Webcasts


On Demand

Precision in Protection: Operationalizing Threat Detection and Response with Microsoft Sentinel

During part one of our two-part webinar series, we’ll explore how to operationalize Microsoft Sentinel’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration Automation and Response) capabilities combined with Security Operation Center analysis and response to rapidly detect, triage, and respond to actionable threats to your organization.


What’s New, Upcoming and Notable in Multicloud Data Threats

Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.


Cloud Data & Data Protection Best Practices Summit

Register for this free, three-hour summit to learn everything you need to know today about the biggest cloud data management trends and challenges. From modern best practices to the biggest emerging threats, our panel of cloud experts will share their most actionable real-world insights and effective tips so your organization’s data doesn’t fall through the cracks. Sign up today!


Compliance, Security, Resilience and More: Top Hurdles in Cloud Data Management

In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!


Safeguarding Microsoft 365 Data from Today’s Threats

Safeguarding Microsoft 365 data is your responsibility. In this webinar, we’ll explore how to keep your valuable Microsoft 365 data safe, compliant, and recoverable.


Best Practices for Securing & Recovering Microsoft 365

Join us to learn Microsoft’s newly introduced tools and features can help with data protection and security efforts. Don't miss out!


Managing & Securing Microsoft 365 Summit

You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you ahead of changes and give you real-world insights you can use to improve the security, manageability and recovery of your Microsoft 365 installation. Don't miss it!


Best Practices for Managing & Optimizing Microsoft 365

By the end of this session, you will have a better understanding of how to manage Microsoft 365 for your organization. You will also learn about functionality available in Microsoft 365 that you may want to go implement and learn more about. You will also leave with some tips and resources to help you stay updated on the latest in what is coming to Microsoft 365.


Recovery Readiness in the Modern IT Environment

Watch this webinar to learn how to secure, defend, and recover your data, applications, and production workloads – on-premises, in the cloud, over SaaS, or spread across hybrid and multi-cloud environments.


The Role of AI in Email Security

Join Erich Kron, Security Awareness Advocate for KnowBe4, and Michael Sampson, Principal Analyst at Osterman Research, as they dig into the findings of our latest joint report on The Role of AI in Email Security. They’ll share tips on how your SOC team can identify and use AI to supercharge your anti-phishing defense.


Maximize Your Data Intelligence

Join Insight for a webinar where our experts share the core components of the modern data estate. You’ll learn the steps involved in building a foundation for modern data management to maximize your use of data intelligence — no matter where you are on the maturity curve.


Coffee Talk: Managed Detection & Response 102: Getting Started with MDR

In this session, Senior Resultant Howard M. Cohen discusses the importance of Managed Detection & Response services and how they can be an ideal outsourced service you can offer your customers while outsourcing the actual platform services to experts. Red Canary joins the conversation to take you through the advantages and value of MDR to you, your MSP or MSSP practice, and your customers.


The Definitive Ransomware Checklist Summit: What To Do Before, During and After an Attack

Join this free, three-hour summit to learn the bases you need to cover so your organization’s data is as insulated against compromise as possible, the exact steps to take as soon as a ransomware attack makes itself known, and the post-attack process to make sure another one doesn’t happen again.


IT Automation Summit: The Enterprise Modernization Strategies You Need To Know

Learn how automation can level up your cloud infrastructure, real-world use cases, top configuration and management secrets, and much more. The right automation strategy can expand the possibilities for your IT team – register today and let us show you how!


How to Defend Your Organization Against Evolving Microsoft 365 Email Threats

Join us for a live 60-minute webinar with cybersecurity expert Dave Cook and learn how to break the attack chain while strengthening your M365 security.