BrightTALK Homepage Banner

Discover and learn with the world's brightest B2B professionals

Access expertise from thousands of leading companies and millions of registered users

See latest talks

Stay current with free webinars, videos and trainings from industry experts.See all talks

Exploring AVD Cost, Security and Performance in Virtual Desktops
Channel Logo

Exploring AVD Cost, Security and Performance in Virtual Desktops

Azure Virtual Desktop (AVD) is changing the way businesses manage remote work, offering enhanced security, scalability, and cost efficiency. Nathan Taylor
(SVP, Global Microsoft Practice Leader) and Jeremy Santos (Director of Engineering) break down how AVD simplifies IT management, eliminates open ports,
improves security, and reduces infrastructure costs. Whether you're considering alternatives to traditional VDI solutions or looking for a better way to handl…

How Publishers Clearing House Uses Feedback to Deepen Customer Relationships (APAC)
Channel Logo

How Publishers Clearing House Uses Feedback to Deepen Customer Relationships (APAC)

Publishers Clearing House (PCH) used to be known for balloons and big checks. But now they're known as one of the most trusted data providers around. How
did this happen? Chris Mitchell, VP of Surveys, at PCH will outline how PCH evolved into a top data provider, with the help of a robust feedback and data
collection program. Topics will include how feedback professionals can get better response rates, how technology helps PCH collect data, the importance of…

How to Unleash the Full Potential of Secure Cellular Networks for IoT in APAC
Channel Logo

How to Unleash the Full Potential of Secure Cellular Networks for IoT in APAC

Need smarter IoT connections without sacrificing security? Join us to explore Ericsson’s Cradlepoint S400, a new cellular edge appliance designed to help
organizations optimize remote IoT operations, enhance connectivity, and upscale network security. Stay ahead of the curve with an adaptable and secure
IoT connection. Learn how in our 30-minute product webinar, where we will: *Discuss the benefits of 5G connectivity, edge computing, and zero trust secur…

Firmware as a Service: Enhancing BIOS Security and Flexibility
Channel Logo

Firmware as a Service: Enhancing BIOS Security and Flexibility

Firmware as a Service (FaaS) represents an industry-wide philosophy that directs BIOS designers to consider offering customer firmware-level functionalities
from a service standpoint. In the actual design process of BIOS, the FaaS service should exhibit sufficient flexibility and be pluggable, meaning it can be
customized and integrated into the user's motherboard when required, and can be conveniently updated. The FaaS design empowers users with greater ini…

Integrating AppSec for Efficient DevSecOps
Channel Logo

Integrating AppSec for Efficient DevSecOps

Security is the result of implementing the tools, personnel, and insight necessary to make informed decisions to mitigate risks within the software you create
and the assets you consume through the software supply chain. While this process can be elaborate, rapid releases and CI/CD methodologies require that
AppSec move at the speed of DevOps. Achieving this is only possible with integrated controls and mechanisms to detect, prioritize, and address security iss…

Meeting Strict Compliance Standards for Government Work with AVD Description
Channel Logo

Meeting Strict Compliance Standards for Government Work with AVD Description

Azure Virtual Desktop (AVD) is a powerful solution for meeting the stringent compliance and security standards required for government work. In this snippet
of Demystifying Microsoft, Nathan Taylor (SVP, Global Microsoft Practice Leader) and Jeremy Santos (Director of Engineering) explore how AVD is designed to
support government organizations in ensuring data protection, secure access, and compliance with federal regulations. Learn how AVD enables secure rem…

When to Choose AVD Over Windows 365 for Virtual Desktops Description
Channel Logo

When to Choose AVD Over Windows 365 for Virtual Desktops Description

When deciding between Azure Virtual Desktop (AVD) and Windows 365, it's important to understand the key differences that make each solution suitable for
specific use cases. In this snippet of Demystifying Microsoft, Nathan Taylor (SVP, Global Microsoft Practice Leader) and Jeremy Santos (Director of
Engineering) showcase the unique benefits of AVD and Windows 365, and explain when to choose one over the other. Windows 365 offers simplicity with fi…

Flying Under the Radar – Security Evasion Techniques (Master Class)
Channel Logo

Flying Under the Radar – Security Evasion Techniques (Master Class)

“This is out of scope,” said no hacker ever. Cybercriminals relentlessly aim to breach systems and stay undetected during an attack. In our latest
Cybersecurity Masterclass, Cato experts dive into the evolving tactics of threat actors running malware and phishing campaigns, exploring how they evade
security tools and researchers. We’ll examine the old-school tricks that laid the foundation for today’s sophisticated tactics and examine the modern tech…

Attend BrightTALK Summits

Virtual events showcasing talks from experts in your industry.See all summits

Driving Efficiency with ITSM

Driving Efficiency with ITSM

As organizations navigate the complexities of hybrid environments, AI integration, and evolving cybersecurity landscapes, ITSM needs to adapt to meet these
challenges while consistently delivering tangible business value. Join this two-day Summit to explore innovative strategies that seamlessly blend technologi…

|6 sessions
Activating Intent: Improving Strategy. Driving Growth.

