Webinar Archives - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinar Archives
Upcoming Webinars
3 Ways to Detect and Prevent Man-in-the-Middle Attacks
Date: Sep 21, 2021

View archived webinar

Supply chain cyberattacks are on the rise and threat actors are using multi-phased strategies to access legitimate communications between parties and gain entry into systems.  Vendor email compromise (VEC), a form of Man-in-the-middle (MitM) attack commonly used in supply chain attacks, detection can be difficult. With 58% of organizations reporting an attempted supply chain attack within the past year, and 75% falling victim to an attack, understanding the techniques and mitigation strategies is vital to preventing impact to an organization.  

Defending Against Ransomware
Date: Sep 16, 2021

View archived webinar

The average ransomware payment nearly tripled in 2020, a startling trend that shows no signs of stopping. As ransomware attacks evolve from economic nuisance to national security threat, a powerful response is needed from government and organizations alike. This virtual event will explore the best ransomware defense strategies and tools on the market today. 

Tips for Cleaning Up Cyber Hygiene and Security Basics
Date: Sep 14, 2021

View archived webinar

With cyber attacks on the rise, having proper cyber hygiene and security basics are essential. If companies could just get the basics right, most of these attacks would be stopped. But doing well at the fundamentals is easier said than done. What are these top "cyber hygiene" priorities that make the biggest difference to security, and what tools/techniques can help enterprises get these things right?

Understanding Your IT Risk Management Ecosystem
Date: Sep 09, 2021

View archived webinar

To protect your business from calamity – especially when undergoing digital transformation – a risk management ecosystem is essential. How well do you understand your company’s IT risk management ecosystem? For that matter, do you even have a risk management ecosystem? A risk management ecosystem is comprised of not only your own company’s IT assets, but those of your supply chain partners, cloud service providers, and other third-party technology providers. It also includes your own workforce and its approach to addressing IT risk. To reduce or eliminate vulnerabilities and threats that can impact the integrity and availability of your company’s data, it’s imperative to understand the risk policies, mitigation processes and security technologies being used.

Join us for this informative webinar as we explore what it takes to create and maintain a proper IT risk management ecosystem. The health of your company depends on your knowledge and management of this important topic.

Monitoring the Invisible - Digital Experiences in a Zero Trust World
Date: Aug 31, 2021

View archived webinar

Zero trust architectures such as Zero Trust Exchange are intrinsically better than traditional network security models in securing user-to-app interactions. They make enterprise applications invisible to the internet, allow only authorized users to interact and deny everything else, including performance monitoring traffic. Continuous and proactive monitoring of end-user experiences and applications requires a unique and holistic approach in zero-trust environments. 

Managing Your Enterprise Collaboration Platforms
Date: Aug 19, 2021

View archived webinar

The work-from-home revolution has raised the profile of enterprise collaboration platforms like Microsoft Teams and Slack. While a boon for productivity, these platforms introduce a host of management challenges such as integration with internal systems, managing groups, and security. Attend the virtual trade show to learn the latest tips and tricks for managing and securing your enterprise collaboration platforms.

Fact or Fiction? The Truth About Cloud Native Security
Date: Aug 18, 2021

View archived webinar

More organizations are moving forward with their digital transformation journey and embracing the cloud native world. In every field, there are myths and misconceptions that develop over time. In the case of cloud security or cloud native security, this has manifested in a relatively short space of time. A few that come to mind:

  1. The public cloud is more secure than an on-premises datacenter
  2. DevSecOps is just about adding “security” or “scanning” to DevOps
  3. Cloud Service Providers natively deliver all the security controls a company needs
An Enterprise Guide to Web Security
Date: Aug 10, 2021

View archived webinar
Enterprise security professionals must deal with all levels of data protection, from insider threats to attacks from state actors. But one of the biggest headaches facing security teams is protecting corporate data from simple Internet connections. In this webinar, our experts will discuss the multitude of ways that criminals are trying to get at your systems through the Web, including network, server, and device level connections. We’ll outline some of the tools and techniques for developing a sound security strategy. Some of the simplest approaches can also be some of the most difficult to protect, not just because of the sheer number of endpoints, but also the simplicity of the approach.


Leveraging Infrastructure as Code to Streamline Security and Operations
Date: Aug 03, 2021

View archived webinar

Managing risk in short DevOps cycles is a common struggle for cloud native organizations, and the constant stream of breach announcements provides evidence that success is not easy.  For many teams, the problem boils down not to a lack of awareness or visibility but to an inability to prioritize remediation of the most pressing issues in a sea of findings and alerts.

Join us on August 3rd at 1pm Eastern to see how Infrastructure as Code (IaC) can augment your security program, working with your pipelines and AST tools to ensure the most critical exploitable risks never get deployed.

Monitoring Critical Cloud Workloads
Date: Jul 29, 2021

View archived webinar

With the proliferation of cloud computing in the IT enterprise, and with companies moving more mission critical applications to the cloud, it’s important for the IT organization to provide a level of trust to the business that those workloads are being adequately monitored for security threats. And while many companies understand that need and are making strides, there are still too many situations where the inability to monitor in real time opens up the enterprise to damaging business results. In this webinar, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.

Using Cyber Underground & Blockchain Intel to Stop Cyber Attacks
Date: Jul 28, 2021

View archived webinar

Pair Intel 471’s incredibly powerful intelligence about the thriving cyber underground economy with visualized blockchain forensics to predict and prevent cybercrime. Chainalysis enables investigators to identify and monitor threat actors' cryptocurrency wallets for notification of TTP changes and attack preparation at the point of sale.  Following the money can also lead to attribution of these criminal networks and expand insight into the underlying supply chain that can sometimes be missed by traditional security tools.  

