Fight Back against the Threats of the New World

Our world has changed. The volume and velocity of digital data is growing exponentially. There's more evil seeking to exploit our vulnerabilities. And our IT resources have never been more spread thin. It's time to fight back!

THE PROTECHTORS is a 3-part webinar series for technology visionaries who understand the importance of security and business continuity in the new world. It's led by three of the industry's top thought leaders on cybersecurity, data protection and business continuity. Register for a session today to help us fight back against our newest challenges.



Rick Vanover
Senior Director, Product Strategy
Veeam Software


James Morrison
Distinguished Technologist - HPE
Former FBI Sr. Computer Scientist


Lane Roush
VP of Presales Systems Engineering
Arctic Wolf Networks




Beating Burnout & Boosting Business Continuity in The New World

Wednesday, August 26th @ 11:00 a.m. In this webinar, Rick Vanover, Senior Director of Product Strategy for Veeam Software, provides insight on how to help businesses balance the tug-of-war IT teams and business leaders are facing to keep systems up and running at the same time the demand for their time and resources is at an all time high. 




Maintaining Security & Adapting to change in The New World

Tuesday, September 1st @ 11:00 a.m. In this webinar, James Morrison, former FBI Computer Scientist focused on Cybersecurity and current HPE Distinguished Technologist, helps business and IT leaders grapple with the rapid pace of change they are experiencing. He utilizes his 20+ years of experience with the FBI to point out the 7 habits of highly effective security organizations.



Strengthening Security Ops & Tackling Remote Work Threats in The New World

Thursday, September 10th @ 11:00 a.m. In this webinar, Lane Roush, Vice President of Pre-Sales Systems Engineering for Arctic Wolf, helps business and IT leaders understand what a complete security strategy entails. He utilizes his 20+ years of experience in IT infrastructure, storage, compute, networking and security to layout a more cost effective way of layering your security strategy.