Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinars

Upcoming

Mar 21, 2024

One software update, one misconfiguration, or one vulnerability in an open-source component can cause major disruptions to your business. Securing components, activities, and practices involved in the software supply chain can be a maddening exercise of whack-a-mole.

Mar 27, 2024

Branch as we know has fundamentally shifted. Current SD-WAN solutions fail to meet the demands of hybrid work, cloud adoption, and better security. More importantly, they cripple the ability to improve operational efficiency when IT leaders are forced to do more with less

Apr 18, 2024

Like stagehands at a theater, IT teams are often not seen, but their work is essential to the show going on. Without a skilled IT crew supporting end user efficiency in the background, business productivity can slow to a halt. Good IT should be imperceptible to users, enabling them to be productive without annoying interruptions.

On-Demand

Mar 12, 2024

Join us as we host TeamDynamix, Andrew Graf and Info-Tech Research Advisory Director, Sandi Conrad, as she outlines the playbook for how you can radically automate service desk tasks.

Feb 20, 2024

Cyber adversaries lurk, armed with insights from public data to craft precise traps for your organization. Open-Source Intelligence (OSINT) equips them with user-targeting details, from passwords to tech specifics and beyond. Emerging technologies like AI can make gathering this intelligence even easier. Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, turned KnowBe4's SVP of Cyber Operations, as she reveals their techniques, helping you safeguard your organization proactively.

Feb 15, 2024

Whether you're a security engineer, IT professional, or simply someone concerned about protecting your organization's information, this webinar will showcase how AI can transform the way you approach security. Join us to learn how to: Strengthen your defenses Enhance threat detection Improve response Our expert speakers will demystify the complexity of AI and guide you through its practical applications in the realm of cybersecurity - even if you aren't an expert.

Feb 05, 2024

As technology evolves, IT leaders seek solutions to relieve their teams from resource-intensive tasks. Discover the power of enterprise-wide automation in streamlining manual functions that consume IT resources. Join us to delve into how Radical Automation transforms IT Service Desk operations, saving time spent on tasks like password resets, employee on/off-boarding, ticket management, and more. 1. What are you doing today that can be automated? 2. What integration do you need to reduce redundant data entry? 3. How can you spread this out to other groups like HR & Facilities? 4. Are you able to drive more self-service adoption? 5. What will be the impact of AI on chat and self-service? The IT Service desk is changing – and changing fast. Attend this webinar to learn more about the transformation and how you can level-up your tech for reduced IT team resource drain.

Jan 30, 2024

In today's data-driven business landscape, the security and integrity of data are paramount. Amazon Simple Storage Service (S3), utilized by nearly one million organizations worldwide, is a cornerstone for storing vast amounts of unstructured, critical data. Nevertheless, the surging wave of cyberattacks, mainly targeting cloud storage, safeguarding data in Amazon S3, has become more challenging and crucial than ever. Join us as we navigate the complexities and address the challenges in securing and recovering Amazon S3 data amidst the evolving threat landscape.

Jan 25, 2024

Explore how Oracle databases, the backbone of critical enterprise applications, demand unwavering protection. That means that ensuring they are always protected is job one. However, as any database team would tell you, this is a lot easier said than done. The reliance on manual scripting, intricate job scheduling, and dependencies on multiple teams for operations like recovery complicates and prolongs the process, leaving room for errors. Today’s enterprises need more out of their database protection. They need a solution that simplifies everything from the protection of high availability configurations to advanced recoveries so you can drive even further value from your backups. Join us to see how Rubrik is helping customers get more out of their Oracle Database protection. In this session, you'll learn: Simplifying Oracle protection with Rubrik, reclaiming valuable time, and ensuring continuous database security Leveraging Rubrik to automate Oracle Data Guard protection, seamlessly offload critical backups to standby databases for heightened protection Harnessing Rubrik Live Mount and Advanced Cloning Options to help you get more out of your Oracle backups

Jan 18, 2024

Cyber attacks are becoming increasingly sophisticated and pose a significant threat to backup data. With the growing volume and complexity of applications and data, protecting virtual machines (VMs) across on-premises, enterprise and in the cloud has never been more critical.

