Webcasts


On Demand

The Entra ID Security Playbook Summit

Your IT team needs to keep up with these evolving attack strategies. Sign up for this free three-hour virtual summit and get an in-depth, expert-led guide to protecting Entra ID in today's evolving security landscape. Learn how to modernize your security strategy, plus the newest tools to help you fortify your Entra ID environment before the worst happens. Don't wait -- register today!


The IT Pro's How-to Guide to Building a Strong Security Culture

Join us for this webinar where Erich Kron, Security Awareness Advocate at KnowBe4, walks you through our comprehensive how-to guide to build a step-by-step security culture action plan.


Tech Talk | Microsoft Licensing Essentials: Choosing Between MCA and EA

In this live Tech Talk, veteran technology journalist John K. Waters talks with Mike Jones, VP of Product Development at US Cloud about the key differences between MCA, EA, and other options. As well as how each agreement can affect your organization’s support costs.


Ransomware vs. Analytics Summit: How To Take a Data-Based Approach Against Security Attacks

Our panel of experts will show you how in this free, three-hour summit, where they'll walk you through implementing and managing anti-ransomware analytics. Don't miss it -- register today!


Tech Talk | From Tool Overload to Unified Excellence: Mastering IT Management with Kaseya 365

Modern IT environments are complex and ever-changing. Join our live Tech Talk to discover how Kaseya 365 bundles essential tools into a single subscription, streamlining IT management for MSPs. Don't miss this chance to learn how Kaseya 365 can enhance security, automation, and efficiency in your IT operations.


The CISO's Guide to a Strong Security Culture

It’s time to stop being jerked around by fads and commit to doubling down on the real work. Join Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, as he sheds light on the top security issues and practices security leaders should be aware of. This is about concentrating your time, budget, and efforts where they’ll have the most benefit for your organization.


Cloud Security Automation Summit: How To Achieve (Almost) Zero-Touch Cloud Security

Join us for this free, expert-led summit where you'll learn the best ways to automate your cloud's security so you stay one step ahead of the attackers.


Coffee Talk | Expert View: How To Update Your Data Management Strategy for the AI Era

Join our webcast to discover how to harness the power of AI for your data management strategy. Learn to prepare for the challenges of AI integration, from data security and reliability to ethical considerations and automation. Don't miss our expert tips for modernizing your data management in the AI era!


The Five Types of Data Connectors for Microsoft Sentinel

Don’t miss out on this opportunity to enhance your data analysis and security monitoring capabilities with Microsoft Sentinel. Dive into the realm of third-party cloud applications and their built-in connectors, simplifying event logging data integration into Sentinel.


Identity Threat Summit: How To Find and Fix Entra ID Security Vulnerabilities

Join the editors of Redmondmag.com as well as leading IT security veterans as we look at Entra ID's role as a security risk and the top industry best practices for mitigating that risk.


Coffee Talk | Expert Guide to Preventing and Surviving Business Email Compromise

Join us to discover why Business Email Compromise (BEC) attacks soared to $2.9 billion in losses in 2023, ranking as the second-costliest cyber-crime category of the year. Dive into our webinar as we delve into why BEC attacks blend employee awareness with technical security controls, and explore if they constitute the ultimate supply chain threat. Don't miss out on practical insights to safeguard your organization


Cloud Migration 101: How To Goof-Proof Your Cloud Journey Summit

Learn how to avoid all of these problems in this free, three-hour summit. Get real-world guidance for your cloud migration straight from the experts, from how to streamline your data transfers, to how to salvage your legacy apps, and more. We’ve got all your cloud migration bases covered – sign up today!


Cyber Resilience 101: Top Tips for Active Directory Defense

The ability to defend and recover your hybrid AD environment is key to operational resilience. Join Alexandra Weaver, Senior Solutions Architect, Semperis to learn more!


How to Fight Long-Game Social Engineering Attacks

Don’t get caught in the trap of long-game social engineering! Learn how to spot these attacks before they happen. Join us!


8 Reasons Teams Fall Short on AD Forest and Ransomware Recovery

Join our upcoming webinar to address the critical need for a robust Active Directory (AD) Forest recovery solution. Experts will cover the latest threats, common pitfalls, and effective recovery strategies. Don’t miss this chance to fortify your organization’s AD resilience—register now!