Webinars

Past Webinars

Webinars

Overcoming Petya

Petya is the latest malicious ransomware strain that has greatly infected Eastern Europe. Learn more about the attack and how to secure your data.

admin Image

admin

Webinars

Overcoming WannaCry

WannaCry was a massive ransomware attack that affected 230,000 machines. Learn more about WannaCry and how to protect your data with our webinar.

admin Image

admin

Webinars

Cloud Security Roadmap: Mitigating Risks and Building for Long-Term Success

Build your comprehensive cloud security strategy, ensure a consistent security posture across multiple clouds, and evaluate your cloud security investment.

admin Image

admin

Webinars

Shared Security Responsibility in the Cloud: What is Your Role?

There’s no one-size-fits-all approach to cybersecurity in the cloud. In this webinar, we break down the shared security responsibility model and what that means to you as an Azure customer.

admin Image

admin

Webinars

Security: The Missing Ingredient in Your Public Cloud Strategy

Using the public cloud to host your data brings many great advantages. But what about your cyber security? Learn more from the experts with our webinar.

admin Image

admin

Webinars

Three Practices to Minimize Drift Between Audits

Kurt Hagerman, Armor, CISO, discusses why threat actors care about healthcare data, the five objectives and challenges in defending healthcare data and the three practices to stay aligned between audits.

Webinars

Security: Missing Ingredient for Azure Managed Service Providers

A vulnerable public cloud can be disastrous for your company. Secure your data in Microsoft’s Azure Cloud with cyber security tips from our webinar.

Webinars

What happens when disaster strikes?

This webinar discusses security and disaster recovery best practices that ensure your business goes on after disaster hits.

Webinars

Building a Secure Partner Relationship with Armor

Bringing in talented cyber security professionals doesn’t have to feel impossible. Get connected today with Armor Global Partner Program.

Webinars

Is Your Enterprise Data Secure – From the Inside Out?

Security shouldn’t start on the outside. Most security strategies attempt to detect and stop the threat actors at the edge and provide limited security between VLANs and limited hardening and detection capabilities on the host itself – two points the threat actors are targeting. Defending the end points is a losing battle. Organizations need to focus on deploying multiple security layers from the inside out and leveraging big data analytics to detect at the host level.