The Ultimate Directory on Technology Webinars

Search our directory for upcoming webinars on Technology

Previous Webinars

Cybersecurity webinar by Omada for 5 IGA Essentials to Support Your Cybersecurity Strategy
5 IGA Essentials to Support Your Cybersecurity Strategy
Join our upcoming webinar to learn how identity governance and administration can help you strengthen your security posture and achieve compliance. In today’s complex threat landscape, IGA is essential for protecting your organization’s sensitive data and meeting compliance requirements. By effectively managing user access and enforcing policies, IGA helps reduce the risk of data breaches and security incidents. Discover the top IGA essentials for a comprehensive security strategy in our upcoming webinar. In this informative webinar, Paul Walker, Field Strategist at Omada, will unveil: • Why IGA is key to Zero Trust • Five IGA best practices to improve your Cyber Security Strategy • How Modern IGA can support you with security, compliance and efficiency Don’t miss this opportunity to learn how IGA can help you:• Reduce the risk of data breaches • Improve operational efficiency• Meet compliance requirementsSpeaker: Paul Walker, Field Strategist, Omada.
by Omada
10/17/2024 1:00 PM
Software webinar by MariaDB for MariaDB Databases 101
MariaDB Databases 101
MariaDB Databases 101 – Learning the BasicsIf you’re new to MariaDB, this introductory webinar is for you. We’ll take a high-level look at the fundamentals, including answering questions like these:Why do we need relational databases?Why do we need SQL?What is the architecture of MariaDB?How do I install MariaDB?How do I connect to MariaDB?Are there different editions of MariaDB?And we’ll leave time for you to ask your own questions, live.Register now – and learn what makes MariaDB such a popular choice for both development and mission-critical production deployments.Speaker: Alejandro Duarte - Developer Relations Engineer, MariaDB
by MariaDB
10/16/2024 5:00 PM
Cybersecurity webinar by Rehmann for Maximizing Organizational Effectiveness Through Technology
Maximizing Organizational Effectiveness Through Technology
As technology continues to advance and the looming threat of cyber attacks grows at an alarming rate, it is important for your organization to adapt in order to keep serving your community effectively. In this webinar, you’ll learn how to maximize the resources you currently have and how to identify appropriate solutions to fill in any gaps in your technology infrastructure.Contributors: Ben Eavey, Erinn A. Trask, CPA
by Rehmann
10/16/2024 3:00 PM
Cybersecurity webinar by Thales for The Power of a Future-Proof Data Security Strategy
The Power of a Future-Proof Data Security Strategy
In this session, our speakers will discuss ways to build a future-proof data security strategy for the evolving cyber landscape, combining a vision of possibility while staying grounded in reality.Join this webinar to learn about:• Future-proof data security strategies and risk-based essentials needed to protect against threats and enforce compliance across the organization.• Key use cases for unifying data visibility and control on-premises, cloud data stores, data lakes, and storage systems.• Thales Data Security innovations to address the dynamic challenges of the modern threat landscape while keeping your organization digitally resilient.Presented by Terry Ray, SVP Data Security CTO, Imperva, a Thales Company; Todd Moore, VP of Encryption Products, Thales; Krishna Ksheerabdhi, VP of Product Marketing, Thales.
by Thales
10/16/2024 1:00 PM
Internet of Things (IoT) webinar by Sony Altair for Meet the Future of Low-Power Cellular IoT: Exploring Semtech's HL7900 5G LPWA Solution
Meet the Future of Low-Power Cellular IoT: Exploring Semtech's HL7900 5G LPWA Solution
As the Internet of Things (IoT) continues to expand, the demand for low-power, high-efficiency solutions is growing at an unprecedented rate. Cellular Low Power Wide Area (LPWA) technologies like NB-IoT and LTE-M are leading this surge, with Omdia forecasting connections to jump from over 100 million in 2024 to nearly 400 million by 2030*.Join experts from Sony Altair and Semtech as they introduce the groundbreaking Semtech HL7900 module—a global 5G LPWA solution featuring the Sony ALT1350 chipset. This webinar will explore how this innovative combo is set to transform the low-power IoT landscape with its ultra-low power consumption and future-ready connectivity.Specifically designed for IT, technical, and product management leaders, this session will cover:• The current state and future prospects of LPWA technologies, including insights from 3GPP releases 14/15/16/17.• The needs and challenges of modern low-power applications in smart cities, smart metering, and asset tracking.• Innovations from Sony Altair and Semtech that will empower low-power IoT applications for years to come.Engage directly with our experts during a live Q&A session and discover how the Semtech HL7900 can help your organization stay ahead in the rapidly evolving IoT landscape. *https://www.rcrwireless.com/20240619/internet-of-things-4/nb-iot-and-lorawan-crowned-the-kings-of-long-range-iot-to-double-connections-to-3-5bn-in-five-years
10/15/2024 3:00 PM
Cryptocurrency webinar by Halborn for Crypto Hacks in 2024: Have We Truly Learned From Crypto’s All-Time Biggest Hacks? A Halborn x Merkle Science Webinar
Crypto Hacks in 2024: Have We Truly Learned From Crypto’s All-Time Biggest Hacks? A Halborn x Merkle Science Webinar
