The Ultimate Directory on Technology Webinars

Search our directory for upcoming webinars on Technology

Previous Webinars

Internet of Things (IoT) webinar by Sony Altair for Meet the Future of Low-Power Cellular IoT: Exploring Semtech's HL7900 5G LPWA Solution
Meet the Future of Low-Power Cellular IoT: Exploring Semtech's HL7900 5G LPWA Solution
As the Internet of Things (IoT) continues to expand, the demand for low-power, high-efficiency solutions is growing at an unprecedented rate. Cellular Low Power Wide Area (LPWA) technologies like NB-IoT and LTE-M are leading this surge, with Omdia forecasting connections to jump from over 100 million in 2024 to nearly 400 million by 2030*.Join experts from Sony Altair and Semtech as they introduce the groundbreaking Semtech HL7900 module—a global 5G LPWA solution featuring the Sony ALT1350 chipset. This webinar will explore how this innovative combo is set to transform the low-power IoT landscape with its ultra-low power consumption and future-ready connectivity.Specifically designed for IT, technical, and product management leaders, this session will cover:• The current state and future prospects of LPWA technologies, including insights from 3GPP releases 14/15/16/17.• The needs and challenges of modern low-power applications in smart cities, smart metering, and asset tracking.• Innovations from Sony Altair and Semtech that will empower low-power IoT applications for years to come.Engage directly with our experts during a live Q&A session and discover how the Semtech HL7900 can help your organization stay ahead in the rapidly evolving IoT landscape. *https://www.rcrwireless.com/20240619/internet-of-things-4/nb-iot-and-lorawan-crowned-the-kings-of-long-range-iot-to-double-connections-to-3-5bn-in-five-years
10/15/2024 3:00 PM
Cryptocurrency webinar by Halborn for Crypto Hacks in 2024: Have We Truly Learned From Crypto’s All-Time Biggest Hacks? A Halborn x Merkle Science Webinar
Crypto Hacks in 2024: Have We Truly Learned From Crypto’s All-Time Biggest Hacks? A Halborn x Merkle Science Webinar
Join Halborn and Merkle Science for an exclusive webinar exploring key lessons from the industry's biggest security breaches, the emerging trends in 2024, and what the future holds.​Gain insights into the latest developments in smart contract security, private key management, and hot wallet protection. Dive into DeFi’s unique challenges, including cross-chain vulnerabilities and evolving money laundering techniques. Whether you're securing digital assets or focused on regulatory compliance, this webinar will provide actionable strategies to enhance your overall defense posture.​Details:​Date: Monday, October 14Time: 4:00 PM CET / 10:00 AM ESTFormat: Webinar (45 mins + 15 mins Q&A)​Speakers:​Robert Whitaker & Dr. Justus Delp – Merkle Science​Piotr Cielas & Mar Gimenez-Aguilar – Halborn​André Beganski (Moderator) - Decrypt​Topics Covered:​Smart Contract Security​Private Key Management​Hot Wallet Protection​Money Laundering Prevention in DeFi​Cross-Chain Security Challenges​Incident Response for DeFi Exploits​Emerging Attack Vectors and Trends
by Halborn
10/14/2024 2:00 PM
Cloud webinar by Seclore for Integrating Data-Centric Security with Cloud Services
Integrating Data-Centric Security with Cloud Services
With privacy regulations tightening and cloud adoption accelerating due to the impact of COVID-19, the need for data-centric security in the cloud has never been more urgent. Many organizations face a significant challenge: deploying IT infrastructure, configuring software, and integrating tools for seamless data protection in the cloud can be both complex and time-consuming.During the live webinar, the presenters will cover: - Challenges of securing remote data and work environments - Implementing data-centric security without harming productivity - Ensuring security for remote work, supply chain operations, and a traveling C-suite - Common shortcomings of cloud storage platforms like SharePoint, Box, and others Register for the webinar to learn how to secure your cloud data effectively with data-centric security. Speaker: Vishal Gupta, CEO- Seclore.
