Technology Webinars

Search for upcoming webinars for Technology

Previous Webinars

Cybersecurity webinar by Anonyome Labs for Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against Fraud
Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against Fraud
Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against FraudWednesday, October 2, 10:00 - 11:00 a.m. (PST)Join Dr Paul Ashley, CTO at Anonyome Labs. as he discusses Decentralized Identity being a disruptive technology in the Identity and Access Management (IAM) space.Current identity management methods have been proven to be very poor from a security and privacy point of view.  Numerous security incidents are reported, people’s data is regularly exposed, and the weakness of the current IAM system is apparent.  It has resulted in identity theft and ever increasing financial fraud.Discover how to protect your members against fraud during this engaging and insightful discussion with Anonomye's Dr. Paul Ashley.This webinar will cover such items as:What is decentralized identity? Real-world examples of decentralized identityHow is Anonyome applying decentralized identity to credit unions?Process to get persistent link between Identity Verification (IDV) and authenticated access in each channelOther uses for the IDV reusable credentialWhy should credit unions focus on this enhancement/security measure now?Other preventative measuresRegister today!Speaker: Dr. Paul Ashley is CTO at Anonyome Labs
10/2/2024 5:00 PM
Software webinar by Ardan Labs for Deep Dive into DNS on Linux and Kubernetes
Deep Dive into DNS on Linux and Kubernetes
There is a recurring joke in IT that says “it’s always DNS.” It even prompted a haiku:It's not DNSThere's no way it's DNSIt was DNSIt’s often mentioned in the context of very strange bugs or outages that seem unrelated to DNS but turn out to be related anyway because DNS is everywhere, and it can seem weird.In this short presentation, we won’t talk about a weird bug, but about a weird Kubernetes warning message—something about DNSConfigForming and “nameserver limits”. Spoilers: the error message itself is harmless, but it will give us an Ariadne thread to learn more about DNS configuration in Linux in general, and Kubernetes in particular.We’ll talk about resolv.conf, nsswitch.conf, systemd-resolved, and more. We’ll also discuss DNS configuration policies on Kubernetes and differences between glibc and musl, the system library used by the famous Alpine Linux distribution, which is extremely popular within container ecosystems.This session will equip you with the knowledge to troubleshoot DNS-related issues effectively, whether they are actually DNS-related or not.We will cover:resolv.conf: Understanding the primary DNS configuration file on Linux.nsswitch.conf: How this file determines the sources used by various services.systemd-resolved: An overview of this system service for network name resolution.DNS in Kubernetes: DNS configuration policies and best practices in Kubernetes.glibc vs musl: Differences between these libraries and their impact on DNS, particularly in container environments like Alpine Linux.About Jérôme Petazzoni:Jérôme was part of the team that built, scaled, and operated the dotCloud PAAS before it became Docker. He worked for seven years at the famous container company, wearing various hats. When he’s not busy with computers, he collects musical instruments. He can arguably play the theme of Zelda on a dozen of them.
10/2/2024 4:00 PM
AI (Artificial Intelligence) webinar by Miracle Software Systems for Webinar | AI Agents: From Concept to Real-World Applications
Webinar | AI Agents: From Concept to Real-World Applications
Automation has evolved as the key to success and innovation, as it enhances efficiency and productivity. To stay ahead and drive growth, businesses across the globe are embracing AI-driven solutions. AI Agents is a software program that redefines how companies operate, innovate, and stay competitive by automating repetitive tasks and making complex data-driven decisions.Join us for the webinar on September 30th, 2024, from 11 AM to 12 PM EST, to discover the types of AI agents, how they function, and their transformative impact on elevating efficiency, reducing costs, and driving technological advancement. Also, learn about its real-world applications across diverse sectors such as customer service, predictive maintenance, finance, and manufacturing, highlighting the strategic potential AI agents bring to businesses of all sizes.Speakers: Sameer Deodatta Jaokar - Director of Customer Success - Automation and AI, Miracle Software Systems(USA) Inc.; Shrikar Ravindra Chonkar - Practice Manager - Innovation Labs, Miracle Software Systems(USA) Inc.
9/30/2024 3:00 PM
AI (Artificial Intelligence) webinar by Miracle Software Systems for AI Agents: From Concept to Real-World Applications
AI Agents: From Concept to Real-World Applications
AI Agents is a software program that redefines how companies operate, innovate, and stay competitive by automating repetitive tasks and making complex data-driven decisions. Join us for the webinar on September 30th, 2024, from 11 AM to 12 PM EST, to discover the types of AI agents, how they function, and their transformative impact on elevating efficiency, reducing costs, and driving technological advancement. Also, learn about its real-world applications across diverse sectors such as customer service, predictive maintenance, finance, and manufacturing, highlighting the strategic potential AI agents bring to businesses of all sizes.Speakers: Sameer Deodatta Jaokar - Director of Customer Success - Automation and AI, Miracle Software Systems(USA).Inc; Shrikar Ravindra Chonkar - Practice Manager - Innovation Labs, Miracle Software Systems, Inc.
