With Artificial intelligence at the peak of its hype cycle, how do you know what can be operationalised in your organisation and what should just be left on the hype pile?
While AI initiatives are getting the attention of (...)
Software is essential in everyday products like cars, medical devices, airplanes, and IoT devices. Bugs and security flaws can have serious impacts on safety, the environment, and your reputation. As AI speeds up software development, it's more important than ever (...)
This webinar will be delivered in German.
Im Vordergrund des Webinars stehen die öffentlichen komplexen IT Infrastrukturen, in der viele kritische Applikation und Fachverfahren betrieben werden müssen. Der öffentliche Sektor ist einer hohen Personalknappheit und knappen Budgets ausgesetzt, Um einen störungsfreien (...)
Scopri il nuovo software Arcserve Unified Data Protection (UDP)! Offre una soluzione di protezione dati all-in-one che ti aiuta a conservare, eseguire il backup e ripristinare i tuoi dati in modo completo. Arcserve UDP 10 è una soluzione di protezione (...)
¡Descubra el nuevo software Arcserve Unified Data Protection (UDP)! Ofrece una solución integral de protección de datos que le ayudará a conservar, respaldar y restaurar sus datos de forma integral.
La nueva versión de Arcserve UDP 10 es una solución de (...)
Découvrez le nouveau logiciel Arcserve Unified Data Protection (UDP) ! Il offre une solution de protection des données tout-en-un qui vous aide à conserver, sauvegarder et restaurer vos données de manière complète.
Arcserve UDP 10 est une solution de protection des (...)
Managing both external and internal attack surfaces is crucial for robust cybersecurity to proactively identify and fix vulnerabilities before attackers can exploit them.
This webinar focuses on continuous attack surface monitoring and management solutions.
AI coding assistants are transforming business, with adoption driven both by developers seeking help and by executives seeking savings. But this evolution should not come at the cost of enterprise security or valuable intellectual property. This session explores the most (...)
Discover how Arcserve Unified Data Protection (UDP) delivers an all-in-one data protection solution that helps you comprehensively retain, back up, and restore your data.
Arcserve UDP 10 is a reliable, integrated, user-friendly data protection solution that ensures data security and business (...)
As geopolitical tensions persist and security priorities shift, Europe is undergoing a defence renaissance, creating a compelling new opportunity set for investors. This webinar will explore how professional investors and ETF issuers can access the next generation of security innovation (...)
Institutional credit investing is being reshaped by shifting liquidity dynamics, borrower behaviours, regulatory pressures and the blurring of public and private markets. These changes are ushering in a new era of investment expansion and vehicle innovation. Learn how institutions are (...)
Scaling modern applications across EMEA requires more than ticketing—it demands a smarter, risk-driven approach to container security.
Traditional vulnerability tools can’t keep up with the speed and scale of today’s dynamic cloud-native environments. Containers spin up and down in seconds, creating (...)
Presented by Robert Martin
Senior Software and Supply Chain Assurance Prin. Eng.
Cost Cutting Solutions and Innovation Dept.
Cyber Solutions Innovation Center
MITRE Labs
In this exclusive webinar, expert panellists will examine the methodology for evaluating a cyber extortion demand, and how sophisticated businesses should decide where to make investments during incident response.
Cyber readiness requires anticipating the risks to revenue and potential litigation (...)
Join Steve Wilson as he examines two real-world case studies-the British Library and Lapsus$ attacks alongside original research to reveal critical gaps in cybersecurity readiness. Discover how AI and machine learning can address these vulnerabilities, empowering teams to become more (...)
Building on the principle that "with great power comes great responsibility," this webinar focuses on empowering your AI deployments with robust data protection. Discover how confidential computing and confidential accelerators provide an unparalleled shield for sensitive data and algorithms, ensuring (...)
Analizamos qué es BOAT. El nuevo concepto acuñado por Gartner que define las Tecnologías de Automatización y Orquestación Empresarial. La última innovación para lograr una gestión empresarial más ágil y conectada.
As organizations adopt Agentic AI to automate increasingly complex tasks, ensuring secure and trustworthy interactions between AI agents and data systems is more critical than ever. But what does securing Agentic AI look like in the real world?
Join Kobi Gol, (...)
Whether you call them hackers, security researchers, white-hats, or any other name, the same question always comes up—can I actually trust them?
Just like any career, not all hackers are the same. In this webinar, Beau Woods, Cyber Safety Advocate (...)
Before access is granted, trust must be established. However, static identity records and manual checks aren’t enough to prevent impersonation, insider fraud, or credential misuse.
Whether you’re modernizing your onboarding workflows, strengthening zero trust initiatives, or preparing for compliance mandates, this (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Zero Trust is widely discussed but often misunderstood — and even more rarely implemented effectively. This session offers a practical, experience-driven perspective on how organizations can move beyond Zero Trust theory and begin executing with purpose. Through the lens (...)
For years, fears of leaks, unpredictable performance, and runaway costs kept media workflows tethered to on-prem infrastructure. As production teams grow more decentralized and the adoption of cloud-based tools increase, the evolution of cloud storage provides media professionals much to (...)
Join ScienceLogic and Carlos Casanova, lead analyst of The Forrester Wave: AIOps Q2 2025 for an exclusive deep dive into how Agentic AI is transforming the future of IT operations. In this session, we’ll explore how autonomous agents are enabling (...)
Featuring ServeTheHome’s Patrick Kennedy, this webcast will dive deep into Supermicro’s broad range of Enterprise AI solutions to explore how organizations can implement AI for almost any industry and environment. Product experts from NVIDIA and Supermicro will also be on (...)
In today’s privacy-first world, protecting sensitive customer data is non-negotiable. Join us for a live webinar to learn how Tealium Functions empowers developers and data teams to detect and hash personally identifiable information (PII) — like email addresses — in (...)
There are three regulations that every software development team should be aware of: NIST Secure Software Development Framework (SSDF), the EU Cyber Resilience Act (CRA), and the FDA Cybersecurity Requirements for Medical Devices. What’s your regulation IQ?
Join this webinar (...)
"De los valores al compromiso real"
Un taller dinámico, vivencial y provocador que rompe con las viejas fórmulas de cambio cultural para dar paso a una transformación ágil, visual y conectada con lo humano.
A través del juego La Diana de los (...)
The webinar will discuss ISAC use cases, their requirements, key performance indicators, and deployment scenarios following the recent publication of ETSI ISAC ISG group report ISC-001, and in light of the ongoing work in 3GPP SA1 towards defining 6G use (...)
En esta charla abordaremos el concepto de "Seguridad Psicológica" desde sus principios y complementando con una guía de autoanálisis para identificar en qué nivel se encuentran nuestros equipos y organizaciones.
La Seguridad Psicológica no es algo blanco o negro, no es (...)
Join us for a live Q&A where our panel of experts will answer your questions about CISSP before you sit for the exam. We’ll go over certification requirements, the domains, self-study resources, training strategies, career paths and more to help (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
ETSI’s Industry Specification Group (ISG) THz provides the opportunity for ETSI members to share their pre-standardization efforts on THz technology resulting from various collaborative research projects and being extended with relevant global initiatives.
Two more deliverables of this group are available (...)
Where is SASE headed in 2025? Join us for a live briefing with GigaOm and Versa Networks to explore the latest insights from the newly released GigaOm Radar for SASE.
As organizations converge networking and security into a unified (...)
Your sales team just closed a multi-year deal – congratulations! But how does the office of finance bill for it? How (and when) should they be recognizing the revenue? Uh oh…
If you’re struggling with how to organize multi-year deals into (...)
Compartiré mi visión y aportaré herramientas para gestionar el cambio de una manera efectiva. Olvídate del caos y descubre cómo:
Mantener la calma en pleno proceso de cambio.
Conseguir que tu equipo vea el cambio como una aventura, no como una amenaza.
Convertir (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
Join our webcast on SAP LeanIX calculations, a feature that enhances enterprise architecture data. Discover how calculations let you implement custom logic directly within your workspace, eliminating external tools and manual updates.
- Automate data population across fact sheets using your (...)
As digital transformation accelerates across transportation and logistics, IT leaders are confronting a surge in complexity, cyber threats, and the demand for resilient global connectivity. The new Aryaka survey reveals how industry professionals are prioritizing performance, security, and simplification in (...)
In a recent study, 80% of respondents said they would pay more for the brands or products they love. How do people feel about your brand?
Understanding how your brand is perceived and its overall health can drive business (...)
GenAI is transforming how we build and use applications – but it’s also creating new opportunities for attackers. As organizations rush to deploy AI-powered chatbots, copilots, and customer interfaces, they’re expanding their attack surface with risks traditional AppSec tools can’t (...)
In a recent study, 80% of respondents said they would pay more for the brands or products they love. How do people feel about your brand?
Understanding how your brand is perceived and its overall health can drive business (...)
In Episode 3 in our series "Navigating NIS2 Compliance with Fortinet SecOps" we propose a holistic approach to the alignment of an organization’s people, processes and technology within the appropriate risk framework and map each requirement to suggested Fortinet solutions (...)
A powerful alliance is formed when CISOs and boards unite, paving the way for enhanced digital resilience. However, differences in how to prioritize and measure the impact of cybersecurity can create misalignment. Join to explore the top 5 gaps between (...)
Are you struggling to balance cloud sovereignty with scalability?
Is a lack of cloud skills slowing your digital transformation and weakening your customer experience?
Join Rackspace Technology’s live panel webinar on Tuesday, June 3 at 11:00 AM BST/ 2:00 PM GST (...)
Cybercriminals have harnessed artificial intelligence (AI) to effectively target organisations, worm their way into IT environments, and trick employees.
The sophistication and variety of generative AI-powered cyberthreats is truly mind-boggling, with most MSPs still figuring out how to master this newest (...)
GenAI is transforming how we build and use applications – but it’s also creating new opportunities for attackers. As organizations rush to deploy AI-powered chatbots, copilots, and customer interfaces, they’re expanding their attack surface with risks traditional AppSec tools can’t (...)
From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer enough. Organizations need to anticipate threats and build resilience into their systems.
CISOs and security leaders (...)
How can organizations ensure that critical data remains protected and accessible - potentially forever?
Join us to explore Quantum’s Forever Archive approach: a sustainable, scalable solution for the long-term storage and preservation of essential business data - data that’s not just (...)
Join Accenture, Credera, and Tealium for a dynamic discussion on how businesses are laying the groundwork for AI success. The conversation will focus on building a strong data foundation, achieving data readiness, enabling real-time orchestration, and looking ahead to the (...)
To succeed as a CISO in 2025, you first need guts and luck. This year is poised to bring huge disruption. Unless you have been involved in the design, delivery, direction and drivers for an organization’s technology infrastructure, are supported (...)
In this Under the Hood session, we will explore all of the available Private Clouds supported by Check Point's CloudGuard Network Security(aka Quantum Firewalls in the Cloud).
We will discuss best practices, available architectures, licensing, quick demo, and much much more. (...)
In a recent study, 80% of respondents said they would pay more for the brands or products they love. How do people feel about your brand?
Understanding how your brand is perceived and its overall health can drive business (...)
Watch this webinar to learn about the critical issues and strategic considerations for moving from traditional data centers to cloud solutions. The discussion focused on the impact on patient care and the stifling of innovation if modernization is neglected, pointing (...)
GenAI is transforming how we build and use applications – but it’s also creating new opportunities for attackers. As organizations rush to deploy AI-powered chatbots, copilots, and customer interfaces, they’re expanding their attack surface with risks traditional AppSec tools can’t (...)
As organizations look to scale and meet compliance requirements, many are re-evaluating how they grant access to corporate data and applications. In the journey to zero trust, determining the right tools for your organization is just half the battle. It (...)
Maybe you’ve heard? There’s a new Red Hat Enterprise Linux in Town! What are the new features? What’s going away? What do I need to know about this new release?
Live event not at the best time (...)
Traditional penetration tests often miss the mark, failing to replicate the real-world tactics of today's sophisticated threat actors. In this session, Alex Holden, CISO of Hold Security, cuts through the noise and reveals how to transform your pen testing program (...)
Join F5 for an insightful webinar on how F5 BIG-IP Next for Kubernetes, deployed on NVIDIA BlueField-3 DPUs, transforms AI application performance and data center resource management. This session will explore the latest technical innovations that enhance networking, security, and (...)
With nearly half of organizations facing fines from regulatory noncompliance and one-third unable to recover from ransomware attacks, the need for resilient data protection has never been greater.
Arcserve Cyber Resilient Storage helps you stay steps ahead – with immutable backups, (...)
The transformative potential of AI demands robust security and Google Cloud is uniquely positioned to help organizations accelerate their AI journey by providing capabilities to holistically manage risk across the AI lifecycle. Join this session to learn about how you (...)
