Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinars

Upcoming

May 06, 2024

In this upcoming webinar, you'll discover how to harness the power of familiar tools to become a cloud security expert and effectively combat the most impactful attack vectors – human and machine identities and entitlements.

May 07, 2024

In this webinar, you'll learn how to use UiPath Test Suite as an automated testing tool to streamline your application testing process. Plus, you'll discover how to leverage Autopilot for Test Suite, a new AI-powered experience that enables enhanced productivity for testing.

May 22, 2024

Some dev and security teams mix it up in all the wrong ways, whether that’s in constant clashes or in unintentional operational shortfalls. Either way, it’s time to batten the hatches and unite the crew. This webinar shares ways to do that by amplifying the advantages in DevOps and transitioning them to DevSecOps.

On-Demand

Apr 18, 2024

Like stagehands at a theater, IT teams are often not seen, but their work is essential to the show going on. Without a skilled IT crew supporting end user efficiency in the background, business productivity can slow to a halt. Good IT should be imperceptible to users, enabling them to be productive without annoying interruptions.

Mar 21, 2024

One software update, one misconfiguration, or one vulnerability in an open-source component can cause major disruptions to your business. Securing components, activities, and practices involved in the software supply chain can be a maddening exercise of whack-a-mole.

Mar 12, 2024

Join us as we host TeamDynamix, Andrew Graf and Info-Tech Research Advisory Director, Sandi Conrad, as she outlines the playbook for how you can radically automate service desk tasks.

Feb 20, 2024

Cyber adversaries lurk, armed with insights from public data to craft precise traps for your organization. Open-Source Intelligence (OSINT) equips them with user-targeting details, from passwords to tech specifics and beyond. Emerging technologies like AI can make gathering this intelligence even easier. Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, turned KnowBe4's SVP of Cyber Operations, as she reveals their techniques, helping you safeguard your organization proactively.

Feb 15, 2024

Whether you're a security engineer, IT professional, or simply someone concerned about protecting your organization's information, this webinar will showcase how AI can transform the way you approach security. Join us to learn how to: Strengthen your defenses Enhance threat detection Improve response Our expert speakers will demystify the complexity of AI and guide you through its practical applications in the realm of cybersecurity - even if you aren't an expert.

Feb 05, 2024

As technology evolves, IT leaders seek solutions to relieve their teams from resource-intensive tasks. Discover the power of enterprise-wide automation in streamlining manual functions that consume IT resources. Join us to delve into how Radical Automation transforms IT Service Desk operations, saving time spent on tasks like password resets, employee on/off-boarding, ticket management, and more. 1. What are you doing today that can be automated? 2. What integration do you need to reduce redundant data entry? 3. How can you spread this out to other groups like HR & Facilities? 4. Are you able to drive more self-service adoption? 5. What will be the impact of AI on chat and self-service? The IT Service desk is changing – and changing fast. Attend this webinar to learn more about the transformation and how you can level-up your tech for reduced IT team resource drain.

Jan 30, 2024

In today's data-driven business landscape, the security and integrity of data are paramount. Amazon Simple Storage Service (S3), utilized by nearly one million organizations worldwide, is a cornerstone for storing vast amounts of unstructured, critical data. Nevertheless, the surging wave of cyberattacks, mainly targeting cloud storage, safeguarding data in Amazon S3, has become more challenging and crucial than ever. Join us as we navigate the complexities and address the challenges in securing and recovering Amazon S3 data amidst the evolving threat landscape.

Jan 25, 2024

Explore how Oracle databases, the backbone of critical enterprise applications, demand unwavering protection. That means that ensuring they are always protected is job one. However, as any database team would tell you, this is a lot easier said than done. The reliance on manual scripting, intricate job scheduling, and dependencies on multiple teams for operations like recovery complicates and prolongs the process, leaving room for errors. Today’s enterprises need more out of their database protection. They need a solution that simplifies everything from the protection of high availability configurations to advanced recoveries so you can drive even further value from your backups. Join us to see how Rubrik is helping customers get more out of their Oracle Database protection. In this session, you'll learn: Simplifying Oracle protection with Rubrik, reclaiming valuable time, and ensuring continuous database security Leveraging Rubrik to automate Oracle Data Guard protection, seamlessly offload critical backups to standby databases for heightened protection Harnessing Rubrik Live Mount and Advanced Cloning Options to help you get more out of your Oracle backups

Jan 18, 2024

Cyber attacks are becoming increasingly sophisticated and pose a significant threat to backup data. With the growing volume and complexity of applications and data, protecting virtual machines (VMs) across on-premises, enterprise and in the cloud has never been more critical.

