Webcasts


On Demand

Reduce your cyber insurance premium with endpoint MFA

Multi-factor authentication is now a prerequisite for organizations to avail cyber insurance coverage at reduced premiums. In this webinar, we'll discuss how deploying MFA can help mitigate credential-based attacks and data breaches and reduce your cyber insurance premium.

Duration: 1 hour


Turning to Technology to Respond to a Huge Rise in High Profile Breaches

This invitation-only event is designed to facilitate an open discussion among industry peers focusing on the events and responses surrounding some of Australia’s most prominent breaches in 2022, establishing an effective framework following the Australian government's substantial increase in data breach fines, and more.


7 Ransomware Mistakes Enterprises Make Before, During and After an Attack

Join this session and we’ll share a mix of ransomware related business, organizational, procedural, and technical decision we wish enterprises just wouldn’t make.

Duration: 1 hour


Coffee Talk: Threat Alert: Monthly Top Attack Overview

Armed with the latest cyber threat intelligence from Cyjax, Ian Thornton-Trump CD, will outline what he sees as a resurgence in Russian state sponsored or state condoned cyber-attacks and why there may be very turbulent times ahead as we head into Spring 2023.

Duration: 1 hour


Coffee Talk: Why Cloud Firewalls & Why Now

Join Ian Thornton-Trump CD, CISO of Cyjax who has recent experience with a global deployment of Cloud based firewall technology and learn from his successes and challenges.

Duration: 1 hour


Recovering AD: The missing piece in your ITDR plan

In this webinar, Guido Grillenmeier (Semperis Principal Technologist, EMEA) will discuss the role of AD recovery in ITDR, considerations for building a comprehensive recovery plan, and a real-life example of why AD recovery planning is vital to operational resilience. Register Today!

Duration: 1 hour


Contact Center as a Service: The Microsoft Teams Connection

In this informative Tech Talk, contact center experts explain how companies can clear these hurdles with real-world strategies for Teams that will improve productivity and customer satisfaction. Businesses can do more with less using Microsoft Teams, as long as they know how to use it to its fullest potential. Register today to find out how! 

Duration: 1 hour


Best Practices for AWS Monitoring

In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!


How ITDR Helps Battle Identity Theft

This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!

Duration: 1 hour


The Road to Digital Resilience: Right-Sizing Hybrid Cloud Application Deployments

This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!


Disaster Recovery: Your New Ticket to Cyber Insurability

This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.


Applying the MITRE ATT&CK framework for threat detection and response

Learn how to use the MITRE ATT&CK framework within your SIEM solution to derive actionable insights. Leveraging your security analytics tools can help you improve threat detection and formulate an impenetrable defense mechanism. Get started now!


MITRE ATT&CK training: Staying ahead of adversarial tactics

Watch this webinar to gain a better understanding of the MITRE ATT&CK framework and learn about the several tactics, techniques, and procedures involved in a compromise. Knowing the modus operandi of attackers can help you to prepare and defend your organization. Stay ahead of adversaries!


Enterprise Buyer's Guide for Data Protection

Join this webcast where Dave Russell, Veeam’s Vice President of Enterprise Strategy, and Misha Rangel, Veeam's Director of Enterprise Product Marketing will help you navigate through different questions that as decision maker you should ask yourself and your team when evaluating company’s specific data needs.

Duration: 11:00am


Microsoft 365 Backup Checklist for 2023

More organizations are protecting Microsoft 365 data than ever before, is yours one of them? In this presentation, you’ll also get to learn about the #1 Microsoft 365 backup solution — Veeam Backup for Microsoft 365.

Duration: 1 hour


WebCMS to WebOps: A Conversation with Nestlé's WebCMS Product Manager

Join us to learn how WebOps differs from WebCMS and allows organizations to transcend silos, why companies like Nestle chose a WebOps solution to address those challenges, and more!


Modern Cloud Data Protection Summit

Make sure you're ready for all things cloud data protection with this free half-day summit from the editors of Virtualization & Cloud Review and Redmondmag.com.

Duration: 3 hours


Security Readiness Best Practices with Veeam Data Platform

Join this session, to discuss how new features like Direct-to-object storage and the expanded options for application-consistent cloud backups will provide even more security protection.

Duration: Security Readiness Best Practices with Veeam Data Platform


Microsoft 365: Top Security Features & Best Practices Summit

There's so much IT leaders need to know about keeping their M365 installations secure in 2023 that the editors of Redmondmag.com have created this free, half-day summit where you'll hear from independent Microsoft 365 and security experts on the best ways to keep your M365 (and your enterprise) secure. Don't miss it!

Duration: 3 hours


Best Practices for Keeping M365 Secure

In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users.

Duration: 1 hour