Cybersecurity and Risk Management Webinars

Quantum computing. Quantum cryptography. What are they? Find out why vendors like IBM, Microsoft, Intel, and others are placing a bet on these technologies, and what they mean for enterprise technology. Join Nemertes' CEO and resident futurist Johna Till Johnson for a quarterly update on...

Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT. ...

Quantum computing. Quantum cryptography. What are they? Find out why vendors like IBM, Microsoft, Intel, and others are placing a bet on these technologies, and what they mean for enterprise technology. Join Nemertes' CEO and resident futurist Johna Till Johnson for a quarterly update on...

Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development. But are they taking the right steps to secure those containers? This Webinar provides a feature-functionality comparison of the leading providers...

Enterprise Architecture is dead. Long live Enterprise Architecture! In the face of DevOps and Agile development methodologies, many enterprises have backed off entirely from the concept of an enterprise architecture. That's a mistake. Enterprise Architecture is needed more urgently than ever before--but not the old, silo-ed,...

You've been breached. Now what? You may think you know the answer, but in this cloud-first, mobile-first environment, it's time to rethink your incident response policy. This webinar covers how to modify your security operations to take into consideration your next-generation security architecture and protect assets...

Your company's adopted a cloud-first strategy. Your DevOps initiative is steaming along, and your processes are lean and agile. But how well are you protecting cloud-based resources? Do you even know what's in the cloud, and who has access to it? Using Nemertes' real-world data, find...

You've got firewalls, anti-malware, next-generation endpoint security, and NAC. You're rolling out CASB and analytics, and extending protection to cloud, mobile, and IoT resources. But how does it all come together? This webinar reveals what a next-generation security architecture looks like--and which technologies, and vendors, should...

Thanks to cloud computing, the proliferation of endpoints, the emergence of new technologies and paradigms like IoT and Blockchain, enterprise data protection has undergone a paradigm shift. The challenge is no longer simply to classify and lock down structured data in protected on-premise environments. Today...