It takes valuable time to sift through the ever-increasing number of cyber threats and stop those likely to result in a breach. The faster your team can resolve that unending flow of incidents, the better.
Expert security teams are just one (...)
Traditional penetration tests often miss the mark, failing to replicate the real-world tactics of today's sophisticated threat actors. In this session, Alex Holden, CISO of Hold Security, cuts through the noise and reveals how to transform your pen testing program (...)
As the world discusses ChatGPT-3 and its impressive capabilities, the business community is concerned about the AI’s potential to change the game for cyber criminals and wreak havoc in the world of defense organizations. Should businesses soon expect a wave (...)
In the ever-evolving landscape of DevOps, the paradigm is now shifting - where security is taking the central stage. With vast surface areas including containers, cloud, repositories and third-party components, cyber threats became more prominent than ever before in DevOps.
This (...)
The way employees communicate and collaborate is constantly evolving, and so too are the security threats they face. The rise of generative AI adds a new layer of complexity, requiring CISOs to proactively address the risks of data loss and (...)
While BPMN is often associated with automation and execution, its true potential lies far beyond IT implementation. Join us for an insightful webinar exploring the powerful role of BPMN in conceptual process modeling—an essential practice for achieving clarity, alignment, and (...)
As the U.S. political landscape shifts under a new administration, UK and EU investors face a fresh set of opportunities and challenges. This webcast will provide a broader analysis of how regulatory, legal, and policy developments are shaping shareholder (...)
Are you updating or reassessing your email security system to stay ahead in the ever-evolving threat landscape?
To help you make informed decisions to protect your organisation, our cybersecurity experts discuss:
• The findings of the 2024 Gartner® Magic Quadrant™ for Email (...)
Join the authors of the M-Trends 2025 Special Report for an insightful webinar series on the latest global cyber trends and attacker tactics. Based on Mandiant's frontline incident response and threat intelligence from January 1, 2024, to December 31, 2024, (...)
Is your organization struggling to keep pace with today’s complex cyber risk landscape? Fragmented security tools, overwhelming risk findings, and limited visibility can make it difficult to prioritize and remediate the threats that matter most to your business. The Qualys (...)
This webinar will explore the benefits of CXL memory sharing and how CXL shared memory will improve performance for Big Data Analytics, AI, and more. CXL Consortium members Astera Labs, Micron Technology, UnfabriX, and XConn Technologies will share real-world usage (...)
The emergence of quantum computing presents a unique challenge to the cybersecurity landscape. This transformative technology poses significant risks to current encryption methods, particularly for asymmetric cryptography systems like RSA and Diffie-Hellman, which secure most network communications today.
Organizations face a (...)
With regulations tightening and cryptographic threats evolving, enterprises can no longer rely on static encryption strategies. The shift toward crypto agility is now a business imperative, ensuring organizations can seamlessly adapt to new cryptographic standards and regulatory requirements across the (...)
In this session, we explore the capabilities of DX NetOps Topology, now generally available (GA) in the latest 24.3.9 release. Learn how topology service enables seamless visibility, automated network mapping, and real-time insights into your entire network infrastructure, helping you (...)
Earn 1.5 CPE credits on this webinar
As cloud adoption accelerates, managing vendor risks is more crucial than ever. Join our panel discussion
webinar with Paul McKay, Principal Analyst at Forrester, and subject matter experts as we explore strategies for
overseeing vendor relationships (...)
This episode of “Shift + ALT + Disrupt” will feature a one-on-one interview with a subject matter expert, and our Digital Transformation Roundtable.
Speakers: TBA
Every minute of business disruption costs organizations millions – and cyber attackers know it. As threat actors weaponize AI and exploit zero-day vulnerabilities with unprecedented speed, the difference between survival and failure often comes down to how quickly you can (...)
Join our comprehensive 60-minute webinar designed to empower IT professionals with the expertise to manage and secure
endpoints using Netwrix Solutions. Dive deep into the technical landscape with a live demonstration that showcases how
Netwrix can streamline your endpoint management processes. Additionally, (...)
Bots evolve to bypass even sophisticated bot management controls, as highlighted in a recent F5 Labs report. In this webinar, F5 Labs researchers will demonstrate the persistent bot problem in cybersecurity by analyzing over 200 billion web and API transactions (...)
Join us as we explore AI innovations in Microsoft 365 that boost security and performance. Learn how AI can
transform your Microsoft environment with enhanced security and efficiency and listen in as our expert
speakers share strategies and best practices to help (...)
Les données sensibles sont partout, et les attaquants le savent. Qu'il s'agisse d'un stockage en nuage mal configuré ou d'identités trop autorisées, l'exposition des données est devenue l'un des vecteurs de risque les plus urgents pour les organisations modernes. Mais (...)
A più di un anno dall'implementazione di requisiti più severi per chi spedisce messaggi di posta elettronica da parte di Google e Yahoo, l'adozione del protocollo DMARC è aumentata, e per una buona ragione. I criminali informatici stanno costantemente evolvendo (...)
- Impact from a global perspective: opportunities in an era of uncertainty – Hari Balkrishna of T. Rowe Price
- Managing and measuring portfolio impact outcomes in a time of mounting demands on sustainable funds Caroline Brady of Net Purpose
- Investing (...)
Industrial environments once built to operate in isolated networks are now connected to the internet, exposing them to all the threats that plague IT networks. While point products can appear attractive as you tackle the security challenge of the moment, (...)
Recent shifts in global data regulations have prompted European organizations to re-evaluate their identity and access management strategies. As identity sits at the core of both security and compliance, questions around where platforms are hosted, how data is handled, and (...)
A lot can be understood about cyber-risk and its probabilities from an often-overlooked source: cyber insurance data. This data offers visibility into the frequency and types of cyberattacks that organisations face, as well as the financial implications of those incidents.
Analysing (...)
CISOs must ensure their organizations comply with various cybersecurity regulations and industry standards. Each industry has its own hodgepodge of requirements and states are beginning to roll out their own regulatory mandates. Would adopting a risk management framework help you (...)
Más de un año después de que Google y Yahoo implementaran requisitos de remitente más estrictos, la adopción de DMARC se ha disparado, y con razón. Los ciberdelincuentes evolucionan constantemente sus tácticas, utilizando la suplantación de dominio para suplantar la (...)
Participez à notre webinaire :
Les dernières tendances en matière d'usurpation de domaine et comment les attaquants exploitent les failles de sécurité des e-mails ;
Comment DMARC prévient les attaques par usurpation d'identité et protège votre marque ;
Pourquoi les organisations de toutes (...)
In this topical webinar we will explore the history and background to President Trump’s tariff policies. We will consider the latest position and how tariffs are impacting on markets, consumer sentiment and trade. Finally, we’ll outline how asset managers are (...)
In today's complex threat landscape, anticipating and neutralizing cyberattacks is essential. Google Threat Intelligence provides the visibility and insight needed to proactively defend against emerging threats and mitigate operational risk.
Join our Google Threat Intelligence subject matter experts for an informative (...)
As organizations increasingly adopt multi-cloud and hybrid cloud architectures, ensuring consistent application performance, availability, and scalability across diverse environments becomes a critical challenge. Traditional load balancing solutions often fall short when stretched across multiple cloud providers or integrated with on-premise (...)
Adotar a autenticação sem senha vai além da adoção de FIDO Passkeys — trata-se de construir uma estratégia de autenticação segura, fluida e escalável para toda a sua população digital de usuários.
Neste webinar, apresentaremos as etapas essenciais para (...)
The government has just published its proposals around surplus release for DB pension schemes. In this webinar, we will discuss the implications of these proposals on pension scheme long-term objectives and investment strategy. In particular we will focus on “run-on”, (...)
Integrating global simulation and training systems is more complex than ever. Legacy simulators rely on varied and often incompatible standards for data, voice and video, while modern systems demand cloud-based, distributed architectures and robust security. When you factor in the (...)
Abordar un proyecto de Automatización y Transformación Digital, con el tradicional levantamiento “As-Is” de Procesos es el PEOR enfoque que se puede aplicar.
¿Porqué ocurre esto en la amplia mayoría de empresas? Porque siguen ancladas en la Gestión "tradicional (antigua)" de procesos.
Los Modelos Lógicos Disruptivos (MLD) son modelos detallados de procesos que impulsan de (...)
Mergers and acquisitions can fuel growth—but they also create prime opportunities for cyber threats. Financial services organizations must act fast to secure newly acquired entities, maintain compliance, and prevent cyber risks from jeopardizing the deal.
In this webinar, security leaders will (...)
Most organizations only start thinking about the security of their large language models (LLMs) once the model is already developed and deployed. However, this reactive approach often leads to costly retrofitting, unexpected vulnerabilities, and missed opportunities to build security in (...)
Ready to accelerate your Red Hat expertise and drive success? Join our webinar to explore the Red Hat Training Portal - your central hub for credentials, sales plays, technical content, and the latest updates to help you win in the (...)
In this session, you will learn how to:
- Integrate back-end order systems to automate fulfillment.
- Eliminate manual processes.
- Satisfy your customers with a consistent UX.
Join Hummingbirds AI CEO for a transformative session on how edge-based authentication is reshaping security while creating unprecedented business opportunities for Intel partners.
The cybersecurity landscape is at a critical inflection point. Despite billions invested in protection, 80% of breaches still (...)
As artificial intelligence transforms the enterprise landscape, the foundation of digital trust is being put to the test. With AI-driven automation, machine-to-machine communication, and deepfake threats on the rise, enterprise leaders are rethinking how they build and maintain digital trust. (...)
Featuring experts from Supermicro and AMD, join our webinar where we will highlight our latest solution ideal for cloud hosting providers, edge computing, content delivery networks, and online gaming. Discover a powerful balance of performance, density, scalability and affordability.
We'll (...)
Announced in May 2025, Backblaze B2 Overdrive delivers terabit-speed at exabyte scale with pricing starting at $15/TB/month, including unlimited free egress. In this session we’ll take you on a deep dive into B2 Overdrive’s architecture, explaining how B2 Overdrive scales (...)
Cloud Storage Security’s internal threat laboratory, Casmer Labs, has been hard at work discovering and identifying the most current and pressing threats to organizations that operate in the cloud.
In Q1 of 2025, botnet malware dominated the charts as the most (...)
Join Microsoft and Qualys for a strategic session unveiling our latest integration: full support for Azure Linux—Microsoft’s attested and signed OS purpose-built for secure, cloud-native workloads on Azure Kubernetes Service (AKS).
Discover how Azure Linux, together with the Azure Operations Center, (...)
Securing your software supply chain begins with knowing what’s in your code. With AI-generated code and ubiquitous open source software use, it’s never been more critical to understand what risks your software may contain. In fact, last year alone we (...)
Join us for an informative webinar on migrating from VMware to Nutanix with the help of F5 BIG-IP. Industry experts will cover critical steps, best practices, and technical nuances for a successful migration.
As organizations seek efficiency and cost-effectiveness, many are (...)
In a rapidly evolving business landscape, organisations must continuously adapt and refine their strategies if they are going to remain competitive, or even survive. Data is a fundamental enabler of this organisational agility, but only when adaptability has been built (...)
Keynote sobre cómo el visual thinking puede ayudar a equipos a mejorar la colaboración, la escucha profunda, y activar la inteligencia colectiva.
Experimentaremos en primera persona cómo las notas visuales pueden ayudarnos a traer claridad, foco y visión. (...)
During this training, we'll review how to navigate the different features of Kintone as an End User. This includes running through Portal Home, interacting with the People Feature, using Spaces, and reviewing/adding data in an App.
We all know that open text feedback is a goldmine—customers are telling you exactly what they think, in their own words. But let’s be honest: digging through all that raw, unstructured text? It’s time-consuming, messy, and often overwhelming.
That’s where Alchemer (...)
In recent years, the rise of API attacks has become a pressing concern across the Asia-Pacific region, with reports indicating a significant uptick in incidents targeting APIs. Organizations are grappling with the complexities of API security, reflecting a broader trend (...)
We all know that open text feedback is a goldmine—customers are telling you exactly what they think, in their own words. But let’s be honest: digging through all that raw, unstructured text? It’s time-consuming, messy, and often overwhelming.
That’s where Alchemer (...)
Service Providers are facing growing challenges in managing cyber risks while leveraging cybersecurity tools to drive trust and business growth. At MWC25, Fortinet explored these crucial topics, and now we’re bringing the key insights directly to you. Don’t miss this (...)
Passwortlos bedeutet mehr, als nur FIDO geräte einzuführen – es geht darum, eine Authentifizierungsstrategie zu entwickeln, die sicher, nahtlos und skalierbar für Ihre gesamte Nutzerbasis ist.
In diesem Webinar zeigen wir Ihnen die wichtigsten Schritte, um ein passwortloses Rahmenwerk zu gestalten (...)
