Webcasts


Upcoming

From Azure to AWS, Closing the Security Gaps in Your Cloud Database Summit

Don’t let hidden vulnerabilities put your cloud database at risk. Join our free virtual event to get expert guidance on securing your data, closing access gaps, and tackling compliance challenges head-on. Reserve your spot now and start building a cloud-ready security strategy.

Date: 07/16/2025

Time: 10:00 AM

Duration: 10:00 AM


Next-Gen Database Security Strategies for the Intelligence Era Summit

Stay ahead of today’s evolving threats with smarter, data-driven defense. Join our expert-led event to uncover how advanced analytics and posture management can help you detect and stop database attacks before they happen. Don’t wait, secure your spot now and strengthen your security strategy.

Date: 07/29/2025

Time: 10:00 AM

Duration: 2 Hours


2026 IT Security Outlook Summit

Stay ahead of the evolving IT security landscape! Join this free virtual summit to explore the top threats, technologies, and strategies shaping cybersecurity in 2026. Register now to gain expert insights and ensure your defenses are ready for the future!

Date: 12/12/2025

Time: 9:00 AM

Duration: 3 Hours


On Demand

Data Security in AWS Summit: Tips, Tricks and Real-World Strategies

Secure your AWS environment with confidence! Join this free, expert-led summit to discover the must-have security tools and best practices that will keep your data protected. Register now and take the next step in strengthening your cloud security!

Duration: 10:00 am


Future-Proofing Your Infrastructure: Modernizing Virtualization and Kubernetes

As organizations face rapid technological changes, they must modernize infrastructure while supporting both cloud-native and traditional workloads. This event will explore how KubeVirt-based solutions like Red Hat OpenShift Virtualization enable running containers and virtual machines on a single platform. It will also cover the importance of a strong data resilience strategy to meet RTO and RPO requirements, maintain compliance, and address security threats. Attendees will learn how modern virtualization and Kubernetes-based solutions streamline operations, support hybrid workloads, and ensure success in a cloud-native environment.

Duration: 1 hour


Microsoft 365 Security Roundup: Top 5 Threats in 2025

As the attacks targeting Microsoft 365 get more sophisticated, staying ahead of the curve is no longer optional -- it's essential. Keep ahead of the threats with this information-packed summit, where you'll learn the five most damaging tactics that cybercriminals are deploying against Microsoft 365 today, and how to protect yourself against them. Microsoft 365 is at the heart of your organization's productivity -- make sure you keep it airtight. Register today!

Duration: 2 hours


Unstructured and Unsecured Summit: Tackling the Problem of Unstructured Data Assets

Unstructured data is a growing threat hiding in plain sight—don’t wait for a breach to realize the risk. Join our free summit to learn how to find, secure, and manage unstructured data across your hybrid environment. Hear from industry experts and walk away with actionable steps to protect your organization—register now!

Duration: 2 Hour


Identity Security Simplified: Practical Strategies for Safeguarding the New Perimeter

This webinar demystifies modern identity security, providing practical, actionable strategies you can implement immediately. We'll explore how to strengthen authentication, enforce least privilege, and maintain visibility across your hybrid environment, effectively safeguarding your organization's assets against evolving identity-based threats, simplified through an integrated approach. Gain actionable insights to bolster your identity security posture immediately. Learn how to navigate the complexities of the modern perimeter and protect your critical assets.

Duration: 1 hour


The New Age of Microsoft 365 Data Protection

In this virtual event, hear from Luis Blando, OutSystems CPTO, as he discusses the future of AI-driven development. Gain expert market insights from John Rymer, industry analyst at Analysis.Tech, and learn how organizations are already using low-code and AI to achieve impactful results. The session also includes a live demo of OutSystems Mentor, the first full SDLC digital worker, transforming app generation, delivery, and monitoring using low-code, generative AI (GenAI), and AI-driven guidance.

