Upcoming Webinars - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Upcoming Webinars
Webinar Archives
How to Outsource Security Without Inviting Risk and Wasting Money
Date: Aug 24, 2021
View webinar
In this webinar, experts offer advice on how to effectively use third-party service providers, how to choose a provider that fits your requirements, and how to ensure the third-party provider is meeting your security requirements.

Reduce Supply Chain Risk by External Threat Hunting
Date: Aug 19, 2021
View webinar
In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, this company gets ahead of supply chain threats and reduced its exposure.

Fact or Fiction? The Truth About Cloud Native Security
Date: Aug 18, 2021
View webinar
In this webinar, you'll discover how to ensure your cloud infrastructure and cloud native applications are built and run securely, and learn how to reap all the business benefits cloud has to offer without compromising on security.

Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise
Date: Aug 17, 2021
View webinar
Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How does SOAR work in the enterprise? How does it lower security risk, and what skills and tools do you need to make it work in your own organization? In this webinar, experts answer these questions and provide recommendations on practical implementation of the SOAR concept.

Two Sides of the PAM Coin
Date: Aug 11, 2021
View webinar
There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We invite you to join ThycoticCentrify to learn why you must go beyond simply implementing a vault to further mitigate risk and align with modern best practices such as Zero Trust.

An Enterprise Guide to Web Security
Date: Aug 10, 2021
View webinar
This webinar will discuss the multitude of ways that criminals are trying to get at your systems through the Web. We'll also outline some of the tools and techniques for developing a sound security strategy.

Leveraging Infrastructure as Code to Streamline Security & Operations
Date: Aug 03, 2021
View webinar
See how Infrastructure as Code (IaC) can augment your security program, working with your pipelines and AST tools to ensure the most critical exploitable risks never get deployed.

Monitoring Critical Cloud Workloads
Date: Jul 29, 2021
View webinar
In this webinar, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.

Using Cyber Underground & Blockchain Intel to Stop Cyber Attacks
Date: Jul 28, 2021
View webinar
Register for this webinar to learn how Intel 471 and Chainalysis can help you enhance understanding of blockchain forensics, track adversary activity starting at the point of sale, and how to determine supply chain vulnerabilities.

Disaster Recovery/Business Continuity in the New Normal
Date: Jul 27, 2021
View webinar
Consider what DR/BC looks like if thousands of company employees once again are working at home, riding out a pandemic, a hurricane, or power outages. Or, consider that many organizations will be managing a hybrid workforce. Is your DR/BC plan up to date?

Unifying Your Endpoint Security Strategy
Date: Jul 27, 2021
View webinar
For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain a security strategy that protects enterprise data and users across such a wide variety of devices and locations. In this Dark Reading webinar, top experts discuss strategies and tools for unifying endpoint security policies and practices, and for simplifying the process of end user provisioning, access, and security management. Attendees will get an overview of the methods they can use to unify endpoint security capabilities, and the tools available to manage endpoint security across the enterprise.

2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
How CIO Roles Will Change: The Future of Work
Jessica Davis, Senior Editor, Enterprise Apps,  7/1/2021
Commentary
A Strategy to Aid Underserved Communities and Fill Tech Jobs
Joao-Pierre S. Ruth, Senior Writer,  7/9/2021
Slideshows
10 Ways AI and ML Are Evolving
Lisa Morgan, Freelance Writer,  6/28/2021
Register for InformationWeek Newsletters
Video
Current Issue
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll