Webcasts


On Demand

Microsoft Security in 2022 Summit

The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.


Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. Learn more.


2022 State of IT & Digital Transformation Leadership Summit

Don't miss this expert-packed, two-hour summit created for CTOs, CIOs, IT directors, and IT professionals looking for technology trends that will impact them and their market in the new year. Learn more.


Identity & Access Pain Points: Top Issues from AD Integration to SaaS Control to Compliance

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment. Learn more.


Identity & Access Management Summit

In this virtual summit, we look at top issues surrounding IAM, supplementing Active Directory and Azure AD, including SaaS authentication, changing compliance requirements and emerging approaches such as CARTA, continuous and adaptive risk and trust assessment. Learn more.


Identity & Access Management Best Practices: What IT Pros Need to Know Now

Join us to learn the best practices for establishing an IAM architecture that will work with your existing infrastructure and across clouds. Learn more.


Real-World HCI Best Practices

In this session, you will learn essential information about keeping your HCI infrastructure running and looking at future-proofing your designs. Tune into this session for expert industry advice for two of the worlds leading experts in HyperConverged Infrastructure.


Mastering Hyperconvergence Summit

Don't miss this free half-day summit brought to you by the editorial staff of Virtualization & Cloud Review and Redmondmag.com who will bring together independent HCI experts for to walk you through tips, advice, best practices and more that will help you master hyperconvergence. Learn more.


Top Hyperconvergence Infrastructure Tips

In this session, you will hear from two industry experts regarding best practices on managing and maintaining HyperConverged Infrastructure. Learn more.


DevSecOps: Securely Navigating a Shifting Threat Landscape

In this live Tech Talk, veteran technology journalist John K. Waters talks with DevSecOps expert Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about DevSecOps best practices. Learn more.


Incredible Email Hacks You'd Never Expect

In this webinar Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Learn more.


Part II: Optimizing and Securing Communications in the Hybrid Workplace

This is the secont of a two-part podcast featuring experts from unified communications platform provider RingCentral.


How to Create a SIEM Framework That Aligns With NIST Guidelines

Join our webinar where our SIEM expert talks about how you can align your SIEM framework with NIST guidelines. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


AWS Architecture & Configuration Best Practices

In this session, we'll go through a few cloud architectures and explain why these design choices were made, and discuss a few best practices around application scalability, security and resilience. Learn more.