Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinars

Aug 17, 2022

The headline-making attack against Solarwinds sent a shockwave through the world and had many security and business leaders reexamining the security of their own supply chains. In a supply chain - or third party - attack, criminals infiltrate and disrupt the computer systems of a company's key suppliers or vendors and, through this third-party access, are then able to breach other organizations associated with the initial target. In this webinar, experts talk through the stages of a supply chain attack. You will also learn what tools and strategies you can start using immediately to assess your own supply chain security and put defenses in place to keep your supply chain protected.

Aug 18, 2022

At this virtual event, you'll get a better picture of today's threat landscape; learn what tools and techniques can best help your organization detect and prevent these attacks; design a thorough incident response plan that will help your organization survive a successful attack intact; and be prepared with a fast answer to the age-old question: "to pay or not to pay?"

Aug 18, 2022

When ransomware locks up your business's critical data and essential gear, there is no time to figure out what to do. There is only time to act - without panicking. That's why a good ransomware response playbook is essential: Do you know if this is a worm that is going to spread to other endpoints or is the attack contained. Do we have backups and how long will it take to get up and running? Should we pay the ransom - and do we even have the cryptocurrency on hand to pay with? Do we know what to do to ensure business continuity? In this webinar, experts walk you through questions and help you prepare your answers in the ransomware response playbook, so that when the infection hits your network, you have the processes and technologies necessary to bounce back.

Aug 25, 2022

Top executives often ask, "how safe are we from a cyber breach?" But it can be difficult to quantitatively measure cyber risk, and even harder to assess your organization's attack surface. In this webinar, you'll learn how to evaluate your organization's risk and security posture, and how to present that assessment to enterprise leaders who may not be technology experts or security-savvy. You'll learn about the costs associated with today's threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can justify spending additional budget on security tools and take the steps needed to protect against current exploits.

Aug 30, 2022

Bots are launching more complex and targeted attacks such as price scraping, credential stuffing, scalping, and credit card fraud, but many security defenders are still focused on only the most obvious attacks. Automated bot attacks are on the rise, but defenders often don't know how to recognize attacks. In this webinar, experts will discuss which attacks post the greatest risks to businesses, and highlight the impact across different industries. See how bots try to evade detection and learn best practices to help protect your business from both automated and manual bot attacks.

Sep 07, 2022

Advancements in artificial intelligence technology and machine learning and deep learning algorithms promise to transform enterprise security by giving IT security teams tools to detect and respond to attacks faster than before. Before security teams can use these tools, they need to know what is possible with different types of learning and how artificial intelligence can address complex questions. In this webinar, experts will discuss the differences between machine learning and deep learning, and how to evaluate and choose the right approach that can address enterprise security challenges.

Sep 28, 2022

This is your opportunity to get up-to-date insights on how hybrid work is progressing and what we're learning about real-world choices about technologies such as video, collaboration platforms, E-911, customer experience (CX), and more.

Sep 28, 2022

In this digital event session presented by Enterprise Connect, a leading expert on E911 will give you the latest updates and help you understand how your emergency readiness can keep up with an ever-changing hybrid work environment.

On-Demand Webinars

2022-06-09 13:00:00 EDT

Businesses today need real-time insights into application performance, user experience, and security risks. Increasingly, they are turning to tools and services that aggregate, analyze, and derive insights from log, trace, and telemetric data generated by numerous sensors and point solutions. In this webinar, our specialist will explore the tools and techniques to help shine a light into all the shadowy parts of your network infrastructure.

2022-04-26 13:00:00 EDT

Security has historically been bolted onto traditional network architectures as an afterthought. With the shift to everything-as-a-service, legacy security appliances can become bottlenecks to scale and agility. Perimeter-based security models require all network traffic to trombone through specific Internet exit points, impacting SaaS application performance. Security needs to evolve from a bottleneck to an enabler for the next wave of digital transformation. Our experts will be covering the fundamentals of network SECaaS in this new webinar.

2022-04-07 13:00:00 EDT

In an ever evolving and expanding threat landscape, organizations cannot rely on traditional network security. Organizations need to mitigate risks and protect their network through the use of proactive, cloud-based and machine learning approaches. And, when it comes to security containers, it's a whole new ball game. Join this webinar to learn from front-line examples on how to protect your container deployments.

2022-03-30 13:00:00 EDT

For decades, enterprises have searched for networking solutions that would provide remote workers and distributed offices with secure and reliable connectivity to conduct business. Due to the pandemic's disruption, requirements have changed rapidly. At the same time, cyberattacks have continued to evolve and become more pervasive and even more dangerous.

In this webinar, you will find that, increasingly, what is needed is a WAN approach that focuses on security based on a zero-trust strategy. Such an approach will accommodate today's work-from-anywhere business operations and support whatever happens in the future.