by Seclore
10/11/2024 5:00 PM
Cybersecurity webinar by IT-ISAC | Sharing Cyber Threats And Information | United States for Compliance Conundrums: The Intersection of Cybersecurity Reporting and Legal Accountability
Compliance Conundrums: The Intersection of Cybersecurity Reporting and Legal Accountability
Mandatory cyber incident reporting requirements and other regulations create increased risk for organizations that experience breaches and security professionals who respond to them. Not only must organizations and their leaders effectively defend their enterprises, but they must also understand the complex field of regulatory reporting responsibilities. Do you know what reporting requirements you’re responsible for?Join the Information Technology-Information Sharing and Analysis Center (IT-ISAC), Booz Allen, and guest speakers for a two-part webinar series geared toward cybersecurity leaders and professionals navigating the management of cyber incidents and regulatory obligations.Part I: Assessing Corporate and Personal Liability October 9 at 2 PM ETPart II: How to Establish Compliance Programs October 30 at 2 PM ETPlease select one or both webinars to join us in October.
Cybersecurity webinar by Kaspersky for Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System
Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System
As AI systems based on large language models become more powerful and widespread, more cybersecurity challenges emerge. From jailbreaks to indirect prompt injections, they are vulnerable to a wide array of LLM-specific threats. However, all these problems can be boiled down to one single issue: LLMs are probabilistic algorithms that are inherently unreliable, just like any other ML system. Does it mean they cannot be useful? Absolutely not! In this talk, we will discuss the challenges of secure and reliable LLM-based applications and the way to make them safer and more aligned with your business goals.Presented by Vladislav Tushkanov - Research Development Group Manager | Machine Learning Technology |AI Research | Kaspersky.
10/9/2024 9:00 AM
Cloud webinar by Barracuda Networks for Data Loss Prevention: A 360-degree approach to securing Cloud storage system
Data Loss Prevention: A 360-degree approach to securing Cloud storage system
Storing files and information in Cloud environment has become a necessity in place of maintaining physical infrastructure on-premises, driven by lower IT spend on storage resources in a Cloud environment. This trend of cloud first is expected to grow at a staggering 25% CAGR.The ease of storing unlimited volumes of information in Cloud Storage systems like OneDrive elevates the overhead of monitoring and administering corrective actions when data breaches occur. Often, the two activities, storing files and monitoring for exposure, are mutually exclusive, like in the following scenario:Action 1: An Employee uploads a file containing sensitive data to OneDrive.Action 2: An alert is raised to a Security personnel who has minimal understanding of why the alert was raised.Having to manage such as scenario at scale, where thousands of alerts have to be monitored and remediated becomes error prone and leaves potential gaps in the security posture, leading to:Exposure of Intellectual PropertyMalware creepFile sharing leaksA policy-driven, feedback-enabled approach which puts your security in the core, becomes a necessity to keep on top of an efficient security lifecycle.Join us in this webinar on Data Loss Protection and Prevention, to learn how to implement an end-user centric, policy-driven and feedback enabled framework to safeguard your corporate information.Speaker: Aravinth Ramachandran - Director, SW Engineering, Barracuda Networks.
10/8/2024 4:00 AM
Cybersecurity webinar by Toradex for Are you really ready for the new EU Cyber Resilience Act?
Are you really ready for the new EU Cyber Resilience Act?
The importance of security in industrial devices is evolving from a recommended practice to an absolute necessity. The forthcoming EU Cyber Resilience Act will impose substantial penalties on device manufacturers who do not meet the mandated security standards. In this session, you will gain insight into essential security requirements and discover how Toradex and Torizon can help.Key TakeawaysUnderstand what the Cyber Resilience Act could mean for youExplore the essential requirements outlined in the ActDocumentation and DeclarationsIncident ReportingMitigation and Software UpdatesLearn how you can stay ahead and be well-preparedDiscuss your security concerns with our expertsWe will also have a dedicated live Q&A towards the end of the webinar.Speaker: Jon Oster, Platform Development Lead - Torizon, Toradex.
