Webcasts


Upcoming

Data Security Posture Management 101

Join us to learn more about today's complex cybersecurity landscape and data security posture management (DSPM). DSPM helps IT better understand their data, so IT can be better at protecting it. Get ahead of attackers and modernize how you safeguard your data by registering for this free virtual webinar today!

Date: 07/29/2024

Time: 11:00 AM PT

Duration: 1 Hour


Azure Governance: Protecting Data and Meeting Regulatory Requirements

Join us to Empower directors and IT leaders to create a secure and compliant Azure environment.

Date: 07/31/2024

Time: 11:00 AM PT

Duration: 1 Hour


Ransomware vs. Analytics Summit: How To Take a Data-Based Approach Against Security Attacks

Our panel of experts will show you how in this free, three-hour summit, where they'll walk you through implementing and managing anti-ransomware analytics. Don't miss it -- register today!

Date: 08/09/2024

Time: 9:00 AM PT

Duration: 3 hours


Leaders in Tech Series: The Definitive Ransomware Prevention & Recovery Checklist

Join us for this free, expert-led virtual event where you’ll learn the best strategies to make your organization as ransomware-proof as possible, and the mitigation steps you need to take when the worst happens. Don’t wait – sign up today!

Date: 09/13/2024

Time: 9:00 am PT

Duration: 2 hours


Meet the Threat Actors: What IT Needs To Know About Malware, Ransomware and Microsoft 365

Sign up for this free, three-hour summit, where our panel of experts and MVPs will detail the most notable Microsoft 365 vulnerabilities and attack methods today, and the proven best practices to stop them from doing your organization serious harm. Register today!

Date: 09/27/2024

Time: 9:00 am PT

Duration: 3 hours


Data & Datacenter Strategies for AI Summit

Join us to optimize your infrastructure for the AI era. AI is everywhere, profoundly impacting data management and datacenter infrastructure. Join our free virtual summit to learn from experts how to meet the new demands of AI applications.

Date: 10/30/2024

Time: 9:00 am PT

Duration: 3 Hours


Endpoint Security Refresh Summit: New Best Practices for Modern Enterprises

Learn how to harden your security posture in this free, three-hour summit, where our panel of top experts will share their most useful best practices for securing all of your endpoints.

Date: 11/15/2024

Time: 9:00 am PT

Duration: 3 hours


2025 AI Trend Watch Summit: Top Innovations To Watch, Adopt (and Avoid)

Want to future-proof your business and avoid AI-related technical debt? Register for this free, three-hour summit where top industry experts will update you on the latest AI trends, developments and technologies so you and your IT team can stay ahead of the game.

Date: 12/06/2024

Time: 9:00 am PT

Duration: 3 hours


On Demand

Get In Tune with Your Cloud Cyber Resilience Strategy

Join us to learn how Rubrik Security Cloud can help your organization achieve complete cyber resilience, as well as how to secure your most sensitive data, simplify control and automation, and reduce your cloud bill.

Duration: 1 Hour


Cloud Security Automation Summit: How To Achieve (Almost) Zero-Touch Cloud Security

Join us for this free, expert-led summit where you'll learn the best ways to automate your cloud's security so you stay one step ahead of the attackers.

Duration: 3 hours


Coffee Talk | Expert View: How To Update Your Data Management Strategy for the AI Era

Join our webcast to discover how to harness the power of AI for your data management strategy. Learn to prepare for the challenges of AI integration, from data security and reliability to ethical considerations and automation. Don't miss our expert tips for modernizing your data management in the AI era!

Duration: 1 Hour


Migrating to Microsoft Azure Virtual Desktop with Nerdio 101

Get actionable insights and valuable advice that you can start implementing in your AVD environment today.

Duration: 1 Hour


Coffee Talk | Microsoft Copilot for Microsoft 365 Best Practices for Maximum Data Protection

Join us to unlock the full potential of Microsoft Copilot within your M365 environment by joining our exclusive webcast! Discover essential insights from Greg Schulz, a renowned author, founder, and Sr. Analyst of Server StorageIO, and Microsoft MVP (CDM). Learn about the security, governance, and data protection strategies you need to safeguard your organization's data while leveraging Copilot.

Duration: 1 Hour


Cloud Migration 101: How To Goof-Proof Your Cloud Journey Summit

Learn how to avoid all of these problems in this free, three-hour summit. Get real-world guidance for your cloud migration straight from the experts, from how to streamline your data transfers, to how to salvage your legacy apps, and more. We’ve got all your cloud migration bases covered – sign up today!

