Webcasts


On Demand

Coffee Talk: Why Cloud Firewalls & Why Now

Join Ian Thornton-Trump CD, CISO of Cyjax who has recent experience with a global deployment of Cloud based firewall technology and learn from his successes and challenges.


Best Practices for AWS Monitoring

In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!


How ITDR Helps Battle Identity Theft

This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!


The Road to Digital Resilience: Right-Sizing Hybrid Cloud Application Deployments

This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!


Disaster Recovery: Your New Ticket to Cyber Insurability

This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.


Applying the MITRE ATT&CK framework for threat detection and response

Learn how to use the MITRE ATT&CK framework within your SIEM solution to derive actionable insights. Leveraging your security analytics tools can help you improve threat detection and formulate an impenetrable defense mechanism. Get started now!


MITRE ATT&CK training: Staying ahead of adversarial tactics

Watch this webinar to gain a better understanding of the MITRE ATT&CK framework and learn about the several tactics, techniques, and procedures involved in a compromise. Knowing the modus operandi of attackers can help you to prepare and defend your organization. Stay ahead of adversaries!


Enterprise Buyer's Guide for Data Protection

Join this webcast where Dave Russell, Veeam’s Vice President of Enterprise Strategy, and Misha Rangel, Veeam's Director of Enterprise Product Marketing will help you navigate through different questions that as decision maker you should ask yourself and your team when evaluating company’s specific data needs.


WebCMS to WebOps: A Conversation with Nestlé's WebCMS Product Manager

Join us to learn how WebOps differs from WebCMS and allows organizations to transcend silos, why companies like Nestle chose a WebOps solution to address those challenges, and more!


Modern Cloud Data Protection Summit

Make sure you're ready for all things cloud data protection with this free half-day summit from the editors of Virtualization & Cloud Review and Redmondmag.com.


Recent Breaches: The Role of an Identity Compromise

Google's cybersecurity outlook for 2023 is a stark reminder that organizations must remain vigilant against identity and authentication attacks. In the last year, 84% of businesses fell victim to identity-related breaches, and 78% felt their bottom line from these attacks. To help combat this crisis, SentinelOne recently amplified its XDR solution with Identity Threat Detection & Response and Deception Technology. This fortress-like addition to SentinelOne's solution repertoire creates an extra layer of vigilance against potential malicious activity.


Endpoint Credential Theft: How to Prevent and Tackle the Adversary Head On

Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.


IR Playbook: Top 5 Ways to Revolutionize Incident Response

When faced with a cyber-security incident, time is of the essence. Organizations must remain agile and proactive to stay ahead of potential threats. Utilizing sophisticated security tools can help teams swiftly detect, evaluate, and contain vulnerabilities before they cause any permanent harm. Join us for a virtual discussion as experts explore five use cases that make incident response faster and more comprehensive than ever before—enabling security analysts to respond quickly and efficiently while protecting their organization from developing threats.


Supply Chain Attacks: How to Protect Against Infiltration and Sabotage

Threat actors are turning to supply chain-based attacks as a means of exploiting customer-supplier relationships to infiltrate organizations. According to Gartner predictions, nearly half the world's businesses could be affected by 2025 - a stark reminder that security measures need constant reinforcement.


Security Readiness Best Practices with Veeam Data Platform

Join this session, to discuss how new features like Direct-to-object storage and the expanded options for application-consistent cloud backups will provide even more security protection.