Webinar Archives - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Webinar Archives
Upcoming Webinars
Fighting Cybercrime in a Pandemic Threat Landscape
Date: May 05, 2020

View archived webinar

The cyber risk landscape is shifting dramatically during this pandemic. A huge wave of employees are migrating from protected work environments to unprotected home environments, providing a prime attack surface for threat actors. Cyber criminals are looking eagerly for ways to exploit weaknesses in these new teleworkers and gain access to otherwise secure company networks. In addition, the same industry sectors that are disproportionately hit by COVID-19 have become softer targets for cyber criminals, including the Healthcare, Financial, Government, and Telecommunications sectors. Government and private organizations striving to lead us through the COVID-19 crisis have already been targeted by cyber criminals.

These changing dynamics are stretching cybersecurity resources when time-to-action is a critical factor in preempting cyber criminals who will continue to focus on vulnerable targets at increasing speed. Current methods of cyber risk management, incident response, and risk modeling have failed to keep up with the growing sophistication and speed with which cyber adversaries are armed. Traditional threat intelligence models that focus on Indicators of Compromise are problematic, producing a high rate of false positives and delays in execution due to security products that deliver frequent, low-impact alerts.

The Evolution of Ransomware
Date: Apr 23, 2020

View archived webinar

One constant truth Sophos has found over our 30 years of creating effective defenses against ever-changing threats: there is no silver bullet in security. Solutions need to evolve and adapt to new and emerging threats all the time.

When it comes to ransomware, the same rules apply. Bad actors are finding ways to exploit your organization’s weaknesses and their bag of tricks is continuously growing. You need an adaptive approach to keep up and defend your organization. Join our experts as they discuss ways you can navigate the dangerous waters where bad actors lurk.

Getting Down to Business: Chatbots for the Enterprise
Date: Apr 08, 2020

View archived webinar

Beyond Alexa in the home, enterprises are implementing intelligent agents based on conversational AI to drive efficiencies in how their employees navigate business processes, and how customers get valuable support from an enterprise like yours. Expense processing, corporate employee directories, IT help desks, purchasing/acquisition, and customer sales and product support are just some of the ways that companies are leveraging machine learning and AI in enterprise applications.

The ROI Story
Date: Mar 25, 2020

View archived webinar

Disruptive technology such as hyper-converged infrastructure tends to significantly complicate the buying decision. It forces new operational procedures and can impact IT governance, security, and compliance. But even a strong financial justification might not be enough to alter the ingrained processes, interests, and cultural norms surrounding the legacy environment. In many cases, it takes an ROI story.

This webinar will assist anyone interested in how to use financial analysis as a framework to optimize strategic decision-making.

Attend and receive a free copy of the eBook, The ROI Story: A Guide for IT Leaders and the IDC whitepaper, sponsored by Nutanix, Organizations Leverage Nutanix Enterprise Cloud as Scalable, High-Performing, and Cost-Effective Infrastructure Foundation.

The Six Must-Haves for Practical Cloud Security
Date: Mar 19, 2020

View archived webinar

Enterprises large and small are migrating existing applications to the cloud and developing new applications on cloud-native infrastructure. Datacenter security practices don’t translate to cloud environments due to technical and operational changes that disrupt existing security and compliance approaches. As organizations transition to distributed DevOps models, application development velocity increases dramatically. Continuous delivery and software-defined infrastructure result in additions and changes to critical assets on-demand at any time.

This webinar is for security engineers, DevOps engineers, cloud architects, and security executives.

Shifting Security from Speedbump to Digital Accelerator
Date: Mar 12, 2020

View archived webinar

Survival in today’s economy requires businesses to innovate at unprecedented speed to become more responsive to markets and competitors. Application teams are achieving greater agility by leveraging public clouds, containers and Kubernetes. However, agility often comes at the expense of security. If developers operate or make changes at full speed without security keeping the same pace, they risk leaving gaps in the environment that attackers can exploit. But, developers fear that engaging with their security teams will result in application delivery delays and possibly risks slowing down the business. Fortunately, these can be issues of the past as we adopt new processes and technologies that allow agile and secure to co-exist.

12 Things You May Not Know About Microsoft Azure
Date: Dec 11, 2019

View archived webinar

Are you leveraging all the benefits of cloud computing? Microsoft Azure has many tools designed to power company performance, including tools for analytics, advanced reporting, AI, data protection, DevOps, and much more. Join this webinar as we discuss 12 Azure features to strengthen security, increase ROI, comply with regulations, and meet your 2020 business goals.

Threat & Performance Management: 2 Key Data Sources
Date: Dec 04, 2019

View archived webinar

Many of us show up for work on Monday and immediately find ourselves immersed in the analysis of possible threats or performance problems. Much like a scavenger hunt, sometimes the information we’re looking for is close by, even obvious *if* you know where and how to look. You need the right view of suspicious behavior, and end-user experience, in order to validate the issue, understand the scope and impact, and isolate the problem domain. Learn about how you can use two well known, but often under-utilized data sources that can help you succeed in your hunt for answers.

This session will include a live demonstration of how these data sources, combined with advanced and automated analysis techniques, can help SecOps and NetOps teams to collaborate more effectively.

Unified Communications Security: How Analytics Addresses the Threats You Donít Even Know About
Date: Nov 12, 2019

View archived webinar

As unified communications (UC) adoption grows, so too does the number of bad actors who prey on vulnerabilities. The source of vulnerabilities stem from a lack of understanding risks and subsequent lack of best practices to address UC security threats. When a serious threat strikes, without the right security solution that can see across the entire UC network -- IT staff will only have reactive after-the-fact options. Wondering what can your organization do, to best protect itself from these bad actors? Then this webinar is for you.

Forecast Calls for 'EPYC' Innovation and Discovery
Date: Oct 31, 2019

View archived webinar

Buried in your data are insights that can lead to commercial innovation and progress!

In this webinar, we’ll discuss how new technology can help you harness AI, machine and deep learning with high performance computing (HPC). HPC is helping make the impossible possible such as transforming the treatment of diseases, cutting storm predictions in half, and helping organizations discover their next big business opportunity.

The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Slideshows
10 Cyberattacks on the Rise During the Pandemic
Cynthia Harvey, Freelance Journalist, InformationWeek,  6/24/2020
News
IT Trade Shows Go Virtual: Your 2020 List of Events
Jessica Davis, Senior Editor, Enterprise Apps,  5/29/2020
Commentary
Study: Cloud Migration Gaining Momentum
John Edwards, Technology Journalist & Author,  6/22/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll