Webcasts


On Demand

The Entra ID Security Playbook Summit

Your IT team needs to keep up with these evolving attack strategies. Sign up for this free three-hour virtual summit and get an in-depth, expert-led guide to protecting Entra ID in today's evolving security landscape. Learn how to modernize your security strategy, plus the newest tools to help you fortify your Entra ID environment before the worst happens. Don't wait -- register today!


The IT Pro's How-to Guide to Building a Strong Security Culture

Join us for this webinar where Erich Kron, Security Awareness Advocate at KnowBe4, walks you through our comprehensive how-to guide to build a step-by-step security culture action plan.


Tech Talk | Microsoft Licensing Essentials: Choosing Between MCA and EA

In this live Tech Talk, veteran technology journalist John K. Waters talks with Mike Jones, VP of Product Development at US Cloud about the key differences between MCA, EA, and other options. As well as how each agreement can affect your organization’s support costs.


Ransomware vs. Analytics Summit: How To Take a Data-Based Approach Against Security Attacks

Our panel of experts will show you how in this free, three-hour summit, where they'll walk you through implementing and managing anti-ransomware analytics. Don't miss it -- register today!


Tech Talk | From Tool Overload to Unified Excellence: Mastering IT Management with Kaseya 365

Modern IT environments are complex and ever-changing. Join our live Tech Talk to discover how Kaseya 365 bundles essential tools into a single subscription, streamlining IT management for MSPs. Don't miss this chance to learn how Kaseya 365 can enhance security, automation, and efficiency in your IT operations.


The CISO's Guide to a Strong Security Culture

It’s time to stop being jerked around by fads and commit to doubling down on the real work. Join Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, as he sheds light on the top security issues and practices security leaders should be aware of. This is about concentrating your time, budget, and efforts where they’ll have the most benefit for your organization.


Cloud Resiliency Demo: Cybersecurity basics in 3-2-1

With 86% of organizations stating they had cloud-hosted data affected by ransomware in 2022, IT teams are left with concerns around who will manage all their clouds, all while ensuring cyber security prevention, data protection, and other critical IT controls. series. Veeam® cloud experts, Leah Troscianecki and Karinne Bessette, will take you through an important cloud cybersecurity basics masterclass in 3-2-1.


Game Changing M365 Backup Service: What Small Business Need to Know

Join us for an informative session on Veeam Data Cloud for Microsoft 365, our new as-a-service solution, and discover how it can revolutionize your data backup and recovery strategy. In this webinar, we will explore robust features and capabilities, designed specifically to fit the needs of small businesses. Learn how this feature rich solution helps save time on managing your backup infrastructure and keeps things simple with a modern, secure, and intuitive UI. Don't miss this opportunity to unlock the power of cloud backup and safeguard the future of your business.


Cloud Security Automation Summit: How To Achieve (Almost) Zero-Touch Cloud Security

Join us for this free, expert-led summit where you'll learn the best ways to automate your cloud's security so you stay one step ahead of the attackers.


Coffee Talk | Expert View: How To Update Your Data Management Strategy for the AI Era

Join our webcast to discover how to harness the power of AI for your data management strategy. Learn to prepare for the challenges of AI integration, from data security and reliability to ethical considerations and automation. Don't miss our expert tips for modernizing your data management in the AI era!


The Five Types of Data Connectors for Microsoft Sentinel

Don’t miss out on this opportunity to enhance your data analysis and security monitoring capabilities with Microsoft Sentinel. Dive into the realm of third-party cloud applications and their built-in connectors, simplifying event logging data integration into Sentinel.


Identity Threat Summit: How To Find and Fix Entra ID Security Vulnerabilities

Join the editors of Redmondmag.com as well as leading IT security veterans as we look at Entra ID's role as a security risk and the top industry best practices for mitigating that risk.


Coffee Talk | Expert Guide to Preventing and Surviving Business Email Compromise

Join us to discover why Business Email Compromise (BEC) attacks soared to $2.9 billion in losses in 2023, ranking as the second-costliest cyber-crime category of the year. Dive into our webinar as we delve into why BEC attacks blend employee awareness with technical security controls, and explore if they constitute the ultimate supply chain threat. Don't miss out on practical insights to safeguard your organization


Generative AI: Breaking through the backlog for business transformation

Watch this on-demand webinar on AI-driven business transformation. Discover how generative AI empowers developers, accelerates app development, optimizes workflows, and delivers personalized experiences. Learn to unlock AI's full potential for unparalleled productivity and innovation.


Cloud Migration 101: How To Goof-Proof Your Cloud Journey Summit

Learn how to avoid all of these problems in this free, three-hour summit. Get real-world guidance for your cloud migration straight from the experts, from how to streamline your data transfers, to how to salvage your legacy apps, and more. We’ve got all your cloud migration bases covered – sign up today!