Webinars

Webinars

  • Infrastructure monitoring in the cloud: Optimizing performance and availability

    As organizations increasingly migrate their infrastructure to the cloud, ensuring the performance, availability, and reliability of cloud resources becomes paramount. The cloud environment brings tremendous benefits in terms of scalability, flexibility, and cost-efficiency. However, these benefits come with unique challenges that must be addressed through effective monitoring practices. One of the primary goals of infrastructure monitoring in the cloud is to proactively identify and address performance issues before they impact users. By continuously monitoring key metrics such as CPU usage, memory utilization, network latency, and storage capacity, organizations can detect bottlenecks, identify potential failures, and take timely actions to optimize resource allocation. Read More

  • Navigating Cloud Chaos: Strategies for Streamlining Post-Cloud IaaS

    The Cloud is not a destination any longer. It’s a journey. Once companies have completed one phase of cloud implementation there is always a need to do better. Better at monitoring, better at managing the complexity, and better at managing cost. Join us as we provide recommendations on how your organization can take full advantage of all that cloud ...and its related tools have to offer. This webinar will include information on these key topics: • A definition of cloud operations (CloudOps) and how the practice has evolved over time • Insight into how organizations have started applying an agile methodology to their cloud management so support agility and innovation at the infrastructure layer • CloudOps best practice and how it can help establish strong processes for workloads, no matter the application or environment • Ways that standardization helps streamline deployment, operation, and monitoring of secure workloads in the public cloud. • Key security considerations and best practice that you and your teams need to consider as threats continue to evolve • Client example of cloud management and how it has served as a platform for new solutions while at the same time minimizing downtime The rest of your cloud journey starts today. Read More

  • Adding unique value with a true multi-cloud architecture

    Multi-Cloud is not simply about juggling multiple clouds - it's about orchestrating your teams, partners, and most importantly, your data, in a harmonious, integrated ecosystem. In this webinar, we will uncover how achieving true Multi-Cloud can streamline governance, bolster collaboration, and significantly reduce costs. Join Faction CTO, Matt Wallace as he shares insights drawn from myriad successful large enterprise multi-cloud engagements. Discover the strategic edge that comes with a seamlessly interconnected multi-cloud environment, and how it can be the catalyst to unlocking your cloud resources' full potential. Read More

  • Demystifying SASE for CIOs and tech leaders: Solutions & strategies

    SASE is generating tremendous hype, steep expectations, and confusion. Ideally, SASE promises to deliver benefits such as consistent protection, reduced complexity, and scalability. But modern enterprise networks are a maze of complexity including distributed networks, specialized systems, legacy infrastructure, public and private cloud, and dozens of security tools from multiple vendors. While enterprise buyers require a common visibility and policy framework, how can they approach the SASE transformation in a way that best aligns with their security requirements and business goals? In this presentation, we will play a recorded video with IDC analyst and Cloudflare Subject Matter Expert to explore the SASE concept and examine strategies to help IT buyers navigate the SASE journey. A live Q&A will be hosted at the end of presentation to answer all your questions about SASE. Read More

  • Fortifying Your Defenses: A Crawl, Walk, Run Approach to Zero Trust

    As the security landscape grows increasingly complex and challenging, traditional perimeter-style security architecture needs to be reassessed. The lines between trusted and untrusted entities have blurred, and cyber criminals are taking advantage of the confusion, infiltrating and moving through the network as trusted users. By assuming that nothing is trusted inside or outside the perimeter, Zero Trust Architecture (ZTA) aims to dynamically verify all access to system resources as agencies and companies modernize their cybersecurity. Join our discussion to discover the power of adopting a crawl, walk, run approach to Zero Trust and unleash the true potential of your existing cybersecurity investments, by: 1. A Path to Cybersecurity with Zero Trust Architecture: Assess cybersecurity posture, leverage existing investments, and enhance foundational components like data loss prevention to strengthen your ZTA strategy. 2. The Who, What, When, Where, and How of Zero Trust: Attain continuous visibility and risk assessment across endpoints, networks, users, and cloud assets. Identify coverage gaps, ensure compliance, and enable effective risk management. 3. Learning and Adapting to Evolving Threats: Harness advanced threat intelligence, anomaly detection, deception technologies, and machine learning. Use dynamic insights from network, cloud, and endpoint metadata empower real-time threat detection, hunting, and response 4. Think Like an Adversary: Assume breaches occur and gather necessary data within a ZTA framework. Utilize automated alerts, policy-based remediations, and proactive threat detection to counteract malicious activities. By adopting a crawl, walk, run approach to ZTA, organizations can build upon a solid technical foundation, best leverage their cybersecurity investments for securing data, networks, and boundaries while providing visibility into traffic, particularly for hybrid and multi-cloud communications in the ever-evolving cybersecurity landscape. Read More

