Veeam partners with over 22 different vendors that offer immutability. How do you know which one is the right one for you and fits the needs of the organization? Join Emilee Telez in this session and find out more.
In this Webcast, you will learn key best practices for securing your Active Directory and Azure AD environments. Some of the topics of discussion include important considerations for using Azure AD Connect, how creating isolation boundaries within the AD environment can improve security, and practical steps that you can take today to proactively head off attacks. Don't miss it!
Join the editors of Redmondmag.com will bring together independent experts to walk you through what's new in Microsoft Teams for remote workforce management plus best practices you need to know surrounding management, security and recovery.
To learn various best practices that you can implement as a way of helping your users to work more efficiently in Microsoft Teams.
It only takes 1 email, a 30 second call, or 1 social media DM for her to hack you and gain access to your money and data or infect your systems with ransomware. Meet Rachel Tobac, who executes these social engineering attacks for a living and uses her real‑life ethical hacking stories to keep organizations up to date on the methods criminals are using to trick people and the actions you can take to prevent a cybersecurity disaster before it strikes.
Join Veeam Product Manager Chris Hoff as he has a fireside chat with Veeam CISO Gil Vega to discuss what cyber threats are on the top of Gil’s CISO list in 2023, advice he’d give to technical teams to have informed conversations with their CISOs about disaster recovery and his top tips for building a security‑first mindset at your company.
Find out from Tony Liau why immutability must be an integral part of your data protection strategy and learn how to make sure your backups are immutable.
Many organizations don't know what options are available to recover from a ransomware attack. In this session, Matt Kalmenson will discuss how an as‑a‑service model can help you meet the unique needs of your business.
Learn directly from our expert Tim Smith how to adopt strategies to automate recovery and make sure you are ready to be a recovery hero.
In this session, we’ll examine the growth of AIOps, discussing not only how it can be applied to accelerate improvement to networks, but also how cautious humans can assure that it remains under control and positively productive.
Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.
In this session, Senior Resultant Howard M. Cohen takes on this excellent challenge and talks about the future UC developments he sees as most likely. Stimulate your imagination to inform your future planning. Join use for a look at the Future of United Communications & Teams.
Multi-factor authentication is now a prerequisite for organizations to avail cyber insurance coverage at reduced premiums. In this webinar, we'll discuss how deploying MFA can help mitigate credential-based attacks and data breaches and reduce your cyber insurance premium.
This invitation-only event is designed to facilitate an open discussion among industry peers focusing on the events and responses surrounding some of Australia’s most prominent breaches in 2022, establishing an effective framework following the Australian government's substantial increase in data breach fines, and more.
Join this session and we’ll share a mix of ransomware related business, organizational, procedural, and technical decision we wish enterprises just wouldn’t make.