Increasingly complex IT infrastructures, a growing range of cyberthreats, and disjointed security solution tech stacks are keeping many managed service providers up at night.
But not the team at RIZQ Consulting, a provider of specialized and integrated IT consultation services in (...)
In 2025, ransomware and DDoS attacks continue to threaten Europe’s public institutions - disrupting critical services, undermining operational stability, and eroding citizen trust.
This webinar draws on real-world cyber defence experience from the Ukrainian frontline to show how governments can (...)
Join us for an introduction to Blue Owl and the GP Strategic Capital Investment team. We will discuss how:
i. Growth rates have not been uniform across asset classes and some are experiencing growing pains
ii. The seven “super quarters” of growth (...)
As you would have discovered in our first webinar, the state of Digital Trust is in decline. At the core of trust issues is customer experience, whether it be around a complicated onboarding process, the customers feeling forced to share (...)
Discover how Application Detection and Response (ADR) enhances your security posture by providing critical application-layer visibility that Endpoint Detection and Response (EDR) often misses. Learn why, with the rise of application-focused attacks, relying solely on EDR is insufficient and how (...)
Learn from experts about CyberProof's approach to advanced threat hunting service.
Niranjan Jayanand, NJ to his friends, leads this service at CyberProof and has a wealth of experience and insights.
Sergey Novikov is Director of Cyber Security at CyberProof.
Get a better (...)
In this Under the Hood Session, we are going back to basics and walking you through what makes CloudGuard WAF the best and most unique WAF on the market.
We will also discuss and demo onboarding options, initial configuration, and general (...)
We all know that open text feedback is a goldmine—customers are telling you exactly what they think, in their own words. But let’s be honest: digging through all that raw, unstructured text? It’s time-consuming, messy, and often overwhelming.
That’s where Alchemer (...)
Only about half of companies are even familiar with the term "agentics," but it's already garnering intrigue and interest, coupled with a healthy dose of skepticism, from CX leaders. In this session, Metrigy will define agentics, and where companies (...)
As agentic AI solutions evolve and develop capabilities to act on behalf of humans, opportunities for operational efficiency abound. CX leaders are keen to learn what aspects of currently available AI solutions are truly agentic, and can be leveraged today, (...)
Explore cutting-edge innovations in solid-state drive (SSD) power efficiency and liquid cooling, designed to mitigate AI workload bottlenecks and reduce Total Cost of Ownership (TCO) in data centers. By focusing on optimizing SSD performance per watt, we can significantly enhance (...)
Explore cutting-edge innovations in solid-state drive (SSD) power efficiency and liquid cooling, designed to mitigate AI workload bottlenecks and reduce Total Cost of Ownership (TCO) in data centers. By focusing on optimizing SSD performance per watt, we can significantly enhance (...)
Explore cutting-edge innovations in solid-state drive (SSD) power efficiency and liquid cooling, designed to mitigate AI workload bottlenecks and reduce Total Cost of Ownership (TCO) in data centers. By focusing on optimizing SSD performance per watt, we can significantly enhance (...)
Explore cutting-edge innovations in solid-state drive (SSD) power efficiency and liquid cooling, designed to mitigate AI workload bottlenecks and reduce Total Cost of Ownership (TCO) in data centers. By focusing on optimizing SSD performance per watt, we can significantly enhance (...)
Explore cutting-edge innovations in solid-state drive (SSD) power efficiency and liquid cooling, designed to mitigate AI workload bottlenecks and reduce Total Cost of Ownership (TCO) in data centers. By focusing on optimizing SSD performance per watt, we can significantly enhance (...)
Discover how to optimize your developer workflow with Code Sight, an innovative IDE plugin that identifies SAST and SCA vulnerabilities earlier in the software development process. Join us to learn how this powerful tool seamlessly integrates with Coverity, Black Duck (...)
Join Scott Abel, The Content Wrangler, for a special Coffee and Content talk show featuring Jennifer Baranowski, President of the CODiE Awards. In this live session, you'll learn about the legacy and purpose of the prestigious CODiE Awards and take (...)
AI only matters if it resolves something. And most enterprises are still falling short.
According to Metrigy’s latest research:
- Fewer than 50% of live interactions are resolved on first contact
- 91% of customers fail with self-service
- 75% of companies say agentic (...)
Embedded systems are a part of our daily lives. Unfortunately, they don't receive the attention they deserve when it comes to security. The list of threats is long, and attacks can cause huge damage. But how can embedded systems be (...)
Watch this webinar that explores the key cybersecurity trends shaping the threat landscape in 2025.
We discuss the rise of hacktivism, the latest developments in the world of ransomware, the growing influence of state-sponsored actors, and the potential impact of (...)
In an era where cyber threats are increasingly powered by artificial intelligence, traditional security measures are often insufficient. This webinar, "The Role of Preemptive DNS Security in Combating AI-Powered Cyber Attacks” aims to address the growing concern of AI-driven cyber (...)
As today’s threat landscape continues to evolve, traditional vulnerability management programs are struggling to keep up. Security teams face mounting challenges, from sprawling hybrid environments to increased attack surface complexity and the need for faster remediation. To stay ahead, organizations (...)
As AI systems based on large language models become more powerful and widespread, more cybersecurity challenges emerge. From jailbreaks to indirect prompt injections, they are vulnerable to a wide array of LLM-specific threats. However, all these problems can be boiled (...)
Shifting left sounds great in theory but often creates an overwhelming burden on developers who aren't security experts. And traditional security gates create friction that developers bypass, leading to breaches.
In this webinar, industry thought leader Atulpriya Sharma will explore the (...)
In an era where cyber threats are increasingly powered by artificial intelligence, traditional security measures are often insufficient. This webinar, "The Role of Preemptive DNS Security in Combating AI-Powered Cyber Attacks” aims to address the growing concern of AI-driven cyber (...)
As today’s threat landscape continues to evolve, traditional vulnerability management programs are struggling to keep up. Security teams face mounting challenges, from sprawling hybrid environments to increased attack surface complexity and the need for faster remediation. To stay ahead, organizations (...)
As the digital landscape grows more complex, vulnerabilities are evolving faster than ever, posing serious risks to organizations across industries. Are you prepared for what’s coming?
Join us for an exclusive webinar where cybersecurity experts unpack the key trends shaping 2025 (...)
As organizations race to adopt AI technologies, many overlook the complex -- and often vulnerable -- supply chains that power them. From open-source libraries and training data to model hosting and deployment pipelines, every layer introduces potential risk.
This talk (...)
For today’s CISOs, third-party risk management (TPRM) often feels like a time-intensive, check-the-box process that pulls valuable resources away from strategic priorities.
Join this panel discussion featuring David Stapleton, Chief Trust Officer at ProcessUnity, and Marcello Tomasina, Senior Manager at Accenture (...)
Regulatory and manufacturing requirements exist to perform product-specific microbial retention testing on sterilizing filters. The implementation of a Quality by Design approach to microbial retention testing supports a paradigm that would obviate the need for product-specific testing for early-stage products (...)
The evolving threat landscape requires security operations (SecOps) to move beyond traditional methods and embrace cutting-edge innovations. Generative AI is emerging as a game-changer, enabling security teams to automate and enhance threat intelligence processes with unprecedented speed and accuracy.
In this (...)
The evolving threat landscape requires security operations (SecOps) to move beyond traditional methods and embrace cutting-edge innovations. Generative AI is emerging as a game-changer, enabling security teams to automate and enhance threat intelligence processes with unprecedented speed and accuracy.
In this (...)
Open source is widely used in software development because it allows you to create high-quality software quickly - especially with the use of AI-assisted coding tools. But if left unmanaged, open source can lead to license compliance issues as well (...)
Although 80% of business leaders consider generative AI to be the top emerging technology of the next few years only 23% of leaders feel their organization's risk management and governance functions are ready to support scaling Generative AI initiatives. If (...)
Dive into the specifics of SD-WAN deployments as we demonstrate how DX NetOps Topology offers in-depth visibility into control and data plane connectivity. Understand how to map, monitor, and manage these critical components, ensuring seamless connectivity, reducing operational complexity, and (...)
There is an ever-widening gap between the threats to identities and access control and our ability to defend against those threats. Bad actors know it, and they exploit gaps in traditional, outdated security controls. Without a new identity security paradigm (...)
As today’s threat landscape continues to evolve, traditional vulnerability management programs are struggling to keep up. Security teams face mounting challenges, from sprawling hybrid environments to increased attack surface complexity and the need for faster remediation. To stay ahead, organizations (...)
Join us for lessons from an FBI Hostage Negotiator to Lead, Influence and Connect like never before.
In this engaging session, you'll dive into the powerful listening techniques used in hostage negotiation, transforming the way you lead, influence, and communicate (...)
Join us for an upcoming webinar covering RHEL management including Red Hat Insights and Red Hat Satellite. What are the new features? What’s going away? What do I need to know about this new release?
Live event not at (...)
Join us for a deep dive into Certified in Cybersecurity (CC), the entry-level cybersecurity credential from ISC2, creator of the CISSP.
Cyberthreats continue to escalate worldwide, and the need for cybersecurity experts is critical. But talent is (...)
In an era where cyber threats are increasingly powered by artificial intelligence, traditional security measures are often insufficient. This webinar, "The Role of Preemptive DNS Security in Combating AI-Powered Cyber Attacks” aims to address the growing concern of AI-driven cyber (...)
Digital forensics is no longer just a post-incident activity—it's a strategic pillar for proactive risk management and cyber resilience. Join N2K CyberWire's Dave Bittner, and experts from Magnet Forensics, as we unpack key findings from the latest State of Enterprise (...)
Join us for a deep dive into Certified in Cybersecurity (CC), the entry-level cybersecurity credential from ISC2, creator of the CISSP.
Cyberthreats continue to escalate worldwide, and the need for cybersecurity experts is critical. But talent is (...)
Enterprise Strategy Group notes that 75% of companies that experienced a ransomware attack in the last year were compromised, with data exposure and exfiltration common outcomes. In this threat landscape, establishing resilient cyber preparedness and data protection is more challenging (...)
Join us for a deep dive into Certified in Cybersecurity (CC), the entry-level cybersecurity credential from ISC2, creator of the CISSP.
Cyberthreats continue to escalate worldwide, and the need for cybersecurity experts is critical. But talent is (...)
Get an exclusive first look at Supermicro DLC-2, the next generation direct-liquid-cooling solution. AI and HPC workloads are driving the demand for liquid-cooled data centers. Supermicro’s DLC-2 is the latest innovation in liquid cooling technology. Join Supermicro experts, as they (...)
This is a great training for anyone who will be a Kintone Administrator because we’ll go through the highlights of each of our admin sections. This will give you a good base as you start to set up Kintone for (...)
Join us for an insightful webinar on advancing AI orchestration to simplify AI/ML infrastructure while enhancing AI model contextual awareness. This session will delve into high-performance connectivity strategies for hybrid and multicloud environments, designed to optimize retrieval-augmented generation (RAG) and (...)
Attackers are wielding AI-driven strategies to outpace traditional defenses, launching hyper-targeted, automated, and adaptive attacks at an unprecedented scale. As adversaries grow more sophisticated, leveraging generative AI to evade detection and deploy malicious payloads in real time, security teams are (...)
• Unlock new revenue opportunities and deliver scalable security with best-in-class threat performance by leveraging SonicWall's latest mid-range firewalls.
• Leverage advanced management tools to ensure persistent security and seamless multi-tenant management.
• Get expert insights on reducing costs, optimizing operations and (...)
Kubernetes is known for its ability to scale quickly, but does its security and management keep up with that growth? As your Kubernetes setup expands, it becomes harder to spot and fix potential problems.
Join our experts as they share modern (...)
Scopri come ottenere il miglior backup sul mercato per le applicazioni cloud e la gamma di funzionalità disponibili nei nostri servizi di backup e ripristino. Arcserve SaaS Backup offre una protezione completa per i dati archiviati in Microsoft 365, Microsoft (...)
Are you a CIO, CISO, CTO, Product or Supply Chain Director navigating the complexities of the new CRA legislation? Don’t miss this exclusive Live Q&A session where our experts will break down everything you need to know to ensure your (...)
Active Directory est constamment attaqué, avec 95 millions de comptes ciblés quotidiennement. Les menaces basées sur l'identité permettent aux attaquants de se déplacer latéralement, d'élever les privilèges et de compromettre vos systèmes critiques. Les outils traditionnels ne suffisent pas à (...)
Detecting and isolating sophisticated human and automated attacks early before they inflict serious damage is a powerful strategy.
Join this session to gain essential insights on implementing and utilizing deception technology to enhance a proactive security.
Find out what IT decision-makers like you are doing to prepare for the latest trending email-borne cyberthreats — and gain key insights to help you allocate security investments wisely this year.
