Hi [[ session.user.profile.firstName ]]

Energy

  • Making Stopping Phishing Your #1 Priority
    Making Stopping Phishing Your #1 Priority
    George Anderson, Director of Product Marketing, Webroot Recorded: Jul 16 2019 54 mins
    Phishing is flying under most organisations radar. Yet more than nine of 10 successful security breaches start with a phish.

    Phishing takes many forms and is constantly adapting and morphing to become harder to detect and therefore harder to stop. We used to talk about polymorphic malware, but we now live in the age of polymorphic phishing.

    This webinar looks at the real threat that poses and defenses you can use to mitigate its effects on profitability.
  • Where's the Market? A guide to Wholesale Energy Prices
    Where's the Market? A guide to Wholesale Energy Prices
    Tim Partridge (DB Group (Europe) Ltd.), Georgina Penfold (ICON) Recorded: Jul 15 2019 61 mins
    We all know the energy markets are volatile, but as we use the quieter summer months to refresh and update our procurement strategy ahead of the busy winter period, what should we be aware of?

    Will the stricken oil tanker in the Gulf of Oman create movement in the oil markets? Will the long-term weather forecast have a chilling effect on winter power prices?

    Tune into this webinar, and we'll explain the bulls and bears in the markets right now, then explain how the markets work as we watch the Market Making Obligation trades come in at 10:30.

    Don't know what that means? Join us and you soon will.

    This webinar is offered by DB Group to help inform and update ICON members and other business energy consumers; we're very sorry but other brokers will be asked not to dial in on this occasion
  • Digital Oilfield Wellsite Automation – What You Need to Know Now
    Digital Oilfield Wellsite Automation – What You Need to Know Now
    Chirag Rathi, Consulting Director, Energy & Environment, Frost & Sullivan Recorded: Jul 11 2019 29 mins
    The Oil & Gas industry is going through a costly war, and the weapon of choice is innovation for all operators. Wellsite operation is a key area of CAPEX and OPEX and also one of the most workforce-intensive. However, wellsite operations are quickly evolving as operators embrace the “digital oilfield age.” New technologies such as the Internet of Things/Internet of Everything, predictive analytics, cloud, and profit insights from Big Data are provided operational efficiency opportunities but offer a new set of challenges as well.

    Key Takeaways:

    • Gain insight into the top operational pain points and how they are driving investment priorities.
    • Learn about process control technology advances, including surveillance, analysis, and optimization, and how the Oil & Gas industry can benefit
    • Identify innovation that can easily be leveraged to improve wellsite automation
  • The Top Cyber Threats Today and How to Protect against Them
    The Top Cyber Threats Today and How to Protect against Them
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Jul 9 2019 49 mins
    The year 2018 and the first half of 2019 saw a significant number of major events showcasing cybercriminal innovation. We saw cryptojacking and botnets reach their most widespread, ransomware become more targeted, and phishing attacks transition their focus from financial to tech targets.

    Webroot believes it's possible to effectively protect businesses and clients, but only by understanding the adversary and the techniques they use.

    In this webinar, Webroot threat analyst Tyler Moffitt will offer insights into prevailing malware trends and tactics, and discuss how implementing a layered security strategy can help you protect your clients from multi-pronged attacks.

    We hope you can join us for this live, educational session.
  • Emerging Technologies & IoT: How AI, AR and Blockchain Are Shaping The Future
    Emerging Technologies & IoT: How AI, AR and Blockchain Are Shaping The Future
    Ed Maguire, Principal Partner, Momenta Partners Recorded: Jul 5 2019 57 mins
    When it comes to innovation, we've arguably seen more technological advancements over the last ten years than at any other point in time. Technology as we know it is changing before our eyes. We see the merging of the digital and physical worlds through technologies such as augmented reality; artificial intelligence enables computers to think faster than humans, and blockchain technology is considered by many to be the greatest technological innovation since the internet.

