Bringing quality tech content delivered by experts worldwide and Hexnode geeks to your screen. Indulge yourself with the latest IT insights, training sessions and become a part of an active endpoint management community. Do not miss out on this opportunity and mark the dates in your calendar right now. Stay tuned for updates.
All times are in EDT (GMT-4)
Hear from Hexnode's board of directors as they speak on the challenges faced last year and narrate Hexnode's inspirational story of perseverance. Do not miss out on the latest exciting features from Hexnode.
Take a deep breath and make sure to congratulate yourself for all the successes in your life. Nick Vujicic joins us at HexCon21 and talks about the need to recognize the goals you’ve set and see how many you’ve accomplished.
What should you do to prepare yourself for potential cyber attacks? Duncan McAlynn talks more about what all you can do prior to an attack to brace yourself.
Listen to Dr. Wendy's take on the future of cybersecurity as she talks about her decision to move from the field of healthcare to cybersecurity.
Don't miss out on any signs of a bully in your organization. Tammy Dunnett lets you in on the signs and symptoms of workplace bullies and how you can solve this issue.
Using real-world cases, Philippe dives into the best practices for securing APIs. Join him as he exposes the attack surface of an API and some common authorization problems and how best to tackle them.
Analyse the root causes of cyberattacks with the best in the field. Dr. Johannes Drooghaag explains the "Human Element in cybersecurity" at HexCon21 and demonstrates how we humans play a critical role in cybersecurity.
There's an ever-growing list of data breaches and that's why security is essential. Tamaghna Basu talks about the practical ways to enhance product security in your organization.
Find out more about device-sieve IoT from this much-awaited session. Also, experience the thrill of hacking with a live hacking demo from Bryson Bort!
Ever wondered if your enterprise is resilient or not? Well, George Platsis confirms that most enterprises are likely not resilient, and explains how we can analyze, build and test enterprise resiliency even in challenging times.
Join Calvin Nobles, Ph.D., as he addresses the lack of awareness of the human factors in cybersecurity. He also analyzes the human factors and the performance issues in detail.
Tune into Ian Murphy's unique take on how we as individuals fit into the security culture. Learn more about how to increase awareness in the field of cybersecurity.
Cloud-based solutions are being increasingly adopted in today's enterprises. Going cloud poses a lot of challenges. Find out the solutions to these challenges from Paul Lanois.
Bridge the gap between the CISO and the employees with BISO (Business Information Officer). Find out how a BISO assists with communicating the importance of cybersecurity within an organization.
Andre Kerstens talks about why APIs are more important now than ever before, and how APIs are the critical connective tissue that brings the next-gen apps and environment to life.
Why do hackers hack? Are you totally defenceless against hacker attacks? Learn the answers to these questions and more from author Roger Grimes.
One of the Top Cybersecurity Leaders for 2021, Chuck Davis dives into threats, assets, vulnerabilities, and risks of modern hacks in detail.
Prevent cyberattacks without spending a dollar! Join Adam Sbeta as he discusses the different ways management and technology experts can work together to prevent attacks in a cost-effective manner.
Social engineers use our information against us and expose us to risks. May Brooks-Kempler will guide you through the social engineering issues and how we can best overcome them.
With more than 26 years of experience, Jones Loflin shares with us the natural way of leading yourself, your team, and your organization.
There is a lot of ground to cover in cybersecurity, and Jakub covers some in this informative session.
Did you miss out on anything in WWDC? Let Bradley Chambers bring you up to date with what's new in Apple Device Management and the features announced in WWDC.
Here's a unique take on cybersecurity! Barrie Kirk talks about how connected and automated vehicles impact the data system and the society as a whole.
Learn about some of the important principles of building Zero Trust as a culture, and about utilizing the architecture to increase security in your organization.
Examine how the publicly accessible information about your organization can be used against you by your competitors, nation-state attackers and disgruntled employees.
Endpoint threats aren't threats if proper defenses are in place. Listen and learn from Adrian on how to set up proper defenses for endpoints in your organization.
Find out how cyber criminals are using psychology as an effective weapon to commit crimes. Erich Kron helps to spot and effectively counteract the attacks to make your organization more secure.
Brian C Reed helps the viewers understand the risks of mobile apps and how they can protect themselves. Find out how to run through the latest benchmark data of the apps.