Jan 09, 2024

Amidst increasing demands on IT teams and budget constraints heading into 2024, many IT leaders are looking for ways to work smarter - leveraging no-code software, integrations hubs and automation. When it comes to IT Service Management (ITSM) platforms, many teams are looking to improve the lives (and productivity) or their IT service desk techs. These teams often support multiple systems for HR, marketing, facilities and more, in addition to the IT technology and tools. With Enterprise Service Management (ESM) you can ease the drain on your IT resources and improve service outcomes. You'll leave knowing: 1. Key drivers for ESM and how to make your business case 2. Primary departmental areas to target for ESM expansion 3. ESM Shopper's guide that includes all you need to know 4. Why no-code matters - enabling the enterprise 5. How to build an enterprise integration strategy 6. How to use no-code tools to automate across enterprise systems Join the speakers and walk through key market trends and a simplified roadmap for ESM adoption!

Jan 04, 2024

Not ascertaining potential data exposure in a cyber attack opens the door for reputation damage, government or industry compliance concerns and penalties, and lost business. Your sensitive data requires the most up-to-date protection, find out how you can secure your sensitive data from cyber attack in this coming event.

Dec 12, 2023

PowerShell has been a game-changer for systems administrators to automate nearly any action across networks. In today's cloud-focused IT landscape, IT teams are faced with even more challenges. Writing PowerShell can be time-consuming and daunting, but unsigned scripts pose significant security risks, leaving organizations more vulnerable to threats. Join this webinar, where we'll unveil the secrets to unleashing the full potential of signed PowerShell. Learn how to automate any task securely on any endpoint while fortifying your organization against security risks. Join us as we unwrap: The high stakes security risk that scripting poses for IT teams and effective measures to ensure critical endpoint management tasks are secure How to leverage PowerShell signing to enforce separation of duties between administrators How to securely generate, store, and distribute key’s across your endpoints How to get the strongest possible technical control between authorization to write and authorization to execute

Dec 07, 2023

Every year, enterprises lose millions of dollars due to website performance issues such as slow loading times, frequent downtime resulting from server health issues, geographical distance-related delays for end users, and cyberattacks. While load balancers provide a solution to these problems, legacy solution providers are unable to mitigate them effectively. Join us as we explore how advanced application delivery and security solutions can: Elevate your application performance and scalability, ensuring a seamless user experience Fortify your defenses against modern cyber threats, safeguarding your business continuity Optimize your resource allocation, helping you make the most of your budget and resources

Dec 06, 2023

Modern infrastructures are hard to manage, secure, and optimize due to their complexity. IT managers, network operators, and more are easily overwhelmed with a flood of alarms and alerts from numerous disparate tools and services. Increasingly, enterprises are turning to modern observability solutions that aggregate such information, provide visibility into potential problems, and eliminate many manual troubleshooting and remediation tasks.

Dec 05, 2023

AI is advancing at a stunning rate, with new tools and use cases being discovered and announced every week, from writing poems all the way through to securing networks. Recent developments in LLM-based engines like ChatGTP and Google’s Bard have turned skeptics into believers as AI’s abilities and outputs are tangible and in some cases seem magical. As with all technology, AI raises both opportunities and challenges for security professionals and development teams looking to boost productivity while managing risk. The speakers will highlight some of the potential pitfalls AI can bring to secure development, and provide guidance on how security teams can think about both within the context of their programs by highlighting key stats from Snyk’s recently released 2023 State of AI report. Don't miss this opportunity to gain a deeper understanding of the dynamic intersection between AI and cybersecurity.

