On Demand
Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies.
MITRE Engenuity conducts independent evaluations of cybersecurity products to help institutions make better decisions to combat security threats and improve their threat detection capabilities. MITRE recently released results from the latest Engenuity ATT&CK Evaluation covering the adversary Turla, and SentinelOne will be breaking down the results during a special webcast. Join our product experts as we discuss what the ATT&CK Evaluation means for enterprises, what the Turla adversary is about, and how the Singularity Platform combats sophisticated threat actors.
During part one of our two-part webinar series, we’ll explore how to operationalize Microsoft Sentinel’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration Automation and Response) capabilities combined with Security Operation Center analysis and response to rapidly detect, triage, and respond to actionable threats to your organization.
Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.
In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!
Register for this free, three-hour summit to learn everything you need to know today about the biggest cloud data management trends and challenges. From modern best practices to the biggest emerging threats, our panel of cloud experts will share their most actionable real-world insights and effective tips so your organization’s data doesn’t fall through the cracks. Sign up today!
Safeguarding Microsoft 365 data is your responsibility. In this webinar, we’ll explore how to keep your valuable Microsoft 365 data safe, compliant, and recoverable.
Join us to learn Microsoft’s newly introduced tools and features can help with data protection and security efforts. Don't miss out!
You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you ahead of changes and give you real-world insights you can use to improve the security, manageability and recovery of your Microsoft 365 installation. Don't miss it!
By the end of this session, you will have a better understanding of how to manage Microsoft 365 for your organization. You will also learn about functionality available in Microsoft 365 that you may want to go implement and learn more about. You will also leave with some tips and resources to help you stay updated on the latest in what is coming to Microsoft 365.
Watch this webinar to learn how to secure, defend, and recover your data, applications, and production workloads – on-premises, in the cloud, over SaaS, or spread across hybrid and multi-cloud environments.
Join Insight for a webinar where our experts share the core components of the modern data estate. You’ll learn the steps involved in building a foundation for modern data management to maximize your use of data intelligence — no matter where you are on the maturity curve.
Learn how automation can level up your cloud infrastructure, real-world use cases, top configuration and management secrets, and much more. The right automation strategy can expand the possibilities for your IT team – register today and let us show you how!
Join us for a live 60-minute webinar with cybersecurity expert Dave Cook and learn how to break the attack chain while strengthening your M365 security.
Join this exclusive expert-led webinar to understand the increasing relevance of identity- based security and what are the immediate steps you can take to get started.