Chloe dives into factors that lead to burnout among security professionals. Gain an understanding on how you can invest in your team so that they can thrive even during stressful times.
Managing iOS devices has never been easier. Sit through this brief training session and start managing your iOS devices with Hexnode.
Desktop and PC management is a staple in any organization. Hear from Hexnode experts and manage the Windows devices in your organization.
Leave no Android device unmanaged after this curated training from Hexnode wizards.
Manage macOS devices with Hexnode for a secured workplace. Get trained with the best in the industry.
Attention Hexnode partners! Do not miss out on the exclusive sales training that will enable you to sell more and retain more customers.
Do not miss Matthew Rosenquist's exciting take on how digital technology and security are interdependent. Find out more about how the rise of technology drives cybersecurity.
Donald talks about the role of passwords in cybersecurity and different methods to protect against threats.
If we are to protect people's security, we must also protect their privacy. Fennel Aurora will tell you why, and convince you that it is the right thing to do.
Are you worried about the hassles of going back to the office? Julie Alleyn's seamless guide to prepping employees in returning to the office is what you need! Find out what you can do to ease the transition.
Abbas Kudrati, APAC Chief Cybersecurity Advisor at Microsoft, talks about how we can stay on top of ransomware attacks and the Zero Trust network architecture.
Do you find security difficult while implementing WFH in your organization? Randy Marchany addresses this issue as he talks about how we can design security architecture to deal with protecting data.
Are you apprehensive about today's corporate environment landscape? Do you worry about which data is sensitive and which is not? Find out the answers with Ulf Mattsson.
It is always better to be proactive than reactive. Hear from Sami Laiho as he talks about what one should do to implement a proactive security strategy in their organization.
Dr. Dave Schippers discusses the big trends - exploitation of communication networks during the pandemic, phishing and endpoint considerations.
John Grim explains how the VERIS Framework underpins the Data Breach Investigations Report (DBIR). VERIS employs the A4 Threat Model to describe key aspects of incidents and breaches that affect victim organizations.
Andy Harris takes you back in time to analyze the first instance of ransomware and explains how to protect the critical infrastructure from ransomware using Privileged Access Management (PAM).
Note down Madhu Maganti's recommendations to build a strong security culture as he guides you through some of his real-life anecdotes.
If you are the next victim of a cybercrime, are you well prepared to tackle it? Find out with the help of a retired FBI agent, Scott A Augenbaum.
Rafay Baloch shares his insightful research on browser security as he walks us through how one can bypass anti-phishing detection mechanisms.
Learn more about GuardDuty and AWS Security Hub from Nicholas McLaren. Find out how to use the services to protect enterprises and monitor compliance.
Businesses face a lot of challenges when mobile communication is concerned. Curtis Wick from Kyocera International is here to talk about the benefits of Rugged devices for the 5G evolution.
Witness an attack scenario and how Microsoft 365 Defender catches the attack. Learn to analyze and avoid the typical misconfigurations in an organization with Sergey Chubarov.
Chris Roberts answers some of the most common vendor questions and how we can choose the perfect vendor. Tune in to his interview to get some interesting insights.
Rethink the security culture and make the hacker's job harder by learning the best practices from the field with Dr. Erdal Ozkaya.
Are you aware of the ransomware attacks of 2021? The year is not over yet and you would be surprised how many attacks have already taken place! Stay protected with the best cybersecurity tactics and techniques.
Albert E. Whale talks about the possibility of insider threats. Join his session and learn more about the pillars of cybersecurity and how the users affect a network.
Change is constant! Using his real life incidents, Dr. Lanre Phillips talks about how life falls in between expectations and reality.
Hexnode customers like Kent Lin, Chad Farkas, Kerry Klein, Felipe Barragan and Liam Darling share their wonderful experiences with Hexnode.
Revisit the security fundamentals that are required to mount an effective defense against ransomware and advanced threats that are common today.
How do we reduce burnouts? How do we set up a good work place culture? Find out from Josh Allan Dykstra as he talks on how a great workplace has a direct impact on reducing burnouts in employees.
How can you help your team achieve success? What are the different development models you can implement? Find out an interesting approach to art of building teams with Ralph van Roosmalen.
Learn the ABCs of Apple user enrollment with this brief session.
Flashing a custom ROM with Hexnode UEM app as the system app gives additional privileges. Learn the ropes with this comprehensive training session.
