Threat actors are turning to supply chain-based attacks as a means of exploiting customer-supplier relationships to infiltrate organizations. According to Gartner predictions, nearly half the world's businesses could be affected by 2025 - a stark reminder that security measures need constant reinforcement.
Join this session, to discuss how new features like Direct-to-object storage and the expanded options for application-consistent cloud backups will provide even more security protection.
There's so much IT leaders need to know about keeping their M365 installations secure in 2023 that the editors of Redmondmag.com have created this free, half-day summit where you'll hear from independent Microsoft 365 and security experts on the best ways to keep your M365 (and your enterprise) secure. Don't miss it!
In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users.
Whether you need to encrypt your emails, secure user logins, secure endpoints, prevent data loss, detect and respond to attacks, or even run attack simulations, Microsoft 365 has you covered. In this session, we'll dive into some of those security features and how you can take advantage of them in your own environment!
Register for this Coffee Talk to learn exactly what’s falling out of support and when, the security and licensing implications, and how to find the least-painful upgrade paths for your organization.
In this Tech Talk, John K. Waters, editor in chief in the Converge360 Group of 1105 Media, talks with entrepreneur and thought leader Bob Friday, Chief AI Officer at Juniper Networks, about ChatGPT and the future AIOps, which organizations are implementing to automate infrastructure operations and DevOps.
Join the editors of Redmondmag.com have created this free, two-session mini-summit featuring real-world insights on how you can keep your organization secure. From new approaches with Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) to compliance issues around IAM, authentication and endpoint protection, you'll get real-world insights you don't want to miss. Register now!
Join this session for a deep dive into MDR, what it can do, what it can’t do and if you truly want to protect critical assets – what the foundational controls must be to make MDR bring business value. Gain clarity in the chaos of the modern threat landscape and understand that MDR is a key part of the new “layers of cyber defence.”
Join this free half-day summit to walk you through current best practices for Microsoft Teams, offering real-word advice, top tips and solutions for managing, securing and communicating with Microsoft Teams. You don't want to miss it!
Whilst security leaders naturally know cloud security very well, the board and other senior leadership may not. According to the 2021 Global CISO Survey 90% of CISO’s present directly to the board. Therefore, the ability to articulate business risk to decision-makers is paramount to securing the appropriate investment in the right cybersecurity tool.
Practically every organization is increasing their use of cloud infrastructure. Despite the proliferation of image scanning solutions, security remains the #1 concern. Cloud security is made difficult because it doesn’t fit into the more common perimeter-focused security model. In today’s cloud-enabled world, the perimeter of the network is an increasingly blurry line, making cloud defense in depth key to keeping your organization safe and secure from cyber threats.
Principal Security Solutions Architect for AWS, Megan O’Neil and Senior TDIR Solution Architect for AWS, Kyle Dickinson educate on what to expect if your organization encounters a security event targeting data residing in a customer’s S3 buckets. The duo explore common event patterns, leading to step-by-step guidance on how to respond to a ransomware event and best practices for recovering your data.
Watch now as we explore the benefits of adding a Veeam‑powered Backup as a Service (BaaS) offering for Microsoft 365 to your stack.
This talk will cover all the ways that ransomware groups are focusing on initial access to your network and what you need to do to defend your organization from attack. Don't miss out!