Upcoming
Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.
Date: 04/05/2023
Time: 10:00 AM PT
Join the editors of Redmondmag.com will bring together independent experts to walk you through what's new in Microsoft Teams for remote workforce management plus best practices you need to know surrounding management, security and recovery.
Date: 04/12/2023
Time: 9:00am PT
Duration: 3 hours
Get your defense and recovery plans in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com.
Date: 04/14/2023
Time: 9:00 AM PT
Duration: 3 hours
Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this half-day summit that will bring together independent ransomware and security experts to give you real-world, practical advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!
Date: 04/26/2023
Time: 9:00am PT
Duration: 3 hours
Join the editors of Virtualization & Cloud Review, Redmondmag.com, AWSinsider.net and ADTmag.com for this this free, half-day summit featuring independent experts with real-world advice on how you can transform your enterprise with the cloud and DevOps. Don't miss it!
Date: 04/28/2023
Time: 9:00 AM PT
Duration: 3 hours
Join this free half-day summit from the editors or AWSInsider.net and Virtualization & Cloud Review to find out how to keep your AWS cloud setup secure.
Date: 05/10/2023
Time: 9:00am PT
Duration: 3 hours
Join the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud and security experts that will cover best practices for managing and securing your modern hybrid cloud infrastructure. Register today!
Date: 06/23/2023
Time: 9:00am
Duration: 3 hours
Join the editors of Virtualization & Cloud Review and Redmondmag.com for this expert-led, free half-day summit that will walk you through the current threats facing your enterprise cloud data plus what you can do to protect it. Don't miss it!
Date: 07/07/2023
Time: 9:00 AM PT
Duration: 3 hours
On Demand
This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!
Join experts from OTAVA® and Total Compliance Tracking (TCT) as they explain why compliance and security are critical to multi-cloud deployments. Don't miss out!
Duration: 1 hour
In this webcast, Cloudflare and cyber insurance partner Coalition will discuss the rise of cyber threats and current state of cyber insurance, do’s & don’ts while seeking cyber insurance policy, and technologies to invest now and avoid future cyber insurance surprises. Don't miss out!
Duration: 1 hour
Make sure you're ready for all things cloud data protection with this free half-day summit from the editors of Virtualization & Cloud Review and Redmondmag.com.
Duration: 3 hours
Google's cybersecurity outlook for 2023 is a stark reminder that organizations must remain vigilant against identity and authentication attacks. In the last year, 84% of businesses fell victim to identity-related breaches, and 78% felt their bottom line from these attacks. To help combat this crisis, SentinelOne recently amplified its XDR solution with Identity Threat Detection & Response and Deception Technology. This fortress-like addition to SentinelOne's solution repertoire creates an extra layer of vigilance against potential malicious activity.
Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.
When faced with a cyber-security incident, time is of the essence. Organizations must remain agile and proactive to stay ahead of potential threats. Utilizing sophisticated security tools can help teams swiftly detect, evaluate, and contain vulnerabilities before they cause any permanent harm. Join us for a virtual discussion as experts explore five use cases that make incident response faster and more comprehensive than ever before—enabling security analysts to respond quickly and efficiently while protecting their organization from developing threats.
Threat actors are turning to supply chain-based attacks as a means of exploiting customer-supplier relationships to infiltrate organizations. According to Gartner predictions, nearly half the world's businesses could be affected by 2025 - a stark reminder that security measures need constant reinforcement.
With so much to keep up on, the editors of AWSinsider.net and Virtualization & Cloud Review have created this two-hour free mini-summit covering modern real-world cloud performance best practice tips and tricks (as well as what not to do) from independent AWS cloud experts. Don't miss it!
Duration: 2 hours
Join Carlos Rivas, Sr. Solutions Architect, to discuss performance around Compute, Storage, and Database in AWS as it relates to the Well-Architected framework.
Duration: 1 hour
Writing secure code within an organization is challenging enough without having to worry about malicious third-party JavaScript code. Join this session to learn more about the security challenges of third-party JavaScript & what's next for client-side security. Don't miss out!
Duration: 1 hour
This presentation combines two important elements of an enterprise “Zero Trust” framework – Identity and Access Management (IAM) and the latest in endpoint protection technologies. For this presentation, Ian will be joined by Head of Cyber Threat Intelligence Operations for Cyjax, Chris Spinks, and will outline the crisis organizations find themselves when it comes to identity and access management.
Duration: 1 hour
Join the editors of Redmondmag.com have created this free, two-session mini-summit featuring real-world insights on how you can keep your organization secure. From new approaches with Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) to compliance issues around IAM, authentication and endpoint protection, you'll get real-world insights you don't want to miss. Register now!
Duration: 2 hours
What are the key components of a modern data analytics platform? Watch the webinar to learn what areas businesses are focusing on as keys for modernization and how they’re benefitting.
Join us for this tech talk with Adam Rusho, Field CTO at Clumio and Editor in Chief, John K. Waters, to learn why S3 Replication is often the wrong tool for the wrong job. Don't miss out!
Duration: 1 hour
Whilst security leaders naturally know cloud security very well, the board and other senior leadership may not. According to the 2021 Global CISO Survey 90% of CISO’s present directly to the board. Therefore, the ability to articulate business risk to decision-makers is paramount to securing the appropriate investment in the right cybersecurity tool.
Practically every organization is increasing their use of cloud infrastructure. Despite the proliferation of image scanning solutions, security remains the #1 concern. Cloud security is made difficult because it doesn’t fit into the more common perimeter-focused security model. In today’s cloud-enabled world, the perimeter of the network is an increasingly blurry line, making cloud defense in depth key to keeping your organization safe and secure from cyber threats.
Principal Security Solutions Architect for AWS, Megan O’Neil and Senior TDIR Solution Architect for AWS, Kyle Dickinson educate on what to expect if your organization encounters a security event targeting data residing in a customer’s S3 buckets. The duo explore common event patterns, leading to step-by-step guidance on how to respond to a ransomware event and best practices for recovering your data.
In this session you will learn about how to protect your data, the importance of air gaps and immutability, how to manage your costs, and finally the best ways to secure your data.
Duration: 1 hour
This talk will cover all the ways that ransomware groups are focusing on initial access to your network and what you need to do to defend your organization from attack. Don't miss out!
Duration: 1 hour
Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practical advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!
Duration: 3 hours
At this engaging and informative event, Mission CTO Jonathan LaCour and Customer Engagement, FinOps Manager, Jeremy McClay, will answer your AWS cost optimization and billing questions. In addition, they will walk you through real-world examples of how we’ve helped our customers achieve significant cost savings on AWS.
Duration: 1 hour