BrightTALK Homepage Banner

Discover and learn with the world's brightest B2B professionals

Access expertise from thousands of leading companies and millions of registered users

See latest talks

Stay current with free webinars, videos and trainings from industry experts.See all talks

NinjaOne 8.0 Feature Updates: What You Need to Know
Channel Logo

NinjaOne 8.0 Feature Updates: What You Need to Know

NinjaOne’s 8.0 release delivers several feature enhancements that streamline IT operations. New native patching automations make delivering patches
quicker than ever. NinjaOne Remote Background Mode means technicians can solve problems without disrupting the end user. Other new features include: 
The new Tags feature lets administrators identify devices easily  A new generic agent brings tokenization for faster and more secure deployments  The PS…

MetriSight Ep.79 - CEO Scott Russell's Plan to Build on NICE's CX Success
Channel Logo

MetriSight Ep.79 - CEO Scott Russell's Plan to Build on NICE's CX Success

Get to know Scott Russell, CEO of NICE, in this podcast discussing the future of NICE with his new leadership, the rapidly growing customer experience
market, and more.

Managing the risks of AI-generated code
Channel Logo

Managing the risks of AI-generated code

AI coding assistants, such as Microsoft CoPilot and ChatGPT, will fundamentally change the way teams build software, much like open source software has
over the last decade. As with open source, teams seeking the benefits of AI will also need to take precautions to address the security, quality, and intellectual
property risks that come with the use of AI-generated code. Is your team ready for AI? In this webinar, we'll explore: Key risks teams might encounter usi…

STRONGER 2024: Emerging Careers in Cyber Security - APAC
Channel Logo

STRONGER 2024: Emerging Careers in Cyber Security - APAC

In an era of escalating cyber threats, the demand for skilled cyber security professionals has never been greater. This session offered a comprehensive
exploration of the growing career opportunities in cyber security. Attendees gained valuable insights into cyber security organizations' structure and success
metrics, essential skill sets required for various roles, and the industry's evolving landscape. From understanding the implications of high-profile cyber attac…

Addressing myths around EDR
Channel Logo

Addressing myths around EDR

While some of the existing cybersecurity solutions already provide Endpoint Detection and Response functionality for small and medium business,
implementation of EDR in these organizations can cause doubts. Kaspersky’s long-term experience in the development and implementation of EDR Solutions
found the following has frequently raised concerns: • EDR is just a “better antivirus”; • This technology is only suitable for large enterprises as it is meant to…

Understanding Container Security: Common Misconfigurations
Channel Logo

Understanding Container Security: Common Misconfigurations

Containerized applications and microservices simplify scaling and deployment. Yet, they also create new opportunities for attackers to exploit.
Misconfigurations in these environments can allow attackers to hide, move, and launch advanced attacks. Join us for a deep dive into common container
misconfigurations. We'll dive into Black Duck’s extensive experience in container penetration testing. What you’ll learn: • Common misconfigurations f…

Scale up or Scale out: Decode the Platform Selection Dilemma
Channel Logo

Scale up or Scale out: Decode the Platform Selection Dilemma

Breakthrough medical innovations are transforming the way we treat and potentially cure certain diseases. There are challenges like scalability, automation,
cell type flexibility, that must be solved. A critical parameter for that can affect time to market and production costs is platform selection. Also, when
addressing the question of commercial viability, therapeutics developers face these crucial questions. Join us for reviewing the platforms and processes tha…

OE for ICAM: Operational Efficiency that's FedRAMP Proven, & Ready to Scale
Channel Logo

OE for ICAM: Operational Efficiency that's FedRAMP Proven, & Ready to Scale

Federal agencies must modernize identity, credential and access management (ICAM) while ensuring compliance with evolving security mandates. Achieving
an Authority to Operate (ATO) is just the beginning—true operational efficiency requires scalable, centralized solutions that align with ICAM best practices. As
agencies look to modernize, they must ensure their IAM strategies are proven, adaptable, and ready to support thousands of users across multiple environ…

Attend BrightTALK Summits

Virtual events showcasing talks from experts in your industry.See all summits

Driving Efficiency with ITSM

Driving Efficiency with ITSM

As organizations navigate the complexities of hybrid environments, AI integration, and evolving cybersecurity landscapes, ITSM needs to adapt to meet these
challenges while consistently delivering tangible business value. Join this two-day Summit to explore innovative strategies that seamlessly blend technologi…

|6 sessions
Strengthening Cyber Security with AI

Strengthening Cyber Security with AI

AI is gradually integrating itself into organization’s cyber security strategy. Companies are increasingly using AI to automate capabilities like threat detection,
predictive analytics, incident response and more. AI even supports machine learning- algorithms to detect unusual behavior that may indicate a coming att…

|7 sessions
Activating Intent: Improving Strategy. Driving Growth.