    More importantly, we're not only seeing new technologies but the convergence and intersection of multiple technologies as they extend and create new capabilities through their collaboration. The era of combinatorial innovation is upon us, and the combined impact of augmented reality, artificial intelligence, blockchain and other technologies on Connected Industry will be unprecedented.

    This webinar provides an opportunity to explore and consider the applications of new technologies as they related to IoT and Connected Industry.

    We'll take a look at:

    - The current status of AI, AR, blockchain and distributed ledger technologies and their role in empowering Connected Industry
    - Benefits and risks of evolution
    - Use cases across multiple industries
    - Future timelines and predictions
  • MCPD: what your business needs to know
    MCPD: what your business needs to know
    Leigh Preece, Power Electrics, Steph Charnaud, Enzygo, Jack Christie, KiWi Power Recorded: Jul 4 2019 60 mins
    The Medium Combustion Plant Directive (MCPD) and Specific Generator Regulation aim to improve air quality and reduce pollution by cutting harmful emissions from medium combustion plants (1-50 MW) and specified generators. The regulations apply to all medium combustion plants across the UK including back-up generators, Combined Heat and Power (CHP) plant and boilers.

    The legislation is complex with multiple compliance deadlines and this has resulted in a lot of confusion amongst businesses. This webinar will untangle the process and clearly explain how businesses are affected and what they need to do.

    -MCPD & abatement – Leigh Preece, Power Electrics
    -Permitting – Steph Charnaud, Enzygo
    -Impact on DSR – Jack Christie, KiWi Power
    -Q&A

    Our expert speakers:

    Leigh Preece, Sales Director, Power Electrics
    Leigh Preece is the Sales Director for Power Electrics, the UK’s largest independent supplier of FG Wilson generators.

    Steph Charnaud, Principal Consultant, Enzygo
    Steph has 16 years’ experience within the environmental sector, within non-governmental organisations, local authorities and as a regulatory officer and policy advisor within the Environment Agency.

    Jack Christie, Head of Account Management, KiWi Power
    Jack has worked with KiWi Power for the past three years within the company’s sales team, becoming the head of the account management channel in June 2017.

    Please note, all data you provide through pre-registration will be shared with our webinar partners once the webinar has been concluded. If you do not wish your data to be shared with the partner, please email harry.matyjaszek@energylivenews.com detailing the specific webinar.
  • Real Time Governance City Command Center
    Real Time Governance City Command Center
    Mark Bouldin, Subject Matter Expert, Hitachi Vantara Recorded: Jul 2 2019 9 mins
    With a focus on Real Time Governance, Andra Pradesh Government wanted to establish a State Command and Communication Center. Hear how this ambitious project came to life.
  • The Intelligent Edge: The Next Frontier of IoT Innovation
    The Intelligent Edge: The Next Frontier of IoT Innovation
    Ed Maguire, Momenta Partners Recorded: Jun 27 2019 57 mins
    Edge, mobile edge, and fog computing have emerged, offering a panacea to the pain points of IoT data. Companies such as Intel, SAP, Ericsson and Dell Technologies are creating their own solutions. Edge computing has the potential to impact the data infrastructure of the IoT, but what are the benefits and risks of moving away from the cloud? Edge computing comes with a suite of considerations that need to be carefully considered prior to adoption that we'll explore in turn.

    This webinar will cover:

    - The current state of fog and intelligent edge computing
    - What are the benefits/risks of moving away from the cloud?
    - What does this mean for cloud computing, data infrastructure and data analytics?
    - What are the best use cases of edge computing and what are its limitations?
    - Forecasts on future applications
  • Smart Spaces and the Future of Smart Technology
    Smart Spaces and the Future of Smart Technology
    Justin Bean, Global Director of Smart Cities and Smart Spaces Marketing, Hitachi Vantara Recorded: Jun 21 2019 35 mins
    What are smart spaces and how are video intelligence, IoT, big data and artificial intelligence (AI) enabling their rapid growth? How does this drive smarter, data driven decisions to enhance safety, operations, experience, and sustainability?