Duration: 1 hour


2025 Tech Trends IT Leaders Can’t Ignore

In this webinar, industry experts will dive into the most transformative tech trends that will impact businesses and redefine the IT landscape in 2025. By understanding these shifts, you'll be better positioned to refine your strategy, stay ahead of the curve, and drive sustainable business growth.

Duration: 1 hour


Everything NEW in Veeam Data Cloud

Join us for an in-depth exploration of everything new in Veeam Data Cloud, delivering the industry's leading platform for data resilience with the simplicity of SaaS.

Duration: 1 hour


QR Codes Exposed: From Convenience to Cybersecurity Nightmare

Join us for this eye-opening webinar where Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, will peel back the layers of QR code attacks and arm you with the knowledge to fortify your defenses.

Duration: 1 hour


Closing the Gap for Government Agencies: 5 Ways to Automate Cyber Resilience

Don’t let identity infrastructure vulnerabilities put your agency at risk! Join Gil Kirkpatrick in this session to discover five key security steps you can automate to strengthen your defenses, detect threats faster, and recover from attacks with confidence. Secure your spot now and take the next step toward cyber resilience!

Duration: 1 Hour


The Definitive Microsoft 365 Data Resilience Playbook Summit

Don't leave your Microsoft 365 data resilience to chance—join us for The Definitive Microsoft 365 Data Resilience Playbook Summit and get the expert insights you need to strengthen your recovery strategy. Learn how to protect against ransomware, accidental deletions, and compliance gaps with proven best practices. Secure your spot today and ensure your business is prepared before disaster strikes!

Duration: 3 Hours


Standardize for Innovation: Transitioning to Red Hat Enterprise Linux

Join us in this four-part event as we share the benefits and advantages of migrating from a community Linux® distribution to Red Hat® Enterprise Linux®. We encourage you to attend each session to fully understand the benefits of migrating and the support Red Hat can offer.

Duration: 4 hours


Disaster Recovery 101: Top Tips & Strategies for Microsoft IT Pro Summit

In this free educational summit, you'll get expert-level advice for disaster-proofing your Microsoft investments. Learn about the best native tools to safeguard your Microsoft data and apps, plus actionable insights for real-world scenarios. Don't wait -- register today!

Duration: 3 hours


From Noise to Action: Tuning SIEM Alerts to Focus on High-Risk Network Events

This session will explore how to transform chaotic alert streams into actionable intelligence. It will cover alert prioritization frameworks, focusing on events such as unauthorized GPO modifications, suspicious Kerberos ticket requests, and registry changes. The session will also address government-specific threat indicators, including predefined rules for detecting ransomware preparation, data exfiltration, and insider threats. Additionally, it will delve into automated triage, demonstrating how to escalate only the 1% of alerts that require human intervention.

Duration: 1 hour


Automating Zero Trust: Reducing Labor and Software Costs with Policy-Driven Access Controls

This session will explore how automation can cut costs and strengthen security by replacing fragile manual processes with policy-driven controls.

Duration: 1 hour


Building a Cyber Resilience Playbook

In a threat landscape that's as sophisticated and fast-evolving as today's, having a robust cyber resilience strategy is more critical than ever. Join us for this educational session, where you'll learn the tools and strategies to prepare for, respond to, and recover from cybersecurity incidents. Get real-world advice for developing a cyber survival playbook, strengthening your defense strategies, and enhancing business continuity during disruptions.

Duration: 2 hours


Make AI your App Development Advantage: Learn Why and How

In this virtual event, hear from Luis Blando, OutSystems CPTO, as he discusses the future of AI-driven development. Gain expert market insights from John Rymer, industry analyst at Analysis.Tech, and learn how organizations are already using low-code and AI to achieve impactful results. The session also includes a live demo of OutSystems Mentor, the first full SDLC digital worker, transforming app generation, delivery, and monitoring using low-code, generative AI (GenAI), and AI-driven guidance.

Duration: 1 hour