Webcasts


On Demand

Coffee Talk: Threat Alert: Monthly Top Attack Overview

Armed with the latest cyber threat intelligence from Cyjax, Ian Thornton-Trump CD, will outline what he sees as a resurgence in Russian state sponsored or state condoned cyber-attacks and why there may be very turbulent times ahead as we head into Spring 2023.


Coffee Talk: Why Cloud Firewalls & Why Now

Join Ian Thornton-Trump CD, CISO of Cyjax who has recent experience with a global deployment of Cloud based firewall technology and learn from his successes and challenges.


Recovering AD: The missing piece in your ITDR plan

In this webinar, Guido Grillenmeier (Semperis Principal Technologist, EMEA) will discuss the role of AD recovery in ITDR, considerations for building a comprehensive recovery plan, and a real-life example of why AD recovery planning is vital to operational resilience. Register Today!


Contact Center as a Service: The Microsoft Teams Connection

In this informative Tech Talk, contact center experts explain how companies can clear these hurdles with real-world strategies for Teams that will improve productivity and customer satisfaction. Businesses can do more with less using Microsoft Teams, as long as they know how to use it to its fullest potential. Register today to find out how! 


Best Practices for AWS Monitoring

In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!


How ITDR Helps Battle Identity Theft

This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!


The Road to Digital Resilience: Right-Sizing Hybrid Cloud Application Deployments

This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!


Disaster Recovery: Your New Ticket to Cyber Insurability

This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.


Applying the MITRE ATT&CK framework for threat detection and response

Learn how to use the MITRE ATT&CK framework within your SIEM solution to derive actionable insights. Leveraging your security analytics tools can help you improve threat detection and formulate an impenetrable defense mechanism. Get started now!


MITRE ATT&CK training: Staying ahead of adversarial tactics

Watch this webinar to gain a better understanding of the MITRE ATT&CK framework and learn about the several tactics, techniques, and procedures involved in a compromise. Knowing the modus operandi of attackers can help you to prepare and defend your organization. Stay ahead of adversaries!


Enterprise Buyer's Guide for Data Protection

Join this webcast where Dave Russell, Veeam’s Vice President of Enterprise Strategy, and Misha Rangel, Veeam's Director of Enterprise Product Marketing will help you navigate through different questions that as decision maker you should ask yourself and your team when evaluating company’s specific data needs.


Microsoft 365 Backup Checklist for 2023

More organizations are protecting Microsoft 365 data than ever before, is yours one of them? In this presentation, you’ll also get to learn about the #1 Microsoft 365 backup solution — Veeam Backup for Microsoft 365.


WebCMS to WebOps: A Conversation with Nestlé's WebCMS Product Manager

Join us to learn how WebOps differs from WebCMS and allows organizations to transcend silos, why companies like Nestle chose a WebOps solution to address those challenges, and more!


Modern Cloud Data Protection Summit

Make sure you're ready for all things cloud data protection with this free half-day summit from the editors of Virtualization & Cloud Review and Redmondmag.com.


Hacking Biometrics: If You Thought Your Fingerprints Were Safe, Think Again!

Join Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist, as he dives into how biometrics can work, how they can be used against you, and how you can best protect your organization. Don't miss out!