    Rajiv Parikh, host of Center Stage from Regalix TV speaks to Justin Bean, Global Director of Smart Cities and Smart Spaces Marketing, Hitachi Vantara to discuss this and more.

    See additional episodes of Regalix TV here: https://www.regalix.tv
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Jun 18 2019 44 mins
    Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.

    SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.

    Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.

    Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
  • How Scopus can help address researchers’ most pressing questions
    How Scopus can help address researchers’ most pressing questions
    Margaret Phillips, Purdue University and Eleonora Presani, Elsevier Recorded: Jun 6 2019 59 mins
    Join us for a webinar on Thursday, June 6th as we discuss how Scopus can assist librarians in addressing researchers’ top priorities and questions, such as:
    •Where do I publish?
    •How can I make sure my research is novel?
    •How can I easily maintain my researcher profile and showcase my impact?

    Co-presenting the webinar will be:

    Margaret Phillips, Purdue University
    Margaret is an Assistant Professor of Library Science and Engineering Information Specialist at Purdue University Libraries and School of Information Studies. She is the Libraries liaison to the Schools of Engineering Technology, Industrial Engineering, Mechanical Engineering, and Nuclear Engineering.

    Eleonora Presani, Elsevier
    Before Dr. Eleonora Presani (@elepre17) joined Elsevier in 2012, she was a particle physicist at CERN. At Elsevier, her first role was as a publisher, managing 14 academic journals in Nuclear and High Energy Physics. In 2016 she joined the Scopus team as Product Manager, working on research data linking and author assessment.
  • IT Industry Outlook 2019
    IT Industry Outlook 2019
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Recorded: Jun 4 2019 41 mins
    CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:

    • How the cloud, edge computing, and 5G form modern economic infrastructure
    • How IoT and AI are opening new doors for ambient computing
    • How distributed technology models challenge existing structures
    • How the business of emerging technology prompts sales channels’ reinvention
    • How partnerships are bridging gaps in the new tech ecosystem
    • How persistent tech personnel shortages are fueling new, creative staffing solutions
    • How global tech hubs shine the spotlight on the ingredients for innovation
  • Emerging technologies in Europe: The Digital Octopus' strategy
    Emerging technologies in Europe: The Digital Octopus' strategy
    Gabriele Roberti and Andrea Siviero Recorded: May 30 2019 30 mins
    Innovation Accelerators such as Artificial Intelligence, Internet of Things, Augmented & Virtual Reality and other emerging technologies are drawing unique opportunities and challenges across European vertical markets, with multiple digital use cases unlocking new technology scenarios for companies.

    In this IDC web conference Gabriele Roberti and Andrea Siviero from the IDC European Customer Insights & Analysis team will discuss the combination of these emerging technologies and the leading disruptive use cases across European industries, such as professional services, retail, healthcare and others, answering questions such as:
  • Uptime Institute 2019 Data Center Industry Survey Results
    Uptime Institute 2019 Data Center Industry Survey Results
    Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical Officer Recorded: May 29 2019 61 mins
    The data center industry’s largest and most influential survey results are in. Join us May 29th at 9:00 AM Pacific time to see what’s trending. Are data centers getting more efficient? How are outages changing? What proportion of workloads are running in the cloud? Will rack density rise at last?
  • Capitalise on rising energy costs: Five ways to transform your buying strategy
    Capitalise on rising energy costs: Five ways to transform your buying strategy
    Stuart Lea, Inenco, David Oliver, Inenco, Michael McGowan, Ibstock Recorded: May 23 2019 58 mins
    Speakers:

    •Inenco - Stuart Lea, Head of Energy Procurement
    •Inenco – David Oliver, Technical Product and Insight Manager
    •Inenco customer – Michael McGowan, Group Sustainability Manager, Ibstock

    Increasing commodity and non-commodity costs amidst a back drop of unprecedented economic uncertainty means that revisiting your energy buying strategy is more important than ever.