9/30/2024 3:00 PM
Cloud webinar by Global Signage Alliance for VXT 2.1 Revealed: What’s New and How It Impacts You
VXT 2.1 Revealed: What’s New and How It Impacts You
VXT 2.1 Revealed: What’s New and How It Impacts YouJoin us for an insightful upcoming webinar hosted by the Global Signage Alliance! We’ll dive into the latest updates on VXT 2.1, guided by expert Pete Colquitt.Key Highlights:🔍 Explore the Newest Features of VXT 2.1🙋 Interactive Q&A Session with Pete Colquitt, covering key innovations and updates📣 Stay ahead of the curve—register now to discover how VXT 2.1 and other advancements are transforming digital signage.Learn how to optimize your workflows and unlock new possibilities.To secure your spot, complete the registration form above.For more information or questions, contact us at info@gs-alliance.org.We look forward to having you join us as we explore the future of digital signage together!
9/27/2024 1:00 PM
Cybersecurity webinar by Tenable for From Exposure to Control: Automate Vulnerability Response with ServiceNow & Tenable
From Exposure to Control: Automate Vulnerability Response with ServiceNow & Tenable
Learn how integrated solutions from Tenable and ServiceNow help you quickly and effectively automate remediation response based on actual riskWith expanding attack surfaces, operational complexity, and evolving compliance requirements, vulnerability response is a significant burden for even the largest organizations.Join experts from Tenable and ServiceNow for a deep dive into how you can overcome the common pitfalls of vulnerability response, at 2 pm ET, September 26, 2024. By attending you’ll gain insight into:How joint solutions from Tenable and ServiceNow enable IT and security teams to streamline vulnerability management workflows, prioritization, and remediation across your organization’s critical assetsNew solutions coming from the Tenable-ServiceNow technology partnershipAnd, we’ll have live Q&A to address your specific questions.Who should attend?IT and security professionals responsible for improving vulnerability response and overall security program efficacy are encouraged to attend.Save your spot. Register now.If you can’t make the live session, register anyway and we’ll email you a link to the replay.Speakers: Jamie Jackson - Senior Product Success Manager, ServiceNow; Nick Keuning - Senior Director, Solutions Architecture, Tenable; Ben Prime - Senior Advisory Solution Architect, Security, ServiceNow.
by Tenable
9/26/2024 6:00 PM
Cybersecurity webinar by Barracuda Networks for Threat Spotlight report: Latest ransomware trends, real-world attack analysis, and best defenses
Threat Spotlight report: Latest ransomware trends, real-world attack analysis, and best defenses
Barracuda’s annual Ransomware Threat Spotlight report is out, packed with high-value insights about the past year’s biggest developments and trends. The report is prepared by top threat experts, based on information from reported global ransomware attacks along with data gathered by our Extended Detection and Response (XDR) deployments. Attend this webinar and get a deep dive into the key takeaways, along with plenty of detailed analysis of real-world attacks and actual SOC responses. After attending this session, you’ll know what to expect from ransomware crooks in the coming year—and you’ll know all about advanced strategies and technologies to beat back their nastiest, most sophisticated efforts to steal your data, extort your money, and wreck your operations. Of course, you could just skip it and hope for the best. But the smart money says don’t miss this one—register now. Speaker: Adam Khan - VP, Global Security Operations, Barracuda Networks.
9/26/2024 5:00 PM
Cybersecurity webinar by Red Piranha for Meet the new Threat Detection and Logging guidance from the ASD and CISA. Detect CnC Callouts, Lateral movement, and pivoting with Crystal Eye #TDIR | Red Piranha
Meet the new Threat Detection and Logging guidance from the ASD and CISA. Detect CnC Callouts, Lateral movement, and pivoting with Crystal Eye #TDIR | Red Piranha
To keep up with advanced cyber threats from APT’s using living of the land (LOTL), pivoting and lateral movement techniques within your network, effective threat detection and event logging are key to staying secure. The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), in collaboration with global cybersecurity authorities including CISA, FBI, and NCSC, has established comprehensive guidelines to bolster organizational resilience.Red Piranha is a pioneer and leader in threat detection with Crystal Eye designed to meet the new guidance to detect living off-the-land attacks and EDR bypass, offering advanced capabilities to enhance your security posture.In this session, you will learn how Crystal Eye’s Advanced Intrusion Detection and Prevention System (IDPS) is essential for combatting, pivoting and lateral movement within networks.You will discover how to effectively detect and isolate lateral movement activities within your network and implement a robust network segmentation strategy using Crystal Eye’s Advanced Intrusion Detection and Prevention System: Comprehensive Detection and Prevention Framework  Operational Modes of IDPS  Customisable Rulesets and Profiles  Multi-Tenancy and Advanced Configuration  Local Rule Creation  Ongoing Updates and Adaptation  Key Features Network Segmentation: Implement robust segmentation to create secure zones