Technology Webinars

Search for upcoming webinars for Technology

Previous Webinars

Cybersecurity webinar by Rehmann for Maximizing Organizational Effectiveness Through Technology
Maximizing Organizational Effectiveness Through Technology
As technology continues to advance and the looming threat of cyber attacks grows at an alarming rate, it is important for your organization to adapt in order to keep serving your community effectively. In this webinar, you’ll learn how to maximize the resources you currently have and how to identify appropriate solutions to fill in any gaps in your technology infrastructure.Contributors: Ben Eavey, Erinn A. Trask, CPA
by Rehmann
10/16/2024 3:00 PM
Cybersecurity webinar by Thales for The Power of a Future-Proof Data Security Strategy
The Power of a Future-Proof Data Security Strategy
In this session, our speakers will discuss ways to build a future-proof data security strategy for the evolving cyber landscape, combining a vision of possibility while staying grounded in reality.Join this webinar to learn about:• Future-proof data security strategies and risk-based essentials needed to protect against threats and enforce compliance across the organization.• Key use cases for unifying data visibility and control on-premises, cloud data stores, data lakes, and storage systems.• Thales Data Security innovations to address the dynamic challenges of the modern threat landscape while keeping your organization digitally resilient.Presented by Terry Ray, SVP Data Security CTO, Imperva, a Thales Company; Todd Moore, VP of Encryption Products, Thales; Krishna Ksheerabdhi, VP of Product Marketing, Thales.
by Thales
10/16/2024 1:00 PM
Internet of Things (IoT) webinar by Sony Altair for Meet the Future of Low-Power Cellular IoT: Exploring Semtech's HL7900 5G LPWA Solution
Meet the Future of Low-Power Cellular IoT: Exploring Semtech's HL7900 5G LPWA Solution
As the Internet of Things (IoT) continues to expand, the demand for low-power, high-efficiency solutions is growing at an unprecedented rate. Cellular Low Power Wide Area (LPWA) technologies like NB-IoT and LTE-M are leading this surge, with Omdia forecasting connections to jump from over 100 million in 2024 to nearly 400 million by 2030*.Join experts from Sony Altair and Semtech as they introduce the groundbreaking Semtech HL7900 module—a global 5G LPWA solution featuring the Sony ALT1350 chipset. This webinar will explore how this innovative combo is set to transform the low-power IoT landscape with its ultra-low power consumption and future-ready connectivity.Specifically designed for IT, technical, and product management leaders, this session will cover:• The current state and future prospects of LPWA technologies, including insights from 3GPP releases 14/15/16/17.• The needs and challenges of modern low-power applications in smart cities, smart metering, and asset tracking.• Innovations from Sony Altair and Semtech that will empower low-power IoT applications for years to come.Engage directly with our experts during a live Q&A session and discover how the Semtech HL7900 can help your organization stay ahead in the rapidly evolving IoT landscape. *https://www.rcrwireless.com/20240619/internet-of-things-4/nb-iot-and-lorawan-crowned-the-kings-of-long-range-iot-to-double-connections-to-3-5bn-in-five-years
10/15/2024 3:00 PM
Cryptocurrency webinar by Halborn for Crypto Hacks in 2024: Have We Truly Learned From Crypto’s All-Time Biggest Hacks? A Halborn x Merkle Science Webinar
Crypto Hacks in 2024: Have We Truly Learned From Crypto’s All-Time Biggest Hacks? A Halborn x Merkle Science Webinar
Join Halborn and Merkle Science for an exclusive webinar exploring key lessons from the industry's biggest security breaches, the emerging trends in 2024, and what the future holds.​Gain insights into the latest developments in smart contract security, private key management, and hot wallet protection. Dive into DeFi’s unique challenges, including cross-chain vulnerabilities and evolving money laundering techniques. Whether you're securing digital assets or focused on regulatory compliance, this webinar will provide actionable strategies to enhance your overall defense posture.​Details:​Date: Monday, October 14Time: 4:00 PM CET / 10:00 AM ESTFormat: Webinar (45 mins + 15 mins Q&A)​Speakers:​Robert Whitaker & Dr. Justus Delp – Merkle Science​Piotr Cielas & Mar Gimenez-Aguilar – Halborn​André Beganski (Moderator) - Decrypt​Topics Covered:​Smart Contract Security​Private Key Management​Hot Wallet Protection​Money Laundering Prevention in DeFi​Cross-Chain Security Challenges​Incident Response for DeFi Exploits​Emerging Attack Vectors and Trends
by Halborn
10/14/2024 2:00 PM
Cloud webinar by Seclore for Integrating Data-Centric Security with Cloud Services
Integrating Data-Centric Security with Cloud Services
With privacy regulations tightening and cloud adoption accelerating due to the impact of COVID-19, the need for data-centric security in the cloud has never been more urgent. Many organizations face a significant challenge: deploying IT infrastructure, configuring software, and integrating tools for seamless data protection in the cloud can be both complex and time-consuming.During the live webinar, the presenters will cover: - Challenges of securing remote data and work environments - Implementing data-centric security without harming productivity - Ensuring security for remote work, supply chain operations, and a traveling C-suite - Common shortcomings of cloud storage platforms like SharePoint, Box, and others Register for the webinar to learn how to secure your cloud data effectively with data-centric security. Speaker: Vishal Gupta, CEO- Seclore.
by Seclore
10/11/2024 5:00 PM
Cybersecurity webinar by IT-ISAC | Sharing Cyber Threats And Information | United States for Compliance Conundrums: The Intersection of Cybersecurity Reporting and Legal Accountability
Compliance Conundrums: The Intersection of Cybersecurity Reporting and Legal Accountability
