For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Microsoft & Quest Cybersecurity Summit: Irvine, CA

We are sorry, the event "Microsoft & Quest Cybersecurity Summit: Irvine, CA " has already expired.

You may also be interested in.

Shields Up: Disrupting Identity Attacks in Flight
On Demand Webcast
Shields Up: Disrupting Identity Attacks in Flight
Shields Up: Disrupting Identity Attacks in Flight
Delve into the rising threat landscape, emphasizing the critical need for rapid response mechanisms—akin to a panic button—when an imminent threat is detected.
Watch Webcast
Managing the Invisible Risk of Non Human Identities
E-book
Managing the Invisible Risk of Non Human Identities
Managing the Invisible Risk of Non Human Identities
Learn what risk non-human identities can pose to your organization, and how to mitigate that risk while retaining their usefulness
Read E-book
Cybersecurity Lessons from Maersk’s Former CIO
Online Event
Cybersecurity Lessons from Maersk’s Former CIO
Cybersecurity Lessons from Maersk’s Former CIO
When cyberattacks strike, response time is crucial. Join us for an exclusive webcast featuring Adam Banks, former Chief Technology & Information Officer of A.P. Moller – Maersk, who led the comp
Attend Event
AD Modernization Without Compromise
On Demand Webcast
AD Modernization Without Compromise
AD Modernization Without Compromise
Discover how to optimize your environment, strengthen your security controls and ensure continuous protection throughout the process.
Watch Webcast
XPERT Day Netherlands 2025
Events & Seminars
XPERT Day Netherlands 2025
XPERT Day Netherlands 2025
Is your organisation detecting the sophisticated threats targeting your identity infrastructure and is your migration strategy creating security vulnerabilities?Today's cyber attackers can remain unde
Attend Event
TEC Talk: What's New in Conditional Access Policies and Why You Should Care
On Demand Webcast
TEC Talk: What's New in Conditional Access Policies and Why You Should Care
TEC Talk: What's New in Conditional Access Policies and Why You Should Care
Dive into the significance of configuring a strong conditional access baseline and demonstrate how integrating new features can enhance protection.
Watch Webcast
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
On Demand Webcast
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
Find out how to stop the damage and respond with purpose in this informative, dynamic and empathetic TEC Talk where the disaster recovery lifecycle will be dissected from the seats of a technical expert, an IT risk consultant and product owner.
Watch Webcast
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
On Demand Webcast
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
Covering the progression of identity governance, moving from traditional on-premises methodologies to contemporary approaches in a technology-driven world.
Watch Webcast