Recent talks on Endpoint Security

From Sprawl to Control: Regaining Control Over Data in a GenAI World
Explore real-world strategies to combat data sprawl across SaaS apps, GenAI tools, web, email and endpoints. Learn how deep data discovery, AI-driven
classification, and unified, risk-aware policies help organizations prevent data loss across all channels and secure digital transformation at scale.

The Future of Self-Aware Data Security
You’ve heard why self-aware data security matters. Now it’s where the proof meets the pudding: making it real in environments with millions or billions of
records, files, sprawling databases, and AI touching sensitive data at every turn. In this fireside chat, Chief Product and Marketing Officer Naveen Palavalli
teams up with CTO and Global Head of Engineering Bakshi Kohli to dig into how to start closing the Visibility-Control Gap — without adding complexity. The…

Bridging security gaps with defense-in-depth: Tackling vulnerabilities of siloed security
Attackers are fully focused on utilizing the identity when infiltrating organizations through their endpoints. Most security teams are still fighting these threats
with disconnected tools, creating dangerous blind spots that let threats slip through undetected. Don’t let siloed security create blind spots. Join us for this
webinar where our speakers, Niels van Bennekom from CyberArk, and Nadav Shai Kanon from Palo Alto Networks, will walk through the importance of brea…

Protecting Your Organization with a Unified Mobile Endpoint Strategy
In today's complex and diverse IT environments, organizations face the challenge of managing and securing a vast array of mobile endpoints and operating
systems. From corporate-owned phones to front-of-store devices and backend warehouse tools, the variety of endpoints can create significant security gaps.
That is why a robust Unified Endpoint Management is so important. In fact, many organizations that considered and rejected MDM have later experienced d…

Built for Trust: Dell Copilot+ PCs with Intel and the Future of Endpoint Security
Outdated PCs are a growing security risk, especially in hybrid environments where attackers exploit hardware gaps. This webinar explores how Dell Copilot+
PCs — built in partnership with Intel and Microsoft — deliver AI-powered, hardware-backed protection against ransomware, phishing, and zero-day threats.
Learn how modern endpoints reduce incidents, simplify compliance, and free up IT resources through automated management with Microsoft Intune. Disco…

State of Cybersecurity: A Reality Check
You’re juggling multiple endpoints. Your remote workforce is creating security gaps. And identity attacks jumped 442% last year alone. In this webinar, you'll
hear from Jason Kikta (CISO/SVP, Product at Automox) and Dmitri Alperovitch (Automox Chairman of the Board, co-founder of Crowdstrike) discuss pressing
security concerns and real solutions, like: - What’s actually happening in the current threat landscape - How autonomous endpoint management eliminates …

Cyber Security Workshop 02: CIS Compliance Simplified
Is CIS compliance hard? Or Herculean? Compliance is a critical aspect of cybersecurity, and if performed incorrectly, it can bring a lot of trouble during
audits. Fines, reputational and business impact, just to name a few. CIS compliance is one major policy that organizations around the world refer to secure,
comply, and enhance their security posture. But, how do you do it effectively? How do you implement compliance without spending millions of dollars and …

Breaking Down the Exposure Management Maturity Model
As the modern attack surface continues to expand, and threat actors continue to evolve, it’s incumbent on you to assess where your organization stands
today and determine how you can evolve your security capabilities going forward. Join Ivanti's Chris Goettl and Rob Lesieur as they walk through an exposure
management maturity model, laying out the tooling and capabilities that accompany each stage of your organization’s exposure management journey — ju…
Attend Summits on Endpoint Security
The 2023 Threatscape
2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…
Evolution of Endpoint Security
Rethink your endpoint security strategies and technology to keep up with unprecedented change.
Successfully Securing Endpoints & Mitigating Threats
Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid
workplaces. Multiple endpoints and locations heighten that risk, making it essential for CISOs and IT security teams to overcome common challenges. Find o…
360° Cloud Security for 2023
Cloud security threats in 2023 range from data breaches, insider threats and even insecure interfaces and APIs. The threats are numerous, and creating and
implementing a strategy to contend with them requires more planning and research than ever before.
Next-Gen Strategies for Securing the Network in 2022
According to a 2021 study by the Ponemon Institute, 68% of organizations experienced one or more endpoint attacks that successfully compromised data
and/or IT infrastructure in the last 12 months. Coupled with the rise of zero trust meaning that endpoint security is becoming even more critical, it’s safe to …
Intelligent Identity Management and Cloud Security
Cloud security spending exceeded Gartner's 2020 estimations, reaching $595 billion as a result of the pandemic. With organizations continuing rapid cloud
services adoption to accommodate remote and hybrid work, they are grappling with complex questions around the shared responsibility model and how to …
Watch series about Endpoint Security
Fortinet Secure Operational Technology
Previously air-gapped OT environments are becoming increasingly connected due to Digital Transformation demands, and production risk reduction
initiatives, while also supporting a growing need for remote access. Tune in this webinar series to explore how the Fortinet OT Security Platform can addres…
Securing the Enterprise Series with Cisco
Cisco's Secure the Enterprise Webinar Series provides in-depth insights on advanced cybersecurity practices. Learn about threat intelligence, incident
response, and secure networking. Gain expertise in safeguarding enterprise assets. Perfect for cybersecurity professionals
Thought Leadership Thursday
Designed to provide valuable knowledge and actionable guidance, Adlumin’s Thought Leadership Thursday webinar series explores a wide range of
cybersecurity topics, including threat hunting, incident response, insider threat detection, compliance, and more. Each session features a renowned expert …
Secure Your Desktops and Servers
Implement foundational endpoint security controls. In the digital age we live in, businesses are constantly under the threat of cyber-attacks. Learn how to
protect your organization with an endpoint privilege security solution, through removing local admin rights, enforcing role-specific least privilege, and defen…
CAFÉ TECH NORTH AMERICA: The Best 20-Min You’ll Spend on Cybersecurity Tech Each Month
Staying ahead in data and network security is a constant challenge for MSPs, MSSPs, and IT Professionals —but CAFÉ TECH makes it easier. That’s Why We
Created CAFÉ TECH! Every month, we invite you to join our expert Solutions Engineering team for an exclusive session packed with the latest SonicWall tech…
Beyond the Login: Security First IAM
Don’t just manage identities. Secure them. Learn about strategies and solutions that support a security first approach to IAM, providing the right users
seamless access to the right resources at the right time, while safeguarding credentials and controlling access to privileges in on-premises and cloud-based…





