On Demand

Observe and Monitor: Strengthening Your Cyber-Resilience Strategy

In this Tech Talk, Kirsten Stoner, technologist at Veeam Software, talks with veteran technology journalist John K. Waters about current cybersecurity challenges in the enterprise, and strategies for protecting your company's most vulnerable assets. Register Now!

Conquering Cloud Chaos: Best Practices for Highly Regulated Orgs

In this session, Senior Resultant Howard M. Cohen joined by experts from VMware will discuss the challenges and the best practices to be applied to resolve them. Get ready to have those cloud management headaches go away. Join us!

Coffee Talk : Top 10 Disaster Recovery Risks in Microsoft 365

Find out all of the bases you need to cover to keep your Microsoft 365 resilient and recoverable at all times. In this free Coffee Talk, you’ll learn all the common pitfalls that organizations run into when it comes to Microsoft 365 data recovery, and how to bolster those weaknesses before the worst happens. Don’t wait – register today!

A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

You’re Doing Endpoint Security Wrong: How To Identify and Fix IT’s Biggest Pain Points

Unified endpoint management is critical for the security of your organization and the efficiency of your IT team. Let our experts show you how – register today!

Azure AD/Active Directory Security & Management Summit

The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!

Expert Active Directory/Azure AD Security & Management Insights

In this session, we will be looking at how you can properly secure and manage and secure your AD and Entra environments, so your systems, services, and data remain safe and secure. Join in to learn more!

Top Active Directory/Azure AD Security & Management Best Practices

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment.

Reducing Backup and Data Protection Storage Costs from On-Prem to Cloud

Join Greg Schulz and Adrian Moir for an interactive discussion on reducing backup and data protection storage costs from on-prem to cloud. They will discuss industry trends, customer pain points, techniques, and best practices to reduce your data footprint impact and how to support exponential data growth without busting your data protection storage budget.

The Art of Cyber Deception Technology: Strengthening Modern Defenses

Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies. Join SentinelOne as we discuss deception technology for a modern defense.

Managed Cloud for Growth and Innovation

In this expert-led session, we’ll discuss Insight’s wide portfolio of managed services. Learn strategies you can implement for a hands-off approach that will transform operations and innovate your cloud environment.

Coffee Talk: Enterprise Ransomware Threat Outlook

In this session, Senior Resultant Howard M. Cohen and the Red Canary team will discuss the most prevalent threats and how to develop your protective strategies. Learn more!

Facilitate log auditing and alerting for proactive threat management

Active Directory (AD) is pivotal for user details, network logons, and threat detection. AD Auditing is imperative due to compliance penalties and escalating cyber risks. The webinar explores AD event auditing, breach detection, user tracking, troubleshooting, and seamless compliance fulfilment.

Streamline Identity Security by Eliminating Redundant Tasks

IT and SOC teams should devote a major share of their efforts towards high-end operations such as implementing incident response plans, advanced threat detection, and mitigation strategies. Join in yo learn why and how manual processes harm IT and SOC operations, and more.

Can Your Organization Pass an Identity Security Assessment?

Join this webinar, Semperis Senior Solutions Architect Mike Carlson will draw from his years of hands-on experience and use Semperis free community tools to illustrate how to determine whether your organization could pass an identity security assessment.