Cybersecurity Framework On-Demand Webinars

Identity, Applications, Data, Inboxes, and Endpoints all play an important role in your organization's overall cybersecurity posture (or, as we like to call it, your Cybersecurity Framework). In this six-part webinar series, we'll walk through each of these key components of your Cybersecurity Framework to help you get a better overall picture of how your organization stacks up & what you can do to improve your security posture.

  On-demand Webinars       Recommended Audience: IT Professionals & IT Decision-Makers

Watch Now →



George Abou-Samra_ProServeIT



George Abou-Samra

Principal Consultant and Security Practice Lead, ProServeIT

George Abou-Samra is a Principal Consultant and Security Practice Lead at ProServeIT. As Security Consultant, George's primary focus revolves around ensuring that ProServeIT's customers and organizations in general are made aware of the increase in cybersecurity risks, as well as providing guidance on what to do to better secure their organizations from threats and bad actors.

George's technical background and expertise in white-hat hacking enables him to understand hackers' methods and protect customers by securing vulnerable points of entry. When George isn't working, he enjoys spending time with his family, playing basketball, and hiking through the beautiful trails in Ontario and Canada.

Cybersecurity Webinar Series

security webinar 1

How To Protect Your Identity


Whether it's using world events that tug at the heartstrings, exploiting social media, taking advantage of deprecated equipment, buying compromised data, or other nefarious avenues, these threat actors are constantly attacking your environment, looking for a way to get that personally identifiable information.


How To Protect Your Applications


In this second webinar of our Cybersecurity Framework series, we'll dive into the features & functionality of Microsoft Cloud App Security: a tool that can help you eliminate your concerns over unauthorized access to corporate data, provide insights into possible data leakage points and other security risks, and help you to set, monitor, and revise policies within your organization.

how to protect your data- screen

How To Protect Your Data


Join ProServeIT for our third webinar in our Cybersecurity Framework series, as we look at how you can protect your corporate data and information, and preventing your users from inadvertently or inappropriately sharing it.

Cybersecurity Framework - How to Protect Your Inboxes & Prevent Phishing

How To Protect Your Inboxes & Prevent Phishing


In this fourth webinar in our Cybersecurity Framework series, we dive into tips and tricks around the fourth key pillar of our Cybersecurity Framework - protecting your Inboxes & preventing Phishing attacks. We'll discuss how to secure your inboxes to protect against threats like ransomware, malware, phishing, or other nefarious activities, and explore the benefits of Multi-Factor Authentication (MFA) and other tools to better protect your security posture.



How To Protect Your Endpoints


An increase in Bring Your Own Device (BYOD) policies in organizations has led to even more questions about protecting corporate information - if employees are using personal mobile devices to access corporate data, how can you make sure you're protecting that data? 

In this webinar, we discuss the fifth key pillar of ProServeIT's Cybersecurity Framework - protecting your endpoints - and discusses how tools like Microsoft Intune can help you to manage your mobile environment, especially as this pertains to BYOD.

How to Protect Your Overall Security Posture

How To Protect Your Overall Security Posture


Ransomware, data breaches, and security vulnerabilities are making headlines all around the globe. These threats aren't going anywhere - in fact, they're getting even more sophisticated than ever. So, how do you protect your overall security posture, gain cybersecurity awareness, combat ever-evolving cyberthreats, and ensure that cybersecurity is the foundation of your organization?

This sixth and last webinar of our Cybersecurity Framework webinar series addresses this question. In the webinar, focused around the sixth and final key pillar of the Cybersecurity Framework, we'll explore cybersecurity from a holistic perspective. We'll also dive into Azure Sentinel, a powerful tool that utilizes artificial intelligence and machine learning capabilities to collect, detect, investigate, and respond to incidents in real-time.

Remediating OT IOT Webinar

Special Webinar: Remediating OT/IOT Threats 


Operation Technology (OT) and Internet of Things (IOT) play a major role in today’s business transformation which opens up new cyber threat risks. As a result, SOC teams in organizations with complex operations environments are becoming increasingly responsible for remediating these attacks. We’ll discuss security strategy and solutions to reduce business risk for your critical infrastructure.

Watch the Cybersecurity webinar series

Fill out the form below to access our webinar content. Enjoy!