The Ultimate Directory on Technology Webinars

Search our directory for upcoming webinars on Technology

Previous Webinars

Cybersecurity webinar by Toradex for Are you really ready for the new EU Cyber Resilience Act?
Are you really ready for the new EU Cyber Resilience Act?
The importance of security in industrial devices is evolving from a recommended practice to an absolute necessity. The forthcoming EU Cyber Resilience Act will impose substantial penalties on device manufacturers who do not meet the mandated security standards. In this session, you will gain insight into essential security requirements and discover how Toradex and Torizon can help.Key TakeawaysUnderstand what the Cyber Resilience Act could mean for youExplore the essential requirements outlined in the ActDocumentation and DeclarationsIncident ReportingMitigation and Software UpdatesLearn how you can stay ahead and be well-preparedDiscuss your security concerns with our expertsWe will also have a dedicated live Q&A towards the end of the webinar.Speaker: Jon Oster, Platform Development Lead - Torizon, Toradex.
by Toradex
10/4/2024 1:00 PM
Cybersecurity webinar by Money Management for Addressing Technological Challenges for AFS Licensees
Addressing Technological Challenges for AFS Licensees
In this free webinar on 3 October, Money Management will be looking at the technological challenges facing Australian Financial Services (AFS) licensees.With technology playing an ever-greater role in practice management, this webinar will help licensees understand they can use technology to streamline their work processes, implement cost savings and create efficiencies.This webinar will bring together key decision makers, leading executives and professionals from licensees to explore critical issues such as cyber security, digital transformation and regtech solutions.Key discussion points:Cyber security: Best practices for safeguarding sensitive data and preventing fraud.Digital transformation: Balancing legacy systems with innovative technologies.Regtech: Leveraging technology for regulatory compliance and data management.Client experience: Enhancing user experience and integrating communication channels.Data management: Strategies for effective data analytics and ensuring privacy.Scalability: Approaches to expanding technology solutions while managing costs.Don’t miss out on this opportunity to learn how you can use technology to improve your business. Register now to secure your spot!Speakers: Stuart Alsop - Director of Sales, intelliflo; Lanie Worsley - Director of Customer Success & Client Solution, Morningstar; Laura Dew - Editor, Money Management.
10/3/2024 4:00 AM
Cybersecurity webinar by Anonyome Labs for Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against Fraud
Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against Fraud
Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against FraudWednesday, October 2, 10:00 - 11:00 a.m. (PST)Join Dr Paul Ashley, CTO at Anonyome Labs. as he discusses Decentralized Identity being a disruptive technology in the Identity and Access Management (IAM) space.Current identity management methods have been proven to be very poor from a security and privacy point of view.  Numerous security incidents are reported, people’s data is regularly exposed, and the weakness of the current IAM system is apparent.  It has resulted in identity theft and ever increasing financial fraud.Discover how to protect your members against fraud during this engaging and insightful discussion with Anonomye's Dr. Paul Ashley.This webinar will cover such items as:What is decentralized identity? Real-world examples of decentralized identityHow is Anonyome applying decentralized identity to credit unions?Process to get persistent link between Identity Verification (IDV) and authenticated access in each channelOther uses for the IDV reusable credentialWhy should credit unions focus on this enhancement/security measure now?Other preventative measuresRegister today!Speaker: Dr. Paul Ashley is CTO at Anonyome Labs
10/2/2024 5:00 PM
Software webinar by Ardan Labs for Deep Dive into DNS on Linux and Kubernetes
Deep Dive into DNS on Linux and Kubernetes
There is a recurring joke in IT that says “it’s always DNS.” It even prompted a haiku:It's not DNSThere's no way it's DNSIt was DNSIt’s often mentioned in the context of very strange bugs or outages that seem unrelated to DNS but turn out to be related anyway because DNS is everywhere, and it can seem weird.In this short presentation, we won’t talk about a weird bug, but about a weird Kubernetes warning message—something about DNSConfigForming and “nameserver limits”. Spoilers: the error message itself is harmless, but it will give us an Ariadne thread to learn more about DNS configuration in Linux in general, and Kubernetes in particular.We’ll talk about resolv.conf, nsswitch.conf, systemd-resolved, and more. We’ll also discuss DNS configuration policies on Kubernetes and differences between glibc and musl, the system library used by the famous Alpine Linux distribution, which is extremely popular within container ecosystems.This session will equip you with the knowledge to troubleshoot DNS-related issues effectively, whether they are actually DNS-related or not.We will cover:resolv.conf: Understanding the primary DNS configuration file on Linux.nsswitch.conf: How this file determines the sources used by various services.systemd-resolved: An overview of this system service for network name resolution.DNS in Kubernetes: DNS configuration policies and best practices in Kubernetes.glibc vs musl: Differences between these libraries and their impact on DNS, particularly in container environments like Alpine Linux.About Jérôme Petazzoni:Jérôme was part of the team that built, scaled, and operated the dotCloud PAAS before it became Docker. He worked for seven years at the famous container company, wearing various hats. When he’s not busy with computers, he collects musical instruments. He can arguably play the theme of Zelda on a dozen of them.