with tailored IDPS profiles, isolating sensitive data and critical infrastructure from general user networks. This confines attacks to specific segments, ensuring rapid containment if lateral movement is detected. Detection and Prevention Framework: Crystal Eye’s IDPS identifies and counters lateral movement using network traffic analysis, anomaly detection, and response mechanisms  Operational ModesDetection & Protection Mode: Alerts and logs suspicious traffic without blocking, allowing for thorough threat analysis. Administrators can configure profiles and rulesets for segmented interfaces. Inline Mode: Actively blocks malicious traffic based on predefined rules, preventing the spread of threats. Network Security Monitoring Mode (NSM): Provides detailed visibility into network activities, capturing and logging events to identify movement patterns. Customizable Rulesets and Profiles: Administrators can create tailored profiles and rulesets for different network segments, detecting sophisticated threats and addressing unique security needs. Multi-Tenancy and Advanced Configuration: Efficiently manage multiple security zones and profiles with customizable local rules for detecting advanced tactics. Ongoing Updates: Keeps up with new lateral movement techniques through regular updates from Red Piranha’s Global Security Operations Team. This is a fantastic opportunity to stay ahead of ASD's new standards and strengthen your organisation’s cybersecurity posture.  So, join us in this knowledge sprint webinar to learn how your business can align with the ASD’s latest guidelines. Key PresentersGeorge Boulis - General Manager, Sales at Red PiranhaRoland Casabar - Cyber Security Engineer & Incident Response at Red PiranhaDylan Paquelet - Cyber Security Engineer at Red Piranha
9/26/2024 1:00 PM
Cybersecurity webinar by Formation Tech for Webinar: Cybersecurity – Mind the Gap!
Webinar: Cybersecurity – Mind the Gap!
In today's rapidly evolving digital landscape, securing a hybrid workforce has become one of the most pressing challenges for IT and network security teams. The shift to remote and hybrid work models has opened new security gaps, rendering traditional solutions like VPNs inadequate. As shadow IT continues to grow and operational complexities increase, organisations face significant risks and inefficiencies.Join us for our learning webinar where -  accompanied by our partners and market leaders at Fortinet - we will explore how the modern threat landscape has evolved post-pandemic and delve into why a comprehensive, consolidated vendor solution is essential for addressing these challenges. Discover the key security gaps introduced by hybrid work, understand the limitations of current solutions, and learn how to achieve a secure, reliable, and consistent access to corporate resources, no matter where your team is located.Agenda:Webinar: Cybersecurity – Mind the Gap!Date: Thursday, 26th September | Time: 11am.Here's what to expect:11:00-11:05am: Setting the stage for understanding the modern cybersecurity landscape.11:05-11:15am: Recognising the 5 Key Challenges of Securing a Hybrid Workforce:Addressing Security GapsOvercoming VPN Performance IssuesManaging Shadow ITSimplifying Operational ComplexityReducing Vendor Sprawl 11:15-11:20am: Where to Start? Prioritising Your Security Needs: Practical advice on how to assess your current security posture and what to address first.11:20-11:25am: Case Studies: Real-world examples of how businesses have successfully navigated these challenges.11:25-11:30am: Interactive Q&A Session: Get your questions answered by our cybersecurity experts.Speakers: Mark Tyers - Co-Founder of Formation Tech, Mike Gilroy-Scott - Head of Technology, Stephen Jamieson - Fortinet’s Cyber Expert.
9/26/2024 10:00 AM
Cloud webinar by Kartaca - Solutions for life for Run Data Analytics with Google Cloud
Run Data Analytics with Google Cloud
Dive into the world of Data Analytics on Google Cloud Platform (GCP). This session will cover the complete data lifecycle from ingestion and processing to storage. Participants will learn about the powerful data analytics tools available on GCP and how to leverage them for efficient and effective data management.Register now!AgendaDive into Data Analytics world with Google Cloud & KartacaJoin forces with Kartaca and Google Cloud to gain deeper insights into the dynamic world of data and empower your decision-making. Join the event and learn how to build a robust analytics platform using BigQuery and unlock the full potential of your data!Introduction (5 minutes)Data Analytics on GCP: Introduction to Google Cloud’s data analytics tools and services (10 minutes)Streaming Data: Explore how to process near real-time data using Pub/Sub, Dataflow, and BigQuery. (10 minutes)Batching Data: Explore how to handle large volumes of data with a batch processing approach using Cloud Storage, Cloud Composer, and Data Fusion. Exploring ETL (Extract, Transform, Load) workflows. (10 minutes)Change Data Capture: Understand how to implement Change Data Capture (CDC) using Data Stream to track and process data changes in real time. (10 minutes)Real-life scenario of a data analytics project using GCP (10 minutes)Q&A (5 minutes)Speakers: Maciej Kubiak - Territory Manager, Google Cloud; Osman Avci - Head of Business Development, Kartaca; Umniyah Abbood - Data & AI Engineer, Kartaca; Farooq Harbeed - Business Analyst, Kartaca.
9/26/2024 8:00 AM
;