Webcasts


On Demand

To Hell and Back: Recovering Active Directory During an Attack

Join Semperis’ Principal Technologist and MVP alumnus Guido Grillenmeier for lessons from this real-live incident response and attack intervention.


The Dual Nature of the Dark Web: Navigating Risks and Harnessing Potential for Cybersecurity

As compromised credentials reign as the primary catalyst for data breaches, organizations are in pursuit of actionable intelligence to secure their environment. Join in to Learn more!


Enhancing Security, Cyber Resilience, and Performance of Your Veeam Backup Recovery Solution

Join us for an interactive discussion on making backups and restores better, faster, more secure, and cost-effective from on-prem to Cloud. Adrian and Greg will discuss industry trends, customer pain points, techniques, best practices, AI anomaly, dedupe data footprint reduction, and cloud object storage.


Leaving Microsoft Unified for Third-Party Support : How Two Large Enterprises Made the Switch

Join our experts and IT professionals who made the switch from Microsoft Unified and never looked back.


Data Resilience 101 Summit: How To Keep Data Safe and Recoverable

Join this free, three-hour summit to learn straight from the experts the biggest mistakes you can make with your data, the top ways to make that data resilient, and how to make sure your organization stays ahead of the threats.


Coffee Talk: Rebounding from Ransomware: An Expert Guide

Make sure your ransomware strategies cover the full breadth of an attack, from start to finish – and beyond! Learn how in this free expert-led Coffee Talk.


AI vs. Security Summit

Join this free three-hour summit to learn straight from the experts how to modernize your security posture with AI to meet up-and-coming threats to your data.


Coffee Talk: Datacenter Fabrics 101: What They Are, Why You Need Them & How To Implement Them

In this coffee talk you’ll learn about how fabric architecture can help you drive efficiencies in bandwidth, costs, and energy efficiency in you datacenter.


Securing Identities Against Modern Security Threats

Join Matthew Vinton and Anna Malec, security experts at Quest, for an invaluable session where we will discuss the top Active Directory threats. Don't miss out!


Managing Long term and Permanent Digital Records within Microsoft 365

In this live Tech Talk, Mike Quinn, CEO of Preservica, and Stuart Reed, the company's Chief Product Officer, talk with veteran technology journalist John K. Waters about Active Digital Preservation archiving in Microsoft 365 and SharePoint environments. Learn more!


Enhance Your Microsoft Teams Experience With A Single Source for UCaaS and CCaaS

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, along with Vonage experts Denise Vlaicu and Carlos Aragon, as they discuss how to get more value out of your Microsoft Teams investment, UC, and CC as services (UCaaS & CCaaS), and related topics.


Leaders in Tech Series | Ransomware Recovery: What To Do After an Attack (and Prevent Future Ones)

In this free, one-hour summit, leading experts will provide critical insights into the exact immediate actions to take following a ransomware attack. You’ll learn how to build a responsible ransomware response plan so your organization can rebound quickly and painlessly after the worst happens. Don’t wait – register today!


Coffee Talk: Simplifying Windows Imaging before FY25 school year budget cycle

Tune in to this Coffee Talk to learn all the best Windows imaging tools and strategies for the upcoming school year.


Supercharge Microsoft Environments with Intelligent IT Documentation

Join us for what promises to be an insightful conversation about how intelligence-driven IT documentation has become a critical technology, providing IT teams with key information about their Microsoft environments, including M365, Active Directory and Intune, right at their fingertips.


Identity System Defense for the Healthcare Industry

Join Marty Momdjian, Semperis’ EVP of Services and an expert in healthcare cyber protection, to learn why the industry has become a prime cyberattack target—and how an effective 360˚ identity threat detection and response (ITDR) strategy can help you protect your organization, staff, and patients.