Discover Security Events in Application Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 days from now
Managing a 35 million line, multi language monolith presents major security and visibility challenges. This webinar examines how Adyen addressed limited dependency insight within a highly customized build environment. DevSecOps expert Supun Vidana Pathiranage joins JFrog’s Yonatan Arbel to explain the architecture designed to separate dependency resolution from the core build system, enabling scalable visibility and reliable security scanning without disrupting developer workflows.
The session covers architectural patterns for handling dependency visibility in large monorepos, integration of a custom pipeline with JFrog Xray, and the design decisions behind deep software composition analysis. It also reviews the Battlestar framework for actionable scan results and practical shift left AppSec enforcement at the merge request level.
3 days from now
AI is reshaping software development, but increasing complexity across tools, workflows, and security requirements continues to slow delivery. This webinar explores how agentic AI can be integrated across the software development lifecycle to streamline processes while maintaining security and compliance. The session focuses on how automation and orchestration can improve both development speed and security outcomes.
Attendees will learn how AI driven workflows can automate planning, code generation, and review processes while identifying and remediating vulnerabilities. The discussion also covers how integrated platforms enable faster resolution of pipeline issues and improve overall code quality. The webinar provides practical insight into embedding security into AI powered development environments and strengthening software delivery practices.
3 weeks from now
Penetration testing continues to evolve as web, mobile, and cloud environments grow more complex. This 60 minute webinar examines common pitfalls and best practices for 2026, along with the legal and regulatory landscape affecting testing activities. The session also addresses risks and benefits of AI driven and automated penetration testing, including testing LLMs and AI powered applications for AI specific vulnerabilities.
Additional topics include the OWASP Top 10 for LLM, accountability for AI related failures, red teaming, continuous breach and attack simulation, and use of the MITRE ATT&CK Matrix. The discussion compares continuous and one time testing, as well as external versus in house penetration testing approaches.
2 days ago
Children’s privacy regulations in the United States are evolving rapidly as federal and state authorities introduce new compliance requirements. With the updated Children’s Online Privacy Protection Act (COPPA) rule approaching its April 2026 compliance deadline and additional state privacy laws emerging, organizations must reassess how they collect, manage, and protect children’s data. This webinar provides an overview of the latest regulatory developments affecting children’s privacy.
The session explores the implications of the new COPPA rule and the growing number of state level privacy regulations. Speakers will discuss key compliance expectations, enforcement trends, and how these regulatory changes affect organizations that handle children’s data. Attendees will gain practical insight into preparing their privacy programs to meet upcoming requirements while reducing regulatory and operational risk.
2 days ago
Teams using GitHub Copilot often struggle to decide when to use instructions, prompts, custom agents, or skills. This webinar provides a practical walkthrough of how these customization options work and how to choose the right approach based on how your team builds software.
The session breaks down each customization method, explains where it fits best, and uses real examples to show how Copilot can be aligned with team standards, architecture, and preferred development patterns. Live demos illustrate how thoughtful customization leads to more consistent output, less rework, and smoother day to day development workflows.
2 days ago
Managing software risk in the AI era has become increasingly difficult as the speed of AI driven development outpaces human capacity to manage security exposure. This webinar introduces Cycode Maestro, presented by Cycode Field CTO Jimmy Xu, and explains how agentic security can expand the capabilities of product security teams by combining context intelligence, AI skills, and coordinated agent workflows within the software development lifecycle.
The session demonstrates how Maestro uses the Context Intelligence Graph to analyze violations and assess risk posture while coordinating multi agent workflows that address security issues. It also explores use cases such as exposure analysis, risk prioritization, and AI driven remediation, while showing how AI usage can support faster MTTR and improved SLA compliance.
2 days ago
Supply chain attacks through malicious open source packages are becoming a major risk for modern applications. This webinar focuses on how Chainguard Libraries helps teams reduce that risk by using rebuilt from source dependencies designed to prevent malware by default, with signed provenance, SBOMs, and remediated CVEs.
The session walks through real world engineering workflows, showing how to update existing dependencies to trusted sources and how Chainguard Libraries for Python addresses critical and high severity vulnerabilities. Attendees will see practical examples of securing application supply chains and gain a clearer understanding of how verified libraries improve both security and reliability.
3 days ago
AI agents are rapidly moving from experimentation to production, with many organizations making them a strategic priority. This webinar explores findings from research on how AI agents are being adopted, the challenges teams face when scaling them, and the infrastructure required to support their growth. The session focuses on practical insights into real world usage and emerging patterns in agent development.
Attendees will learn about common use cases for AI agents and the barriers that impact scalability and reliability. The discussion also covers strategies for building flexible, future ready agent architectures using frameworks such as the Model Context Protocol. The webinar provides guidance for teams planning and expanding AI agent deployments across their environments.
3 days ago
Software development is evolving as AI capabilities expand from assistive tools to agentic systems that operate across the entire software development lifecycle. This webinar presents GitHub’s Q1 2026 product roadmap and explains how the platform is advancing toward an AI powered SDLC. The session connects recently released capabilities with upcoming investments across GitHub and GitHub Copilot, highlighting how AI is shaping planning, coding, review, and operational workflows.
Attendees will see product walkthroughs demonstrating how agentic AI features improve developer productivity, code quality, and efficiency. The discussion also covers how governance and security controls are integrated into the platform to provide visibility and oversight as organizations adopt AI powered development tools. The webinar offers insight into how GitHub is building a flexible development environment that supports multiple tools and workflows.
4 days ago
Protecting LLM powered applications requires visibility into how models behave, respond, and interact with data in real time. This hands on workshop focuses on using Datadog LLM Observability with Gemini to monitor and defend against modern AI driven security risks, including prompt abuse, unsafe outputs, and unintended data exposure. Participants will work with a pre instrumented application on Vertex AI to see how prompts, responses, evaluations, and traces reveal security and safety issues as they happen.
The session shows how correlating LLM traces with logs, metrics, and infrastructure context supports auditability, incident investigation, and risk reduction. Attendees will learn how to detect prompt injection attempts, monitor safety and toxicity signals, prevent sensitive data leakage, and validate that AI workflows remain grounded in approved data. The workshop is designed for teams responsible for securing AI systems and maintaining trust, control, and accountability in production LLM environments.
1 week ago
Application security automation takes center stage in this interactive session focused on protecting web, mobile and API environments in 2026. The webinar examines how AI is influencing modern development, including the risks introduced by automated coding and new vulnerabilities linked to rapid application creation. It also reviews common security weaknesses behind data breaches and highlights the relevance of the OWASP Top 10 for large language models in today’s threat landscape.
The discussion moves into practical implementation, covering how to build a risk based application security testing program and integrate automated scanning into CI CD pipelines. Attendees will see how mobile, web and API security testing can be streamlined using specialized tools, along with how AI can enhance detection and testing efficiency. This session is designed for security and development teams looking to strengthen application defenses through automation.
1 week ago
AI powered applications are creating new security risks that sit at the intersection of observability, governance, and AI security. This webinar focuses on how visibility into AI models, APIs, and usage patterns helps organizations detect availability issues, prevent resource exhaustion, and maintain control over increasingly complex AI stacks.
The session shows how monitoring AI interactions supports security goals such as identifying shadow AI usage, reducing exposure to misuse, and protecting against costly abuse scenarios like token flooding or performance degradation. Attendees will see how tracking latency, throughput, and cost indicators strengthens both operational resilience and AI security, while supporting safer deployment and compliance as AI features move into production.