Attend this webinar to discover the key findings presented in (...)
The EU created the Digital Operational Resilience Act (DORA) to help the financial sector withstand, respond to, and recover from Information and Communication Technology (ICT) disruptions. But what does that mean from a security testing perspective?
Join this webinar (...)
Migrer vers l’authentification sans mot de passe ne se limite pas à l’adoption de clés FIDO : il s’agit de construire une stratégie d’authentification à la fois sécurisée, fluide et évolutive pour l’ensemble de vos utilisateurs.
Dans ce webinaire, nous vous (...)
The critical issue of cyber risk governance has come under laser focus following a wave of high-profile breaches, including recent hacker incursions at Snowflake, the Change Healthcare, AT&T, and other well-known corporations. Regulators are intensifying squeeze, increasingly demanding formal assurance (...)
The critical issue of cyber risk governance has come under laser focus following a wave of high-profile breaches, including recent hacker incursions at Snowflake, the Change Healthcare, AT&T, and other well-known corporations. Regulators are intensifying squeeze, increasingly demanding formal assurance (...)
Organisations face an increasingly fast evolving regulatory landscape and a multitude of cybersecurity frameworks to help them defend against security threats.
In this interactive session, we will give some practical insights for leveraging the use of cybersecurity frameworks from major international (...)
Descubre cómo la Automatización Robótica de Procesos (RPA) y la Inteligencia Artificial (IA) están revolucionando la forma en que trabajamos. En esta sesión introductoria, exploraremos los conceptos básicos de RPA e IA y cómo se integran dentro de Microsoft Power (...)
The Verizon Data Breach Investigations Report (DBIR) is an annual report that analyzes thousands of confirmed data breaches and security incidents. It provides insights into the latest cyber threat trends, common attack vectors, and industry-specific vulnerabilities. The DBIR is a (...)
Learn how to create a unified approach to security and operations by overcoming organizational resistance and bridging gaps between teams.
Tune into this in-depth webinar from TD Bank's Application Release Engineer Pankul Chitrav as she shares:
- Techniques for aligning security (...)
Are you a CIO, CISO, CTO, Product or Supply Chain Director navigating the complexities of the new CRA legislation? Don’t miss this exclusive Live Q&A session where our experts will break down everything you need to know to ensure your (...)
Simplifique la gestión de inventarios mediante la automatización de los procesos de gestión de compras y abastecimiento. Garantice la disponibilidad de productos para satisfacer la demanda de los clientes, eliminando el exceso de stock y mejorando la eficiencia en la (...)
Abstract: As non-human identities (NHIs) surge past human identities in modern enterprises, the stakes for securing these connections have never been higher. From API to agentic AI, software workloads power critical systems – but they also create new exposure surfaces (...)
With AI systems playing an increasingly significant role in critical areas, it's essential to ensure strong authorization and access control. This is vital for protecting data integrity, privacy, and maintaining compliance.
This session will feature Gal Helemski, Co-founder & CPO, PlainID, (...)
The Verizon Data Breach Investigations Report (DBIR) is an annual report that analyzes thousands of confirmed data breaches and security incidents. It provides insights into the latest cyber threat trends, common attack vectors, and industry-specific vulnerabilities. The DBIR is a (...)
Join experts from F5 and Microsoft for a panel discussion on F5 NGINXaaS for Azure. Learn why this ADC as a Service solution was created, how it addresses cloud-native app delivery and security challenges, and the benefits it brings to (...)
Traditional security measures like firewalls and antivirus software have become necessary but insufficient guardians of your organization's digital assets. As cyber threats grow increasingly sophisticated and persistent, businesses face unprecedented challenges that require a fundamental shift in how we approach (...)
Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on June 12, 2025.
We will discuss this month's high-impact vulnerabilities, including those that are part of May 2025 Patch Tuesday. We will walk (...)
GenAI is transforming technical communication, with 86% of professionals exploring its potential. The 2024 Center for Information Development Management Benchmark Study uncovers how GenAI is being implemented, the benefits it brings, and the challenges it presents.
This presentation from Amanda Patterson, (...)
Join me, Pat Patterson, Chief Technical Evangelist at Backblaze, as I introduce our new webinar series, Backblaze Tech Lab. I'll explain the webinar format, share our schedule for the next few weeks, and bring you the latest news from the (...)
The Verizon Data Breach Investigations Report (DBIR) is an annual report that analyzes thousands of confirmed data breaches and security incidents. It provides insights into the latest cyber threat trends, common attack vectors, and industry-specific vulnerabilities. The DBIR is a (...)
Legislation requiring stringent software security practices by software producers is being passed around the globe. This requires organizations to rethink their approach to software security, which industry standards they follow, and the best practices for their software development teams.
NIST has (...)
Operationalizing UEBA & Versa XDR – Real-World Deployment, Analytics, and Feedback
Date: June 12
Time: 11:00 AM PT
Traditional security tools often miss the early warning signs of advanced threats. Join Versa Networks for a deep dive into how User and Entity Behavior (...)
The CSA Enterprise Authority to Operate (EATO) Framework is an assessment, remediation, consultancy, and certification framework. It targets Anything-as-a-Service (XaaS) providers and their entire underlying supply chain who are catering to customers in highly regulated industries processing sensitive data. EATO (...)
Gear up for another deep dive! In this episode of AI Friday, we've got the crew—Aubrey, Joel, Byron, and Pete—ready to unpack the latest in AI technology and hardware. Join us as we break down Google's groundbreaking Ironwood TPU, exploring (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through building an app and a few features to set up to prepare it for use. This will give you a good base (...)
Security teams responsible for vulnerability management are under constant pressure balancing SLAs, compliance requirements, and thousands of cloud vulnerabilities. While many tools claim to help by identifying the riskiest issues, knowing what’s critical doesn’t always translate into fast or effective (...)
¿Te sientes abrumado por el estrés en el trabajo?
¿Te cuesta manejar tus emociones en el día a día?
Si es así esta propuesta es para ti. En el entorno laboral actual, gestionar nuestras emociones es clave para nuestro bienestar y productividad. (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
Join us for How Top Retailers Build NPS Surveys That Get Results, a practical session in our "How to Build a CX Program" series.
Learn how to design, launch, and optimize Net Promoter Score (NPS) surveys that real shoppers will actually (...)
As hybrid multicloud adoption accelerates, many organizations are grappling with siloed, inconsistent network management tools that increase complexity and risk. According to the latest EMA research, only a quarter of respondents believe their organizations are completely successful at building and (...)
In today’s rapidly evolving threat landscape, reactive cybersecurity is no longer enough. Join EMITEC and SecPod for an exclusive session focused on building a prevention-first cybersecurity framework that protects organizations before threats can take root.
This session will explore how (...)
Join us for How Top Retailers Build NPS Surveys That Get Results, a practical session in our "How to Build a CX Program" series.
Learn how to design, launch, and optimize Net Promoter Score (NPS) surveys that real shoppers will actually (...)
Learn how to combat the modern threat landscape with
AI-powered services and next-generation firewalls.
Rapid advancements in AI enable attackers to create more sophisticated and evasive threats, outpacing traditional security measures.
AI-powered threat detection and protection technologies are crucial for identifying and stopping (...)
The fight against DDoS is no longer just about absorbing traffic. It’s about outmaneuvering an adversary that is growing smarter, faster, more organized, and more relentless by the nanosecond. And it will take more than traditional defenses to protect your (...)
Software is essential in everyday products like cars, medical devices, airplanes, and IoT devices. Bugs and security flaws can have serious impacts on safety, the environment, and your reputation. As AI speeds up software development, it's more important than ever (...)
Going passwordless requires more than just adopting FIDO Passkeys—it’s about building an authentication strategy that’s secure, seamless, and scalable across your entire digital user population.
In this webinar, we’ll walk you through the key steps to design and implement a (...)
In the evolving landscape of cybersecurity, integrating AI tools such as Microsoft Copilot and ChatGPT offers promising enhancements for cyber risk management and compliance. This discussion from STRONGER 2024, featuring Dr. Fortune Onwuzuruike, provided an in-depth discussion on the strategic (...)
As digital transformation accelerates, organizations face an increasing challenge in managing the rise of machine identities. Unfortunately, many organizations are still struggling to define and protect these identities, which increases the risk of data breaches and system downtime – both (...)
Private equity acquisitions are shaking up the IT landscape, triggering sudden price hikes, shrinking support, and leaving IT leaders scrambling for budget continuity. If your IT monitoring costs and roadmaps are now uncertain, this session is for you.
Join us (...)
Unleash the potential of generative AI in your professional toolkit with our upcoming webinar, "Collaborative Cognition: AI as a Thought Partner." Join Ruth Kaufman, Knowledge Engineer at Urbina Consulting, as she delves into how AI is transitioning from a mere (...)
Join Treasure Data Co-Founder and CEO, Kazuki Ohta, and Chief Product Officer, Rafa Flores, as they unveil the bold new vision for the enterprise CDP market—and what’s next for the Treasure Data platform. This isn’t just a product update. It’s (...)
Building autonomous systems means navigating complexity; balancing modularity and scalability with latency, reliability, and resource constraints. Connext handles these tradeoffs at the platform level, enabling developers to focus on building high-level autonomy platforms that are flexible, scalable, and deployable across (...)
Join us for How Top Retailers Build NPS Surveys That Get Results, a practical session in our "How to Build a CX Program" series.
Learn how to design, launch, and optimize Net Promoter Score (NPS) surveys that real shoppers will actually (...)
As organizations increasingly turn to open source software to power innovation, reduce costs, and accelerate transformation, a new set of challenges is emerging around security, patch management, and regulatory compliance. According to new research from IDC and sponsored by Canonical (...)
Data center operations relies on effective data center teams being proactive, informed, and practiced. In this session, we’ll explore how these principles of data center operations can be applied to support, sustain, and enhance the skills of people supporting the (...)
For safety and security-critical software, every line of code counts. On top of that, modern software development requires speed, accuracy, and efficiency. Discover how your embedded development team can streamline compliance, fortify security, and accelerate development with Parasoft C/C++test 2025.1. (...)
Leverage the power of policies to flag non-compliant components. With Black Duck SCA policies, create your own rules to determine 'non-compliance'. Join us in this webinar as we explore what policies are, how to configure them and how we can (...)
Dive into a full year of SOC data to identify trends in infrastructure targets, malware, schemes, and more to uncover strategies for improving your security resilience in the coming year. We’ll cover:
• Security data specific to the FinServ industry, including specific (...)
The fight against DDoS is no longer just about absorbing traffic. It’s about outmaneuvering an adversary that is growing smarter, faster, more organized, and more relentless by the nanosecond. And it will take more than traditional defenses to protect your (...)
Join experts from Supermicro and AMD and get an in-depth look at our new H14 solutions, powered by the AMD Instinct MI350 series GPUs. Organizations today are looking for options to maximize performance and scale their large AI training models (...)
Join us for an exclusive webinar to explore how Copilot+ is redefining the AI experience across a wide spectrum of silicon architectures. From ARM to x86 and beyond, Copilot+ ensures seamless, powerful, and personalized AI performance—no matter the device.
In this (...)
Protecting applications and APIs is crucial. While F5 BIG-IP administrators have managed this for years, emerging threats have made it increasingly complex and time-consuming. Adding multiple point solutions has only amplified this complexity.
F5 Distributed Cloud Services can enhance your BIG-IP (...)
How does your hybrid, multi-cloud strategy measure up?
Join Infoblox as we break down key benchmarks from our Multi-Cloud Maturity Assessment to help you gauge where your organization stands today — and what it will take to stay ahead.
In (...)
Data is the fuel that delivers sustained business growth — uncovering new business opportunities, improving customer and employee experiences, and optimising business processes.
But how do you spotlight dark pockets of data to enhance performance without compromising the security and reliability (...)
Join us for an in-depth webinar that redefines how organizations approach threat detection in cybersecurity. Although detection remains the cornerstone of Security Operations Centers (SOCs), the absence of a formalized cybersecurity program often results in inefficiencies and missed opportunities for (...)
Vybudování bezpečného a škálovatelného prostředí AWS může být složité bez správného základu. AWS Landing Zone vám pomůže prosadit osvědčené bezpečnostní postupy, zefektivnit segmentaci sítě a zachovat soulad – to vše při optimalizaci cloudových operací. Check Point CloudGuard se hladce integruje (...)
Créer un environnement AWS sécurisé et évolutif peut s'avérer complexe sans une base solide. Une zone d'atterrissage AWS vous aide à appliquer les bonnes pratiques de sécurité, à rationaliser la segmentation du réseau et à maintenir la conformité, tout en (...)
Der Aufbau einer sicheren und skalierbaren AWS-Umgebung kann ohne die richtige Grundlage komplex sein. Eine AWS Landing Zone unterstützt Sie bei der Umsetzung bewährter Sicherheitsmethoden, der Optimierung der Netzwerksegmentierung und der Einhaltung von Compliance-Vorgaben – und das alles bei optimiertem (...)
