On Demand
This webinar will provide a pragmatic roadmap for implementing Zero Trust principles without costly overhauls. We’ll focus on high-impact, low-effort strategies that deliver measurable risk reduction.
Duration: 1 hour
In this live Tech Talk veteran technology journalist John K. Waters talks with industry expert Neil McLoughlin to get an insider's look at Windows 365, Azure Virtual Desktop, and the future of Cloud PC technology. Join them as they will dive into the impact of the industry-wide shift toward cloud-based desktop solutions and offer actionable solutions for organizations facing uncertainty around architectural choices, deployment models, and long-term management strategies.
Duration: 1 hour
Don't miss this opportunity to see how AI is revolutionizing code and documentation creation! Join us to discover practical ways to automate development tasks, improve accuracy, and boost productivity. Save your spot now and stay ahead in the AI-powered future of coding!
Duration: 1 Hour
Join KnowBe4's Security Awareness Advocate, Erich Kron, and SVP of Threat Intelligence, Jack Chapman, for an insightful dive into the tactics cybercriminals are using to single out organizations and individuals via email and how you can defend your organization against them.
Duration: 1 hour
Cybercriminals actively target AD because they know that even a single misconfiguration can open the door to privilege escalation, ransomware attacks, and data breaches. Regulatory bodies are also cracking down—failing to meet compliance requirements can lead to hefty fines, legal troubles, and reputational damage.
Duration: 1 hour
Sign up for this expert-led summit that's designed to arm you with real-world strategies to stop the most pressing hybrid cloud security threats today.
Duration: 2 hours
Join us for an exclusive two-part event discussing modernizing IBM Software on Azure Red Hat OpenShift. The first part showcases the power of IBM's commitment to the OpenShift platform, and the second part is an Azure Red Hat® OpenShift® (ARO) demo with IBM Software.
Duration: 1 hour
In this live Tech Talk, veteran technology journalist John K. Waters talks with Jeff Wichman, a seasoned cybersecurity expert and former ransomware negotiator, for an eye-opening conversation on how organizations can better prepare, respond, and recover when disaster strikes. They will dive deep into the real-world challenges and consequences of AD compromise and offer actionable guidance for building operational resilience. You’ll discover why more businesses are adopting a “resilience mindset,” and learn steps you can take now to protect your organization’s identity infrastructure.
Duration: 1 hour
Data Resilience has dramatically changed from “simple” backup to a blend of Availability, Security and Business Outcomes. It’s no longer about backup, but recovery; recovery from errors, outages, and cyberattacks, as well as meeting expanding regulatory compliance demands. Aspirationally, the business wants to leverage critical data for new use cases, such as AI, while also needing to contain infrastructure and operations costs.
Duration: 1 hour
Whether you’re evaluating new solutions or enhancing existing defenses, this HUMAN Dialogue webinar will provide the critical insights needed to navigate the complexity of modern bot attacks while making informed, impactful and action-oriented decisions. Join in to learn more.
Duration: 1 hour
IT professionals working in internal IT departments are facing a rapidly evolving landscape, with challenges that require strategic action. From cybersecurity threats and compliance risks to operational inefficiencies and budget constraints, IT teams must navigate a complex and ever-changing environment.
Duration: 1 hour
Join us for this webinar where James McQuiggan, Security Awareness Advocate at KnowBe4, helps you understand how your organization can harness AI-powered agents for real-time threat detection, predictive analytics and automated training.
Duration: 1 hour
Join us for an engaging discussion on the future of application security and learn how to make your security stack more effective while reducing operational burden. Whether you’re looking to replace your existing WAF or exploring a more comprehensive approach to application security, this webinar will provide valuable insights to help guide your decision-making process.
Duration: 1 hour
Join our fireside chat-style webinar to explore the benefits of transitioning to hyperconverged infrastructure (HCI) during a server refresh, including improved performance, scalability, cost savings, and best practices for a seamless migration with Nutanix.
Duration: 1 Hour
Join this webinar as we reveal our most powerful release yet: Veeam Kasten v7.5! This solution is designed to protect your cloud‑native applications and virtual machines (VMs) on Kubernetes so you can build, deploy, and run it with resilience and confidence, at scale.
Duration: 1 hour
Don't miss this opportunity to stay ahead of the curve! Join our free virtual event to uncover the top security threats targeting IT infrastructures and gain actionable insights to fortify your defenses. Reserve your spot today to safeguard your organization from emerging risks.
Duration: 3 Hours
Unlock the full potential of your IT team with low-code and AI-assisted development. Join our expert-led Coffee Talk to explore how you can eliminate bottlenecks, accelerate innovation, and maintain security—all without the hassle of outdated processes. Register now and take the next step toward faster, smarter development!
Duration: 1 Hour
Unlock the full potential of your data with a strategic approach to Data Lifecycle Management (DLM). This session will explore best practices for securing, managing, and optimizing data across hybrid and multi-cloud environments—ensuring resilience, agility, and protection against cyberthreats. Don’t miss this opportunity to future-proof your organization with expert insights and actionable strategies!
Duration: 1 Hour
Secure your spot at this free virtual event to stay ahead of today’s most sophisticated security threats. Gain critical insights into identifying vulnerabilities, prioritizing risks, and implementing defenses to safeguard your IT infrastructure. Don’t miss this chance to protect your organization—register now!
Duration: 2 Hours