Find out all of the bases you need to cover to keep your Microsoft 365 resilient and recoverable at all times. In this free Coffee Talk, you’ll learn all the common pitfalls that organizations run into when it comes to Microsoft 365 data recovery, and how to bolster those weaknesses before the worst happens. Don’t wait – register today!
Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.
Unified endpoint management is critical for the security of your organization and the efficiency of your IT team. Let our experts show you how – register today!
The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!
In this session, we will be looking at how you can properly secure and manage and secure your AD and Entra environments, so your systems, services, and data remain safe and secure. Join in to learn more!
During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment.
Join Greg Schulz and Adrian Moir for an interactive discussion on reducing backup and data protection storage costs from on-prem to cloud. They will discuss industry trends, customer pain points, techniques, and best practices to reduce your data footprint impact and how to support exponential data growth without busting your data protection storage budget.
Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies. Join SentinelOne as we discuss deception technology for a modern defense.
In this session, Senior Resultant Howard M. Cohen and the Red Canary team will discuss the most prevalent threats and how to develop your protective strategies. Learn more!
Active Directory (AD) is pivotal for user details, network logons, and threat detection. AD Auditing is imperative due to compliance penalties and escalating cyber risks. The webinar explores AD event auditing, breach detection, user tracking, troubleshooting, and seamless compliance fulfilment.
Sign up for this free Coffee Talk to learn about the most notable Microsoft 365 vulnerabilities and attack methods today, and the proven best practices to stop them from doing your organization serious harm. Register today!
Ransomware is the most prevalent form of cyberattack and has been for quite some time. In this session, we’ll review many ways in which you can keep your workforce totally attuned to the problem, and their role in protecting the company and themselves from ransomware attacks.
Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.
Despite advancements in modern security controls, identity-based attacks remain a major challenge for businesses. Organizations need more effective ways to protect identities and identity management infrastructures. Deception is an often-overlooked tool that significantly improves Identity Security by creating false targets that deter attackers from compromising valuable assets.
Mobile device usage has seen an unprecedented growth in the past few years, and many corporate workers heavily rely on mobile devices for their day-to-day operations. This rapid rise has found organizations ill-prepared to deal with the mobile security threats they face. As a result, we’ve recently seen a massive surge in attacks against mobile targets in the form of ransomware, theft of financial data through app vulnerabilities, and even advanced APT zero days.