    A robust energy strategy, executed well, will give your businesses long-term cost and carbon savings, it will shelter you from rising commodity and non-commodity energy costs and provide you will revenue generating opportunities.

    In this webinar, we will share our top five essential steps for developing a future-proofed energy strategy that can handle anything 2019 throws at it.

    You will also hear from Inenco customer, Ibstock, who will share first-hand experience of how an effective energy procurement strategy helped their business achieve a competitive advantage, despite a changing and challenging environment.

    The webinar will explore all elements of the energy strategy, from choosing the right procurement tools through to optimising your consumption patterns.
  • Checking a Box is Not Enough : Handling Lawful Consent in a Post-GDPR World
    Checking a Box is Not Enough : Handling Lawful Consent in a Post-GDPR World
    Simon Hill, Chief Legal and Compliance Officer, Certes Networks Recorded: May 22 2019 41 mins
    Handling lawful consent in GDPR is one area that can be especially tricky. Companies need to be particularly aware of new rights for consumers and notification requirements as these types of regulated responsibilities are not just limited to Europe. Any enterprise that provides a service whereby personal data is processed, are impacted by GDPR requirements.

    So, companies may think they have obtained sufficient consent regarding personal data and transparency only to find out that they have failed to obtain valid consent.

    In this interactive webinar, Certes Networks will cover:

    • What Did We Learn in 2018?
    • What is Important in 2019?
    • Getting Back to Basics
    • The Top Three Keys to Sufficient Consent
    • Case Studies

    On behalf of Certes Networks, we look forward to your participation.
  • Modularisation of coal-fired power plants in the 21st century
    Modularisation of coal-fired power plants in the 21st century
    Dr Stephen Mills Recorded: May 22 2019 25 mins
    ‘Modularisation’ refers to the design and production of standardised components or systems that can be arranged or fitted together in a variety of ways. It can be used to reduce costs, improve quality, and speed up construction. The webinar explores the use of modularisation in the development and construction of modern coal-fired power plants and looks at its potential.
  • The right medicine: reducing cost and carbon in the NHS
    The right medicine: reducing cost and carbon in the NHS
    Lorcan Anglin, Inenco Mark Winn, Inenco Recorded: May 16 2019 59 mins
    Speakers:
    Lorcan Anglin, Head of Solutions at Inenco
    Mark Winn, Lead Consultant, Public Sector at Inenco

    How can a better approach to energy management help NHS organisations to deliver the Ten Point Efficiency Plan?

    Bottom lines in NHS Trusts take a direct hit every time energy costs rise, forcing organisations to direct an already-stretched budget away from front line service delivery. Many choose to fix their energy prices annually, but taking a different approach to procurement can provide greater budget certainty and create opportunities to better control energy price inflation. Looking afresh at energy consumption can also unearth real optimization opportunities and the chance to control overall costs.

    Using real life case studies and practical advice, this webinar will focus on delivering both better energy procurement and an holistic approach to energy optimisation. Our industry experts will address:

    1.How differing approaches to procurement strategies can achieve better outcomes and reduce the risk of annual price variations and provide greater budget certainty
    2.Taking a shorter-term focus on invoice validation to remove the need for retrospective review and recovery, keeping much needed resources available for vital frontline services within financial year
    3.What opportunities exist to review technology and processes that will optimise energy consumption to both reduce cost and help achieve 2020 carbon reduction targets
    4.Five essential steps for identifying saving opportunities, prioritising them and developing investment cases based on short pay-back periods.
  • Unsecured Networks and the Risks for Your Business
    Unsecured Networks and the Risks for Your Business
    Francis Bourke, Sales Engineer, Webroot Recorded: May 14 2019 14 mins
    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. It’s also capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    Additionally, DNS filtering allows admins to take back control of their network, secure all devices, prevent internet misuse, and improve productivity.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection protect against attacks while benefitting your business.
  • Why Artificial Intelligence and Machine Learning are Key for MSPs
    Why Artificial Intelligence and Machine Learning are Key for MSPs
    George Anderson, Director of Product Marketing, Webroot Recorded: May 7 2019 57 mins
    As the volume, sophistication, and complexity of cyberattacks on SMBs grows, current IT security solutions must become more pro-active, automated, and effective in response.

