Webcasts


On Demand

How to Guard Your Microsoft 365 Investment: Email Security Strategies

Join our cybersecurity experts Mark Harris and Brette Petersen for practical guidance on enhancing native Microsoft 365 email security to learn how to assess existing gaps in your current email security posture, when your organization should consider implementing additional security controls, and more.


Safeguarding Microsoft 365 Summit: Modern Security Best Practices for 2024 and Beyond

Join this three-hour, expert-led summit where you’ll learn the most common Microsoft 365 weak spots, the newest emerging attack vectors and methods, the best ways to mitigate these threats, and much more. Don’t wait – register today!


Getting the Most Out of AI with Open Source and Kubernetes

In this webinar, we’ll take you through how to get the most out of open source AI, introduce you to OpenShift Data Science, and provide a roadmap for planned future investments by Red Hat for AI on Red Hat OpenShift. Join to learn more!


Coffee Talk: Attack Roundup: Top Remote Device Threats in Q4 and Beyond (and How To Stop Them)

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses trends, issues, and challenges around remote device threats in Q4 and beyond and how to protect them.


Coffee Talk: SaaS & Your Digital Transformation: What IT Managers Need to Know

As more companies engage partners to help them achieve real digital transformation, SaaS will be a more and more frequent component of the IT solutions that help them realize their goals. In this session, Senior Resultant Howard M. Cohen will discuss several SaaS-based strategies that accelerate and enable powerful digital transformation for your clients. Learn more!


Coffee Talk: Intro to Endpoint Security

Join security expert Ian Thornton-Trump CD as walks you through the realities of endpoint security, from protecting legacy systems, business services and even ephemeral workloads such as Elastic Beanstalk, so you can know how to thwart cyberattacks and keep your business afloat.


The Art of Cyber Deception: Strengthening Modern Defenses

Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies.


Decoding the 5th Round of MITRE ATT&CK Enterprise Evaluations 2023

MITRE Engenuity conducts independent evaluations of cybersecurity products to help institutions make better decisions to combat security threats and improve their threat detection capabilities. MITRE recently released results from the latest Engenuity ATT&CK Evaluation covering the adversary Turla, and SentinelOne will be breaking down the results during a special webcast. Join our product experts as we discuss what the ATT&CK Evaluation means for enterprises, what the Turla adversary is about, and how the Singularity Platform combats sophisticated threat actors.


Precision in Protection: Operationalizing Threat Detection and Response with Microsoft Sentinel

During part one of our two-part webinar series, we’ll explore how to operationalize Microsoft Sentinel’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration Automation and Response) capabilities combined with Security Operation Center analysis and response to rapidly detect, triage, and respond to actionable threats to your organization.


What’s New, Upcoming and Notable in Multicloud Data Threats

Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.


Compliance, Security, Resilience and More: Top Hurdles in Cloud Data Management

In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!


Cloud Data & Data Protection Best Practices Summit

Register for this free, three-hour summit to learn everything you need to know today about the biggest cloud data management trends and challenges. From modern best practices to the biggest emerging threats, our panel of cloud experts will share their most actionable real-world insights and effective tips so your organization’s data doesn’t fall through the cracks. Sign up today!


Safeguarding Microsoft 365 Data from Today’s Threats

Safeguarding Microsoft 365 data is your responsibility. In this webinar, we’ll explore how to keep your valuable Microsoft 365 data safe, compliant, and recoverable.


Best Practices for Securing & Recovering Microsoft 365

Join us to learn Microsoft’s newly introduced tools and features can help with data protection and security efforts. Don't miss out!


Managing & Securing Microsoft 365 Summit

You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you ahead of changes and give you real-world insights you can use to improve the security, manageability and recovery of your Microsoft 365 installation. Don't miss it!