Webcasts


On Demand

Revolutionize Your Security Risk Prioritization: Continuous Threat Exposure Management (CTEM)

Streamline security with unified CTEM risk management. Derek Melber shares how to merge various security aspects into one view, reducing risks and costs while improving overall security. Learn more!


Learn How to Beat Ransomware with Trusted Backup

There is no bigger threat to the technology landscape than ransomware. In this session, our own Veeam expert will overview some key tips and tricks to survive your next ransomware incident.


Top Security Questions to ask your Data Protection Vendor

Are you sure they're secure? It's a question you have to ask when evaluating a vendor because it can be the difference between reducing your attack surface or adding more risk to your network. Join this webinar as we'll shift through the noise and discuss what's really important when choosing who to work with.


Key Considerations for Managing Massive Backups

The challenges and complexity of maintaining a “ready-to-recover” posture grow exponentially as the volume of data, the number of locations and numbers of workloads continue to skyrocket. Join two seasoned backup-and-recovery experts as they discuss solutions for managing backups at a massive scale and how you can deliver predicable, rapid recovery when things go wrong.


Transforming Employee Experience with Microsoft Viva

Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.


Cyberattacks on Education: How to Strengthen Identity Security

Join this webinar, Semperis Solutions Architect Alexandra Weaver will give you expert insight into lessons learned from recent education-focused cyberattacks and how to strengthen your own institution’s identity security stance.


Microsoft 365 Security Summit

Keeping your M365 installation secure is vital to your organization (and your job!). That's why you won't want to miss this free, half day summit curated by the editors of Redmond and featuring independent Microsoft MVPs and other Microsoft 365 experts who can offering you expert, real-word insight. Don't miss out!


Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas"

Keeping your M365 installation secure is vital to your organization (and your job!). That's why you won't want to miss this free, half day summit curated by the editors of Redmondmag and featuring independent Microsoft MVPs and other Microsoft 365 experts who can offering you expert, real-word insight. Don't miss out!


Top 10 Microsoft 365 Security Best Practices Every Organization Must Implement

Although Microsoft has designed the Microsoft 365 platform to be secure, customers are responsible for securing their own data within the Microsoft 365 ecosystem. Join this session to learn which Microsoft 365 security features you should be using to harden your Microsoft 365 deployment based on your own unique security needs.


NIST SP 800-53: Essential Security Controls for the Current Threat Landscape

Join our webinar to take a look at the NIST SP 800-53 and learn how it can help federal agencies and other organizations protect themselves against attacks.


Cyber Resiliency from Prevention to Recovery

Malicious actors are attacking companies of all sizes, necessitating an enterprise-quality cyber resiliency strategy and scalable toolset for small and medium sized organizations. Get key insights from Storagepipe a Thrive Company on the benefits of a multi-layered Cybersecurity framework to protect cloud and hybrid IT environments for businesses of any size.


Innovating the Enterprise App Ecosystem: Key Strategies for Success

Explore the latest trends, technologies and best practices that can elevate your app ecosystem to new heights.


Still Developing Software the Old Way? Best Practices for Migrating to DevSecOps

In this webinar we explore best practices for seamlessly integrating security into DevOps to ensure that software development doesn't compromise security in its quest for speed.


Ransomware Recovery Summit: What To Do After an Attack

In this free, three-hour summit, our experts will outline the steps you need to take in the aftermath of an attack, how to recover your data, and the changes you need to implement to make sure it doesn’t happen again. Learn more.


How To Build a Responsible Ransomware Response Plan

Join Ian Thornton-Trump, CISO at Cyjax, in this exclusive session, as he walks through the organization’s locker room when the home team suffers the biggest loss of their careers.