Truth in IT | Events | 6

Events | IT Webinars, Surveys, and Audience Loyalty Programs | 6

Events, webinars, it, cybersecurity, cloud, infrastructure, api, security, data, protection, network, security, 6

Events

Past events

  • Jan
    29

    DMARC Best Practices with KnowBe4

    Date: 01/29/2020 01:00 PM - 01/29/2020 02:00 PM
    Webcast 1.29 @1pm ET: Only ~20% of companies use DMARC, SPF, and DKIM, which reduces phishing attacks yet even when enabled, 81% of phishing attempts get thru. Learn to correctly configure DMARC w. KnowBe4
    • Jan
      23

      Truth in Data Protection: Table Stakes 2020

      Date: 01/23/2020 01:00 PM - 01/23/2020 02:00 PM
      January 23, 2020 @ 1pm ET What are the table stakes now for 2020 in data protection? Who has raised the ante for all vendors when it comes to near-zero RTO/RPO and ransomware protection and recovery? Feel like your gambling with cloud adoption? Maximiz...
      • Dec
        12

        Levers of Human Deception

        Date: 12/12/2019 01:00 PM - 12/12/2019 02:00 PM
        The Levers of Human Deception: Webcast Dec 12, 1pm ET Summary: Hackers and scammers are technologically savvy. There's no doubting that but don't underestimate their ability to leverage weaknesses in the human psyche to advance their malicious intent...
        • Dec
          11

          Going Cloud-First? Think Data Management First

          Date: 12/11/2019 02:00 PM - 12/11/2019 03:00 PM
          Learn how eSilicon migrated their production environment consisting of petabytes of data to Google Cloud for high performance with Cohesity for data protection and archiving to keep costs in check. Dec 11 @ 2pm ET.
          • Nov
            20

            Citrix: Ultimate Desktops as a Service Experience

            Date: 11/20/2019 01:00 PM - 11/20/2019 02:00 PM
            If you’re looking for the ultimate Desktops as a Service experience, join us for a deep dive into Citrix Managed Desktops. Our panel of experts will cover the 8 ways that Citrix Managed Desktops meet the demands of a mobile workforce. Learn how, in an ...
            • Nov
              12

              Webcast: Microsoft 365 Cybersecurity for SMBs

              Date: 11/12/2019 01:00 PM - 11/12/2019 02:00 PM
              Ransomware can shut down operations and destroy data assets. Malware infections can steal customer data or intellectual property. Data breaches can trigger regulatory violations and lawsuits. SMBs need robust security defenses, including leading-edge ...
              • Oct
                17

                Protecting Yourself Against Multi-Factor Authentication

                Date: 10/17/2019 01:00 PM - 10/17/2019 02:00 PM
                Multi-Factor Authentication (MFA) may be more secure than a simple login name and password but it’s not the perfect, unhackable solution many think it is. MFA is being hacked every day and organizations of all sizes are vulnerable. Roger A. Grimes, Kn...
                • Sep
                  24

                  Ultimate Guide to Phishing Mitigation

                  Date: 09/24/2019 01:00 PM - 09/24/2019 02:00 PM
                  Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware...
                  • Sep
                    10

                    VMWorld Video Expo & Analyst Recap

                    Date: 09/10/2019 01:00 PM - 09/10/2019 02:00 PM
                    We travelled to VMworld 2019 so you didn't have to(!) and interviewed nearly 50 vendors. This webcast profiles a handful of the more interesting & disruptive data protection vendors we saw. Cloud, multi-cloud, security & containers were the hot topics...
                    • Aug
                      15

                      7 Steps Hackers Use to Take Over Your Network

                      Date: 08/15/2019 01:00 PM - 08/15/2019 02:00 PM
                      The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manip...