Webinars are boring…until you think outside the box and utilize creative ideas to wake up the minds of your attendees. Pick one of these ten creative options to revitalize your webinars in 2020.
Dimensions: 672384147 cm
Analyst
EMA
Other Resources:
See All ResourcesBlog 06/12/2025
Cybersecurity Awesomeness Podcast Recap – Episode 111: Penetration Testing
In the rapidly evolving landscape of cybersecurity, penetration testing stands out as a crucial comp...Blog 05/27/2025
Cybersecurity Awesomeness Podcast Recap – Episode 110: Supply Chain Attacks
In this Cybersecurity Awesomeness Podcast blog recap, EMA cybersecurity experts Chris Steffen and Ke...Blog 05/20/2025
Cybersecurity Awesomeness Podcast Recap – Episode 109: Using AI for Cyberattacks
This Cybersecurity Awesomeness blog recap focuses on the intricacies of agentic AI, shedding light o...Blog 05/12/2025
Cybersecurity Awesomeness Podcast Recap – Episode 108: RSAC Recap
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 04/14/2025
Cybersecurity Awesomeness Podcast Recap – Episode 105: Hacking a Computer-Controlled Vehicle
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 04/14/2025
Hack to the Future: AI, Cars, and Quantum Shenanigans at Black Hat Asia 2025
Black Hat Asia 2025 returned to Singapore with a dynamic mix of technical depth, real-world impact, ...By Ken Buckler
Blog 04/07/2025
Cybersecurity Awesomeness Podcast Recap – Episode 104: Taxes and Tariffs
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 03/27/2025
Messaging in Government: Signal, Microsoft Teams, and the Security-Convenience Paradox
In an era when government operations increasingly rely on digital infrastructure to remain effective...By Ken Buckler
Blog 03/24/2025
Cybersecurity Awesomeness Podcast Recap – Episode 102: Insider Threats
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 03/18/2025
Redefining PTaaS: A Goal-Oriented Approach to Include Bug Bounty Programs
In an era when cybersecurity threats continue to evolve at an unprecedented pace, organizations are ...By Ken Buckler