Webcasts


On Demand

Microsoft 365 Data Security Refresh Summit

Join us for this essential summit to stay ahead of the evolving threats targeting your Microsoft 365 data. Learn from industry experts how to fortify your security strategy against sophisticated attacks, from data siphoning to advanced persistent threats. Equip your team with the tools and knowledge needed to protect your critical data. Register now to ensure your organization is prepared for the threats of today and tomorrow!

Duration: 3 Hours


Unifying and Enhancing Network and Security Automation With Red Hat + Cisco

Don’t miss this opportunity to learn from these experts. Uncover how you can unify and enhance network and security automation to spark greater innovation and agility in your business. Learn more!

Duration: 1 hour


The Journey to AWS Cloud: Overcoming Common Migration Challenges to Achieve Cloud Excellence

Perfect for IT decision-makers, this on-demand webinar provides expert guidance to help you overcome AWS cloud migration challenges, optimize workloads, manage costs, and create a migration roadmap.


Coffee Talk | Expert Guide: What To Do with Your Unstructured Data

Unlock the potential of your unstructured data and turn it into a strategic asset that drives real business growth. Join us for this Coffee Talk to discover the strategies and tools that can help you harness the power of your data. Register now and start transforming overlooked information into innovation!

Duration: 1 Hour


Ransomware vs. Analytics Summit: How To Take a Data-Based Approach Against Security Attacks

Our panel of experts will show you how in this free, three-hour summit, where they'll walk you through implementing and managing anti-ransomware analytics. Don't miss it -- register today!

Duration: 3 hours


Azure Governance: Protecting Data and Meeting Regulatory Requirements

Join us to Empower directors and IT leaders to create a secure and compliant Azure environment.

Duration: 1 Hour


Data Security Posture Management 101

Join us to learn more about today's complex cybersecurity landscape and data security posture management (DSPM). DSPM helps IT better understand their data, so IT can be better at protecting it. Get ahead of attackers and modernize how you safeguard your data by registering for this free virtual webinar today!

Duration: 1 Hour


Get In Tune with Your Cloud Cyber Resilience Strategy

Join us to learn how Rubrik Security Cloud can help your organization achieve complete cyber resilience, as well as how to secure your most sensitive data, simplify control and automation, and reduce your cloud bill.

Duration: 1 Hour


Cloud Security Automation Summit: How To Achieve (Almost) Zero-Touch Cloud Security

Join us for this free, expert-led summit where you'll learn the best ways to automate your cloud's security so you stay one step ahead of the attackers.

Duration: 3 hours


Coffee Talk | Expert View: How To Update Your Data Management Strategy for the AI Era

Join our webcast to discover how to harness the power of AI for your data management strategy. Learn to prepare for the challenges of AI integration, from data security and reliability to ethical considerations and automation. Don't miss our expert tips for modernizing your data management in the AI era!

Duration: 1 Hour


Migrating to Microsoft Azure Virtual Desktop with Nerdio 101

Get actionable insights and valuable advice that you can start implementing in your AVD environment today.

Duration: 1 Hour


Navigating the Unstructured Data Maze: Your Journey Starts Here

Hear from top industry experts about what’s really at stake if your unstructured data falls in the wrong hands—and how you can keep it safe. Discover actionable steps and watch a live demo on how you can understand, manage, and secure your unstructured data environment efficiently.


How to Empower IT with Immutable Data Vaults

Cybercriminals are hip to the backup game and routinely target backups. In fact, according to Rubrik Zero Labs, attackers tried to affect the backups in 96% of attacks. Unfortunately, most backup solutions are not up to the task of delivering cyber resilience, as attackers were at least partially successful in 74% of those attempts to affect backups. Legacy backup solutions that may have once-protected data struggle to keep up with modern threats.


Coffee Talk | Microsoft Copilot for Microsoft 365 Best Practices for Maximum Data Protection

Join us to unlock the full potential of Microsoft Copilot within your M365 environment by joining our exclusive webcast! Discover essential insights from Greg Schulz, a renowned author, founder, and Sr. Analyst of Server StorageIO, and Microsoft MVP (CDM). Learn about the security, governance, and data protection strategies you need to safeguard your organization's data while leveraging Copilot.

Duration: 1 Hour


Cloud Migration 101: How To Goof-Proof Your Cloud Journey Summit

Learn how to avoid all of these problems in this free, three-hour summit. Get real-world guidance for your cloud migration straight from the experts, from how to streamline your data transfers, to how to salvage your legacy apps, and more. We’ve got all your cloud migration bases covered – sign up today!

