Webcasts


On Demand

Coffee Talk: Digital Transformation & AIOps: The Future of IT

In this session, we’ll examine the growth of AIOps, discussing not only how it can be applied to accelerate improvement to networks, but also how cautious humans can assure that it remains under control and positively productive.


The Future is XDR: How to Conquer the SOC Transformation

Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.


Coffee Talk: The Future of Unified Communications & Teams

In this session, Senior Resultant Howard M. Cohen takes on this excellent challenge and talks about the future UC developments he sees as most likely. Stimulate your imagination to inform your future planning. Join use for a look at the Future of United Communications & Teams.


Turning to Technology to Respond to a Huge Rise in High Profile Breaches

This invitation-only event is designed to facilitate an open discussion among industry peers focusing on the events and responses surrounding some of Australia’s most prominent breaches in 2022, establishing an effective framework following the Australian government's substantial increase in data breach fines, and more.


7 Ransomware Mistakes Enterprises Make Before, During and After an Attack

Join this session and we’ll share a mix of ransomware related business, organizational, procedural, and technical decision we wish enterprises just wouldn’t make.


Coffee Talk: Threat Alert: Monthly Top Attack Overview

Armed with the latest cyber threat intelligence from Cyjax, Ian Thornton-Trump CD, will outline what he sees as a resurgence in Russian state sponsored or state condoned cyber-attacks and why there may be very turbulent times ahead as we head into Spring 2023.


Best Practices for AWS Monitoring

In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!


The Road to Digital Resilience: Right-Sizing Hybrid Cloud Application Deployments

This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!


How ITDR Helps Battle Identity Theft

This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!


Disaster Recovery: Your New Ticket to Cyber Insurability

This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.


Enterprise Buyer's Guide for Data Protection

Join this webcast where Dave Russell, Veeam’s Vice President of Enterprise Strategy, and Misha Rangel, Veeam's Director of Enterprise Product Marketing will help you navigate through different questions that as decision maker you should ask yourself and your team when evaluating company’s specific data needs.


Endpoint Credential Theft: How to Prevent and Tackle the Adversary Head On

Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.


Security Readiness Best Practices with Veeam Data Platform

Join this session, to discuss how new features like Direct-to-object storage and the expanded options for application-consistent cloud backups will provide even more security protection.


Best Practices for Keeping M365 Secure

In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users.


Inside Microsoft 365s Security Features

Whether you need to encrypt your emails, secure user logins, secure endpoints, prevent data loss, detect and respond to attacks, or even run attack simulations, Microsoft 365 has you covered. In this session, we'll dive into some of those security features and how you can take advantage of them in your own environment!