Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Recover from IT Outages in Minutes - What Indian MSPs Must Know

Downtime can cost businesses revenue, productivity, and customer trust. Whether it's a server crash, ransomware attack, hardware failure, or accidental deletion, every minute matters. In this webinar, learn how modern IT teams and MSPs can reduce recovery time from hours to minutes and keep critical systems running with minimal disruption. Who should watch: IT Managers • System Administrators • MSPs • Business Leaders. Watch the full session to discover practical strategies for faster backup and disaster recovery.

Video On Demand - Configuration Drift and the Risk of Misconfiguration

Misconfigurations can undermine security even on fully patched systems. In this webinar, CalCom’s Co-Founder and Director of Business Development Roy Ludmir explains what configuration vulnerabilities are, how configuration drift happens, and why it matters for both cyber risk and compliance. Questions? Want to talk about server hardening for your organization? Contact us at info@calcomsoftware.com.

Stop Local App Data Leakage | Falcon Data Protection Demo

CrowdStrike Falcon Data Protection enforces content-aware controls on local thick-client applications to prevent sensitive data from leaving the environment. Real-world exfiltration attempts across common desktop applications including chat tools, note-keeping apps, and email clients are identified and blocked beyond the browser. Custom Local Application groups, Classification Rules, and Data Security Policies give defenders flexible, precise control over how sensitive data is handled across the endpoint.

The Need for Infrastructure Identity | Teleport x The Cyber Hut

Most organizations have identity over here and infrastructure over there — and they don't talk. By default, infrastructure has no identity. It's naked. Ev Kontsevoy explains why bringing identity into your infrastructure stack is a prerequisite for safe AI adoption — and what a trusted state actually looks like.

What Healthcare Leaders Face After a Cyberattack

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with Errol Weiss, Chief Security Officer at Health-ISAC. Drawing on decades of experience across government, finance, and healthcare, Errol walks through what leaders actually face in the hours and weeks following a cyberattack. The conversation explores why healthcare remains a top ransomware target, how uncertainty shapes recovery decisions, and why trusted, anonymous information sharing has become one of the sector’s strongest defenses.

The hidden risks of AI rule conversion in SIEM migrations

Uncover the hidden risks of AI-powered rule conversion during SIEM migrations and why clean inputs matter. Learn how to combine automation with human validation for secure migration success. Additional Resources: About Elastic Elastic, the Search AI Company, enables everyone to find the answers they need in real time, using all their data, at scale. Elastic’s solutions for search, observability, and security are built on the Elastic Search AI Platform — the development platform used by thousands of companies, including more than 50% of the Fortune 500.