Learn from the people behind our information security products and technologies.

Monthly Support Webinars
View all

Join us for interactive presentations presented by our expert support technicians.

Webcasts on Demand

Office of the CSO: Defending Against Big Data and IoT Threats

Big Data and the ‘Internet of Things’ pose great threat challenges for cybersecurity professionals.

Breaking Threat Kill Chains

Protecting your Data from Advanced Threats and Multi-Stage Attacks.

Websense® 2014 Threat Report

The Websense Security Labs™ "intelligence operatives" behind the 2014 Threat Report explain its significance and what you can expect to learn from it.

Learn about 2014's key threats and how to respond.

After viewing the Websense 2014 Security Predictions webcast, you'll know what to expect from cybercriminals and how to be ready for when they attack.

Enhancing the TRITON Portfolio: What's New

Find out how Websense has improved the industry-leading TRITON architecture to provide even greater protection.

Defending Against Advanced Cyberthreats and APTs

A new on-demand webcast describes the nature of APTs and outlines how best to defend against them.

Enabling Fast Responses to Security Incidents

Websense® TRITON® RiskVision™ combines unmatched insight into advanced threats and data loss with actionable reporting and malware analysis.

Office of the CSO: Quick Wins and Tips for DLP Success

In this webcast our expert panel offers an insider's perspective on how to approach data loss prevention (DLP) projects while avoiding the traditional pitfalls of implementation.

Deploying data security: Six steps to data protection

Deploying data security need not be complex, expensive or ineffective. In just six steps, your organization can be preventing the loss or theft of its IP and other sensitive data.

Office of the CSO: Rethinking Your Security Strategy

Join top security executives from leading organizations in a frank discussion about how to identify your greatest vulnerabilities and deploy new tactics that stop advanced attacks in their tracks.

Threat defenses: Before, during and after the point of click

Learn how to get protection from malware, advanced threats and data theft with continuous defenses before, during and after the point of click.

Why Java Exploits Remain a Top Security Risk

This webinar will explain Java's exposure to being compromised, plus offer a variety of alternatives and best practices you can employ to mitigate risks.

2013 Threat Report

Analyze threats and trends of 2012, and how they might affect your organization in the coming year.

Seven Stages of Advanced Threats and Data Theft

Learn how to protect your organization against the seven stages of advanced threats and data theft.