  • A Zero Trust Approach To Securing Hybrid, Multi-Cloud, and SaaS Data

    As organisations use more cloud workloads and seek to protect data across diverse environments, it gets increasingly complex to secure all your data and applications from cyber threats. Learn how you can easily protect, monitor, and recover all your cloud and SaaS workloads on a single platform. Watch this to learn: -> Why attackers (still) slip through the cracks of hybrid, multi-cloud and SaaS environments -> How American Family Insurance protects their data across multiple cloud environments -> Ways that you can achieve cyber resilience across your cloud environemnts, IaaS, PaaS, and SaaS Special guest appearance by Nate Brooks, Technology Services Manager, American Family Insurance talking about the challenges and opportunities organisations have when embarking on a multiple cloud environments journey. Other speakers include: Bill Gurling, Technology GTM Manager at Rubrik Shubhankar Chatterjee, Sr. Director, Product Management at Rubrik Read More

  • Zero Trust is Evolving: Learn Why Zero Trust is a Must For Cyber Resilience

    Cybercriminals are at the top of their game, with 98 percent of organizations saying they suffered some kind of attack in the last year. Zero Trust principles are a great way to defend your data, but what does proper implementation look like? How can you make sure you’re using Zero Trust effectively? John Kindervag, the creator of the Zero Trust Model of Cybersecurity, will give you the answers in this highly anticipated talk, where you'll learn: -> How zero trust has evolved over the years -> The latest advancements in zero trust -> New ways to start implementing zero trust principles Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success. Read More

  • How to Break into the International Cybersecurity Market

    Ready to expand into the international cybersecurity market? Join us to discover how to get started and explore the wealth of State and Federal resources available to cyber companies. Business development experts Pompeya Lambrecht, Senior International Trade Specialist at the U.S. Commercial Service, and Ellen Meinhart, Senior International Trade Manager from the Virginia Economic Development Partnership, will be our guests giving U.S.-based businesses tips and resources to help break into the international cyber marketplace. Sign up today! Read More

  • Decoding PowerDrop Vulnerability: AI and ML in Adlumin’s Threat Hunting

    In the ever-evolving landscape of cybersecurity threats, organizations face the constant challenge of detecting and mitigating sophisticated attacks in a timely manner. Implementing automation and machine learning into a threat hunting strategy is key, but what does that look like in practice? Join Kevin O'Connor, Adlumin’s Director of Threat Research, as he demonstrates how his team discovered and remediated PowerDrop, an insidious PowerShell script for command and control attacks targeting the U.S. aerospace defense industry. During Kevin’s live demo, you will learn: - How Adlumin's Threat Research Team used Artificial Intelligence (AI) and Machine Learning (ML) to detect and remediate PowerDrop - Daily threat hunting methodologies employed by O'Connor and his team - Exploring the advantages of AI and ML in the field of threat hunting As a thank you for joining our webinar, we’ll send you our new overview guide, The Executive’s Overview to Proactive Cybersecurity: Harnessing the Power of Security Operations. Additionally – one lucky participant will receive a $200 Amazon gift card. Read More

  • Hunting for the unknowns…Where to start?

    Modern IT environments are complex. Organizations have logs and telemetry from thousands of devices, dozens of tools, covering both on-premises and cloud solutions. It’s hard enough to collect all this data in one place, knowing how to begin can also be daunting. This talk presented by industry thought leader John Bambenek will cover practical examples and techniques to dig into the security data of an organization to start hunting for otherwise unknown threats. Armed with this knowledge, teams can realize the goal of building their own detection techniques to find the threat actors that slip through their defenses. Read More