Skip to content
Watch Now!

On-Demand Webinars

Access Endsight's library of recorded webinars, designed to provide actionable insights on IT strategy, cybersecurity, and industry-specific challenges. Whether you're seeking guidance on streamlining operations, enhancing security, or planning for the future, our expert-led sessions offer practical solutions to help your business thrive. Watch at your convenience and gain the knowledge you need to tackle your toughest IT challenges.

Copy of Untitled (300 x 250 px) (1)
Microsoft365-Webinar

Ready to Ditch Your Spreadsheets?

Learn How Power BI Can Revolutionize Your Data Analysis!

Copy of Untitled (300 x 250 px) (2)
Microsoft365-Webinar

Unlock the Power of the Power Platform

In this webinar, we explore the key components of the Power Platform - Power Apps, Power Automate, and Power BI - and show you how they can help automate, integrate, and analyze your business.

Copy of Untitled (300 x 250 px)
Microsoft365-Webinar

Maximizing Business Efficiency through Collaboration and Security

Many organizations are missing out on opportunities to streamline operations, reduce errors, and enhance data integrity due to incomplete utilization of these tools.

Copy of Passwords
Cybersecurity-Webinar

Mastering Microsoft 365: Unlocking Security, Savings, and Compliance through Strategic Licensing

In today's dynamic digital environment, understanding and staying ahead of the evolving licensing landscape is more crucial than ever. With Microsoft continually updating its licensing, businesses find themselves in the labyrinth of choices, often unaware of the potential savings and enhanced security features each license offers.

Monthyl Webinar Recording
Cybersecurity-Webinar

Monthly Cybersecurity Webinar

Want to learn more about cybersecurity, but can't make it to our live webinar? Fear not! We have the recording here.

Save the Date! Special Inv - November 23 Office Hours (160 x 600 px) (300 x 250 px) (1)
Cybersecurity-Webinar

Security Office Hours Recording: Conditional Access - Granular control of logins

In this essential webinar, explore the vital topic of Conditional Access in cybersecurity. Learn how to implement control over login processes, a critical aspect for securing digital assets in today's technology-driven world.

Webinar Recording MS 365 Attacks
Cybersecurity-Webinar

Cybersecurity Office Hours Recording: Common Attacks and Identity Concerns in 365

Watch our webinar on common attacks and identity issues in Microsoft 365, as we show you the increasing need for better security measures. In this session, we will also show a demo of an MFA bypass attack. We aim to empower your business against evolving threats, securing a high-performance future.

Copy of MFA Bypass (7)
Microsoft365-Webinar

The Future of Work: AI-Driven Efficiency with Copilot

Discover how Copilot, the innovative AI-powered digital assistant that integrates seamlessly with Microsoft 365, can transform your workplace. This presentation is designed to guide business leaders and professionals through the ways Copilot enhances productivity and collaboration within your organization.

Copy of Copy of MFA Bypass
Microsoft365-Webinar

Mastering the Art of Prompt Engineering for Microsoft Co-pilot

AI and Microsoft Co-pilot are powerful tools, but with the right prompts, you can unleash their full potential. Join us to learn how to create precise prompts that will enhance your communication with Microsoft Co-pilot. Our goal is to elevate your Microsoft 365 productivity to unprecedented levels!

Copy of Copy of MFA Bypass (1)
Cybersecurity-Webinar

Executive De-Brief Regarding the Worldwide IT Outage Linked to CrowdStrike (7/22)

Watch our exclusive Executive De-Briefing session focused on the recent worldwide IT outage and the pivotal role CrowdStrike has played in mitigating its impact.

Copy of Copy of MFA Bypass (2)
Cybersecurity-Webinar

Cybersecurity Office Hours Recording: Recent Cyber Events and Individual Risk

Join us for our quarterly Cybersecurity Office Hours, where we dive into the latest industry events and trends. This quarter, we will cover notable incidents involving Patelco, AT&T, and CrowdStrike. We'll also discuss the increasing risks to individuals, highlighting recent actions by the FCC against negligent executives.

Copy of Reputational Damage
Cybersecurity-Webinar

Cybersecurity Office Hours Recording: Strategies to Defend Against Phishing Attacks

In this webinar, we explore the Kaspersky incident, a cyberattack that halted operations at a Kansas water plant, and how criminals exploit stolen data for profit. Learn how to defend your business with expert insights, phishing prevention strategies, and a live demo of cutting-edge protection tools.

Copy of Reputational Damage (1)
Microsoft365-Webinar

Unlocking Efficiency from Grape to Glass

In today’s fast-paced business environment, wineries face a unique set of challenges when it comes to managing operations across departments—from inventory and sales to events and customer orders. Many businesses are still burdened by manual processes, disconnected systems, and a lack of real-time data visibility, leading to inefficiencies and costly errors.

Wanna know the current state of your IT?

Endsight’s THRIVE is your all-access pass to transform your IT environment into a strategic asset. It's not just a survey; it's the conductor's baton to your IT symphony. The Thrive Survey empowers you to:

  • Gain a 360-degree view of your current IT infrastructure.
  • Receive personalized recommendations to enhance your technology and security.
  • Identify potential areas for improvement, aligning IT with your unique business goals.
THRIVE with Endsight