Mandatory cyber incident reporting requirements and other regulations create increased risk for organizations that experience breaches and security professionals who respond to them. Not only must organizations and their leaders effectively defend their enterprises, but they must also understand the complex field of regulatory reporting responsibilities. Do you know what reporting requirements you’re responsible for?Join the Information Technology-Information Sharing and Analysis Center (IT-ISAC), Booz Allen, and guest speakers for a two-part webinar series geared toward cybersecurity leaders and professionals navigating the management of cyber incidents and regulatory obligations.Part I: Assessing Corporate and Personal Liability October 9 at 2 PM ETPart II: How to Establish Compliance Programs October 30 at 2 PM ETPlease select one or both webinars to join us in October.
Cybersecurity webinar by Kaspersky for Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System
Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System
As AI systems based on large language models become more powerful and widespread, more cybersecurity challenges emerge. From jailbreaks to indirect prompt injections, they are vulnerable to a wide array of LLM-specific threats. However, all these problems can be boiled down to one single issue: LLMs are probabilistic algorithms that are inherently unreliable, just like any other ML system. Does it mean they cannot be useful? Absolutely not! In this talk, we will discuss the challenges of secure and reliable LLM-based applications and the way to make them safer and more aligned with your business goals.Presented by Vladislav Tushkanov - Research Development Group Manager | Machine Learning Technology |AI Research | Kaspersky.
10/9/2024 9:00 AM
Cloud webinar by Barracuda Networks for Data Loss Prevention: A 360-degree approach to securing Cloud storage system
Data Loss Prevention: A 360-degree approach to securing Cloud storage system
Storing files and information in Cloud environment has become a necessity in place of maintaining physical infrastructure on-premises, driven by lower IT spend on storage resources in a Cloud environment. This trend of cloud first is expected to grow at a staggering 25% CAGR.The ease of storing unlimited volumes of information in Cloud Storage systems like OneDrive elevates the overhead of monitoring and administering corrective actions when data breaches occur. Often, the two activities, storing files and monitoring for exposure, are mutually exclusive, like in the following scenario:Action 1: An Employee uploads a file containing sensitive data to OneDrive.Action 2: An alert is raised to a Security personnel who has minimal understanding of why the alert was raised.Having to manage such as scenario at scale, where thousands of alerts have to be monitored and remediated becomes error prone and leaves potential gaps in the security posture, leading to:Exposure of Intellectual PropertyMalware creepFile sharing leaksA policy-driven, feedback-enabled approach which puts your security in the core, becomes a necessity to keep on top of an efficient security lifecycle.Join us in this webinar on Data Loss Protection and Prevention, to learn how to implement an end-user centric, policy-driven and feedback enabled framework to safeguard your corporate information.Speaker: Aravinth Ramachandran - Director, SW Engineering, Barracuda Networks.
10/8/2024 4:00 AM
Cybersecurity webinar by Toradex for Are you really ready for the new EU Cyber Resilience Act?
Are you really ready for the new EU Cyber Resilience Act?
The importance of security in industrial devices is evolving from a recommended practice to an absolute necessity. The forthcoming EU Cyber Resilience Act will impose substantial penalties on device manufacturers who do not meet the mandated security standards. In this session, you will gain insight into essential security requirements and discover how Toradex and Torizon can help.Key TakeawaysUnderstand what the Cyber Resilience Act could mean for youExplore the essential requirements outlined in the ActDocumentation and DeclarationsIncident ReportingMitigation and Software UpdatesLearn how you can stay ahead and be well-preparedDiscuss your security concerns with our expertsWe will also have a dedicated live Q&A towards the end of the webinar.Speaker: Jon Oster, Platform Development Lead - Torizon, Toradex.
by Toradex
10/4/2024 1:00 PM
Cybersecurity webinar by Money Management for Addressing Technological Challenges for AFS Licensees
Addressing Technological Challenges for AFS Licensees
In this free webinar on 3 October, Money Management will be looking at the technological challenges facing Australian Financial Services (AFS) licensees.With technology playing an ever-greater role in practice management, this webinar will help licensees understand they can use technology to streamline their work processes, implement cost savings and create efficiencies.This webinar will bring together key decision makers, leading executives and professionals from licensees to explore critical issues such as cyber security, digital transformation and regtech solutions.Key discussion points:Cyber security: Best practices for safeguarding sensitive data and preventing fraud.Digital transformation: Balancing legacy systems with innovative technologies.Regtech: Leveraging technology for regulatory compliance and data management.Client experience: Enhancing user experience and integrating communication channels.Data management: Strategies for effective data analytics and ensuring privacy.Scalability: Approaches to expanding technology solutions while managing costs.Don’t miss out on this opportunity to learn how you can use technology to improve your business. Register now to secure your spot!Speakers: Stuart Alsop - Director of Sales, intelliflo; Lanie Worsley - Director of Customer Success & Client Solution, Morningstar; Laura Dew - Editor, Money Management.
10/3/2024 4:00 AM
;