Creare un ambiente AWS sicuro e scalabile può essere complesso senza le giuste fondamenta. Una AWS Landing Zone ti aiuta ad applicare le best practice di sicurezza, semplificare la segmentazione della rete e mantenere la conformità, il tutto ottimizzando le (...)
Construir un entorno de AWS seguro y escalable puede ser complejo sin la base adecuada. Una Zona de Aterrizaje de AWS le ayuda a implementar las mejores prácticas de seguridad, optimizar la segmentación de la red y mantener el cumplimiento (...)
How does your hybrid, multi-cloud strategy measure up?
Join Infoblox as we break down key benchmarks from our Multi-Cloud Maturity Assessment to help you gauge where your organization stands today — and what it will take to stay ahead.
In (...)
Building a secure and scalable AWS environment can be complex without the right foundation. An AWS Landing Zone helps you enforce security best practices, streamline network segmentation, and maintain compliance—all while optimizing cloud operations.
Check Point CloudGuard seamlessly integrates with AWS (...)
Why Attend?
In the time it takes to drink a coffee, discover how to build a solid business case for the adoption of AI PCs.
Join Louise Quennell (Dell Technologies), Matt Hains (Intel), and Bryan Sutton (Microsoft) for this exclusive microlearning (...)
Vous êtes un établissement de santé et vous devez anticiper la mise en conformité NIS2 dès 2025 ? Vous cherchez une solution efficace, rapide et optimisée pour votre budget ?
Akamai et SFR vous invitent à un webinaire dédié à la (...)
For financial institutions like CMC Markets, resilience means more than compliance - it ensures real-time availability for customers. With DORA now in effect and recurrent threats like DDoS and credential abuse still ever-present, a proactive security strategy is essential.
Join (...)
When downtime means lost revenue, damaged reputation, and broken customer trust, resilience isn’t optional — it’s essential.
In this webinar, Bryan Glick (Computer Weekly) speaks with Richard Meeus (Akamai) about what it takes to build and maintain cyber resilience at (...)
Despite recent spread compression, current all-in yields in the European direct lending market remain attractive when compared to both historical levels and the North American market. At the same time, the asset class continues to offer compelling relative value on (...)
Managing certificates across a small number of web apps might be tolerable in the short term. However, as you scale your F5 solutions to roll out across hundreds or thousands of servers, your simple certificate management becomes a major problem. (...)
The Next Evolution of NGFWs — Defending Against Modern Cyber Threats
Date: June 18
Time: 8:00 AM PT
As hybrid work becomes the norm and IoT devices proliferate across enterprise campuses and branches, cyber threats are becoming more advanced and persistent. Legacy firewalls (...)
When network issues arise, speed and precision are crucial. In this session, we showcase how DX NetOps Topology streamlines contextual triage and troubleshooting, providing actionable insights to identify and resolve network problems quickly. Learn how interactive visualization and deep contextual (...)
As Kubernetes environments grow across clouds and data centers, ensuring consistent security, compliance, and operational policies becomes critical — and increasingly complex.
Join Mirantis and Nirmata to see how open source k0rdent and Kyverno make policy-driven Kubernetes management simple, scalable, and (...)
As cybersecurity standards tighten across the federal supply chain, the Cybersecurity Maturity Model Certification (CMMC) has become a critical framework for protecting Controlled Unclassified Information (CUI). Whether you're a federal contractor, subcontractor, or industry partner, understanding CMMC is essential to (...)
Architecting OpenShift Virtualization on bare metal requires a clear understanding of how infrastructure and design choices impact performance, scalability, and workload flexibility. In this session, Red Hat’s OpenShift Virtualization experts guide partners through the key architectural considerations needed to support (...)
La inteligencia artificial está revolucionando fundamentalmente el proceso de desarrollo de software, introduciendo herramientas y técnicas que mejoran la productividad, la precisión y la innovación de maneras que eran impensables hace apenas unos años.
Estamos presenciando una transformación donde la IA generativa y los modelos de lenguaje grandes agilizan (...)
Deepfakes are no longer a distant concern—they’re an active threat to businesses, governments, and individuals. As deepfake technology grows more sophisticated, security teams face mounting challenges in combating its misuse.
Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security (...)
Deepfakes are no longer a distant concern—they’re an active threat to businesses, governments, and individuals. As deepfake technology grows more sophisticated, security teams face mounting challenges in combating its misuse.
Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security (...)
Earn 1.5 CPE credits on this webinar
Cybersecurity compliance often feels like an expensive obligation, draining time, budgets, and resources - but what if it could be a catalyst for value instead? On this CPE accredited webinar, our panel of experts (...)
Deepfakes are no longer a distant concern—they’re an active threat to businesses, governments, and individuals. As deepfake technology grows more sophisticated, security teams face mounting challenges in combating its misuse.
Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security (...)
Deepfakes are no longer a distant concern—they’re an active threat to businesses, governments, and individuals. As deepfake technology grows more sophisticated, security teams face mounting challenges in combating its misuse.
Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security (...)
Too many teams struggle to turn strategy into action. Product Operations is the missing link that makes it possible. Join Melissa Perri as she explains how Product Operations brings clarity, drives alignment, and accelerates results across product organizations.
What you'll learn:
• (...)
The growing complexity and speed of emerging threats continue to pose a significant challenge for MSSPs striving to deliver outstanding services to their clients.
Save your spot for our live event on June 18 at 11am MT as we explore how (...)
How does your hybrid, multi-cloud strategy measure up?
Join Infoblox as we break down key benchmarks from our Multi-Cloud Maturity Assessment to help you gauge where your organization stands today — and what it will take to stay ahead.
In (...)
In today’s relentless threat landscape, staying sharp isn’t optional; it’s mission-critical. Whether you're leading security strategy or working on the front lines, real-world expertise is what sets exceptional cybersecurity professionals apart.
But traditional training platforms often miss the mark, focusing on (...)
In the evolving landscape of big data, efficient and scalable data lake management is paramount. Traditional table formats like Apache Hive have served well but come with limitations in schema evolution, partitioning flexibility, and transaction support. Apache Iceberg has emerged (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
Las APIs impulsan el mundo moderno. Son los pilares fundamentales de todas las aplicaciones y permiten una comunicación y un intercambio de datos sin fisuras en todo el panorama digital. Sin embargo, esta misma dependencia de las APIs las convierte (...)
La Cadena de Suministro es un sistema integrado que involucra a todas las partes y procesos necesarios para que un producto o servicio llegue desde la obtención de materias primas hasta la entrega final al consumidor.
Esto incluye la planificación, gestión (...)
In the evolving landscape of cybersecurity, integrating AI tools such as Microsoft Copilot and ChatGPT offers promising enhancements for cyber risk management and compliance. This discussion from STRONGER 2024, featuring Dr. Fortune Onwuzuruike, provided an in-depth discussion on the strategic (...)
This year’s DevSecOps report defines a vivid image of organizations’ journey to secure their software development pipelines. It provides intriguing conclusions about operational challenges, AppSec efficiency, and evolving risk exposure amid the rise of AI-assisted development. Did you know that (...)
Join our thought-leadership webinar designed for enterprise IT operations teams and Infrastructure & Operations (I&O) tool buyers. Hear from a leading industry analyst and successful enterprises as they share real-world case studies on overcoming network observability challenges.
With 80% of (...)
This presentation from STRONGER discussed practical tips for building predictive risk models using Python and open-source libraries. Professor Huwyler explored how these models can detect unusual activity and threats in real-time, providing valuable insights to enhance cybersecurity measures. The session (...)
Ce rendez-vous en ligne – Gratuit – sur inscription sera animé par deux experts de la cybersécurité, Damien Bancal, journaliste d’investigation et spécialiste en Cyber intelligence (Zataz.com) et Yaz Bekkar, Senior Solution Architect XDR chez Barracuda.
Au programme : actualités cyber inédites révélées en (...)
Critical infrastructure organizations are prime targets for sophisticated cyber threats. Attackers are leveraging ransomware variants, phishing emails, and wiper malware to disrupt operations and compromise sensitive systems. How can your organization stay ahead?
In this session, you'll gain insights on:
• Emerging (...)
Explore nuestro módulo especializado para el control individual de jamones y paletas mediante precintos identificativos. Cumpla con la Norma del Ibérico, IGP, DOP y ETG del jamón serrano, garantizando calidad y trazabilidad en cada pieza.
This presentation from STRONGER discussed practical tips for building predictive risk models using Python and open-source libraries. Professor Huwyler explored how these models can detect unusual activity and threats in real-time, providing valuable insights to enhance cybersecurity measures. The session (...)
Join us for a critical and timely webinar exploring how the UK’s Online Safety Act, coming into force on July 24th, will reshape the responsibilities of game developers and online platforms. Hosted by Andrew Wailes, CEO of PlaySafe ID, this (...)
Adoptar la autenticación sin contraseñas va más allá de incorporar Passkeys FIDO: requiere una estrategia que sea segura, escalable y sin fricciones para toda tu base de usuarios digitales.
En este webinar, exploraremos los pasos esenciales para diseñar e implementar (...)
Join us for a fresh brew of insight on the next episode of Coffee and Content, where we welcome Manny Silva, author of the newly released book Docs as Tests: A Strategy for Resilient Technical Documentation. Manny will introduce us (...)
Wiz and Check Point have formed a strategic business alliance to deliver end-to-end cloud security and bring increased value to our joint customers.
You're invited to join an interactive session with thought leaders and industry experts as they discuss the unification (...)
Selección de Sotfware
La IA está transformando todas las industrias, incluyendo la forma en que los responsables de la toma de decisiones evalúan y seleccionan software empresarial. En este seminario web Helbert Bello presentará TEC Advisor NOVA, una plataforma impulsada por (...)
Reactive security is no longer enough. Join ESET experts James Rodewald and Charles Everett for an inside look at how ESET’s Managed Detection and Response (MDR) service delivers proactive, 24/7 protection against real-world cyberattacks. You’ll see how our team works (...)
Dashboards are everywhere—but are they actually helping you make better decisions? In this bite-sized episode, Lance Knight explores why most enterprise data fails to inform real outcomes and what it takes to turn information into action. From common pitfalls to (...)
Are you struggling to demonstrate the business value of customer satisfaction? Without clear metrics, it’s difficult to justify investments in improving the customer experience. In this webcast, Jeff Rumburg will explore the ROI of customer satisfaction and how to measure (...)
Tener los procesos de negocio permanentemente alineados al plan estratégico empresarial es vital para que las organizaciones mantengan conectada su operación con sus objetivos tácticos y estratégicos.
Muchas organizaciones creen erróneamente que implementar soluciones de Business Intelligence (BI) y Balanced Scorecard (BSC) es suficiente para lograr la (...)
Join us for an insightful webinar where we break down key compliance standards like PCI, HIPAA, and CIPA, explore industry guidelines such as cyber insurance requirements and NIST frameworks, and uncover how a Zero Trust security framework plays a crucial (...)
It's AI Friday! This week, we unpack the latest AI news and trends, including the top AI use cases for 2025, intriguing new developments from OpenAI, AI in nuclear safety with PG&E (what could possibly go wrong?), novel defenses against (...)
During this training, we'll review how to navigate the different features of Kintone as an End User. This includes running through Portal Home, interacting with the People Feature, using Spaces, and reviewing/adding data in an App.
La agilidad va más allá de herramientas como tableros y tarjetas; es un lenguaje común que conecta equipos en una organización. Promueve la colaboración, autonomía y adaptación rápida frente al cambio.
Los marcos ágiles facilitan la comunicación y alineación, empoderando a (...)
En nuestro próximo webinar de Logística 5.0, nos unimos a Óvtimo, especialistas en estrategia de transporte con más de 20 años de experiencia, para presentar cómo su Método VADEX® utiliza inteligencia tecnológica para anticipar y resolver imprevistos antes de que (...)
This is a great training for anyone who will be a Kintone Administrator because we’ll go through the highlights of each of our admin sections. This will give you a good base as you start to set up Kintone for (...)
Join Alchemer’s CMO Bo Bandy and CFO Jove Oakley for a candid conversation on how to connect customer experience (CX) investments to real financial outcomes.
In this session, Jove shares how his perspective on CX has shifted—from seeing it as (...)
L'intelligence artificielle (IA) transforme la cybersécurité et Rapid7 est à l'avant-garde de l'intégration de l'IA dans sa plateforme. Au cours de cette session, nous examinerons comment l'IA est utilisée pour améliorer les opérations de sécurité, en mettant l'accent sur des (...)
