On Demand
Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.
In this session, Senior Resultant Howard M. Cohen takes on this excellent challenge and talks about the future UC developments he sees as most likely. Stimulate your imagination to inform your future planning. Join use for a look at the Future of United Communications & Teams.
This invitation-only event is designed to facilitate an open discussion among industry peers focusing on the events and responses surrounding some of Australia’s most prominent breaches in 2022, establishing an effective framework following the Australian government's substantial increase in data breach fines, and more.
Join this session and we’ll share a mix of ransomware related business, organizational, procedural, and technical decision we wish enterprises just wouldn’t make.
Armed with the latest cyber threat intelligence from Cyjax, Ian Thornton-Trump CD, will outline what he sees as a resurgence in Russian state sponsored or state condoned cyber-attacks and why there may be very turbulent times ahead as we head into Spring 2023.
In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!
This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!
This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!
This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.
Join this webcast where Dave Russell, Veeam’s Vice President of Enterprise Strategy, and Misha Rangel, Veeam's Director of Enterprise Product Marketing will help you navigate through different questions that as decision maker you should ask yourself and your team when evaluating company’s specific data needs.
Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.
Join this session, to discuss how new features like Direct-to-object storage and the expanded options for application-consistent cloud backups will provide even more security protection.
In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users.
Whether you need to encrypt your emails, secure user logins, secure endpoints, prevent data loss, detect and respond to attacks, or even run attack simulations, Microsoft 365 has you covered. In this session, we'll dive into some of those security features and how you can take advantage of them in your own environment!
There's so much IT leaders need to know about keeping their M365 installations secure in 2023 that the editors of Redmondmag.com have created this free, half-day summit where you'll hear from independent Microsoft 365 and security experts on the best ways to keep your M365 (and your enterprise) secure. Don't miss it!