Webcasts


On Demand

Optimize your IT Environment with Red Hat and AWS

This webinar describes how setting a foundation on Red Hat Enterprise Linux for both on-site datacenter and AWS environments can help you improve productivity, security, and operations as you move to the cloud and adapt to an increasingly digital world. Join in to learn more!


How to Guard Your Microsoft 365 Investment: Email Security Strategies

Join our cybersecurity experts Mark Harris and Brette Petersen for practical guidance on enhancing native Microsoft 365 email security to learn how to assess existing gaps in your current email security posture, when your organization should consider implementing additional security controls, and more.

Duration: 1 hour


Safeguarding Microsoft 365 Summit: Modern Security Best Practices for 2024 and Beyond

Join this three-hour, expert-led summit where you’ll learn the most common Microsoft 365 weak spots, the newest emerging attack vectors and methods, the best ways to mitigate these threats, and much more. Don’t wait – register today!

Duration: 3 hours


Getting the Most Out of AI with Open Source and Kubernetes

In this webinar, we’ll take you through how to get the most out of open source AI, introduce you to OpenShift Data Science, and provide a roadmap for planned future investments by Red Hat for AI on Red Hat OpenShift. Join to learn more!


Coffee Talk: Attack Roundup: Top Remote Device Threats in Q4 and Beyond (and How To Stop Them)

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses trends, issues, and challenges around remote device threats in Q4 and beyond and how to protect them.

Duration: 1 hour


Coffee Talk: Intro to Endpoint Security

Join security expert Ian Thornton-Trump CD as walks you through the realities of endpoint security, from protecting legacy systems, business services and even ephemeral workloads such as Elastic Beanstalk, so you can know how to thwart cyberattacks and keep your business afloat.

Duration: 1 hour


Coffee Talk: SaaS & Your Digital Transformation: What IT Managers Need to Know

As more companies engage partners to help them achieve real digital transformation, SaaS will be a more and more frequent component of the IT solutions that help them realize their goals. In this session, Senior Resultant Howard M. Cohen will discuss several SaaS-based strategies that accelerate and enable powerful digital transformation for your clients. Learn more!

Duration: 1 hour


Precision in Protection: Operationalizing Threat Detection and Response with Microsoft Sentinel

During part one of our two-part webinar series, we’ll explore how to operationalize Microsoft Sentinel’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration Automation and Response) capabilities combined with Security Operation Center analysis and response to rapidly detect, triage, and respond to actionable threats to your organization.


What’s New, Upcoming and Notable in Multicloud Data Threats

Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.

Duration: 1 hour


Cloud Data & Data Protection Best Practices Summit

Register for this free, three-hour summit to learn everything you need to know today about the biggest cloud data management trends and challenges. From modern best practices to the biggest emerging threats, our panel of cloud experts will share their most actionable real-world insights and effective tips so your organization’s data doesn’t fall through the cracks. Sign up today!

Duration: 3 hours


Compliance, Security, Resilience and More: Top Hurdles in Cloud Data Management

In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!

Duration: 1 hour


Safeguarding Microsoft 365 Data from Today’s Threats

Safeguarding Microsoft 365 data is your responsibility. In this webinar, we’ll explore how to keep your valuable Microsoft 365 data safe, compliant, and recoverable.


Best Practices for Securing & Recovering Microsoft 365

Join us to learn Microsoft’s newly introduced tools and features can help with data protection and security efforts. Don't miss out!

Duration: 1 hour


Managing & Securing Microsoft 365 Summit

You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you ahead of changes and give you real-world insights you can use to improve the security, manageability and recovery of your Microsoft 365 installation. Don't miss it!

Duration: 3 hours


Best Practices for Managing & Optimizing Microsoft 365

By the end of this session, you will have a better understanding of how to manage Microsoft 365 for your organization. You will also learn about functionality available in Microsoft 365 that you may want to go implement and learn more about. You will also leave with some tips and resources to help you stay updated on the latest in what is coming to Microsoft 365.

Duration: 1 hour


Recovery Readiness in the Modern IT Environment

Watch this webinar to learn how to secure, defend, and recover your data, applications, and production workloads – on-premises, in the cloud, over SaaS, or spread across hybrid and multi-cloud environments.


The Role of AI in Email Security

Join Erich Kron, Security Awareness Advocate for KnowBe4, and Michael Sampson, Principal Analyst at Osterman Research, as they dig into the findings of our latest joint report on The Role of AI in Email Security. They’ll share tips on how your SOC team can identify and use AI to supercharge your anti-phishing defense.

Duration: 1 hour


Maximize Your Data Intelligence

Join Insight for a webinar where our experts share the core components of the modern data estate. You’ll learn the steps involved in building a foundation for modern data management to maximize your use of data intelligence — no matter where you are on the maturity curve.


Coffee Talk: Managed Detection & Response 102: Getting Started with MDR

In this session, Senior Resultant Howard M. Cohen discusses the importance of Managed Detection & Response services and how they can be an ideal outsourced service you can offer your customers while outsourcing the actual platform services to experts. Red Canary joins the conversation to take you through the advantages and value of MDR to you, your MSP or MSSP practice, and your customers.

Duration: 1 hour


The Definitive Ransomware Checklist Summit: What To Do Before, During and After an Attack

Join this free, three-hour summit to learn the bases you need to cover so your organization’s data is as insulated against compromise as possible, the exact steps to take as soon as a ransomware attack makes itself known, and the post-attack process to make sure another one doesn’t happen again.

Duration: 3 hours