Erhalten Sie praktische Einblicke in die Erfüllung der DORA-Anforderungen bei gleichzeitiger Stärkung Ihrer Cybersicherheit. Erfahren Sie, wie Sie die Einhaltung der Vorschriften in einen strategischen Vorteil umwandeln können - mit praktischen Strategien für digitale Widerstandsfähigkeit, Risiken für Dritte und Reaktion (...)
Recent geopolitical shifts challenge one of the strongest return engines of recent years: US exceptionalism. As World ex-USA equities are experiencing record inflows, this webinar reviews a few fundamental anchor points to guide investors towards finding a representative, transparent and (...)
Join Alchemer’s CMO Bo Bandy and CFO Jove Oakley for a candid conversation on how to connect customer experience (CX) investments to real financial outcomes.
In this session, Jove shares how his perspective on CX has shifted—from seeing it as (...)
AI isn’t coming—it’s here. And in ITSM (IT service management), the difference between adopting it now or later could define who thrives and who gets left behind.
Join industry thought leader Stephen Mann and HCLSoftware’s Varun Nagpal for a power-packed 30-minute (...)
As regulations become increasingly complex, OT organizations must enhance compliance, strengthen security, and adapt to evolving standards. This session will explore key regulations affecting OT asset owners in EMEA, along with the cybersecurity strategies and best practices essential for achieving (...)
Traditional protection isn’t designed to stop these evolving DDoS threats, which can devastate enterprise services, productivity, revenue, and reputation. NETSCOUT Adaptive DDoS Protection uses AI/ML and automation powered by the world’s best threat intelligence so you can stop the latest (...)
How are you continuously monitoring endpoints to block the latest cybersecurity attacks?
Don't miss this informative webinar about Barracuda Managed XDR Endpoint Security and staying ahead of attackers with 24/7 managed cybersecurity, to protect every endpoint in your business from threats (...)
CyberSaint and IBM watsonx are thrilled to introduce the next phase of generative AI with KnightVision. This new capability is a cutting-edge AI tool within the CyberStrong platform that leverages IBM watsonx. KnightVision addresses the critical challenges CISOs face daily (...)
Holiday traffic brings big opportunities - and bigger risks. Just 100ms of added latency can cut sales by 1%, while slowdowns lead to 22% cart abandonment. With nearly half of eCommerce traffic from Google Search, performance issues hurt both sales (...)
Holiday traffic brings big opportunities - and bigger risks. Just 100ms of added latency can cut sales by 1%, while slowdowns lead to 22% cart abandonment. With nearly half of eCommerce traffic from Google Search, performance issues hurt both sales (...)
In our hyper-connected world, email remains the single most targeted channel for cybercriminals. Kaspersky systems blocked nearly 900 million phishing attempts last year – a 26% increase over 2023. Yet many organizations still underestimate the sophistication and volume of attacks (...)
In today’s media-rich world, creative teams are under pressure to deliver high-quality content faster and more efficiently – often from remote locations. But building a truly hybrid workflow that balances performance, scalability and simplicity can be challenging.
Join our upcoming webinar, (...)
Is Your Edge-to-Cloud Data Flow Ready for Next-Gen Autonomous Systems?
Whether you're building advanced autonomous systems in smarter farming, safer mining or transportation, one question remains: Can your edge-to-cloud infrastructure keep pace?
AI-enabled systems require unified edge-cloud connectivity for intelligent, real-time information (...)
In this "If APIs Could Talk" episode, we’ll explore the latest enhancement to Akamai API Security’s code-based discovery capabilities: support for scanning GitHub Enterprise repositories. With this update, API Security can now automatically identify OpenAPI specifications and detect APIs written (...)
s your enterprise prepared for the security, compliance, and data protection risks introduced by generative AI? With over 14,000 tools in use and evolving threats like prompt injection and data exfiltration, unmanaged GenAI usage poses a serious risk to organizations. (...)
In today's unprecedented times, diversity, equity and inclusion is more important than ever. Join us for a discussion with Bobbie Carlton, the founder of Innovation Women and Tom Bechtold, the Digital Event Director at SecureWorld to highlight the importance of (...)
Artificial Intelligence is transforming the landscape of Human Resources, offering innovative solutions for talent acquisition and management. This webinar explores how AI is reshaping HR practices, enhancing efficiency, and driving better outcomes.
Join Ramesh Dontha and guests as they discuss:
(...)
Despite record investment in AI and GenAI in the Customer Experience (CX) space, many organizations are still struggling to move from promise to performance. The technology is here—but meaningful CX transformation remains out of reach for many brands.
But there’s more (...)
The security for AI landscape is constantly evolving, protecting AI as it advances from standalone models to complex agents. In this webinar, we demystify what it means to secure AI models, applications, and agents. Whether you’re building your own model (...)
Join Alchemer’s CMO Bo Bandy and CFO Jove Oakley for a candid conversation on how to connect customer experience (CX) investments to real financial outcomes.
In this session, Jove shares how his perspective on CX has shifted—from seeing it as (...)
Dealing with slow test creation and incomplete coverage? Now you can be among the first to see new, simple ways you can use agentic AI to your advantage.
Join us as we unveil brand-new Agentic AI-powered capabilities, designed to transform how (...)
Service accounts are being used as token-based authentication within Ansible and its services interacting with Red Hat’s Hybrid Cloud Console. In this webinar, we’ll go over what service accounts are, how to make one, and the areas where Ansible Automation (...)
The State of SaaS Security: Trends and Insights for 2025-26, commissioned by Valence in partnership with the Cloud Security Alliance, reveals a critical inflection point in SaaS security. While 86% of organizations now prioritize SaaS security with 76% increasing budgets, (...)
Traditional protection isn’t designed to stop these evolving DDoS threats, which can devastate enterprise services, productivity, revenue, and reputation. NETSCOUT Adaptive DDoS Protection uses AI/ML and automation powered by the world’s best threat intelligence so you can stop the latest (...)
Object storage has come a long way from its origins in backup and archive. The use of object storage for unstructured data is well known but high-performance All-Flash storage systems from Supermicro along with new optimized storage protocols make (...)
As cloud adoption surges, so does the speed and sophistication of attacks. Traditional static detection and response can’t keep up in today’s fast-moving, multi-cloud environments.
Join Palo Alto Networks and ISC2 June 24, 2025 at 1:00 p.m. Eastern/10:00 a.m. (...)
Application security teams face an impossible task: securing ever-growing codebases, pipelines, and technologies with limited resources. Security Champions offer a scalable, sustainable way to extend security reach—by embedding security-aware developers directly into engineering teams. In this session, we’ll explore how (...)
Even with all the excitement, attention and investment, AI is drawing a mix of Champions, Skeptics and Alarmists. So often we hear about ‘the next inflection point’. How can we be confident that AI truly is an inflection point, requiring (...)
As Kubernetes becomes the backbone of cloud-native infrastructure, misconfigurations and control plane exposures can quickly escalate from security issues to compliance failures—with real business consequences. Failed audits, regulatory fines, delayed product releases, and lost customer trust are just the beginning.
In (...)
During this session, Richard Stiennon, industry analyst & author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM).
The conversation peels back the layers of hidden vulnerabilities and misconfigurations (...)
CyberSaint and IBM watsonx are thrilled to introduce the next phase of generative AI with KnightVision. This new capability is a cutting-edge AI tool within the CyberStrong platform that leverages IBM watsonx. KnightVision addresses the critical challenges CISOs face daily (...)
Zero Trust isn’t just for enterprise level businesses—it’s a powerful, practical security model that any organization can adopt. In this webinar, we’ll break down how small and mid-sized businesses can start their Zero Trust journey today, without overwhelming resources or (...)
Despite all the technological advancements, human factor remains one of the most significant vulnerabilities – as the evolution of the threat landscape is less about sophisticated code and more about ingenious scenarios. The problem is even more acute as there (...)
Data is the fuel that delivers sustained business growth — uncovering new business opportunities, improving customer and employee experiences, and optimising business processes.
But how do you spotlight dark pockets of data to enhance performance without compromising the security and reliability (...)
Der von Donald Trump ausgerufene „Tag der Freiheit“ brachte den US-Amerikanern und den Rest der Welt vor allem eines: Unsicherheit! Entsprechend viel Diskussionsbedarf gibt es seit dem zur weiteren Entwicklung an den Märkten, insbesondere auch auf der Fixed Income Seite: (...)
Nethaniel Ribco Cyber Threat Intelligence Team Leader at CyberProof, will walk through how CyberProof’s Cyber Threat Intelligence team delivers its Tailored Threat Intelligence service. He’ll explain the process of collecting, researching, and analyzing intelligence specific to a customer’s digital environment—highlighting (...)
During this session, Richard Stiennon, industry analyst & author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM).
The conversation peels back the layers of hidden vulnerabilities and misconfigurations (...)
As generative AI evolves, so do the threats. In this special half-hour episode of The SIG Download, host Tricia Howard is joined by Akamai’s Senior Security Researcher Ofir Shen to expose how shadow AI and malicious AI are being weaponized (...)
As cyber threats grow, fostering employee awareness and preparedness becomes crucial for overall security.
In this session, Javvad Malik, Lead Security Awareness Advocate at KnowBe4, will delve into the ethical responsibility of organisations to ensure their employees are cyber resilient. He (...)
Zero Trust Architecture replaces perimeter-based defenses with continuous verification, guaranteeing every access request is authenticated and authorized.
Considering our current multicloud operational workflows, this approach helps shrink attack surfaces, contain threats in real time, and automate compliance without slowing (...)
For ten years, WD Purple® has been the trusted name in surveillance storage.
Join us for a special webinar to celebrate together the 10th anniversary of WD Purple®.
We have prepared a special presentation for you, including a thank (...)
À medida que os avanços da IA se consolidam no mercado, os riscos de cibersegurança aumentam. A visibilidade da Akamai sobre o tráfego global e ataques web oferece insights únicos sobre as ameaças mais recentes. O último relatório de pesquisa (...)
How to: Configure Saner Agents in IT network
Here’s a different way on how you can configure Saner agents in your network
Watch the webinar to know:
- Step-by-step process of configuring Saner agents
- Significance of agent configuration
Join this next session in the Google Threat Intelligence Use Cases Series where our experts will provide a deep dive into the private scanning module. We will explore its core functionality and use cases and share practical examples on how (...)
Fraud is evolving at a rapid pace in 2025. From generative AI to deepfakes to tools and tips available off the shelf online, it’s never been more sophisticated or accessible. This puts both businesses and consumers at increased risk. Businesses (...)
Creating clear, consistent internal documentation shouldn’t require heroic effort—or a full-time editor. In this episode of The Content Wrangler, we’ll explore how Congree’s hybrid approach—combining generative AI, intelligent linguistic checking, and Retrieval-Augmented Generation (RAG)—can help contributors write better content, faster.
Thiemo (...)
As AI has become readily accessible and widely available, the number of insidious cyber threats has also increased.
Attend our webinar, AI-driven threats are complex but securing your enterprise shouldn’t be, to see how you can effectively combat (...)
Not all fiber optic cabling is created equal—and choosing the right type can make or break your network’s performance. In this engaging and interactive webcast, we’ll cut through the confusion surrounding single mode and multimode fiber, plus explore how fiber (...)
How can you ensure maximum value and efficiency while migrating to the public cloud? Join us for an exclusive webinar where we unpack IDC’s latest research (e.g. IDC White Paper, The Business Value of Ubuntu on Microsoft Azure) on the (...)
Join us for an exclusive webcast on the key findings from the 2025 LevelBlue Futures™ Report, developed in partnership with FT Longitude. Based on a global survey of 1,500 C-suite and senior executives from industries such as healthcare, financial services, (...)
In today's complex regulatory environment, adhering to various cybersecurity and data privacy regulations is a challenging yet essential task for organizations. Join us for an insightful round table discussion where industry experts from Segura will delve into identity-centric strategies to (...)
Third-party cyber risk isn’t slowing down, and neither is the complexity. In the wake of high-profile incidents like CrowdStrike and Delta, third-party risk management (TPRM) has taken center stage. Gartner’s 2025 Market Guide for TPRM Technology Solutions highlights the core (...)
During this session, Richard Stiennon, industry analyst & author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM).
The conversation peels back the layers of hidden vulnerabilities and misconfigurations (...)
Join the Verizon Threat Research Advisory Center for this month’s exclusive intelligence briefing featuring the creators of the Verizon Data Breach Investigations Report (DBIR). Get a behind-the-scenes look at how the industry’s most comprehensive cybersecurity report is put together—directly from (...)
Earn 1.5 CPE credits on this webinar
Managing governance, risk, and compliance (GRC) in a fast-paced world can feel like chasing a moving target, and AI might just be the edge you need to keep up. On this CPE accredited webinar (...)
Gone are the days when audit preparation was a once-a-year exercise. With expanding regulations, hybrid environments, and pressure to prove compliance at any moment, organizations face an uncomfortable truth: gaps exist—and they’re growing.
