Insights from the trenches
CyberVoices Event Series
On-demand WebinarThu, Jun 22, 2023

State of Endpoint Risk and Security
Small businesses have the same types of security risks as large enterprises, but fewer resources to address them. These security risks have only grown in the current work from anywhere era with devices being used in multiple locations outside of the office. It has never been more important to have visibility into device and application health, as well as the usage. Panelists in this session will highlight cybersecurity device trends across small- and medium-businesses and the most impactful ways to address them, using anonymized data collected by Absolute Data Intelligence.
Discussion Topics:
Various security risks for SMB devices
Geolocation and device usage trends
How continuous monitoring of application and device health can help
Panelists:
- Hayley Edge, Director, Data Products, Absolute Software
- Joseph Peck, Director, Product Management - Control, Absolute Software

Cybersecurity for Small Businesses: How to Improve Efficacy
When a data breach makes the news, it’s typically because a large, marquee firm has fallen victim to a cyberattack. However, small businesses are especially attractive targets because they have information that cybercriminals want, and they typically lack the security infrastructure of larger businesses to adequately protect their digital systems for storing, accessing, and disseminating data and information. Join two industry-recognized security leaders in this lively virtual fireside chat to talk about the cyber threats small businesses are facing and how they can improve their security efficacy without breaking the bank.
Discussion Topics:
The state of cybersecurity for SMBs
Common cybersecurity best practices for SMBs
How to do more with less by establishing cyber resilience
Panelists:
- Massimo Rapparini, General Manager & Head of SMB, Gen
- Bushra Nasr, Global Cybersecurity Marketing Manager, Lenovo
Absolute Resilience
Grant self-healing to your mission-critical applications and get the most full-featured set of device and data controls on the market.
Explore related content:

Building Resilient Zero-Trust Capabilities
451 Research’s latest study spotlights an integrated zero-trust approach with resilient capabilities.