10/2/2024 4:00 PM
AI (Artificial Intelligence) webinar by Miracle Software Systems for AI Agents: From Concept to Real-World Applications
AI Agents: From Concept to Real-World Applications
AI Agents is a software program that redefines how companies operate, innovate, and stay competitive by automating repetitive tasks and making complex data-driven decisions. Join us for the webinar on September 30th, 2024, from 11 AM to 12 PM EST, to discover the types of AI agents, how they function, and their transformative impact on elevating efficiency, reducing costs, and driving technological advancement. Also, learn about its real-world applications across diverse sectors such as customer service, predictive maintenance, finance, and manufacturing, highlighting the strategic potential AI agents bring to businesses of all sizes.Speakers: Sameer Deodatta Jaokar - Director of Customer Success - Automation and AI, Miracle Software Systems(USA).Inc; Shrikar Ravindra Chonkar - Practice Manager - Innovation Labs, Miracle Software Systems, Inc.
9/30/2024 3:00 PM
AI (Artificial Intelligence) webinar by Miracle Software Systems for Webinar | AI Agents: From Concept to Real-World Applications
Webinar | AI Agents: From Concept to Real-World Applications
Automation has evolved as the key to success and innovation, as it enhances efficiency and productivity. To stay ahead and drive growth, businesses across the globe are embracing AI-driven solutions. AI Agents is a software program that redefines how companies operate, innovate, and stay competitive by automating repetitive tasks and making complex data-driven decisions.Join us for the webinar on September 30th, 2024, from 11 AM to 12 PM EST, to discover the types of AI agents, how they function, and their transformative impact on elevating efficiency, reducing costs, and driving technological advancement. Also, learn about its real-world applications across diverse sectors such as customer service, predictive maintenance, finance, and manufacturing, highlighting the strategic potential AI agents bring to businesses of all sizes.Speakers: Sameer Deodatta Jaokar - Director of Customer Success - Automation and AI, Miracle Software Systems(USA) Inc.; Shrikar Ravindra Chonkar - Practice Manager - Innovation Labs, Miracle Software Systems(USA) Inc.
9/30/2024 3:00 PM
Cloud webinar by Global Signage Alliance for VXT 2.1 Revealed: What’s New and How It Impacts You
VXT 2.1 Revealed: What’s New and How It Impacts You
VXT 2.1 Revealed: What’s New and How It Impacts YouJoin us for an insightful upcoming webinar hosted by the Global Signage Alliance! We’ll dive into the latest updates on VXT 2.1, guided by expert Pete Colquitt.Key Highlights:🔍 Explore the Newest Features of VXT 2.1🙋 Interactive Q&A Session with Pete Colquitt, covering key innovations and updates📣 Stay ahead of the curve—register now to discover how VXT 2.1 and other advancements are transforming digital signage.Learn how to optimize your workflows and unlock new possibilities.To secure your spot, complete the registration form above.For more information or questions, contact us at [email protected] look forward to having you join us as we explore the future of digital signage together!
9/27/2024 1:00 PM
Cybersecurity webinar by Tenable for From Exposure to Control: Automate Vulnerability Response with ServiceNow & Tenable
From Exposure to Control: Automate Vulnerability Response with ServiceNow & Tenable
Learn how integrated solutions from Tenable and ServiceNow help you quickly and effectively automate remediation response based on actual riskWith expanding attack surfaces, operational complexity, and evolving compliance requirements, vulnerability response is a significant burden for even the largest organizations.Join experts from Tenable and ServiceNow for a deep dive into how you can overcome the common pitfalls of vulnerability response, at 2 pm ET, September 26, 2024. By attending you’ll gain insight into:How joint solutions from Tenable and ServiceNow enable IT and security teams to streamline vulnerability management workflows, prioritization, and remediation across your organization’s critical assetsNew solutions coming from the Tenable-ServiceNow technology partnershipAnd, we’ll have live Q&A to address your specific questions.Who should attend?IT and security professionals responsible for improving vulnerability response and overall security program efficacy are encouraged to attend.Save your spot. Register now.If you can’t make the live session, register anyway and we’ll email you a link to the replay.Speakers: Jamie Jackson - Senior Product Success Manager, ServiceNow; Nick Keuning - Senior Director, Solutions Architecture, Tenable; Ben Prime - Senior Advisory Solution Architect, Security, ServiceNow.