Dec 04, 2023

As IT leaders seek to harness the potential of automation and artificial intelligence, a wave of innovation is sweeping across crucial functions, particularly within the IT Service Desk. With a significant portion of technicians dedicating 2-3 months annually to manual tasks, the forefront of this transformation lies in automating routine processes such as password resets and employee onboarding. Integration of automation with self-service and Conversational AI is becoming pivotal, empowering IT support desks to shift the control to end-users. This dynamic combination not only reduces the time spent on manual processes but also paves the way for increased utilization of self-service. The incorporation of innovative natural language processors, back-end system integration, and automation is set to redefine self-service, offering a more intuitive and efficient experience. Looking ahead to 2024 and beyond, this webinar aims to dissect the landscape and identify the most significant benefits on the horizon.

Nov 29, 2023

Morphing your IT defenses to bounce back better. Driving innovation quickly while maintaining IT resiliency and cybersecurity is no small challenge. Cloud outages, wobbly supply chains, ransomware attacks, and other steep challenges may limit your staff and budget. This session will cover some new innovations that will help IT clear hurdles and explain how to keep innovation and resilience afloat at the same time. Register now to save your spot!

Nov 16, 2023

The world of data management has witnessed a profound transformation thanks to the introduction of cloud computing. However, as technology continues to advance and the need for data mobility and flexibility escalates, traditional cloud models are showing signs of limitations. Hybrid and multi-cloud solutions have emerged as the solution to address these challenges. Join us for an engaging webinar where we will explore the concepts of hybrid and multi-cloud, highlighting their significance as drivers of innovation in the ever-evolving landscape of cloud computing. We will also examine how the growing demand for these solutions is reshaping our approach to current and future offerings within the data management domain. This is your opportunity to gain insights into the cutting-edge strategies shaping the future of data management.

Nov 13, 2023

As many IT leaders know, IT team resource drain is real, and it is impacting many different functions across the team – especially the IT Service Desk. With most organizations now supporting between 200-300 different applications, the team is struggling to keep up with demand. There is often an increase in project work along with an increase in ticket volume. So how can ITSM tech advancements help to address these challenges? TeamDynamix and InformationWeek conducted a market study “The State of IT Team Resource Drain” to identify key areas that can benefit from ITSM modernization. From better self-service portals, improved triage and workflow, to true data integration and enterprise automation are having an impact – helping to save as much as 2-3 months / technician. Join this webinar to review the study findings and to hear how companies are addressing these challenges with Smart Service Management. Save your seat today!

Nov 08, 2023

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware. Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

Nov 01, 2023

In today's cybersecurity landscape, teams dedicate countless hours each year collecting evidence to prove compliance with regulatory and standards mandates. As we face a future with even more regulatory demands, an ever-expanding cyber threat landscape, and a growing number of vulnerable connection points, this burden is set to intensify. This implies that cybersecurity teams will be tasked with more responsibilities, fewer resources, and limited time to guide businesses on harnessing cyber risk for strategic growth. When you attend this webinar, you'll learn to: Elevate regulatory compliance from a mere checklist item to a catalyst for business growth through automation. Transform cybersecurity and regulatory compliance teams into strategic advisors rather than just cost centers. Improve talent retention, department reputation, time and resource ROI, and more with automated evidence collection.

Oct 26, 2023

The majority of IT and Security professionals fear that their cyber strategy isn’t enough to combat today’s cyber threats. In fact, more than 70% believe it would take over four days to recover from a cyber attack. It's no wonder almost 3 in 4 say their company would pay a ransom to recover data and restore business processes. Of course, when dealing with cybercriminals, there’s no guarantee paying a ransom means your data will be recovered—or that if it is recovered, it’ll be clean and free of malware. These are some of the results of the latest annual State of Data Security and Management report. Join this webinar to hear more from our latest annual State of Data Security and Management Survey and about how IT and Security leaders are taking charge against cyber threats in the cloud era. Register Today!

Oct 25, 2023

Avoid the cracks and join this webinar to find out how to navigate the paradigm shift towards Zero Trust. We’ll explore the evolution of remote access VPN to more modern application access technologies.