by Toradex
10/4/2024 1:00 PM
Cybersecurity webinar by Money Management for Addressing Technological Challenges for AFS Licensees
Addressing Technological Challenges for AFS Licensees
In this free webinar on 3 October, Money Management will be looking at the technological challenges facing Australian Financial Services (AFS) licensees.With technology playing an ever-greater role in practice management, this webinar will help licensees understand they can use technology to streamline their work processes, implement cost savings and create efficiencies.This webinar will bring together key decision makers, leading executives and professionals from licensees to explore critical issues such as cyber security, digital transformation and regtech solutions.Key discussion points:Cyber security: Best practices for safeguarding sensitive data and preventing fraud.Digital transformation: Balancing legacy systems with innovative technologies.Regtech: Leveraging technology for regulatory compliance and data management.Client experience: Enhancing user experience and integrating communication channels.Data management: Strategies for effective data analytics and ensuring privacy.Scalability: Approaches to expanding technology solutions while managing costs.Don’t miss out on this opportunity to learn how you can use technology to improve your business. Register now to secure your spot!Speakers: Stuart Alsop - Director of Sales, intelliflo; Lanie Worsley - Director of Customer Success & Client Solution, Morningstar; Laura Dew - Editor, Money Management.
10/3/2024 4:00 AM
Cybersecurity webinar by Anonyome Labs for Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against Fraud
Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against Fraud
Secure Your Credit Union: What Decentralized Identity Means, Why It’s Important, and How to Protect Your Members Against FraudWednesday, October 2, 10:00 - 11:00 a.m. (PST)Join Dr Paul Ashley, CTO at Anonyome Labs. as he discusses Decentralized Identity being a disruptive technology in the Identity and Access Management (IAM) space.Current identity management methods have been proven to be very poor from a security and privacy point of view.  Numerous security incidents are reported, people’s data is regularly exposed, and the weakness of the current IAM system is apparent.  It has resulted in identity theft and ever increasing financial fraud.Discover how to protect your members against fraud during this engaging and insightful discussion with Anonomye's Dr. Paul Ashley.This webinar will cover such items as:What is decentralized identity? Real-world examples of decentralized identityHow is Anonyome applying decentralized identity to credit unions?Process to get persistent link between Identity Verification (IDV) and authenticated access in each channelOther uses for the IDV reusable credentialWhy should credit unions focus on this enhancement/security measure now?Other preventative measuresRegister today!Speaker: Dr. Paul Ashley is CTO at Anonyome Labs
10/2/2024 5:00 PM
Software webinar by Ardan Labs for Deep Dive into DNS on Linux and Kubernetes
Deep Dive into DNS on Linux and Kubernetes
There is a recurring joke in IT that says “it’s always DNS.” It even prompted a haiku:It's not DNSThere's no way it's DNSIt was DNSIt’s often mentioned in the context of very strange bugs or outages that seem unrelated to DNS but turn out to be related anyway because DNS is everywhere, and it can seem weird.In this short presentation, we won’t talk about a weird bug, but about a weird Kubernetes warning message—something about DNSConfigForming and “nameserver limits”. Spoilers: the error message itself is harmless, but it will give us an Ariadne thread to learn more about DNS configuration in Linux in general, and Kubernetes in particular.We’ll talk about resolv.conf, nsswitch.conf, systemd-resolved, and more. We’ll also discuss DNS configuration policies on Kubernetes and differences between glibc and musl, the system library used by the famous Alpine Linux distribution, which is extremely popular within container ecosystems.This session will equip you with the knowledge to troubleshoot DNS-related issues effectively, whether they are actually DNS-related or not.We will cover:resolv.conf: Understanding the primary DNS configuration file on Linux.nsswitch.conf: How this file determines the sources used by various services.systemd-resolved: An overview of this system service for network name resolution.DNS in Kubernetes: DNS configuration policies and best practices in Kubernetes.glibc vs musl: Differences between these libraries and their impact on DNS, particularly in container environments like Alpine Linux.About Jérôme Petazzoni:Jérôme was part of the team that built, scaled, and operated the dotCloud PAAS before it became Docker. He worked for seven years at the famous container company, wearing various hats. When he’s not busy with computers, he collects musical instruments. He can arguably play the theme of Zelda on a dozen of them.
10/2/2024 4:00 PM
;