Webcasts


On Demand

My Top 5 Data Protection Tips

In this presentation, Karen Lopez shares her top 5 ways to protect data and the systems that house it. She’ll even throw in one or two that aren’t typically covered under this topic.


Prevent Active Directory Password Attacks: Steps and Tools

Password attacks are one of the most common reasons for data breaches even in 2021. The best way to get ahead of cybercriminals is to think like them. In this webinar, we'll show you how. Learn more!


Azure AD & Active Directory Security Summit

This half-day summit brings together the editorial staff of Redmondmag.com and independent experts to educate IT pros on what they need to know to protect their enterprise. Learn more.


Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021

Join Ian Thornton-Trump CD for the first session of our Azure AD & Active Directory Security Summit for a walk-through of a recent US Government Agency compromise and how monitoring of the Windows Security Event log could have revealed the unauthorized activity - on many occasions. Learn more.


Threat Detection Thursday - Breaking All The Rules!

This session will provide an overview of detection types, applicability, and rule aggregation to help you better focus on events that matter. If you can't tell your RBA from your UBA, join us on our journey to detection excellence! Learn more.


Enabling Digital Transformation with Windows Embedded IoT Solutions

Join us at this interactive and engaging webinar to learn how Microsoft Windows Embedded IoT and Azure cloud enable digital transformations helping partners to accelerate their delivery goals. Find out more now.


Addressing Endpoint and Data Insecurity in a Post-COVID World

The shifts that have occurred in the last 12 months in the way your organization operates have resulted in a drastically different working environment than what previously existed. Learn how you should go about addressing post-COVID insecurity? Register now.


Active Directory Hybrid Cloud Management: Top Security Risks to Watch For

In this webinar, we'll will discuss the top three security considerations when shifting to a hybrid identity model. Learn more.


Microsoft Teams Summit

It's time for your IT department to become your company's Microsoft Teams hero! Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, tips and tricks plus more. Learn more.


Simplifying Microsoft 365 Tenant Migrations When M&A Makes it Complicated

The pandemic has created opportunity for plenty of M&A/Divestiture activity. Learn more.


Don’t Do This With Your VM, Physical or NAS Backups: Worst Practices Gallery

So, you think you’ve seen it all? Think again. Join this webcast and learn more.


Hybrid Cloud 101 Summit

Do you know the best practices for setup and configuration? What about the tools that can help? Join the editors of Virtualization & Cloud Review along with independent experts for this information-packed half-day seminar. Learn more.


Hybrid Cloud 102: Best Practices for Hybrid Cloud Enterprise Configuration

Join us for session two of this summit as we look at best practices for Enterprise Hybrid Cloud Configuration and associated topics. Learn more.


Digital Transformation & The Cloud: Expert Best Practices for Transforming Your Enterprise

In this special editorial webcast, experts from Redmondmag.com will walk you through basic steps for considering a major Digital Transformation project. We'll look at everything from identifying stakeholders, rallying organizational support, to determining and securing budget and executing the project. Learn more.


How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

Active Directory Exploitation Is the Common Thread in Recent High-Profile Attacks. Colonial Pipeline, SolarWinds, Hafnium - every day we hear about a new attack, a new vulnerability, and devastating consequences. Learn more.