Join Halborn and Merkle Science for an exclusive webinar exploring key lessons from the industry's biggest security breaches, the emerging trends in 2024, and what the future holds.​Gain insights into the latest developments in smart contract security, private key management, and hot wallet protection. Dive into DeFi’s unique challenges, including cross-chain vulnerabilities and evolving money laundering techniques. Whether you're securing digital assets or focused on regulatory compliance, this webinar will provide actionable strategies to enhance your overall defense posture.​Details:​Date: Monday, October 14Time: 4:00 PM CET / 10:00 AM ESTFormat: Webinar (45 mins + 15 mins Q&A)​Speakers:​Robert Whitaker & Dr. Justus Delp – Merkle Science​Piotr Cielas & Mar Gimenez-Aguilar – Halborn​André Beganski (Moderator) - Decrypt​Topics Covered:​Smart Contract Security​Private Key Management​Hot Wallet Protection​Money Laundering Prevention in DeFi​Cross-Chain Security Challenges​Incident Response for DeFi Exploits​Emerging Attack Vectors and Trends
by Halborn
10/14/2024 2:00 PM
Cloud webinar by Seclore for Integrating Data-Centric Security with Cloud Services
Integrating Data-Centric Security with Cloud Services
With privacy regulations tightening and cloud adoption accelerating due to the impact of COVID-19, the need for data-centric security in the cloud has never been more urgent. Many organizations face a significant challenge: deploying IT infrastructure, configuring software, and integrating tools for seamless data protection in the cloud can be both complex and time-consuming.During the live webinar, the presenters will cover: - Challenges of securing remote data and work environments - Implementing data-centric security without harming productivity - Ensuring security for remote work, supply chain operations, and a traveling C-suite - Common shortcomings of cloud storage platforms like SharePoint, Box, and others Register for the webinar to learn how to secure your cloud data effectively with data-centric security. Speaker: Vishal Gupta, CEO- Seclore.
by Seclore
10/11/2024 5:00 PM
Cybersecurity webinar by IT-ISAC | Sharing Cyber Threats And Information | United States for Compliance Conundrums: The Intersection of Cybersecurity Reporting and Legal Accountability
Compliance Conundrums: The Intersection of Cybersecurity Reporting and Legal Accountability
Mandatory cyber incident reporting requirements and other regulations create increased risk for organizations that experience breaches and security professionals who respond to them. Not only must organizations and their leaders effectively defend their enterprises, but they must also understand the complex field of regulatory reporting responsibilities. Do you know what reporting requirements you’re responsible for?Join the Information Technology-Information Sharing and Analysis Center (IT-ISAC), Booz Allen, and guest speakers for a two-part webinar series geared toward cybersecurity leaders and professionals navigating the management of cyber incidents and regulatory obligations.Part I: Assessing Corporate and Personal Liability October 9 at 2 PM ETPart II: How to Establish Compliance Programs October 30 at 2 PM ETPlease select one or both webinars to join us in October.
Cybersecurity webinar by Kaspersky for Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System
Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System
As AI systems based on large language models become more powerful and widespread, more cybersecurity challenges emerge. From jailbreaks to indirect prompt injections, they are vulnerable to a wide array of LLM-specific threats. However, all these problems can be boiled down to one single issue: LLMs are probabilistic algorithms that are inherently unreliable, just like any other ML system. Does it mean they cannot be useful? Absolutely not! In this talk, we will discuss the challenges of secure and reliable LLM-based applications and the way to make them safer and more aligned with your business goals.Presented by Vladislav Tushkanov - Research Development Group Manager | Machine Learning Technology |AI Research | Kaspersky.
10/9/2024 9:00 AM
Cloud webinar by Barracuda Networks for Data Loss Prevention: A 360-degree approach to securing Cloud storage system
Data Loss Prevention: A 360-degree approach to securing Cloud storage system
Storing files and information in Cloud environment has become a necessity in place of maintaining physical infrastructure on-premises, driven by lower IT spend on storage resources in a Cloud environment. This trend of cloud first is expected to grow at a staggering 25% CAGR.The ease of storing unlimited volumes of information in Cloud Storage systems like OneDrive elevates the overhead of monitoring and administering corrective actions when data breaches occur. Often, the two activities, storing files and monitoring for exposure, are mutually exclusive, like in the following scenario:Action 1: An Employee uploads a file containing sensitive data to OneDrive.Action 2: An alert is raised to a Security personnel who has minimal understanding of why the alert was raised.Having to manage such as scenario at scale, where thousands of alerts have to be monitored and remediated becomes error prone and leaves potential gaps in the security posture, leading to:Exposure of Intellectual PropertyMalware creepFile sharing leaksA policy-driven, feedback-enabled approach which puts your security in the core, becomes a necessity to keep on top of an efficient security lifecycle.Join us in this webinar on Data Loss Protection and Prevention, to learn how to implement an end-user centric, policy-driven and feedback enabled framework to safeguard your corporate information.Speaker: Aravinth Ramachandran - Director, SW Engineering, Barracuda Networks.
10/8/2024 4:00 AM
;