    This presentation looks at how SMBs and MSPs can tackle these issues now and in the future, and equips them with the IT security expertise and technology they need to defend their clients while benefitting from market growth.
  • The Webroot 2019 Threat Report
    The Webroot 2019 Threat Report
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Apr 29 2019 45 mins
    Each year, Webroot conducts extensive research on the current threat landscape. This webinar will present findings for 2019, which were also recently published in the Webroot 2019 Threat Report
    .
    A few of the key findings that will be covered, and their consequences explored, during this webinar include:

    -40% of malicious URLs were found on good domains
    -36% increase in the number of phishing attacks
    -93% of phishing domains offered an HTTPS site
    -54% of devices that got infected once were re-infected the same year
    -25 of the top recurring malicious IP addresses were reused 95 times

    Join Webroot security analyst Tyler Moffitt to learn about our threat discoveries and analysis, and to arm your business with the tools it needs to overcome modern cybercrime.
  • Socio-economic impacts of coal power and mining in major coal using economies
    Socio-economic impacts of coal power and mining in major coal using economies
    Paul Baruya Recorded: Apr 24 2019 49 mins
    The webinar explores the direct and indirect effects of coal-fired power generation. It summarises a report that looks at these impacts with respect to employment and the supply of reliable power generation, especially at a time of uncertainty for many coal communities and economies around the world today.
  • The use of Big Data in Real Time Government – The Andhra Pradesh Case Study
    The use of Big Data in Real Time Government – The Andhra Pradesh Case Study
    Mark Bouldin, Subject Matter Expert, Hitachi Vantara Recorded: Apr 23 2019 17 mins
    Smart spaces improve customer outcomes by blending, existing and new data sources from the physical and digital worlds. It helps you make, real-time, predictive, data-driven decisions.
  • Driving the Growth of Corporate Renewable Energy Market
    Driving the Growth of Corporate Renewable Energy Market
    Shaik Safik, Senior Consulting Analyst, Frost & Sullivan Recorded: Apr 23 2019 40 mins
    Driving the Growth of Corporate Renewable Energy Market: Gaining Advantage through Innovative Energy Sourcing Options



    Large corporations around the world are sourcing renewable energy for self-consumption. Companies are becoming part of prestigious groups to source renewable electricity.

    Frost & Sullivan invites you to join Shaik Safik, Senior Consulting Analyst, as he discusses the sourcing methods adopted by corporations across the world to procure renewable energy and how this trend is expected to grow in the future.

    Questions this Session Will Answer:

    · How has the corporate renewable purchase evolved over the years?
    · What are the drivers and barriers for renewable energy purchase at a global level?
    · Who are the major corporate renewable energy purchasers and their renewable energy targets?
    · What are the sourcing methods adopted and the risks involved?
  • Growth Opportunities for Optimizing the Electric Grid through Data Analytics
    Growth Opportunities for Optimizing the Electric Grid through Data Analytics
    Farah Saeed, Research Director, Digital Grids, Frost & Sullivan Recorded: Apr 11 2019 37 mins
    There are several cutting-edge companies already present in the market that have introduced their digital platform/architecture for transitioning to a digital grid. However, the industry currently does not have a clear market leader. The presence of unstructured data is creating a tremendous opportunity for the industry to take a market leader position for creating and innovating tools that will help utilities make the smooth transition to a fully digital grid through analytics.

    Frost & Sullivan invites you to join Farah Saeed, Research Director, Digital Grids, for the webinar: Growth Opportunities and Challenges for Optimizing the Electric Grid through Data Analytics. Learn what type of data analytic solutions are gaining the most traction along with market growth projections by region for smart grid analytics.

    Key Takeaways:
    • Gain in-depth market perspective on what the future holds for smart grid analytics
    • Growing data complexity, concern for cybersecurity breaches, and lack of in-house expertise will encourage utilities to explore cloud-based and x-as-a-service offerings
    • Discover why the industry needs to invest in and embrace smart grid analytics
  • What's Your Digital Game Plan? A Playbook For Success
    What's Your Digital Game Plan? A Playbook For Success
    Jesse DeMesa, Partner, Momenta Partners Advisory Jul 18 2019 5:00 pm UTC 60 mins
    There is no one-size-fits-all-strategy for implementing digital innovation, but there are best practices and experiences you can leverage to enable your firm's road to change in the 21st century. Momenta Partners has created a playbook gleaned from practitioner's perspectives on how to best navigate digital transformation, and we'll share our insights with you in this webinar. This webinar is for CEOs and leadership teams seeking insights and actionable intelligence by example.

    We will take a look at:

    - The steps of a firm's digital transformation journey
    - The best approaches to beginning your transformation journey
    - Getting your team to embrace digital transformation
    - Building a playbook to help you achieve your transformation goals
    - Best practices for adoption
  • The Risks From Unsecured Networks
    The Risks From Unsecured Networks
    Jonathan Barnett, Sales Engineer Jul 24 2019 12:00 am UTC 27 mins
    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.
  • Trends in IT Security
    Trends in IT Security
    Tracy Pound, CompTIA Faculty, CompTIA Jul 24 2019 2:00 pm UTC 60 mins
    As technology becomes a critical component for digital organisations, security becomes an even higher priority. Most companies know security is important, but they aren’t sure how to best change their IT approach to reflect the new reality.

    This market intelligence session, based on CompTIA’s latest research, describes the areas that every business should focus on: the new technology that is needed, the new processes that must be adopted, and the education that must be given to end users.
  • Connecting the World at Large: Exploring LPWA Technologies and Opportunities
    Connecting the World at Large: Exploring LPWA Technologies and Opportunities
    Ed Maguire, Principal Partner, Momenta Partners Jul 25 2019 4:00 pm UTC 64 mins
    LPWA technologies enable low power communications over a large area, typically at low bit rates. With billions of sensors capturing data from the physical world, there’s growing need to transmit data from remote locations that are not connected to power sources. The family of LPWA technologies including LoRa, NB-IOT, and others are perfectly suited to support new use cases in agriculture, transportation, smart spaces, supply chain, manufacturing and many other areas.

    The reality is that there is not one solution but rather a variety of low-power, wide area network technologies that take many shapes and forms. It follows that there are various criteria that need to be considered before a business should invest into a LPWA structure.

    We take a critical look at the current market landscape, providing deep industry insights by experienced technologists who will share first-hand use cases and offer thought-provoking insights into how this technology is transforming connected industry.

    We will be taking a look at:

    - The current market landscape
    - The different types of LPWA technologies
    - How LPWA technologies can solve unique problems
    - How to incorporate LPWA technologies into your business
    - Tips and pointer for LPWA success
  • [Panel]: Best Practices for the Optimized Data Center 3.0
    [Panel]: Best Practices for the Optimized Data Center 3.0
    TBC Jul 30 2019 3:00 pm UTC 60 mins
    Join leading data center management experts as they debate and share best practices for the top 5 essential data center considerations:

    Connectivity
    Sustainability
    Availability
    Versatility
    Security
  • SMBs Market Overview and Technology Buying Trends
    SMBs Market Overview and Technology Buying Trends
    Sue Gilkes, CompTIA Faculty, CompTIA Aug 7 2019 2:00 pm UTC 60 mins
    Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
  • HTTPS: SSL Certificates and Phishing
    HTTPS: SSL Certificates and Phishing
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Aug 20 2019 10:00 am UTC 60 mins
    When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.

    Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.

    Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
  • IT Security: from Complacent to Critical
    IT Security: from Complacent to Critical
    George Anderson, Director of Product Marketing, Webroot Sep 10 2019 3:00 pm UTC 60 mins
    IT security for small to medium-sized businesses (SMBs) has turned from a situation where clients were complacent about IT Security to it now being a critical, high-demanded service offering.

