Webcasts


On Demand

AWS Cloud: What's New & What's Hot Summit

Register for this free, half-day summit organized by the editors of AWSInsider.net and Virtualization & Cloud Review to get first-hand insights and advice from the top AWS independent experts today.


Simplifying FISMA Compliance: A Solution to Federal Cybersecurity Hurdles

In this webinar, we'll show how our IAM solution, ManageEngine AD360, simplifies FISMA compliance.


Data Resilience 101 Summit

Join this free, three-hour summit to learn straight from the experts the biggest mistakes you can make with your data, the top ways to make that data resilient, and how to make sure your organization stays ahead of the threats.


Remote Workforce Security Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net for this free, expert-led half-day summit featuring independent advice and best practices for keeping your remote/hybrid workforce secure and recoverable today and in the future -- don't miss it.


Multicloud Crash Course Summit: Azure vs. AWS vs. GCP or All of the Above

We’re here to help! Register for our free expert-led Summit to learn the most critical differences between the Big 3’s various cloud offerings, from pricing to capabilities to the fine print, so you can make the best decision for your organization.


Maximize Your App Innovation Quotient

Join Insight for a webinar where our experts will share a framework for removing innovation barriers. You’ll learn about the seven phases of innovation and the generative AI lifecycle and walk away with real strategies for success — from building models to deploying and operationalizing them, and how to pinpoint your highest-ROI use cases.


Why Zero Trust & Why Now Summit

Join this free, two-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. From implementation best practices, to key technologies, to end user training, our experts will answer all the zero trust questions you have so you can level up your security. Register today!


Multicloud Data Migration 101

Choosing the proper solution depends on a number of factors, including the engineering level of your organization, your tolerance for risk, and the volume of your data. Learn about these strategies and help your team make the best decisions for your multi-cloud experience.


Trends in Server Virtualization: A conversation with IDC

Join speakers, Gary Chen and Peter Lauterbach, for a discussion on industry trends and where and how technologies like Red Hat& OpenShift& Virtualization can help navigate a path forward.


Revolutionize Your Security Risk Prioritization: Continuous Threat Exposure Management (CTEM)

Streamline security with unified CTEM risk management. Derek Melber shares how to merge various security aspects into one view, reducing risks and costs while improving overall security. Learn more!


Transforming Employee Experience with Microsoft Viva

Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.


NIST SP 800-53: Essential Security Controls for the Current Threat Landscape

Join our webinar to take a look at the NIST SP 800-53 and learn how it can help federal agencies and other organizations protect themselves against attacks.


Still Developing Software the Old Way? Best Practices for Migrating to DevSecOps

In this webinar we explore best practices for seamlessly integrating security into DevOps to ensure that software development doesn't compromise security in its quest for speed.


How To Build a Responsible Ransomware Response Plan

Join Ian Thornton-Trump, CISO at Cyjax, in this exclusive session, as he walks through the organization’s locker room when the home team suffers the biggest loss of their careers.


Ransomware Recovery Summit: What To Do After an Attack

In this free, three-hour summit, our experts will outline the steps you need to take in the aftermath of an attack, how to recover your data, and the changes you need to implement to make sure it doesn’t happen again. Learn more.