On Demand

Why Zero Trust & Why Now Summit

Join this free, two-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. From implementation best practices, to key technologies, to end user training, our experts will answer all the zero trust questions you have so you can level up your security. Register today!

Duration: 2 hours

Multicloud Data Migration 101

Choosing the proper solution depends on a number of factors, including the engineering level of your organization, your tolerance for risk, and the volume of your data. Learn about these strategies and help your team make the best decisions for your multi-cloud experience.

Trends in Server Virtualization: A conversation with IDC

Join speakers, Gary Chen and Peter Lauterbach, for a discussion on industry trends and where and how technologies like Red Hat& OpenShift& Virtualization can help navigate a path forward.

Revolutionize Your Security Risk Prioritization: Continuous Threat Exposure Management (CTEM)

Streamline security with unified CTEM risk management. Derek Melber shares how to merge various security aspects into one view, reducing risks and costs while improving overall security. Learn more!

Transforming Employee Experience with Microsoft Viva

Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.

Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas"

Keeping your M365 installation secure is vital to your organization (and your job!). That's why you won't want to miss this free, half day summit curated by the editors of Redmondmag and featuring independent Microsoft MVPs and other Microsoft 365 experts who can offering you expert, real-word insight. Don't miss out!

Duration: 1 hour

Microsoft 365 Security Summit

Keeping your M365 installation secure is vital to your organization (and your job!). That's why you won't want to miss this free, half day summit curated by the editors of Redmond and featuring independent Microsoft MVPs and other Microsoft 365 experts who can offering you expert, real-word insight. Don't miss out!

Duration: 3 hours

NIST SP 800-53: Essential Security Controls for the Current Threat Landscape

Join our webinar to take a look at the NIST SP 800-53 and learn how it can help federal agencies and other organizations protect themselves against attacks.

Still Developing Software the Old Way? Best Practices for Migrating to DevSecOps

In this webinar we explore best practices for seamlessly integrating security into DevOps to ensure that software development doesn't compromise security in its quest for speed.

Ransomware Recovery Summit: What To Do After an Attack

In this free, three-hour summit, our experts will outline the steps you need to take in the aftermath of an attack, how to recover your data, and the changes you need to implement to make sure it doesn’t happen again. Learn more.

Duration: 3 hours

How To Build a Responsible Ransomware Response Plan

Join Ian Thornton-Trump, CISO at Cyjax, in this exclusive session, as he walks through the organization’s locker room when the home team suffers the biggest loss of their careers.

Duration: 1 hour

Conquering Cloud Chaos: Best Practices for Highly Regulated Orgs

In this session, Senior Resultant Howard M. Cohen joined by experts from VMware will discuss the challenges and the best practices to be applied to resolve them. Get ready to have those cloud management headaches go away. Join us!

Duration: 1 hour

Coffee Talk : Top 10 Disaster Recovery Risks in Microsoft 365

Find out all of the bases you need to cover to keep your Microsoft 365 resilient and recoverable at all times. In this free Coffee Talk, you’ll learn all the common pitfalls that organizations run into when it comes to Microsoft 365 data recovery, and how to bolster those weaknesses before the worst happens. Don’t wait – register today!

Duration: 1 hour

A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

Duration: 1 hour

You’re Doing Endpoint Security Wrong: How To Identify and Fix IT’s Biggest Pain Points

Unified endpoint management is critical for the security of your organization and the efficiency of your IT team. Let our experts show you how – register today!

Expert Active Directory/Azure AD Security & Management Insights

In this session, we will be looking at how you can properly secure and manage and secure your AD and Entra environments, so your systems, services, and data remain safe and secure. Join in to learn more!

Duration: 1 hour

Azure AD/Active Directory Security & Management Summit

The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!

Duration: 3 hours

Top Active Directory/Azure AD Security & Management Best Practices

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment.

Duration: 1 hour

Reducing Backup and Data Protection Storage Costs from On-Prem to Cloud

Join Greg Schulz and Adrian Moir for an interactive discussion on reducing backup and data protection storage costs from on-prem to cloud. They will discuss industry trends, customer pain points, techniques, and best practices to reduce your data footprint impact and how to support exponential data growth without busting your data protection storage budget.

Duration: 1 hour

Coffee Talk: Enterprise Ransomware Threat Outlook

In this session, Senior Resultant Howard M. Cohen and the Red Canary team will discuss the most prevalent threats and how to develop your protective strategies. Learn more!