Duration: 3 hours


Coffee Talk | Modern Active Directory Security Best Practices

Join our free 30-minute Coffee Talk to discover how to fortify your Active Directory against evolving threats. With new vulnerabilities emerging daily and attack methods becoming more sophisticated, it's crucial to rethink your protection strategy now. Don't miss this opportunity to stay ahead of potential security breaches!

Duration: 1 Hour


Leveraging Automation to Securely Adopt Next-Gen Firewalls: A Faster, More Efficient Approach

Join Insight experts Kevin Wilson and Cory Peterson, along with Red Hat Ansible expert John Gibson, for a webinar on how organizations can securely automate and speed up the adoption of Next-Gen Firewalls (NGFWs) using the Red Hat Ansible Automation Platform.


Ask Us Anything: Key Pillars to Harnessing the Power of Enterprise AI

Join our webcast to uncover the key elements of a successful Enterprise AI platform, control costs, and deploy AI apps in a cloud-native format. Our experts will help you understand AI integration, agile app deployment, and data security enhancement. Sign up now to transform your AI strategy

Duration: 1 Hour


What to Know About Copilot Studio

Join us to learn more about Copilot Studio, Microsoft's new chatbot authoring tool. Our experts will cover what Copilot Studio is, how it differs from Power Virtual Agents and Azure® AI Studio, and how you can use it to create chatbots with generative AI and natural language capabilities. Don't miss this opportunity to gain insights from top experts and see Copilot Studio in action. Register today and elevate your chatbot experience to the next level!

Duration: 1 Hour


The Journey to AWS Cloud: Overcoming Common Migration Challenges to Achieve Cloud Excellence

Join us to learn how to successfully migrate to AWS! In this webinar with Insight AWS expert Mike Till, you'll explore common challenges and practical solutions, including workload prioritization, migration roadmaps, and cost optimization.

Duration: 1 Hour


Leaders in Tech Series | Mid-Year Cybersecurity Trends Review: Top Threats To Know

Join our free virtual event to learn the latest strategies that attackers are using today, and the most useful tools and best practices you can implement to stop them. Get expert insights from some of the top experts in cybersecurity on how to identify and fix the most exploitable weaknesses in your organization. Don't let down your guard -- register today!

Duration: 2 hours


Delivering 192% ROI with Red Hat Enterprise Linux on Azure

Join us as we uncover the efficiencies and cost-savings achieved from deploying Red Hat® Enterprise Linux® on Microsoft Azure, examined through the lens of Forrester's Total Economic Impact (TEI) framework.

Duration: 1 Hour


Top Threat Monitoring Implementation Strategies

Join Greg Schulz, Author, founder, and Sr. Analyst of Server StorageIO and Microsoft MVP (CDM), as he discusses top threat monitoring implementation strategies. Greg will discuss industry trends, technologies and techniques, best practices, and implementation strategies.

Duration: 1 hour


Detect Early and Detect Often: The Case for Threat Monitoring

In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Join us!

Duration: 1 hour


Threat Monitoring for SMBs and Enterprises Summit: The Hows, Whys and Gotchas

Get the answers straight from the experts in this free, three-hour summit, where you'll learn the ins and outs of threat monitoring, how to do it right, and the biggest traps to avoid. Register today!

Duration: 3 hours


Rubrik: A battle of the 2024 data regulation giants: DORA vs. NIS2

In 2024, organizations will prioritize building robust cyber resilience to combat ransomware attacks and adhere to new data regulations. Join experts to gain insights on the Digital Operational Resilience Act (DORA) and Security of Networks & Information Systems Regulations (NIS2).


Rubrik: Zero Trust + Cloud Economics = Too good to be true?

Organizations face challenges with rapidly growing cloud data and seek cost-effective, secure solutions while maintaining Zero Trust principles. Join experts from Rubrik and ESG for insights on managing data growth and cybersecurity resilience.


Empowering Security and Productivity With Microsoft 365 E5: Real-World Solutions for Modern Challenges

Join us to learn about Microsoft 365 E5 and the differences between 3 and 5. We’ll show you how to stay on top with Microsoft E5.

Duration: 1 Hour


Microsoft 365 Resilience Summit

Learn how to make sure that every piece of data that crosses your Microsoft 365 environment is as loss-proof and recoverable as possible.

Duration: 3 hours


Expert Guide to Loss-Proof Microsoft 365 Data

In this exciting webinar, you will have the opportunity to learn about tools and techniques to preserve your M365 environment and best practices for configuration and security, enhancing your skills and knowledge in data protection. Learn more!

Duration: 1 hour


Introduction to Rubrik's Ruby AI

Rubrik introduces Ruby, an interactive tool designed to enhance cyber detection, recovery, and resilience. It provides clear recommendations, accelerates threat identification, guides users through actions, and assists in quarantining and recovering infected data in response to cyber threats.