In this Cyber Risk Series: Audit & Compliance (...)
Your strategy is solid — so why aren’t you seeing results?
Seven out of ten digital investments fail to deliver value, leaving many tech leaders frustrated by the strategy-execution gap. As organizations navigate diverse investment types—from product-centric models to scaled (...)
La Cadena de Suministro es un sistema integrado que involucra a todas las partes y procesos necesarios para que un producto o servicio llegue desde la obtención de materias primas hasta la entrega final al consumidor.
Esto incluye la planificación, gestión (...)
Developing a solid CX strategy is significantly harder than it once was. When do AI agents trump human agents? In a digital-first world, does voice still matter? And how important is platform integration to unlock new levels of agility and (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through building an app and a few features to set up to prepare it for use. This will give you a good base (...)
Join us for an exclusive webinar featuring a real-world success story from one of our customers who transformed their security posture through microsegmentation. In this live session, you’ll hear firsthand from Network Security Architect, Quynn Kars, and Network Security (...)
With Artificial intelligence at the peak of its hype cycle, how do you know what can be operationalised in your organisation and what should just be left on the hype pile?
While AI initiatives are getting the attention of (...)
Software is essential in everyday products like cars, medical devices, airplanes, and IoT devices. Bugs and security flaws can have serious impacts on safety, the environment, and your reputation. As AI speeds up software development, it's more important than ever (...)
This webinar will be delivered in German.
Im Vordergrund des Webinars stehen die öffentlichen komplexen IT Infrastrukturen, in der viele kritische Applikation und Fachverfahren betrieben werden müssen. Der öffentliche Sektor ist einer hohen Personalknappheit und knappen Budgets ausgesetzt, Um einen störungsfreien (...)
Scopri il nuovo software Arcserve Unified Data Protection (UDP)! Offre una soluzione di protezione dati all-in-one che ti aiuta a conservare, eseguire il backup e ripristinare i tuoi dati in modo completo. Arcserve UDP 10 è una soluzione di protezione (...)
¡Descubra el nuevo software Arcserve Unified Data Protection (UDP)! Ofrece una solución integral de protección de datos que le ayudará a conservar, respaldar y restaurar sus datos de forma integral.
La nueva versión de Arcserve UDP 10 es una solución de (...)
Découvrez le nouveau logiciel Arcserve Unified Data Protection (UDP) ! Il offre une solution de protection des données tout-en-un qui vous aide à conserver, sauvegarder et restaurer vos données de manière complète.
Arcserve UDP 10 est une solution de protection des (...)
Managing both external and internal attack surfaces is crucial for robust cybersecurity to proactively identify and fix vulnerabilities before attackers can exploit them.
This webinar focuses on continuous attack surface monitoring and management solutions.
AI coding assistants are transforming business, with adoption driven both by developers seeking help and by executives seeking savings. But this evolution should not come at the cost of enterprise security or valuable intellectual property. This session explores the most (...)
Discover how Arcserve Unified Data Protection (UDP) delivers an all-in-one data protection solution that helps you comprehensively retain, back up, and restore your data.
Arcserve UDP 10 is a reliable, integrated, user-friendly data protection solution that ensures data security and business (...)
As geopolitical tensions persist and security priorities shift, Europe is undergoing a defence renaissance, creating a compelling new opportunity set for investors. This webinar will explore how professional investors and ETF issuers can access the next generation of security innovation (...)
Institutional credit investing is being reshaped by shifting liquidity dynamics, borrower behaviours, regulatory pressures and the blurring of public and private markets. These changes are ushering in a new era of investment expansion and vehicle innovation. Learn how institutions are (...)
Scaling modern applications across EMEA requires more than ticketing—it demands a smarter, risk-driven approach to container security.
Traditional vulnerability tools can’t keep up with the speed and scale of today’s dynamic cloud-native environments. Containers spin up and down in seconds, creating (...)
Presented by Robert Martin
Senior Software and Supply Chain Assurance Prin. Eng.
Cost Cutting Solutions and Innovation Dept.
Cyber Solutions Innovation Center
MITRE Labs
In this exclusive webinar, expert panellists will examine the methodology for evaluating a cyber extortion demand, and how sophisticated businesses should decide where to make investments during incident response.
Cyber readiness requires anticipating the risks to revenue and potential litigation (...)
Join Steve Wilson as he examines two real-world case studies-the British Library and Lapsus$ attacks alongside original research to reveal critical gaps in cybersecurity readiness. Discover how AI and machine learning can address these vulnerabilities, empowering teams to become more (...)
Building on the principle that "with great power comes great responsibility," this webinar focuses on empowering your AI deployments with robust data protection. Discover how confidential computing and confidential accelerators provide an unparalleled shield for sensitive data and algorithms, ensuring (...)
Analizamos qué es BOAT. El nuevo concepto acuñado por Gartner que define las Tecnologías de Automatización y Orquestación Empresarial. La última innovación para lograr una gestión empresarial más ágil y conectada.
As organizations adopt Agentic AI to automate increasingly complex tasks, ensuring secure and trustworthy interactions between AI agents and data systems is more critical than ever. But what does securing Agentic AI look like in the real world?
Join Kobi Gol, (...)
Whether you call them hackers, security researchers, white-hats, or any other name, the same question always comes up—can I actually trust them?
Just like any career, not all hackers are the same. In this webinar, Beau Woods, Cyber Safety Advocate (...)
Before access is granted, trust must be established. However, static identity records and manual checks aren’t enough to prevent impersonation, insider fraud, or credential misuse.
Whether you’re modernizing your onboarding workflows, strengthening zero trust initiatives, or preparing for compliance mandates, this (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Agentic AI is an emergent and disruptive paradigm beyond generative AI that carries great promise and great risk. With generative AI, a large language model (LLM) generates content as the result of a prompt. With agentic AI, the language model (...)
Zero Trust is widely discussed but often misunderstood — and even more rarely implemented effectively. This session offers a practical, experience-driven perspective on how organizations can move beyond Zero Trust theory and begin executing with purpose. Through the lens (...)
For years, fears of leaks, unpredictable performance, and runaway costs kept media workflows tethered to on-prem infrastructure. As production teams grow more decentralized and the adoption of cloud-based tools increase, the evolution of cloud storage provides media professionals much to (...)
Join ScienceLogic and Carlos Casanova, lead analyst of The Forrester Wave: AIOps Q2 2025 for an exclusive deep dive into how Agentic AI is transforming the future of IT operations. In this session, we’ll explore how autonomous agents are enabling (...)
Featuring ServeTheHome’s Patrick Kennedy, this webcast will dive deep into Supermicro’s broad range of Enterprise AI solutions to explore how organizations can implement AI for almost any industry and environment. Product experts from NVIDIA and Supermicro will also be on (...)
In today’s privacy-first world, protecting sensitive customer data is non-negotiable. Join us for a live webinar to learn how Tealium Functions empowers developers and data teams to detect and hash personally identifiable information (PII) — like email addresses — in (...)
There are three regulations that every software development team should be aware of: NIST Secure Software Development Framework (SSDF), the EU Cyber Resilience Act (CRA), and the FDA Cybersecurity Requirements for Medical Devices. What’s your regulation IQ?
Join this webinar (...)
"De los valores al compromiso real"
Un taller dinámico, vivencial y provocador que rompe con las viejas fórmulas de cambio cultural para dar paso a una transformación ágil, visual y conectada con lo humano.
A través del juego La Diana de los (...)
The webinar will discuss ISAC use cases, their requirements, key performance indicators, and deployment scenarios following the recent publication of ETSI ISAC ISG group report ISC-001, and in light of the ongoing work in 3GPP SA1 towards defining 6G use (...)
En esta charla abordaremos el concepto de "Seguridad Psicológica" desde sus principios y complementando con una guía de autoanálisis para identificar en qué nivel se encuentran nuestros equipos y organizaciones.
La Seguridad Psicológica no es algo blanco o negro, no es (...)
Join us for a live Q&A where our panel of experts will answer your questions about CISSP before you sit for the exam. We’ll go over certification requirements, the domains, self-study resources, training strategies, career paths and more to help (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
ETSI’s Industry Specification Group (ISG) THz provides the opportunity for ETSI members to share their pre-standardization efforts on THz technology resulting from various collaborative research projects and being extended with relevant global initiatives.
Two more deliverables of this group are available (...)
Where is SASE headed in 2025? Join us for a live briefing with GigaOm and Versa Networks to explore the latest insights from the newly released GigaOm Radar for SASE.
As organizations converge networking and security into a unified (...)
Your sales team just closed a multi-year deal – congratulations! But how does the office of finance bill for it? How (and when) should they be recognizing the revenue? Uh oh…
If you’re struggling with how to organize multi-year deals into (...)
Compartiré mi visión y aportaré herramientas para gestionar el cambio de una manera efectiva. Olvídate del caos y descubre cómo:
Mantener la calma en pleno proceso de cambio.
Conseguir que tu equipo vea el cambio como una aventura, no como una amenaza.
Convertir (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
Join our webcast on SAP LeanIX calculations, a feature that enhances enterprise architecture data. Discover how calculations let you implement custom logic directly within your workspace, eliminating external tools and manual updates.
- Automate data population across fact sheets using your (...)
As digital transformation accelerates across transportation and logistics, IT leaders are confronting a surge in complexity, cyber threats, and the demand for resilient global connectivity. The new Aryaka survey reveals how industry professionals are prioritizing performance, security, and simplification in (...)
In a recent study, 80% of respondents said they would pay more for the brands or products they love. How do people feel about your brand?
Understanding how your brand is perceived and its overall health can drive business (...)
GenAI is transforming how we build and use applications – but it’s also creating new opportunities for attackers. As organizations rush to deploy AI-powered chatbots, copilots, and customer interfaces, they’re expanding their attack surface with risks traditional AppSec tools can’t (...)
In a recent study, 80% of respondents said they would pay more for the brands or products they love. How do people feel about your brand?
Understanding how your brand is perceived and its overall health can drive business (...)
In Episode 3 in our series "Navigating NIS2 Compliance with Fortinet SecOps" we propose a holistic approach to the alignment of an organization’s people, processes and technology within the appropriate risk framework and map each requirement to suggested Fortinet solutions (...)
A powerful alliance is formed when CISOs and boards unite, paving the way for enhanced digital resilience. However, differences in how to prioritize and measure the impact of cybersecurity can create misalignment. Join to explore the top 5 gaps between (...)
Are you struggling to balance cloud sovereignty with scalability?
Is a lack of cloud skills slowing your digital transformation and weakening your customer experience?
Join Rackspace Technology’s live panel webinar on Tuesday, June 3 at 11:00 AM BST/ 2:00 PM GST (...)
Cybercriminals have harnessed artificial intelligence (AI) to effectively target organisations, worm their way into IT environments, and trick employees.
The sophistication and variety of generative AI-powered cyberthreats is truly mind-boggling, with most MSPs still figuring out how to master this newest (...)
GenAI is transforming how we build and use applications – but it’s also creating new opportunities for attackers. As organizations rush to deploy AI-powered chatbots, copilots, and customer interfaces, they’re expanding their attack surface with risks traditional AppSec tools can’t (...)
From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer enough. Organizations need to anticipate threats and build resilience into their systems.
CISOs and security leaders (...)
How can organizations ensure that critical data remains protected and accessible - potentially forever?
Join us to explore Quantum’s Forever Archive approach: a sustainable, scalable solution for the long-term storage and preservation of essential business data - data that’s not just (...)
Join Accenture, Credera, and Tealium for a dynamic discussion on how businesses are laying the groundwork for AI success. The conversation will focus on building a strong data foundation, achieving data readiness, enabling real-time orchestration, and looking ahead to the (...)
To succeed as a CISO in 2025, you first need guts and luck. This year is poised to bring huge disruption. Unless you have been involved in the design, delivery, direction and drivers for an organization’s technology infrastructure, are supported (...)
In this Under the Hood session, we will explore all of the available Private Clouds supported by Check Point's CloudGuard Network Security(aka Quantum Firewalls in the Cloud).
We will discuss best practices, available architectures, licensing, quick demo, and much much more. (...)
In a recent study, 80% of respondents said they would pay more for the brands or products they love. How do people feel about your brand?
Understanding how your brand is perceived and its overall health can drive business (...)
Watch this webinar to learn about the critical issues and strategic considerations for moving from traditional data centers to cloud solutions. The discussion focused on the impact on patient care and the stifling of innovation if modernization is neglected, pointing (...)
GenAI is transforming how we build and use applications – but it’s also creating new opportunities for attackers. As organizations rush to deploy AI-powered chatbots, copilots, and customer interfaces, they’re expanding their attack surface with risks traditional AppSec tools can’t (...)
