Multi-vendor Webinar Schedule

Sponsor an Upcoming Webinar!

CyberEdge hosts multi-sponsor webinars pertaining to dozens of IT security technologies, services, and topics of the day. Participating in one of our webinars is an easy, cost-effective way to generate quality leads. Select one or more topics below to view relevant upcoming webinars. Then contact your CyberEdge sales representative for more information or to sign up.

Network Access Control (NAC)

  1. Events
  2. Network Access Control (NAC)

Views Navigation

Event Views Navigation

Today

Network Security Under Siege: Building Resilience Against Evolving DDoS Attacks

DDoS attacks are no longer just blunt-force disruptions—they’re faster, more targeted, and increasingly difficult to stop. From nation-state campaigns to criminal extortion, attackers are using DDoS to distract, disrupt, and destabilize enterprise operations. Organizations need scalable, adaptive defenses that can withstand the speed and sophistication of modern DDoS campaigns. Topics include: • Trends in DDoS tactics and motivations • How attackers combine DDoS with other threat vectors • Essential capabilities in modern DDoS mitigation solutions • Building layered defenses for availability and performance Gain practical strategies to strengthen your defenses and maintain uptime against today’s most advanced DDoS threats.
Topics:
, , , , , , ,

Securing the Edge: Rethinking Network Security for the AI-powered Threat Landscape

AI-driven threats and multi-vector campaigns are reshaping the cyber battlefield—leaving static perimeter defenses behind. Enterprises must evolve their network security strategies to defend the edge with scalable, intelligent protection that keeps pace with modern threats. Topics include: • Understanding AI-driven shifts in attacker tactics • Applying Zero Trust and segmentation strategies at the edge • Scaling defenses with automation and integrated intelligence Gain practical insight into building resilient, scalable network defenses that meet the demands of hybrid environments and modern threat campaigns.
Topics:
, , , , , , ,