Webinars

All times are shown in your time zone:
America/Los_Angeles

 

IT Security community
Securing Agile IT: Common Pitfalls, Best Practices and Surprises Securing
Agile IT: Common Pitfalls, Best Practices and Surprises

Adrian Sanabria, Senior Analyst – 451 Research and Ram Krishnan, Chief Produ

Jun 23 2016 | 60 mins

 

Defending Oil & Gas Industrial Control System (ICS) Networks Defending
Oil & Gas Industrial Control System (ICS) Networks

Jim Linn, Managing Director, IT, American Gas Association + Tom Bienkowski,

Jun 16 2016 | 45 mins

 

Managing IT in the Hybrid Cloud Era Managing
IT in the Hybrid Cloud Era

Carl Lehman 451 Research, Greg Pierce Concerto Cloud Services

Jun 09 2016 | 52 mins

 

Ready Before the Smoke Clears: understanding the correlation between DDoS attack Ready
Before the Smoke Clears: understanding the correlation between DDoS attack

Chris Rodriguez, Senior Industry Analyst, Frost and Sullivan and Tom Bienkow

Jun 08 2016 | 43 mins

 

The Dark Side of DDoS The
Dark Side of DDoS

Stephen Gates, Chief Research Analyst, NSFOCUS

Jun 15 2016 | 60 mins

 

Find Threats Lurking on your Systems with Host-based Intrusion Detection and Ali Find
Threats Lurking on your Systems with Host-based Intrusion Detection and Ali

Brian Bledsoe & Don Shin

Jun 14 2016 | 60 mins

 

Enable eCommerce with Security? You Bet! Enable
eCommerce with Security? You Bet!

Rob Marti – CA Security and Jeremy Britton – Deloitte, Managing Director of

Jun 15 2016 | 60 mins

 

Revealing Ransomware Secrets With Threat Intelligence Revealing
Ransomware Secrets With Threat Intelligence

Zach Flom, Threat Intelligence Analyst, Recorded Future

Jun 16 2016 | 45 mins

 

How St. Jude Medical Uses Threat Intelligence in Its SOC How
St. Jude Medical Uses Threat Intelligence in Its SOC

Russ Staiger, Lead Analyst, Cyber Threat Action Center, St. Jude Medical

Jun 07 2016 | 53 mins

 

Best Practices for Testing Mule Applications Best
Practices for Testing Mule Applications

Alex Li, Product Manager, Ahyoung An, Product Marketing Manager, and Damian

Jun 23 2016 | 60 mins

 

Integrate Data Security with Your Big Data Platform Integrate
Data Security with Your Big Data Platform

Reiner Kappenberger – HPE Data Security, Praveen Jain – HPE Big Data Protect

Jun 17 2016 | 60 mins

 

Supporting Legacy Infrastructure on the Way to the Cloud Supporting
Legacy Infrastructure on the Way to the Cloud

Andras Cser, Principal Analyst at Forrester; David Meyer, VP Product at OneL

Jun 16 2016 | 60 mins

 

Cyber Lay Of The Land: What The Numbers Tell Us Cyber
Lay Of The Land: What The Numbers Tell Us

Jay Jacobs, Aloysius Tan, Chad Hemenway

May 26 2016 | 60 mins

 

Power it All: The Modern Data Platform Power
it All: The Modern Data Platform

Kevin Orbaker, Technology Solution Professional, Microsoft Corporation

Jun 23 2016 | 60 mins

 

Increase Productivity and Security with Enterprise Mobility Increase
Productivity and Security with Enterprise Mobility

Andrew Conway, Sr. Director Product Marketing and Maura Hameroff Group Produ

Jun 22 2016 | 60 mins

 

The Microsoft Information Protection Strategy across EMS, Office, and Windows The
Microsoft Information Protection Strategy across EMS, Office, and Windows

Pragya Pandey, Cloud Platform Product Marketing Manager and Shobit Sahay O36

Jun 21 2016 | 60 mins

 

Host modern meetings with Skype for Business Host
modern meetings with Skype for Business

Microsoft

Jun 21 2016 | 60 mins

 

IT Security: Incident Planning and Response IT
Security: Incident Planning and Response

Microsoft

Jun 16 2016 | 60 mins

 

Deliver an Elastic Data Warehouse as a Service Deliver
an Elastic Data Warehouse as a Service

Matt Usher, Sr. Program Manager at Microsoft

Jun 15 2016 | 45 mins

 

Deliver Mission-Critical, Highly Available, and Secure Data Deliver
Mission-Critical, Highly Available, and Secure Data

Lindsey Allen, Group Program Manager, Database Systems, Microsoft

Jun 14 2016 | 60 mins

 

Extend Your Datacenter to the Cloud Extend
Your Datacenter to the Cloud

Bryon Surace, Principal Program Manager in the Azure Compute Engineering Tea

Jun 07 2016 | 34 mins

 

Maximize Return on Investment Leveraging Project Online Maximize
Return on Investment Leveraging Project Online

Microsoft

Jun 02 2016 | 91 mins

 

Use Relational Database as a Service Use
Relational Database as a Service

Tony Petrossian, Program Manager, Database Systems

Jun 01 2016 | 52 mins

 

Simplify Mobile App Management and Secure Email on Any Device Simplify
Mobile App Management and Secure Email on Any Device

Vladimir Petrosyan, Technical Product Manager

Jun 01 2016 | 47 mins

 

Office 365 ProPlus - What's new in 2016 and Beyond Office
365 ProPlus – What’s new in 2016 and Beyond

Eric Hudson, Senior Product Marketing Manager ProPlus

Jun 01 2016 | 31 mins

 

Empower your mobile workforce: Enterprise Mobility Management made simple Empower
your mobile workforce: Enterprise Mobility Management made simple

Alex Shteynberg Technology Architect; David Hansford Technology Architect,

May 31 2016 | 44 mins

 

Cloud on your terms: make the most of your infrastructure investments Cloud
on your terms: make the most of your infrastructure investments

Tyler Cooper Technology Architect; Albert Wolchesky Senior Technology Arch

May 27 2016 | 31 mins

 

7 online trends changing the game for small and midsized businesses 7
online trends changing the game for small and midsized businesses

Microsoft

May 26 2016 | 23 mins

 

How secure is your Office 365 deployment? How
secure is your Office 365 deployment?

Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Soluti

May 24 2016 | 59 mins

 

Understanding Account Takeover Attacks Understanding
Account Takeover Attacks

Mike Milner, CTO and Co-founder of IMMUNIO

Jun 23 2016 | 60 mins

 

Leveraging your SIEM to Catch and Respond to Ransomware Leveraging
your SIEM to Catch and Respond to Ransomware

Randy Franklin Smith: Windows Security Expert. Nathaniel Quist: Incident Res

Jun 14 2016 | 105 mins

 

Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Prioritize
and Remediate your Vulnerabilities with Qualys ThreatPROTECT

Wolfgang Kandek, CTO, Qualys and Tim White Director, Product Management, Qua

Jun 23 2016 | 60 mins