Webcasts


On Demand

Finding the Calm Amidst the Storm: Insights into the Impact of Broadcom’s Acquisition of VMware and Potential Paths Forward

Join industry experts as they analyze the potential impacts of the acquisition on VMware customers, including pricing and packaging changes, shifting support levels and Broadcom’s partner program changes, and product changes due to planned divestments. They will also discuss strategies to mitigate risk, including adopting a dual-vendor virtualization strategy, migrating to a new infrastructure platform, or migrating to the public cloud in case that is your goal.


The Security Dos and Don’ts of BYOD and Endpoint Management

Let us help you navigate these issues and more. Join us for this free, three-hour summit where top experts will help you identify the biggest remote work security pitfalls in your organization, and the best ways to mitigate them.


Crash Course: Hybrid Workforce Security Summit

Let us help you navigate these issues and more. Join us for this free, three-hour summit where top experts will help you identify the biggest remote work security pitfalls in your organization, and the best ways to mitigate them.


Identity-First Security with ITDR

Join our upcoming webinar as we explore the core concepts of ITDR, going beyond the limitations of IAM to offer a more proactive and adaptive security solution. Discover how ITDR leverages threat intelligence gathered from all identity-related systems within your environment, enabling continuous and real-time monitoring of user activities.


Coffee Talk: The Whys and How’s of Managed Detection & Response

Cyber defence tools are one thing, cyber defence skills & knowledge are how to make a difference. Join this “cyber fit to fight” defensive webinar and change the game to start winning against the threat actors.


Myths and Realities in Telemetry Data Handling

Data volumes are growing exponentially, driving up observability platform costs and slowing response times. Most organizations underestimate the impact of excessive and poorly understood telemetry data. But help is on the way! Telemetry Pipelines can enhance the value and reduce the cost of handling this data. Learn more.


Solving The Microsoft Support Problem: How to Choose the Right Alternative to Microsoft Unified

In this information-packed Tech Talk, enterprise software support experts Mike Jones and Josh Arras talk with veteran technology journalist John K. Waters about the challenges enterprises are facing in this potentially costly Premier-to-Unified transition.


Coffee Talk: Top Ransomware Lessons for IT Leaders

In this session, we'll discuss ransomware attacks in the context of a comprehensive program leveraging recovery strategies against attacks you can’t always prevent. Keep the data safe and keep the users working. Attend to learn how.


Movers, Joiners, and Leavers: Managing personnel changes and external users in Microsoft 365

In this 45-minute, on-demand webinar, learn how to (safely) manage and secure licenses and user access. Learn more!


4 new ways to intelligently transform ITOps using AIOps-driven automation

Most enterprise ITOps organizations desire a state of self-healing systems capable of identifying and resolving issues without human intervention. While the allure of eliminating known, repeatable incident response workflows offers immense promise, these initiatives often fail to get off the ground. Learn how IT operations can jumpstart automation programs that tie together BigPanda Incident Intelligence with Red Hat® Ansible® Automation Platform – so you can go from knowledge to automated response.


Strategies for Implementing Simulation Training

Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.


End User Ransomware Training Tips, Tricks and Pitfalls

Join this webinar for a new approach to building cyber resilience for the employees on the front lines of your organization.


Why You Need End User Ransomware Training (and How To Do It So They Listen) Summit

Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.


Microsoft 365 Backup & Recovery 101: What To Avoid, What To Do and How To Manage It Summit

Join us for this free, half-day summit where some of the industry’s top independent experts will share their tried-and-true methods for designing, implementing and managing a disaster-proof Microsoft 365 backup and recovery plan. Make sure your Microsoft 365 data doesn’t get lost to the ether if (or when) disaster strikes – register today!


Open-Source Intelligence (OSINT): Learn the Methods Bad Actors Use to Hack Your Organization

Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4’s SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.