The Webinar Archive

A curated repository of research briefings and strategic analysis for the Webinar sector.

C
ContentClick in Webinar

End User Cyber Fundamentals

This course teaches about end user security risks related to everyday online activities such as using email, social media, storing data on public cloud, and using IoT devices. The course analyzes the security and privacy risks end-users should know to recognize threats like online scams, typosquatting, spoofed websites, and others to keep themselves and their organizations safe. End-User awareness training is a priority for any organization and company regardless of its size. It helps the employee to understand the existing security risks and concerns and it cultivates a proactive behavior to detect and prevent attacks before they happen.  Humans are the “weakest link” in the cyber chain, so attackers can prey on the flaws of human nature to target an organization/system. Security infrastructure can be high-end, yet a simple click on a link sent in an email can cause a breach of millions of dollars. Therefore, end-user awareness training is one of the most important steps for successful system implementation. Awareness training helps management as well as employees of an organization to understand the security risks in the information system, to recognize the threats, and to learn how to properly respond to them. This course covers different topics related to end-user cyber fundamentals. You will learn best practices on how to navigate the Internet in a secure manner for safe internet browsing, social media use, public cloud storage risks, and IoT Internet of Things security concerns.  End user awareness training should be performed regularly in every company to include the employees in the security program of the organization to mitigate threats, attacks, and breaches of valuable company data and assets.

Apr 15, 2026 8 min read Premium
C
ContentClick in Webinar

AI for Creative Production: A handbook for the ethical use of AI in creating and processing text, images, video, and audio ($28.79 Value) FREE for a Limited Time

AI for Creative Production is a practical, non-technical guide that helps digital creators, filmmakers, musicians, and writers embrace AI as a tool or collaborator--not a replacement. Beginning with a clear foundation in how modern AI works and its ethical implications, the book offers a hype-free perspective, showing where AI is genuinely useful and where it’s not. It breaks AI into three accessible categories. Starting with Utility AI, tools that help organize and enhance your work, identify the best shots, select image elements, transcribe and search videos, clean audio, and summarize text. You’ll then explore Generative AI, learning to create new text, images, video, and audio with creative control. GenAI doesn’t have to replace your work; you’ll discover tips for better prompting, tools for retouching, and fresh methods for brainstorming and ideation. Finally, you’ll uncover the potential of Automation AI to help edit videos, process photos, and build scripts that streamline your creative workflows. Packed with hands-on examples using accessible tools like Firefly, Runway, Sora, Photoshop, DaVinci Resolve, and ElevenLabs, this book equips you to integrate AI into your practice with clarity and confidence. By the end, you’ll know how to get the best from AI while preserving the unique value of human creativity in an AI-driven world.

Apr 15, 2026 8 min read Premium
C
ContentClick in Webinar

The Hidden AI Attack Surface: How GenAI Tools Expand Data Exposure Risk

As AI adoption accelerates, 93% of companies are already using or planning to use AI, security teams are confronting a new and rapidly expanding attack surface. Employees now feed sensitive data into tools like ChatGPT, Copilot, Gemini, and internal AI assistants, often without guardrails. This session breaks down how AI tools create new pathways for data exposure, privilege escalation, accidental data sharing, and unauthorized access. Attendees will learn how to identify hidden exposure risks, deploy Generative AI tools securely, and implement governance safeguards that reduce breach and compliance risk without slowing innovation. Speakers:  Opper, Sr Solutions Engineering Leader, Lightbeam Opper is a senior solutions engineering leader with deep expertise in data security, governance, and access control across cloud and hybrid environments. He works closely with security and IT leaders to help them understand where sensitive data lives, who can access it, and how to reduce risk without disrupting the business. Known for his practical, real-world approach, Opper bridges technical depth and executive strategy to deliver measurable security outcomes. Wes Kennedy, Sr Product Marketing Manager, Lightbeam Wes Kennedy is Senior Product Marketing Manager at Lightbeam, where he leads go-to-market strategy and builds content that translates complex infrastructure, AI, and data security technologies into clear customer value. With a background that spans virtualization administration, sales engineering, and principal technical marketing roles, Wes has helped bring to market solutions across data security, hyperconverged infrastructure, cloud-native data platforms, and distributed databases. When he’s not talking about data security and AI, Wes is usually in the shop woodworking, tackling a house project, or out in the garden. He lives in the Columbus, Ohio area with his family.

Apr 15, 2026 8 min read Premium
C
ContentClick in Webinar

From Batch to Real-Time: What It Actually Takes to Modernize Your Data Pipelines

Most data teams know their pipelines need to evolve. Batch loads that run overnight, manual workflows stitched together over the years, legacy tooling that was never designed for the demands of real-time analytics or the AI agents that are about to depend on them. But the challenge is figuring out where to start, what to prioritize, and how to modernize without turning it into a six-month replatforming project. The stakes are higher than they used to be. Agentic RAG systems retrieve and reason over live enterprise data and they're only as reliable as the pipelines feeding them. Stale batch data, inconsistent schemas, and siloed sources don't just slow down your analysts. They cause agents to retrieve the wrong context and fail in production. In this session, Kim Fessel joins Jess Ramos of Big Data Energy and Manish Patel, GM of Data Integration at CData, to talk through what pipeline modernization actually looks like in practice. We'll cover when CDC is the right move versus when it's overkill, how to approach hybrid environments where legacy and cloud systems need to coexist, and what separates teams that modernize incrementally from those that get stuck in planning mode. We'll also walk through how CData Sync fits into this, from CDC across sources like SQL Server and Oracle, to pipeline orchestration and delivery into open table formats like Delta Lake and Iceberg, the same formats underpinning retrieval in modern agentic RAG architectures. Can't join us live? Register anyway and we'll send you a recording after the session. By registering, you consent to receiving email communications from Towards Data Science and CData. You may opt out at any time.

Apr 15, 2026 8 min read Premium

Ready for Full Access?

Gain unlimited access to our entire library of research briefings and analyst reports.

Unlock Full Membership
Access Granted
An Executive from a Global Firm just accessed Research Briefing