View the Virtual Sessions OnDemand

Choose from eight cybersecurity-focused sessions. You can sign up for all sessions or pick and choose the top sessions you find the most exciting and beneficial to your business. Even if you can’t attend on that day, sign up anyway, and our team will email the webinar recording to you to view on-demand.

  • October 18th sessions have a special focus on banks and credit unions.
  • October 19th sessions are for any small to medium sized businesses, across multiple industries.


Top 6 Controls to Mitigate Cyber Risk

Presented by: David Edwards, SBS Cybersecurity

(Perfect for banks and credit unions)
Go from risk to resiliency. This session will take a deep dive into the top six controls you need in place to mitigate cyber risk and keep you a step ahead of bad actors. 


Cyber Incident Response Testing - Going Beyond the Roundtable

Presented by: Kaushal Kothari, Secure Guard Consulting

(Perfect for banks and credit unions)

Be prepared to respond to data breaches and cyber threats. Join Kaushal Kothari as he reviews how you can expand cyber incident testing to strengthen incident response planning. 


Security Assessments for Financial Institutions

Presented by: Marquise Davis and Pat Heller, Scantron Technology Solutions

(Perfect for banks and credit unions)

Evaluate whether your security controls and solutions are implemented correctly, operating as intended, and strong enough to fend off a cyber attack or breach of sensitive data – specifically for Financial Institutions.

Security Operations or Not: The Business Impact of Detection and Response

Presented by, Arctic Wolf

(Perfect for banks and credit unions)

Presented by: Jacob Wilde

In today’s world of rapidly evolving cyber threats, organizations need to deploy security operations (SecOps) to protect themselves.  But what impact can organization expect from their security operations practice?
In this webinar, Arctic Wolf experts will explore:
  • The role of security operations in detecting indicators of compromise – and what happens when compromises go undetected
  • How security operations mitigates the dwell time, downtime and cost of cyberattacks
  • Security operations impact on attack remediation and recovery, and post-incident security hardening

How much Cybersecurity is enough?

Presented by, Eddie Campbell, Microsoft

This session focuses on effective cybersecurity that preserves the user experience, compliance needs, safeguarding corporate data, security on-the-go and training employees and good security hygiene. 


Backup is no longer enough: Why You Need a BCDR Strategy

Presented by: Sean Lawless, Axcient

Backup with virtualization has evolved from “nice to have in a natural disaster” to an essential solution to protect you from cyberattacks and keep your businesses running.

Is Best of Breed Really the Best Approach?

Presented by, Fortinet

In a businesses’ early stages, it can be hard to foresee the long-term impact piecemeal security can have. When coupled with the belief that switching is easy, businesses can quickly find themselves in an unmanageable situation riddled with inconsistent policies and gaps in protection. Get the facts and hear how Fortinet’s simplified security through seamless integration and automation can put your business on a path to smart, secure growth.