Duration: 3 hours


Coffee Talk | Modern Active Directory Security Best Practices

Join our free 30-minute Coffee Talk to discover how to fortify your Active Directory against evolving threats. With new vulnerabilities emerging daily and attack methods becoming more sophisticated, it's crucial to rethink your protection strategy now. Don't miss this opportunity to stay ahead of potential security breaches!

Duration: 1 Hour


Leveraging Automation to Securely Adopt Next-Gen Firewalls: A Faster, More Efficient Approach

Join Insight experts Kevin Wilson and Cory Peterson, along with Red Hat Ansible expert John Gibson, for a webinar on how organizations can securely automate and speed up the adoption of Next-Gen Firewalls (NGFWs) using the Red Hat Ansible Automation Platform.


Ask Us Anything: Key Pillars to Harnessing the Power of Enterprise AI

Join our webcast to uncover the key elements of a successful Enterprise AI platform, control costs, and deploy AI apps in a cloud-native format. Our experts will help you understand AI integration, agile app deployment, and data security enhancement. Sign up now to transform your AI strategy

Duration: 1 Hour


What to Know About Copilot Studio

Join us to learn more about Copilot Studio, Microsoft's new chatbot authoring tool. Our experts will cover what Copilot Studio is, how it differs from Power Virtual Agents and Azure® AI Studio, and how you can use it to create chatbots with generative AI and natural language capabilities. Don't miss this opportunity to gain insights from top experts and see Copilot Studio in action. Register today and elevate your chatbot experience to the next level!

Duration: 1 Hour


The Journey to AWS Cloud: Overcoming Common Migration Challenges to Achieve Cloud Excellence

Join us to learn how to successfully migrate to AWS! In this webinar with Insight AWS expert Mike Till, you'll explore common challenges and practical solutions, including workload prioritization, migration roadmaps, and cost optimization.

Duration: 1 Hour


Leaders in Tech Series | Mid-Year Cybersecurity Trends Review: Top Threats To Know

Join our free virtual event to learn the latest strategies that attackers are using today, and the most useful tools and best practices you can implement to stop them. Get expert insights from some of the top experts in cybersecurity on how to identify and fix the most exploitable weaknesses in your organization. Don't let down your guard -- register today!

Duration: 2 hours


Delivering 192% ROI with Red Hat Enterprise Linux on Azure

Join us as we uncover the efficiencies and cost-savings achieved from deploying Red Hat® Enterprise Linux® on Microsoft Azure, examined through the lens of Forrester's Total Economic Impact (TEI) framework.

Duration: 1 Hour


Top Threat Monitoring Implementation Strategies

Join Greg Schulz, Author, founder, and Sr. Analyst of Server StorageIO and Microsoft MVP (CDM), as he discusses top threat monitoring implementation strategies. Greg will discuss industry trends, technologies and techniques, best practices, and implementation strategies.

Duration: 1 hour


Detect Early and Detect Often: The Case for Threat Monitoring

In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Join us!

Duration: 1 hour


Threat Monitoring for SMBs and Enterprises Summit: The Hows, Whys and Gotchas

Get the answers straight from the experts in this free, three-hour summit, where you'll learn the ins and outs of threat monitoring, how to do it right, and the biggest traps to avoid. Register today!

Duration: 3 hours


Rubrik: A battle of the 2024 data regulation giants: DORA vs. NIS2

In 2024, organizations will prioritize building robust cyber resilience to combat ransomware attacks and adhere to new data regulations. Join experts to gain insights on the Digital Operational Resilience Act (DORA) and Security of Networks & Information Systems Regulations (NIS2).


Rubrik: Zero Trust + Cloud Economics = Too good to be true?

Organizations face challenges with rapidly growing cloud data and seek cost-effective, secure solutions while maintaining Zero Trust principles. Join experts from Rubrik and ESG for insights on managing data growth and cybersecurity resilience.


Empowering Security and Productivity With Microsoft 365 E5: Real-World Solutions for Modern Challenges

Join us to learn about Microsoft 365 E5 and the differences between 3 and 5. We’ll show you how to stay on top with Microsoft E5.

Duration: 1 Hour


Microsoft 365 Resilience Summit

Learn how to make sure that every piece of data that crosses your Microsoft 365 environment is as loss-proof and recoverable as possible.

Duration: 3 hours


Expert Guide to Loss-Proof Microsoft 365 Data

In this exciting webinar, you will have the opportunity to learn about tools and techniques to preserve your M365 environment and best practices for configuration and security, enhancing your skills and knowledge in data protection. Learn more!

Duration: 1 hour