Jan 09, 2024

Amidst increasing demands on IT teams and budget constraints heading into 2024, many IT leaders are looking for ways to work smarter - leveraging no-code software, integrations hubs and automation. When it comes to IT Service Management (ITSM) platforms, many teams are looking to improve the lives (and productivity) or their IT service desk techs. These teams often support multiple systems for HR, marketing, facilities and more, in addition to the IT technology and tools. With Enterprise Service Management (ESM) you can ease the drain on your IT resources and improve service outcomes. You'll leave knowing: 1. Key drivers for ESM and how to make your business case 2. Primary departmental areas to target for ESM expansion 3. ESM Shopper's guide that includes all you need to know 4. Why no-code matters - enabling the enterprise 5. How to build an enterprise integration strategy 6. How to use no-code tools to automate across enterprise systems Join the speakers and walk through key market trends and a simplified roadmap for ESM adoption!

Jan 04, 2024

Not ascertaining potential data exposure in a cyber attack opens the door for reputation damage, government or industry compliance concerns and penalties, and lost business. Your sensitive data requires the most up-to-date protection, find out how you can secure your sensitive data from cyber attack in this coming event.

Dec 12, 2023

PowerShell has been a game-changer for systems administrators to automate nearly any action across networks. In today's cloud-focused IT landscape, IT teams are faced with even more challenges. Writing PowerShell can be time-consuming and daunting, but unsigned scripts pose significant security risks, leaving organizations more vulnerable to threats. Join this webinar, where we'll unveil the secrets to unleashing the full potential of signed PowerShell. Learn how to automate any task securely on any endpoint while fortifying your organization against security risks. Join us as we unwrap: The high stakes security risk that scripting poses for IT teams and effective measures to ensure critical endpoint management tasks are secure How to leverage PowerShell signing to enforce separation of duties between administrators How to securely generate, store, and distribute key’s across your endpoints How to get the strongest possible technical control between authorization to write and authorization to execute

Dec 07, 2023

Every year, enterprises lose millions of dollars due to website performance issues such as slow loading times, frequent downtime resulting from server health issues, geographical distance-related delays for end users, and cyberattacks. While load balancers provide a solution to these problems, legacy solution providers are unable to mitigate them effectively. Join us as we explore how advanced application delivery and security solutions can: Elevate your application performance and scalability, ensuring a seamless user experience Fortify your defenses against modern cyber threats, safeguarding your business continuity Optimize your resource allocation, helping you make the most of your budget and resources

Dec 06, 2023

Modern infrastructures are hard to manage, secure, and optimize due to their complexity. IT managers, network operators, and more are easily overwhelmed with a flood of alarms and alerts from numerous disparate tools and services. Increasingly, enterprises are turning to modern observability solutions that aggregate such information, provide visibility into potential problems, and eliminate many manual troubleshooting and remediation tasks.

Dec 05, 2023

AI is advancing at a stunning rate, with new tools and use cases being discovered and announced every week, from writing poems all the way through to securing networks. Recent developments in LLM-based engines like ChatGTP and Google’s Bard have turned skeptics into believers as AI’s abilities and outputs are tangible and in some cases seem magical. As with all technology, AI raises both opportunities and challenges for security professionals and development teams looking to boost productivity while managing risk. The speakers will highlight some of the potential pitfalls AI can bring to secure development, and provide guidance on how security teams can think about both within the context of their programs by highlighting key stats from Snyk’s recently released 2023 State of AI report. Don't miss this opportunity to gain a deeper understanding of the dynamic intersection between AI and cybersecurity.

Dec 04, 2023

As IT leaders seek to harness the potential of automation and artificial intelligence, a wave of innovation is sweeping across crucial functions, particularly within the IT Service Desk. With a significant portion of technicians dedicating 2-3 months annually to manual tasks, the forefront of this transformation lies in automating routine processes such as password resets and employee onboarding. Integration of automation with self-service and Conversational AI is becoming pivotal, empowering IT support desks to shift the control to end-users. This dynamic combination not only reduces the time spent on manual processes but also paves the way for increased utilization of self-service. The incorporation of innovative natural language processors, back-end system integration, and automation is set to redefine self-service, offering a more intuitive and efficient experience. Looking ahead to 2024 and beyond, this webinar aims to dissect the landscape and identify the most significant benefits on the horizon.

Nov 29, 2023

Morphing your IT defenses to bounce back better. Driving innovation quickly while maintaining IT resiliency and cybersecurity is no small challenge. Cloud outages, wobbly supply chains, ransomware attacks, and other steep challenges may limit your staff and budget. This session will cover some new innovations that will help IT clear hurdles and explain how to keep innovation and resilience afloat at the same time. Register now to save your spot!

Nov 16, 2023

The world of data management has witnessed a profound transformation thanks to the introduction of cloud computing. However, as technology continues to advance and the need for data mobility and flexibility escalates, traditional cloud models are showing signs of limitations. Hybrid and multi-cloud solutions have emerged as the solution to address these challenges. Join us for an engaging webinar where we will explore the concepts of hybrid and multi-cloud, highlighting their significance as drivers of innovation in the ever-evolving landscape of cloud computing. We will also examine how the growing demand for these solutions is reshaping our approach to current and future offerings within the data management domain. This is your opportunity to gain insights into the cutting-edge strategies shaping the future of data management.

Nov 13, 2023

As many IT leaders know, IT team resource drain is real, and it is impacting many different functions across the team – especially the IT Service Desk. With most organizations now supporting between 200-300 different applications, the team is struggling to keep up with demand. There is often an increase in project work along with an increase in ticket volume. So how can ITSM tech advancements help to address these challenges? TeamDynamix and InformationWeek conducted a market study “The State of IT Team Resource Drain” to identify key areas that can benefit from ITSM modernization. From better self-service portals, improved triage and workflow, to true data integration and enterprise automation are having an impact – helping to save as much as 2-3 months / technician. Join this webinar to review the study findings and to hear how companies are addressing these challenges with Smart Service Management. Save your seat today!

Nov 08, 2023

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware. Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

Nov 01, 2023

In today's cybersecurity landscape, teams dedicate countless hours each year collecting evidence to prove compliance with regulatory and standards mandates. As we face a future with even more regulatory demands, an ever-expanding cyber threat landscape, and a growing number of vulnerable connection points, this burden is set to intensify. This implies that cybersecurity teams will be tasked with more responsibilities, fewer resources, and limited time to guide businesses on harnessing cyber risk for strategic growth. When you attend this webinar, you'll learn to: Elevate regulatory compliance from a mere checklist item to a catalyst for business growth through automation. Transform cybersecurity and regulatory compliance teams into strategic advisors rather than just cost centers. Improve talent retention, department reputation, time and resource ROI, and more with automated evidence collection.

Oct 26, 2023

The majority of IT and Security professionals fear that their cyber strategy isn’t enough to combat today’s cyber threats. In fact, more than 70% believe it would take over four days to recover from a cyber attack. It's no wonder almost 3 in 4 say their company would pay a ransom to recover data and restore business processes. Of course, when dealing with cybercriminals, there’s no guarantee paying a ransom means your data will be recovered—or that if it is recovered, it’ll be clean and free of malware. These are some of the results of the latest annual State of Data Security and Management report. Join this webinar to hear more from our latest annual State of Data Security and Management Survey and about how IT and Security leaders are taking charge against cyber threats in the cloud era. Register Today!

Oct 25, 2023

Avoid the cracks and join this webinar to find out how to navigate the paradigm shift towards Zero Trust. We’ll explore the evolution of remote access VPN to more modern application access technologies.

Oct 19, 2023

IT leaders look to the Dev team to streamline, accelerate, and upskill the workforce in the face of growing demands, complexities, and threats from outside the organization. Meanwhile, the C-Suite is hoping DevOps can figure out a way to reduce or remove IT costs while distributing more resilience for the organizational infrastructure. It feels a bit like a game of tug of war. How can this be resolved?

Oct 18, 2023

Generative AI is already one of the most rapidly adopted technologies in decades and ChatGPT’s free and paid versions show how bottoms-up adoption is making it a central tool in the workplace – whether it is sanctioned or not. Banning apps or tools rarely works because your employees will still find ways to use them, making your organization less—not more—secure. The last thing you need is a bunch of data being lost to Shadow AI. The availability of ChatGPT Enterprise offers organizations a way to consolidate their employees’ use of AI but how should organizations determine how and when they should “step up” to a company-wide rollout? The solution doesn't have to be spooky. Join this special webinar as industry veterans Jonathan Feldman, Wake County CIO, and James Plouffe, Seraphic Security, provide practical advice for implementing, managing, and securing AI in the enterprise.

