dcsimg
eSeminars The Online Seminar Standard
logo
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Featured Events >>>

It's Time to Rethink Risk Assessment in the Digital Age

September 13, 2018

Discover why effective risk management practices offer a single quantitative threat assessment. The goal: a clear-eyed picture of where risk lies so that you to stay ahead in an increasingly competitive market.

read more >>>

Sponsored by RSA

You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

July 31, 2018

Join cybersecurity experts Dr. Chenxi Wang and Tim Roddy, as they shine a light on the challenges of attaining complete visibility across your security environment.

read more >>>

Sponsored by Fidelis Cybersecurity

Transforming Banks for a Digital Future: The Winners, The Losers, and the Strategies to Beat the Odds

JUly 30, 2018

To thrive and gain competitive advantage, banks must solve the CEO's Paradox: radically reducing costs while still investing in the future. Security, resilience, scalability and an insight-driven approach are all critical to current and future success. 
 

read more >>>

Sponsored by IBM

Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers

July 25, 2018

Today’s cloud service providers (CSPs) need a secure and reliable Linux platform that provides exceptional operational efficiencies, allowing them to consolidate a mix of multi-tenant workloads in a small footprint and deliver differentiated level of service to their clients.

read more >>>

Sponsored by IBM

How the CLOUD ACT Changes Compliance for Service Providers

July 9, 2018

Our experts discuss what service providers need to know to comply with the CLOUD Act without breaking their budget.

read more >>>

Sponsored by IBM

The Journey to AI: Change Your Approach to Data

June 21, 2018

Learn how the newly released IBM Cloud Private for Data analytics platform enables organizations to progress toward data maturity, prepare data for AI and drive business insights.

read more >>>

Sponsored by IBM

Driverless Security for the Blissfully Unaware: Protecting Users Even When Their Hands Are Off the Wheel

June 19, 2018

Security incursions continue to grow exponentially across endpoints, mobile devices, and cloud, despite unprecedented private and public sector efforts to secure the infrastructure. What is the best solution for comprehensive infrastructure protection?

read more >>>

Sponsored by Pomeroy

The New Reality for Customer Engagement

May 31, 2018

Omnichannel communication, intelligent automation, artificial intelligence (AI) and case management are merging to forever change how organizations service their customers. Are you ready?

read more >>>

Sponsored by Appian

Ensuring Peak Performance at the Edge

May 17, 2018

Discover how to improve data center operations in edge environments by using real time data and proactive recommendations to focus on critical incidents, reduce MTTR, mitigate risks, and ensure business continuity.

read more >>>

Sponsored by Schneider Electric

Identifying the Risks to Your Risk Management Strategy

May 10, 2018

lanning, launching, and sustaining a risk management strategy that protects the entire organization is not an easy task. Join eWEEK Senior Editor Sean Michael Kerner for this webinar, which will examine the risks to your risk management plans.

read more >>>

Sponsored by RSA

Predict, Prevent, Detect and Respond: 8 Tips to Secure Your Business

May 8, 2018

You know you need to focus on cybersecurity for your business, but where do you start? If you are able to predict, prevent, detect and respond to an attack, then you will have a secure network and you will be able to defend your business from cybercriminals.

read more >>>

Sponsored by Kaspersky Lab

Beyond the Deadline: How GDPR Will Impact Your Company's Risk and Security Profile

March 29, 2018

Many of the GDPR requirements can be mapped directly to best practices for reducing your IT risk, including techniques and technologies designed to improve authentication, increase visibility with analytics, and make it easier to perform governance, risk and compliance (GRC) functions.

read more >>>

Sponsored by RSA

Sponsors >>>

Topics >>>