Activating Intent: Improving Strategy. Driving Growth.

Brought to you by Informa TechTarget, Activating Intent is a one-day virtual event dedicated to helping product, marketing, sales and revenue operations
leaders get maximum value out of intent data across their go-to-market. Featuring insights from some of B2B’s best experts and practitioners, you’ll walk a…

|8 sessions
Transformative Strategies for Storage Management and Data Backup

Transformative Strategies for Storage Management and Data Backup

With exponential data growth, ever-evolving cyber threats, and increasingly complex regulations, traditional ways of managing storage and backing up data
have become redundant. Among all this change, organizations need to adapt by optimizing and securing their data infrastructure while maintaining complia…

|8 sessions
Securing the Cloud Ecosystem

Securing the Cloud Ecosystem

The use of the cloud is becoming omnipresent, with 85% of organizations planning to embrace the cloud-first principle, according to Gartner. However, cyber
attackers are exploiting this trend. They leverage the cloud’s wide attack surface and low visibility as gateways to breach IT infrastructure. The good news …

|8 sessions
CIO Summit

CIO Summit

In an era where AI reshapes industries overnight and cyber threats evolve at breakneck speed, the modern CIO stands at the helm of a digital revolution.
Gone are the days when IT was a purely technical role – today’s CIO is the leader of innovation, guardian of data, and the bridge between tech and busines…

|12 sessions

Watch episodic series

Don’t miss the latest episodes.See all series

The Future of SIEM
7 episodes
Series Company Logo

The Future of SIEM

Legacy SIEM solutions are stuck in the past. Their manual processes and outdated rule-based analytics make them slow, reactive and ineffective against
advanced tactics like AI-driven evasion and stolen credentials. To keep up with these modern security threats and operational demands, security operations…

Watch series

The Inevitable Boom: Preparing, Responding & Recovering from a Cybersecurity Breach
3 episodes
Series Company Logo

The Inevitable Boom: Preparing, Responding & Recovering from a Cybersecurity Breach

The Inevitable Boom – Preparing, Responding & Recovering from a Cybersecurity Breach In today’s digital landscape, cyber incidents aren’t a question of
if—they’re a question of when. Organizations must be prepared to defend against threats, respond effectively when an attack occurs, and recover swiftly to…

Watch series

Zoom: Customer Experience Re-imagined
2 episodes
Series Company Logo

Zoom: Customer Experience Re-imagined

Uncover the Hidden Potential of Zoom's Unified Platform Think you know everything about Zoom? Think again. Watch this session to discover the surprising
capabilities and innovative solutions you might have overlooked. Explore how Zoom can revolutionise your customer and agent experiences in ways you ne…

Watch series

Cloud webinar series
3 episodes
Series Company Logo

Cloud webinar series

Unlock streaming success with TrafficPeak & Akamai Cloud! Our 3-part webinar series offer real-time insights, expert tips, and a live demo.

Watch series

DevOps Download Webinar Series
4 episodes
Series Company Logo

DevOps Download Webinar Series

Sonatype’s ‘DevOps Download’ is a DevOps webinar series by industry leaders, covering software development topics to maximize your software's potential.
Gain insights on binary repositories, open-source supply chain, and dependency management. Watch the series to mitigate vulnerabilities, secure your ecos…

Watch series

How to Integrate GenAI into Coder CDEs (Without Losing Control)
6 episodes
Series Company Logo

How to Integrate GenAI into Coder CDEs (Without Losing Control)

This multi-part series dives into how organizations can safely and efficiently bring generative AI into their Coder Cloud Development Environments (CDEs).
We’ll explore real-world strategies for deploying tools like GitHub Copilot and Gemini, maintaining compliance, and managing AI/ML infrastructure at scale. …

Watch series

Discover trending channels

Check out top content creators on BrightTALK.See all channels

Channel Logo

ISC2 Security Briefings

165002 subscribers|484 talks

ISC2 Security Briefings - In-depth examination of infosec topics.

View channel

Channel Logo

ISC2 Think Tank

154843 subscribers|197 talks

Moderated roundtable discussions on a variety of infosecurity topics.

View channel

Channel Logo

ISC2 APAC Secure Webinars

84356 subscribers|491 talks

ISC2 Live Webinars for InfoSec Professionals in APAC Region

View channel

Channel Logo

ISC2 Knowledge Vault

138082 subscribers|159 talks

Information Security Certification

View channel

Browse content by topics

Discover the most popular and trending topics on BrightTALK.See all topics