Webcasts


On Demand

Learn How to Beat Ransomware with Trusted Backup

There is no bigger threat to the technology landscape than ransomware. In this session, our own Veeam expert will overview some key tips and tricks to survive your next ransomware incident.


Top Security Questions to ask your Data Protection Vendor

Are you sure they're secure? It's a question you have to ask when evaluating a vendor because it can be the difference between reducing your attack surface or adding more risk to your network. Join this webinar as we'll shift through the noise and discuss what's really important when choosing who to work with.


Key Considerations for Managing Massive Backups

The challenges and complexity of maintaining a “ready-to-recover” posture grow exponentially as the volume of data, the number of locations and numbers of workloads continue to skyrocket. Join two seasoned backup-and-recovery experts as they discuss solutions for managing backups at a massive scale and how you can deliver predicable, rapid recovery when things go wrong.


Transforming Employee Experience with Microsoft Viva

Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.


Cyberattacks on Education: How to Strengthen Identity Security

Join this webinar, Semperis Solutions Architect Alexandra Weaver will give you expert insight into lessons learned from recent education-focused cyberattacks and how to strengthen your own institution’s identity security stance.


Microsoft 365 Security Summit

Keeping your M365 installation secure is vital to your organization (and your job!). That's why you won't want to miss this free, half day summit curated by the editors of Redmond and featuring independent Microsoft MVPs and other Microsoft 365 experts who can offering you expert, real-word insight. Don't miss out!


Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas"

Keeping your M365 installation secure is vital to your organization (and your job!). That's why you won't want to miss this free, half day summit curated by the editors of Redmondmag and featuring independent Microsoft MVPs and other Microsoft 365 experts who can offering you expert, real-word insight. Don't miss out!


Top 10 Microsoft 365 Security Best Practices Every Organization Must Implement

Although Microsoft has designed the Microsoft 365 platform to be secure, customers are responsible for securing their own data within the Microsoft 365 ecosystem. Join this session to learn which Microsoft 365 security features you should be using to harden your Microsoft 365 deployment based on your own unique security needs.


NIST SP 800-53: Essential Security Controls for the Current Threat Landscape

Join our webinar to take a look at the NIST SP 800-53 and learn how it can help federal agencies and other organizations protect themselves against attacks.


Cyber Resiliency from Prevention to Recovery

Malicious actors are attacking companies of all sizes, necessitating an enterprise-quality cyber resiliency strategy and scalable toolset for small and medium sized organizations. Get key insights from Storagepipe a Thrive Company on the benefits of a multi-layered Cybersecurity framework to protect cloud and hybrid IT environments for businesses of any size.


Still Developing Software the Old Way? Best Practices for Migrating to DevSecOps

In this webinar we explore best practices for seamlessly integrating security into DevOps to ensure that software development doesn't compromise security in its quest for speed.


How To Build a Responsible Ransomware Response Plan

Join Ian Thornton-Trump, CISO at Cyjax, in this exclusive session, as he walks through the organization’s locker room when the home team suffers the biggest loss of their careers.


Ransomware Recovery Summit: What To Do After an Attack

In this free, three-hour summit, our experts will outline the steps you need to take in the aftermath of an attack, how to recover your data, and the changes you need to implement to make sure it doesn’t happen again. Learn more.


Observe and Monitor: Strengthening Your Cyber-Resilience Strategy

In this Tech Talk, Kirsten Stoner, technologist at Veeam Software, talks with veteran technology journalist John K. Waters about current cybersecurity challenges in the enterprise, and strategies for protecting your company's most vulnerable assets. Register Now!


Conquering Cloud Chaos: Best Practices for Highly Regulated Orgs

In this session, Senior Resultant Howard M. Cohen joined by experts from VMware will discuss the challenges and the best practices to be applied to resolve them. Get ready to have those cloud management headaches go away. Join us!