Oct 17, 2023

How can companies prepare for an outage at a major cloud service or cloud infrastructure provider? Public cloud outages are getting worse, and any outage can be costly and highly damaging for your company. Yet, the cost and difficulty of building a resilient infrastructure can be just as daunting. This webinar reveals your best options and what to do now to prepare for the inevitable and rebound more quickly. Join this webinar to discuss: Ensuring secure access to mobile devices for cloud/private apps, data, public cloud services, and the open web. Reducing vulnerabilities in high-traffic cloud environments by addressing configuration errors. Implementing proactive monitoring and response strategies for cloud service alerts. Understanding the influence of SLAs on potential outage solutions from your cloud provider. Register today!

Oct 12, 2023

In the ever-evolving landscape of IT, leaders are in the midst of intense strategizing for the years ahead – beyond 2024. It's a period filled with budgetary considerations, tech strategy blueprints, and the critical evaluation of ongoing projects. The hot topics dominating these discussions are automation, AI, and security, closely rivaled by the pressing issue of IT resource limitations. As IT visionaries strive to unlock the secrets of successful budget management and optimal resource allocation, their laser focus turns to pivotal aspects like the IT Service Desk. Are your technological foundations robust enough to cater to the surging demands on the horizon? Tune in to gain invaluable insights into the imminent challenges IT Service Desks will confront in the coming years, and explore effective strategies to tackle the mounting demand head-on! When you attend this webinar, we will explore: • Embracing the Impact of Automation on IT Service Efficiency • Maximizing the Potential of Service Portals • Conversational AI: Automated Issue Resolution • Beyond IT: Leveraging ESM • Unifying Work Management in a Holistic View

Oct 03, 2023

oin us for a transformative webinar as we unveil the power of AI-Based data protection and GenAI. Witness how these revolutionary technologies elevate document productivity, reshaping industries through cutting-edge AI innovations. Explore how these solutions redefine document analysis, collaboration, and accuracy, achieving unparalleled efficiency. Foxit Software's integration of AI-Based Redaction and AI Assistant into its PDF Editing suite takes center stage, redefining document management and collaboration. Ready to harness GenAI's potential for operational excellence? Reserve your spot now and embark on a journey to unleash the full power of AI. Key Takeaways: Grasp AI-Based Document Redaction's role in safeguarding sensitive data and compliance. Explore GenAI's transformative impact on document analysis and productivity. Witness real-world use cases highlighting AI-powered document management. Learn how Foxit Software's AI integration enhances collaboration and efficiency. Uncover how AI shapes the future of document workflows and operational excellence.

Sep 21, 2023

In the fast-paced realm of technology adoption, the IT Service Desk is at the forefront of innovation, navigating the surge in demands. As ticket volumes soar and project support requests surge, IT leaders are on a mission to liberate their teams from the resource drain. Join this webinar to gain valuable insights from a recent Information Week Market Study focused on how to increase self-service and automate manual tasks associated with common requests such as onboarding, password resets, and active directory updates. Join this webinar to better understand the importance of: Driving self-service adoption with better portals Automating manual tasks such as onboarding Using Conversational AI to improve chat interactions Combing ticket and project work into one view Creating automations from the service catalog Radical Automation of the IT Service Desk Tech Showcase Are you ready to see how the modernization of IT Service Management can help you reduce IT resource drain and budgets? This webinar will include a sneak peek demo of how emerging technology is creating radical automation for the IT Service Desk.

Sep 19, 2023

In the current global economic landscape, the imperative to achieve more with limited resources is impacting departments across organizations. Concurrently, the expansion of digital footprints presents challenges as cyber threats exploit vulnerable infrastructures. To uphold a leading-edge cyber risk program and align with business demands, organizations must explore resourceful approaches. An essential initial stride toward effective cyber risk management is gaining comprehensive insight into the extended attack surface of the organization and its associated risks. Equally critical is the capability to articulate strategy and program effectiveness to stakeholders, including the Board. This significance has grown even more pronounced with the introduction of new SEC Regulations. As the cyber landscape evolves, the ability to navigate these complexities becomes paramount. By attending this webinar, you'll dive into: Unleashing the Potential of Your Current Tools: Strategies to enhance tool effectiveness while safeguarding against cyber threats. Effective Board Communication: Understanding the art of conveying cyber insights in a language that resonates with the Board. Fostering Accountability: Unpacking the internal and external dimensions of accountability, while exploring the potential impacts of recent SEC regulation changes. Enriching Visibility through Continuous Monitoring: How monitoring your external attack surface can illuminate priorities and elevate organizational awareness.