As organizations look to scale and meet compliance requirements, many are re-evaluating how they grant access to corporate data and applications. In the journey to zero trust, determining the right tools for your organization is just half the battle. It (...)
Maybe you’ve heard? There’s a new Red Hat Enterprise Linux in Town! What are the new features? What’s going away? What do I need to know about this new release?
Live event not at the best time (...)
Traditional penetration tests often miss the mark, failing to replicate the real-world tactics of today's sophisticated threat actors. In this session, Alex Holden, CISO of Hold Security, cuts through the noise and reveals how to transform your pen testing program (...)
Join F5 for an insightful webinar on how F5 BIG-IP Next for Kubernetes, deployed on NVIDIA BlueField-3 DPUs, transforms AI application performance and data center resource management. This session will explore the latest technical innovations that enhance networking, security, and (...)
With nearly half of organizations facing fines from regulatory noncompliance and one-third unable to recover from ransomware attacks, the need for resilient data protection has never been greater.
Arcserve Cyber Resilient Storage helps you stay steps ahead – with immutable backups, (...)
The transformative potential of AI demands robust security and Google Cloud is uniquely positioned to help organizations accelerate their AI journey by providing capabilities to holistically manage risk across the AI lifecycle. Join this session to learn about how you (...)
It takes valuable time to sift through the ever-increasing number of cyber threats and stop those likely to result in a breach. The faster your team can resolve that unending flow of incidents, the better.
Expert security teams are just one (...)
Traditional penetration tests often miss the mark, failing to replicate the real-world tactics of today's sophisticated threat actors. In this session, Alex Holden, CISO of Hold Security, cuts through the noise and reveals how to transform your pen testing program (...)
As the world discusses ChatGPT-3 and its impressive capabilities, the business community is concerned about the AI’s potential to change the game for cyber criminals and wreak havoc in the world of defense organizations. Should businesses soon expect a wave (...)
In the ever-evolving landscape of DevOps, the paradigm is now shifting - where security is taking the central stage. With vast surface areas including containers, cloud, repositories and third-party components, cyber threats became more prominent than ever before in DevOps.
This (...)
The way employees communicate and collaborate is constantly evolving, and so too are the security threats they face. The rise of generative AI adds a new layer of complexity, requiring CISOs to proactively address the risks of data loss and (...)
While BPMN is often associated with automation and execution, its true potential lies far beyond IT implementation. Join us for an insightful webinar exploring the powerful role of BPMN in conceptual process modeling—an essential practice for achieving clarity, alignment, and (...)
As the U.S. political landscape shifts under a new administration, UK and EU investors face a fresh set of opportunities and challenges. This webcast will provide a broader analysis of how regulatory, legal, and policy developments are shaping shareholder (...)
Are you updating or reassessing your email security system to stay ahead in the ever-evolving threat landscape?
To help you make informed decisions to protect your organisation, our cybersecurity experts discuss:
• The findings of the 2024 Gartner® Magic Quadrant™ for Email (...)
Join the authors of the M-Trends 2025 Special Report for an insightful webinar series on the latest global cyber trends and attacker tactics. Based on Mandiant's frontline incident response and threat intelligence from January 1, 2024, to December 31, 2024, (...)
Is your organization struggling to keep pace with today’s complex cyber risk landscape? Fragmented security tools, overwhelming risk findings, and limited visibility can make it difficult to prioritize and remediate the threats that matter most to your business. The Qualys (...)
This webinar will explore the benefits of CXL memory sharing and how CXL shared memory will improve performance for Big Data Analytics, AI, and more. CXL Consortium members Astera Labs, Micron Technology, UnfabriX, and XConn Technologies will share real-world usage (...)
The emergence of quantum computing presents a unique challenge to the cybersecurity landscape. This transformative technology poses significant risks to current encryption methods, particularly for asymmetric cryptography systems like RSA and Diffie-Hellman, which secure most network communications today.
Organizations face a (...)
With regulations tightening and cryptographic threats evolving, enterprises can no longer rely on static encryption strategies. The shift toward crypto agility is now a business imperative, ensuring organizations can seamlessly adapt to new cryptographic standards and regulatory requirements across the (...)
In this session, we explore the capabilities of DX NetOps Topology, now generally available (GA) in the latest 24.3.9 release. Learn how topology service enables seamless visibility, automated network mapping, and real-time insights into your entire network infrastructure, helping you (...)
Earn 1.5 CPE credits on this webinar
As cloud adoption accelerates, managing vendor risks is more crucial than ever. Join our panel discussion
webinar with Paul McKay, Principal Analyst at Forrester, and subject matter experts as we explore strategies for
overseeing vendor relationships (...)
This episode of “Shift + ALT + Disrupt” will feature a one-on-one interview with a subject matter expert, and our Digital Transformation Roundtable.
Speakers: TBA
Every minute of business disruption costs organizations millions – and cyber attackers know it. As threat actors weaponize AI and exploit zero-day vulnerabilities with unprecedented speed, the difference between survival and failure often comes down to how quickly you can (...)
Join our comprehensive 60-minute webinar designed to empower IT professionals with the expertise to manage and secure
endpoints using Netwrix Solutions. Dive deep into the technical landscape with a live demonstration that showcases how
Netwrix can streamline your endpoint management processes. Additionally, (...)
Bots evolve to bypass even sophisticated bot management controls, as highlighted in a recent F5 Labs report. In this webinar, F5 Labs researchers will demonstrate the persistent bot problem in cybersecurity by analyzing over 200 billion web and API transactions (...)
Join us as we explore AI innovations in Microsoft 365 that boost security and performance. Learn how AI can
transform your Microsoft environment with enhanced security and efficiency and listen in as our expert
speakers share strategies and best practices to help (...)
Les données sensibles sont partout, et les attaquants le savent. Qu'il s'agisse d'un stockage en nuage mal configuré ou d'identités trop autorisées, l'exposition des données est devenue l'un des vecteurs de risque les plus urgents pour les organisations modernes. Mais (...)
A più di un anno dall'implementazione di requisiti più severi per chi spedisce messaggi di posta elettronica da parte di Google e Yahoo, l'adozione del protocollo DMARC è aumentata, e per una buona ragione. I criminali informatici stanno costantemente evolvendo (...)
- Impact from a global perspective: opportunities in an era of uncertainty – Hari Balkrishna of T. Rowe Price
- Managing and measuring portfolio impact outcomes in a time of mounting demands on sustainable funds Caroline Brady of Net Purpose
- Investing (...)
Industrial environments once built to operate in isolated networks are now connected to the internet, exposing them to all the threats that plague IT networks. While point products can appear attractive as you tackle the security challenge of the moment, (...)
Recent shifts in global data regulations have prompted European organizations to re-evaluate their identity and access management strategies. As identity sits at the core of both security and compliance, questions around where platforms are hosted, how data is handled, and (...)
A lot can be understood about cyber-risk and its probabilities from an often-overlooked source: cyber insurance data. This data offers visibility into the frequency and types of cyberattacks that organisations face, as well as the financial implications of those incidents.
Analysing (...)
CISOs must ensure their organizations comply with various cybersecurity regulations and industry standards. Each industry has its own hodgepodge of requirements and states are beginning to roll out their own regulatory mandates. Would adopting a risk management framework help you (...)
Más de un año después de que Google y Yahoo implementaran requisitos de remitente más estrictos, la adopción de DMARC se ha disparado, y con razón. Los ciberdelincuentes evolucionan constantemente sus tácticas, utilizando la suplantación de dominio para suplantar la (...)
Participez à notre webinaire :
Les dernières tendances en matière d'usurpation de domaine et comment les attaquants exploitent les failles de sécurité des e-mails ;
Comment DMARC prévient les attaques par usurpation d'identité et protège votre marque ;
Pourquoi les organisations de toutes (...)
In this topical webinar we will explore the history and background to President Trump’s tariff policies. We will consider the latest position and how tariffs are impacting on markets, consumer sentiment and trade. Finally, we’ll outline how asset managers are (...)
In today's complex threat landscape, anticipating and neutralizing cyberattacks is essential. Google Threat Intelligence provides the visibility and insight needed to proactively defend against emerging threats and mitigate operational risk.
Join our Google Threat Intelligence subject matter experts for an informative (...)
As organizations increasingly adopt multi-cloud and hybrid cloud architectures, ensuring consistent application performance, availability, and scalability across diverse environments becomes a critical challenge. Traditional load balancing solutions often fall short when stretched across multiple cloud providers or integrated with on-premise (...)
Adotar a autenticação sem senha vai além da adoção de FIDO Passkeys — trata-se de construir uma estratégia de autenticação segura, fluida e escalável para toda a sua população digital de usuários.
Neste webinar, apresentaremos as etapas essenciais para (...)
The government has just published its proposals around surplus release for DB pension schemes. In this webinar, we will discuss the implications of these proposals on pension scheme long-term objectives and investment strategy. In particular we will focus on “run-on”, (...)
Integrating global simulation and training systems is more complex than ever. Legacy simulators rely on varied and often incompatible standards for data, voice and video, while modern systems demand cloud-based, distributed architectures and robust security. When you factor in the (...)
Abordar un proyecto de Automatización y Transformación Digital, con el tradicional levantamiento “As-Is” de Procesos es el PEOR enfoque que se puede aplicar.
¿Porqué ocurre esto en la amplia mayoría de empresas? Porque siguen ancladas en la Gestión "tradicional (antigua)" de procesos.
Los Modelos Lógicos Disruptivos (MLD) son modelos detallados de procesos que impulsan de (...)
Mergers and acquisitions can fuel growth—but they also create prime opportunities for cyber threats. Financial services organizations must act fast to secure newly acquired entities, maintain compliance, and prevent cyber risks from jeopardizing the deal.
In this webinar, security leaders will (...)
Most organizations only start thinking about the security of their large language models (LLMs) once the model is already developed and deployed. However, this reactive approach often leads to costly retrofitting, unexpected vulnerabilities, and missed opportunities to build security in (...)
Ready to accelerate your Red Hat expertise and drive success? Join our webinar to explore the Red Hat Training Portal - your central hub for credentials, sales plays, technical content, and the latest updates to help you win in the (...)
In this session, you will learn how to:
- Integrate back-end order systems to automate fulfillment.
- Eliminate manual processes.
- Satisfy your customers with a consistent UX.
Join Hummingbirds AI CEO for a transformative session on how edge-based authentication is reshaping security while creating unprecedented business opportunities for Intel partners.
The cybersecurity landscape is at a critical inflection point. Despite billions invested in protection, 80% of breaches still (...)
As artificial intelligence transforms the enterprise landscape, the foundation of digital trust is being put to the test. With AI-driven automation, machine-to-machine communication, and deepfake threats on the rise, enterprise leaders are rethinking how they build and maintain digital trust. (...)
Featuring experts from Supermicro and AMD, join our webinar where we will highlight our latest solution ideal for cloud hosting providers, edge computing, content delivery networks, and online gaming. Discover a powerful balance of performance, density, scalability and affordability.
We'll (...)
Announced in May 2025, Backblaze B2 Overdrive delivers terabit-speed at exabyte scale with pricing starting at $15/TB/month, including unlimited free egress. In this session we’ll take you on a deep dive into B2 Overdrive’s architecture, explaining how B2 Overdrive scales (...)
Cloud Storage Security’s internal threat laboratory, Casmer Labs, has been hard at work discovering and identifying the most current and pressing threats to organizations that operate in the cloud.
In Q1 of 2025, botnet malware dominated the charts as the most (...)
Join Microsoft and Qualys for a strategic session unveiling our latest integration: full support for Azure Linux—Microsoft’s attested and signed OS purpose-built for secure, cloud-native workloads on Azure Kubernetes Service (AKS).
Discover how Azure Linux, together with the Azure Operations Center, (...)
Securing your software supply chain begins with knowing what’s in your code. With AI-generated code and ubiquitous open source software use, it’s never been more critical to understand what risks your software may contain. In fact, last year alone we (...)
Join us for an informative webinar on migrating from VMware to Nutanix with the help of F5 BIG-IP. Industry experts will cover critical steps, best practices, and technical nuances for a successful migration.
As organizations seek efficiency and cost-effectiveness, many are (...)
In a rapidly evolving business landscape, organisations must continuously adapt and refine their strategies if they are going to remain competitive, or even survive. Data is a fundamental enabler of this organisational agility, but only when adaptability has been built (...)
La Autoridad Portuaria de la Bahía de Algeciras (APBA) ha instalado cámaras térmicas en las zonas de mayor tránsito de pasajeros del puerto para controlar la temperatura corporal de los pasajeros sin necesidad de pararles. ... Leer más ►
Publicamos grabación de webinar que tuvo lugar el pasado 28/03/2019 por el CIO del Grupo de Medios de Comunicación español Vocento Jorge Oteo en el que explica su visión de la Ciberseguridad hoy.
... Leer más ►