    This presentation looks at what has driven this shift in client attitudes, and how IT security needs to rapidly evolve to give MSPs access to the expertise and security technology they need to thrive.

    Many MSPs are struggling with this new reality. This presentation will help you evaluate the IT security options open to you.
  • Cyberattacks: Q3 Review and Emerging Trends
    Cyberattacks: Q3 Review and Emerging Trends
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 17 2019 10:00 am UTC 60 mins
    This webinar will recap some of the major cybersecurity highlights of the past quarter.

    From high-profile attacks making a media splash, to emerging threat trends being tracked by our researchers, a Webroot threat analyst will take attendees through the highlights and lowlights of another busy quarter for cybercrime.
  • Managing IT Services: Quick Start Guide for MSPs
    Managing IT Services: Quick Start Guide for MSPs
    To Be Confirmed Sep 23 2019 2:00 pm UTC 60 mins
    Tried and true best practices established for building profitable managed IT service businesses certainly exist. This session explains those best practices and provides in-depth advice on six key actions for their implementation.

    From understanding the opportunity to developing a marketing plan to support a sales team, attendees will gain valuable insight into best practices for building their business.
  • Cybersecurity: Malware Mayhem
    Cybersecurity: Malware Mayhem
    George Anderson, Director of Product Marketing, Webroot Oct 8 2019 3:00 pm UTC 60 mins
    One thing is certain: the threats facing small and medium-sized businesses keep changing.

    This webinar looks at the threats Webroot, our MSP partners, and SMB clients are experiencing and the impact to their business. The aim of this webinar is to provide threat information you can easily share with your business colleagues or managed service clients to reassure them you have the knowledge and the tools to look after their endpoints.
  • Six Ways to Keep your Business Safe from Cybercriminals
    Six Ways to Keep your Business Safe from Cybercriminals
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Oct 22 2019 10:00 am UTC 60 mins
    Cybercriminals keep finding ways to attack businesses regardless of their size.

    Join Webroot Sr. Threat Research Analyst Kelvin Murray for this 30-minute webinar covering six ways to keep your business safe from cybercriminals. Topics that will be discussed include:

    •Preventing and mitigating ransomware attacks
    •Coping with the spectre of information theft
    •The latest in cybercrime featuring real incidents and case studies
  • Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics
    Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Nov 11 2019 11:00 am UTC 60 mins
    This webinar will provide expert insights on the latest cybercriminal activity, highlighting the year's most innovative, dangerous, and pervasive instances of malware.

    Specifically, we will be covering the developments including information theft, Emotet, BEC scams, ransomware, targeted attacks, and more. Come learn about these developments and strategies to help secure your organisation from ransomware and next-generation cyberthreats.
  • 2019 Cybersecurity Trends
    2019 Cybersecurity Trends
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Nov 19 2019 4:00 pm UTC 60 mins
    As we near the end of 2019, we’ll take a look at some of the most pressing and prevalent threat trends from another busy year in cybercrime.

    This webinar promises to be a sneak peek at some of the developments sure to be covered in the 2020 Webroot Threat Report, so don’t miss it.

    We will update the key topics to be discussed closer to the date.
  • MSP’s Top Cloud Security Concerns and How to Tackle Them
    MSP’s Top Cloud Security Concerns and How to Tackle Them
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Dec 9 2019 3:00 pm UTC 60 mins
    The role of the cloud in IT security can be confusing and frightening for many customers and clients.

    Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.
  • 2019 Threat Landscape Roundup
    2019 Threat Landscape Roundup
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Dec 16 2019 11:00 am UTC 60 mins
    SMBs are major targets for cybercriminals. To stay safe, today’s businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced during 2019, see what's upcoming in 2020, and get tips to help you to keep your business and clients safe.

    A Webroot threat expert will be discussing information theft, information stealers, BEC scams, ransomware, targeted attacks, and all the cybercrime headlines of 2019.