Activating Intent: Improving Strategy. Driving Growth.

Brought to you by Informa TechTarget, Activating Intent is a one-day virtual event dedicated to helping product, marketing, sales and revenue operations
leaders get maximum value out of intent data across their go-to-market. Featuring insights from some of B2B’s best experts and practitioners, you’ll walk a…

|8 sessions
Strengthening Cyber Security with AI

Strengthening Cyber Security with AI

AI is gradually integrating itself into organization’s cyber security strategy. Companies are increasingly using AI to automate capabilities like threat detection,
predictive analytics, incident response and more. AI even supports machine learning- algorithms to detect unusual behavior that may indicate a coming att…

|7 sessions
Securing the Cloud Ecosystem

Securing the Cloud Ecosystem

The use of the cloud is becoming omnipresent, with 85% of organizations planning to embrace the cloud-first principle, according to Gartner. However, cyber
attackers are exploiting this trend. They leverage the cloud’s wide attack surface and low visibility as gateways to breach IT infrastructure. The good news …

|8 sessions
Transformative Strategies for Storage Management and Data Backup

Transformative Strategies for Storage Management and Data Backup

With exponential data growth, ever-evolving cyber threats, and increasingly complex regulations, traditional ways of managing storage and backing up data
have become redundant. Among all this change, organizations need to adapt by optimizing and securing their data infrastructure while maintaining complia…

|8 sessions
CIO Summit

CIO Summit

In an era where AI reshapes industries overnight and cyber threats evolve at breakneck speed, the modern CIO stands at the helm of a digital revolution.
Gone are the days when IT was a purely technical role – today’s CIO is the leader of innovation, guardian of data, and the bridge between tech and busines…

|12 sessions

Watch episodic series

Don’t miss the latest episodes.See all series

Cloud webinar series
3 episodes
Series Company Logo

Cloud webinar series

Unlock streaming success with TrafficPeak & Akamai Cloud! Our 3-part webinar series offer real-time insights, expert tips, and a live demo.

Watch series

The Future of SIEM
7 episodes
Series Company Logo

The Future of SIEM

Legacy SIEM solutions are stuck in the past. Their manual processes and outdated rule-based analytics make them slow, reactive and ineffective against
advanced tactics like AI-driven evasion and stolen credentials. To keep up with these modern security threats and operational demands, security operations…

Watch series

The Inevitable Boom: Preparing, Responding & Recovering from a Cybersecurity Breach
3 episodes
Series Company Logo

The Inevitable Boom: Preparing, Responding & Recovering from a Cybersecurity Breach

The Inevitable Boom – Preparing, Responding & Recovering from a Cybersecurity Breach In today’s digital landscape, cyber incidents aren’t a question of
if—they’re a question of when. Organizations must be prepared to defend against threats, respond effectively when an attack occurs, and recover swiftly to…

Watch series

DevOps Download Webinar Series
4 episodes
Series Company Logo

DevOps Download Webinar Series

Sonatype’s ‘DevOps Download’ is a DevOps webinar series by industry leaders, covering software development topics to maximize your software's potential.
Gain insights on binary repositories, open-source supply chain, and dependency management. Watch the series to mitigate vulnerabilities, secure your ecos…

Watch series

Mastering AI-Driven Endpoint Protection: Your Journey Begins here
4 episodes
Series Company Logo

Mastering AI-Driven Endpoint Protection: Your Journey Begins here

Palo Alto Networks Cortex XDR delivers industry-leading endpoint protection, giving organizations the most effective prevention, detection, and response
capabilities to stop endpoint threats, no matter where they come from. With Cortex XDR, Security Operations teams gain the capabilities they need to outp…

Watch series

Cómo se benefician las telcos y empresas de Latinoamérica de los avances en conectividad satelital?
5 episodes
Series Company Logo

Cómo se benefician las telcos y empresas de Latinoamérica de los avances en conectividad satelital?

Esta serie presenta las 5 charlas en vivo de Telesemana.com relacionadas con el MWC 2025, donde participaron expertos de SES exponiendo el papel de los
satelites en: 1. Mercado B2B e Industria 4.0 2. Monetización: consumidores y el sector empresarial 3. La llegada de la IA y la Automatización 4. Conectivida…

Watch series

Discover trending channels

Check out top content creators on BrightTALK.See all channels

Channel Logo

ISC2 Security Briefings

164934 subscribers|484 talks

ISC2 Security Briefings - In-depth examination of infosec topics.

View channel

Channel Logo

ISC2 Think Tank

154808 subscribers|197 talks

Moderated roundtable discussions on a variety of infosecurity topics.

View channel

Channel Logo

ISC2 APAC Secure Webinars

84315 subscribers|491 talks

ISC2 Live Webinars for InfoSec Professionals in APAC Region

View channel

Channel Logo

ISC2 Knowledge Vault

136697 subscribers|159 talks

Information Security Certification

View channel

Browse content by topics

Discover the most popular and trending topics on BrightTALK.See all topics