by Tenable
9/26/2024 6:00 PM
Cybersecurity webinar by Barracuda Networks for Threat Spotlight report: Latest ransomware trends, real-world attack analysis, and best defenses
Threat Spotlight report: Latest ransomware trends, real-world attack analysis, and best defenses
Barracuda’s annual Ransomware Threat Spotlight report is out, packed with high-value insights about the past year’s biggest developments and trends. The report is prepared by top threat experts, based on information from reported global ransomware attacks along with data gathered by our Extended Detection and Response (XDR) deployments. Attend this webinar and get a deep dive into the key takeaways, along with plenty of detailed analysis of real-world attacks and actual SOC responses. After attending this session, you’ll know what to expect from ransomware crooks in the coming year—and you’ll know all about advanced strategies and technologies to beat back their nastiest, most sophisticated efforts to steal your data, extort your money, and wreck your operations. Of course, you could just skip it and hope for the best. But the smart money says don’t miss this one—register now. Speaker: Adam Khan - VP, Global Security Operations, Barracuda Networks.
9/26/2024 5:00 PM
Cybersecurity webinar by Red Piranha for Meet the new Threat Detection and Logging guidance from the ASD and CISA. Detect CnC Callouts, Lateral movement, and pivoting with Crystal Eye #TDIR | Red Piranha
Meet the new Threat Detection and Logging guidance from the ASD and CISA. Detect CnC Callouts, Lateral movement, and pivoting with Crystal Eye #TDIR | Red Piranha
To keep up with advanced cyber threats from APT’s using living of the land (LOTL), pivoting and lateral movement techniques within your network, effective threat detection and event logging are key to staying secure. The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), in collaboration with global cybersecurity authorities including CISA, FBI, and NCSC, has established comprehensive guidelines to bolster organizational resilience.Red Piranha is a pioneer and leader in threat detection with Crystal Eye designed to meet the new guidance to detect living off-the-land attacks and EDR bypass, offering advanced capabilities to enhance your security posture.In this session, you will learn how Crystal Eye’s Advanced Intrusion Detection and Prevention System (IDPS) is essential for combatting, pivoting and lateral movement within networks.You will discover how to effectively detect and isolate lateral movement activities within your network and implement a robust network segmentation strategy using Crystal Eye’s Advanced Intrusion Detection and Prevention System: Comprehensive Detection and Prevention Framework  Operational Modes of IDPS  Customisable Rulesets and Profiles  Multi-Tenancy and Advanced Configuration  Local Rule Creation  Ongoing Updates and Adaptation  Key Features Network Segmentation: Implement robust segmentation to create secure zones with tailored IDPS profiles, isolating sensitive data and critical infrastructure from general user networks. This confines attacks to specific segments, ensuring rapid containment if lateral movement is detected. Detection and Prevention Framework: Crystal Eye’s IDPS identifies and counters lateral movement using network traffic analysis, anomaly detection, and response mechanisms  Operational ModesDetection & Protection Mode: Alerts and logs suspicious traffic without blocking, allowing for thorough threat analysis. Administrators can configure profiles and rulesets for segmented interfaces. Inline Mode: Actively blocks malicious traffic based on predefined rules, preventing the spread of threats. Network Security Monitoring Mode (NSM): Provides detailed visibility into network activities, capturing and logging events to identify movement patterns. Customizable Rulesets and Profiles: Administrators can create tailored profiles and rulesets for different network segments, detecting sophisticated threats and addressing unique security needs. Multi-Tenancy and Advanced Configuration: Efficiently manage multiple security zones and profiles with customizable local rules for detecting advanced tactics. Ongoing Updates: Keeps up with new lateral movement techniques through regular updates from Red Piranha’s Global Security Operations Team. This is a fantastic opportunity to stay ahead of ASD's new standards and strengthen your organisation’s cybersecurity posture.  So, join us in this knowledge sprint webinar to learn how your business can align with the ASD’s latest guidelines. Key PresentersGeorge Boulis - General Manager, Sales at Red PiranhaRoland Casabar - Cyber Security Engineer & Incident Response at Red PiranhaDylan Paquelet - Cyber Security Engineer at Red Piranha
9/26/2024 1:00 PM
;