining a “ready-to-recover” posture grow exponentially as the volume of data, the number of locations and numbers of workloads continue to skyrocket. Join two seasoned backup-and-recovery experts as they discuss solutions for managing backups at a massive scale and how you can deliver predicable, rapid recovery when things go wrong.

Transforming Employee Experience with Microsoft Viva

Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.

Cyberattacks on Education: How to Strengthen Identity Security

Join this webinar, Semperis Solutions Architect Alexandra Weaver will give you expert insight into lessons learned from recent education-focused cyberattacks and how to strengthen your own institution’s identity security stance.

Duration: 1 hour