Defending againsts threats and malware is easier when Hexnode joins hands with Windows Defender.
You can never be too careful when it comes to security. Discover the best security practices for your macOS devices with Hexnode experts.
Leave nothing unmanaged with Hexnode's IoT management.
Secure and manage access to corporate resources and apps with Hexnode-Okta integration.
Don't sweat the small stuff and let the scripts do the work. Learn to deploy your scripts and automate tasks with Hexnode UEM.
If you are already using a device management solution but you are unsatisfied, you may want to migrate to Hexnode. Migrating to Hexnode is easy, which will be clear by this session's end.
One of the best cybersecurity experts out there, Chuck Brooks explains why we often come up short in security. You don't want to miss his session as he analyzes different cybersecurity trends and emerging technologies.
Join the OEM panel with Vern Olsen and Adam Arruda.
Why do we need to learn more about endpoint security and ransomware? What can we do to reduce the risks of being infected by malware? Bob Fabien Zinga answers these questions and many more.
Break down the components of Secure Access Service Edge (SASE) and understand the practical implementations in a current technology stack with Evgeniy Kharam.
If you're worried about the increasing cyber-attacks, Dan Lohrman will let you in on why it happens and how you can best tackle it.
Why do you need a UEM solution in hospitality and supply chain management? How to actually use Hexnode to maximize profits and productivity? Learn the answers with Vigi in this enlightening session.
Mark it on your calendars and join Jonathan Hard at HexCon21! He discusses the barriers of entry while expanding your company's footprint into the Federal and Department of Defense market segments.
Are you a confused leader in the post-pandemic scenario? Kevin Eikenberry addresses the key differences in the post-pandemic workplace and talks about leadership principles that are bound to drive you to success.
Mirko Ross dives into industrial IoT and the many challenges you face while implementing it in today's world.
Join Harold Sinnott and Frank Cottle as they discuss more about a hybrid workplace and the benefits of a flexible workplace situation in the post-pandemic world.
How to navigate the complex waters of cybersecurity in aviation? Analyze the challenges in aviation from a cybersecurity aspect with Patrick Mana.
Ads are everywhere. Learn where the future of digital ads lie with Thiago Bolognez.
Find out what you’re doing wrong when you make a device “smart” and how to make it right with Ken Munro.
Merritt will challenge you to think about your implementation of security controls, leveraging immutable and ephemeral architectures in your innovation and development pipelines.
We often make mistakes when we involve ourselves with cybersecurity. Most of the time, we are completely unaware of them. Find out what these mistakes are with Jim Stickley at HexCon21.
Join Dmitry Raidman at HexCon21 as he talks about the evolution of DevSecOps in modern organizations and how it ties to application security in today’s world.
91% of cyber attacks start with spear phishing. Jorge Mario talks more about these shocking statistics and what we can do to prevent them during his session on neurohacking.
Did you know that hacking yourself is a good idea? David Jacoby will convince you that it is! He'll let you in on some tips and tricks you can use to find out the vulnerabilities in your system.
Take notes from real-life cybercrimes and analyze what we can do in such cases with Menny Barzilay as he talks about the secret art of cyber crisis management.
Chris Johnson explains how to limit access to products and services to reduce the threat surface and the probability of being compromised.
Do the emerging cyber threats make you curious about the future-proofing of Supply Chain 4.0? Learn why Steven Sim thinks it's the bigger concern and analyze the key strategies to addressing them.
Take an introductory ride through game theory with a defensive approach, and use these principles for any team that requires strategy or action plans in which other players are involved.
Find out what you can do to be a true champion. Mike Robbins helps us gain insights and the focus to attain the championship.
Passwords are secure! Dovell Bonnett, the "Password Guy" talks about why passwords can't be killed and why we can't go passwordless. Tune into his session as he talks about MFAs and how they help or hinder authentication.
The current generation consumes a mammoth amount of data each day. Nazima Ahmad talks about the need for safeguarding the data and how it links to cybersecurity.
Address the common cloud misconfigurations that hackers love in AWS and the real world impact when they are exploited.
Dr. Tim Nedyalkov explains how it essential for businesses to have a robust endpoint management strategy. Find out how we can strategically secure the workforce with a good UEM.
All good things must come to and end! Witness the conclusion of HexCon21 with Apu Pavithran.