On Demand

What Enterprises Should Know About Identity Management, Authentication & Endpoint Protection

This presentation combines two important elements of an enterprise “Zero Trust” framework – Identity and Access Management (IAM) and the latest in endpoint protection technologies. For this presentation, Ian will be joined by Head of Cyber Threat Intelligence Operations for Cyjax, Chris Spinks, and will outline the crisis organizations find themselves when it comes to identity and access management.

Identity, Access Management & Endpoint Protection Mini-Summit

Join the editors of Redmondmag.com have created this free, two-session mini-summit featuring real-world insights on how you can keep your organization secure. From new approaches with Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) to compliance issues around IAM, authentication and endpoint protection, you'll get real-world insights you don't want to miss. Register now!

Coffee Talk: Managed Detection & Response 101: Why MDR and Why Now

Join this session for a deep dive into MDR, what it can do, what it can’t do and if you truly want to protect critical assets – what the foundational controls must be to make MDR bring business value. Gain clarity in the chaos of the modern threat landscape and understand that MDR is a key part of the new “layers of cyber defence.”

Ransomware, Ransom-war and Ran-some-where: What We Can Learn When the Hackers Get Hacked

Join James McQuiggan, Security Awareness Advocate at KnowBe4 for this informative webinar to learn about the tactics, techniques, and procedures used by various cybercriminal groups. Don't miss out!

Microsoft Teams Best Practices Summit

Join this free half-day summit to walk you through current best practices for Microsoft Teams, offering real-word advice, top tips and solutions for managing, securing and communicating with Microsoft Teams. You don't want to miss it!

Microsoft Teams Management & Communications Best Practices

The pandemic and the eventual transition to a hybrid work environment have caused Microsoft Teams to become an indispensable tool for many organizations. Join this session to learn practical tips for keeping your Microsoft Teams environment well organized and running smoothly.

Microsoft Teams Security Best Practices

In this session, we're going to cover best practices you can implement today when it comes to securing Microsoft Teams. We'll take a look at three areas of security you should be thinking about, including some of the brand-new Teams Premium features!

Speaking to the Board about Cloud Security

Whilst security leaders naturally know cloud security very well, the board and other senior leadership may not. According to the 2021 Global CISO Survey 90% of CISO’s present directly to the board. Therefore, the ability to articulate business risk to decision-makers is paramount to securing the appropriate investment in the right cybersecurity tool.

Cloud-Native Defense in Depth

Practically every organization is increasing their use of cloud infrastructure. Despite the proliferation of image scanning solutions, security remains the #1 concern. Cloud security is made difficult because it doesn’t fit into the more common perimeter-focused security model. In today’s cloud-enabled world, the perimeter of the network is an increasingly blurry line, making cloud defense in depth key to keeping your organization safe and secure from cyber threats.

Amazon S3: The Anatomy of Ransomware Events

Principal Security Solutions Architect for AWS, Megan O’Neil and Senior TDIR Solution Architect for AWS, Kyle Dickinson educate on what to expect if your organization encounters a security event targeting data residing in a customer’s S3 buckets. The duo explore common event patterns, leading to step-by-step guidance on how to respond to a ransomware event and best practices for recovering your data.

Extend Veeam-powered BaaS to Microsoft 365

Watch now as we explore the benefits of adding a Veeam‑powered Backup as a Service (BaaS) offering for Microsoft 365 to your stack.

The Top Ransomware Threats Your Enterprise Is Facing Right Now

This talk will cover all the ways that ransomware groups are focusing on initial access to your network and what you need to do to defend your organization from attack. Don't miss out!

Modern Cloud Data Protection Best Practices

In this session you will learn about how to protect your data, the importance of air gaps and immutability, how to manage your costs, and finally the best ways to secure your data.

Ransomware & Cloud Data Protection Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practical advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!

Enterprise Storage, Backup & Recovery Heading into 2023 Summit

Join the editors of Redmondmag.com, AWSinsider.net and Virtualization & Cloud Review have put together this free, half-day summit walking you through what you need to know to put together a comprehensive and real-world storage, backup and recovery plan for 2023. You won't want to miss it!