Disaster Recovery/Business Continuity in the New Normal
Date: Jul 21, 2021

View archived webinar

It's time to rewrite the playbook for DR/BC --  really, that playbook that was gathering dust until the pandemic hit. While most companies may not be going 100% virtual even in a time of crisis, the lessons learned from the shift to remote work in 2020 demand that organizations take a fresh look at their playbooks. Consider what DR/BC looks like if thousands of company employees once again are working at home, riding out a pandemic, a hurricane, or power outages. Or, consider that many organizations will be managing a hybrid workforce. Is your DR/BC plan up to date?

Bolstering Your Enterprise Cyber Risk Assessment
Date: Jul 14, 2021

View archived webinar

Businesses constantly prepare for security breaches, but they don’t always understand exactly how an attack or breach can affect the business. In this webinar, we’ll explore how the impact associated with existing threats and data breaches affect cost and downtime, and how to measure and quantify those costs so they can be reported to corporate decision makers. Being able to better understand your risk assessment will help you to better implement the technologies and processes tailored for your own specific environment.

4 Practical Tips for Building a Data Lake
Date: Jun 24, 2021

View archived webinar

Most very large enterprises have already built data lakes, and they are seeing a number of benefits as a result of becoming more data-driven. As a direct result of integrating more data and analytics into their decision-making processes, organizations are becoming more optimized, more profitable, and more competitive within their markets. 

By contrast, some small and medium-sized enterprises haven't yet fully adopted data lakes. As a result, they aren't realizing the data lake advantages that their larger counterparts are seeing, and some are even falling behind competitively.

The Experts Guide to Ransomware Response
Date: Jun 17, 2021

View archived webinar

Sooner or later, your business is likely to be hit with a ransomware attack. Perhaps you’ve planned for it, but are you truly prepared? When the time comes, however, the careful planning may not be tailored to a specific incident. In that case, you have to be able to react and adjust in real time. Beyond just knowing whether or not to pay a ransom, you have to be sure your tools, processes, and procedures are adaptable so that during a stressful moment, you’re making the right decisions to save your company’s business. In this webinar, our expert will outline a trusted guide ensuring you have the right incident response, develop ironclad backups, and follow a business continuity plan.

Multi-Cloud Architecture and Management
Date: Jun 10, 2021

View archived webinar

Multi-cloud environments offer countless benefits around speed, reliability, and cost savings. But they can also create performance challenges—especially for IT teams who don’t account for performance bottlenecks. Rising complexity and fragmentation further complicate multi-cloud deployments. This virtual trade show will offer proactive strategies to help you address your cloud challenges and design a high-performance multi-cloud architecture.

How the Rapid Shift to Remote Work Impacted IT Complexity and Post-Pandemic Security Priorities
Date: May 13, 2021

View archived webinar

The rapid shift to remote work in 2020 resulted in changes in security and IT priorities and resulted in more complexity and visibility challenges than ever before. But as the effects of the pandemic start to slow and there’s light at the end of the tunnel, we asked:

  • How has the past year impacted priorities for security and IT teams?
  • What other massive challenges are they up against?
  • And how are they planning for employees to return to the office for the first time in over a year?

To answer these questions and more, Axonius partnered with Enterprise Strategy Group (ESG) for a global survey of IT and cybersecurity professionals.

Take DevOps to the Next Level
Date: May 05, 2021

View archived webinar

For years, IT teams have been speeding their software development efforts and reducing human error by merging the development, operations, and testing teams into a single cross-functional team that works together for the duration of the dev cycle. Now, however, there’s even more pressure on IT to speed up development while continuing to ensure quality outcomes and secure software. So how are companies meeting that demand? With a variety of next-level techniques, such as merging security efforts in the DevOps process with DevSecOps; taking automation to the next phase with technologies like AI; leveraging low-code and no-code efforts to reduce costs and free up manpower for more complex dev tasks; and improving the monitoring of compliance, governance and security throughout the dev lifecycle. In this webinar, our expert speakers will address not only how companies are leveraging these concepts, but also how they’re efficiently managing the processes across various teams and development platforms. 

Cybersecurity Risk Management
Date: Apr 22, 2021

View archived webinar

The shared responsibility model of cloud computing means companies are responsible for securing their cloud-based data, apps and infrastructure. But since not every workload demands the highest level of security, how do you balance risk tolerance and cost?

This virtual trade show will highlight the latest strategies, tools and research to help you develop the right cybersecurity risk strategy for your business.

Regulatory Compliance in a Cloud Environment
Date: Apr 07, 2021

View archived webinar

One thing for certain is that you can’t rely on your cloud provider to assure that your assets are safe in the cloud with respect to compliance.  Further, compliance laws are changing, as are retention rules for even simple information.  Throw in some multi-cloud applications, a bit of remote work, and some shadow IT and the tasks for compliance become daunting.  In this webinar, we discuss compliance, how the requirements vary from your own environment to the cloud, and ways the cloud can impact your industry.  We will discuss HIPAA, PCI, and other compliance requirements, as well as data sovereignty and movement of data within the cloud.

2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Remote Work Tops SF, NYC for Most High-Paying Job Openings
Jessica Davis, Senior Editor, Enterprise Apps,  7/20/2021
Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
Register for InformationWeek Newsletters
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll