Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
8 hours from now
Security teams are being asked to support faster data access without losing control as AI adoption accelerates across the business. This webinar focuses on how data democratization can be done securely at scale by shifting from manual gatekeeping to a model built on shared responsibility, accurate data classification and automated enforcement. The discussion reframes data access as a security enabler rather than a blocker.
The session outlines why cross functional collaboration is essential, how high confidence classification becomes the foundation for action and why platform driven automation is the only sustainable approach. It also addresses the people and process challenges that often slow security programs down and shows how to make human effort more efficient and impactful. Attendees will leave with a practical playbook for strengthening data protection while enabling the business to move faster.
8 hours from now
Enterprise IT teams are under growing pressure to sanitize data quickly and consistently as devices move across locations, teams, and regions. This webinar focuses on how organizations can scale secure data sanitization without relying on manual processes or fragmented tools that make compliance difficult to prove. Blancco experts will outline modern approaches that improve visibility, control, and audit readiness across the entire asset lifecycle.
The session covers practical methods for automating sanitization workflows, maintaining a clear chain of custody, and managing different device types and regional requirements with confidence. Attendees will also see how remote erasure fits into enterprise operations and how centralized reporting simplifies compliance verification. This webinar is designed for IT, security, and compliance leaders responsible for protecting data during device redeployment and retirement.
8 hours from now
AI driven email attacks are changing how phishing, business email compromise, and social engineering bypass traditional defenses. This webinar breaks down how attackers are using automation and machine learning to target inboxes at scale and why legacy email security tools struggle to keep up with these techniques.
The session explains how modern AI based defenses detect and stop these threats by analyzing behavior, intent, and patterns that humans and rules alone can no longer catch. Email security experts will walk through real attack scenarios and show why defending email now requires AI fighting AI. This webinar is designed for security teams looking to stay ahead of evolving email based threats.
1 day from now
The webinar focuses on how Salesforce data management is changing as security threats, AI adoption and regulatory pressure continue to increase. Odaseva outlines the key Salesforce data trends shaping 2026 and explains what organizations need to do to protect data while maintaining resilience and control. The discussion addresses how recent OAuth breaches and ransomware incidents have pushed enterprises to rethink their security and recovery strategies.
The session also covers shifts in data architecture, including hybrid models, data mobility and the growing importance of active backups. Governance topics such as data sovereignty, evolving cost structures and the expanding role of the CISO are explored to show how leadership teams are adapting. This webinar is designed for organizations looking to strengthen Salesforce data security and prepare for the challenges ahead.
1 day from now
This Q and A session focuses on building cyber resilience for Microsoft 365 in the face of ransomware, identity based threats and rapid AI adoption. Chad Pallett, acting CISO at BioIVT, shares real world experience on strengthening M365 security and recovery capabilities inside a global life sciences organization.
The discussion covers how BioIVT uses Rubrik to move beyond basic backup toward end to end cyber resilience. Attendees will hear practical guidance on improving M365 data protection, speeding up recovery after incidents, establishing a provable security posture and adopting AI tools such as Microsoft Copilot in a secure and controlled way.
1 week from now
Windows 10 end of support is creating a growing security and compliance risk for operational technology environments, especially where legacy systems cannot be easily replaced. This webinar focuses on how unsupported Windows systems increase exposure in OT and OT adjacent zones and why attackers are increasingly able to move laterally from IT into production systems.
The session breaks down practical options for handling Windows 10 in OT environments, including migration, extended updates and compensating controls, with a clear look at the risks and tradeoffs of each approach. Attendees will gain guidance on meeting regulatory requirements, protecting HMIs, SCADA servers and engineering workstations, and maintaining operational safety without forcing rushed migrations. The discussion is designed to help organizations build a defensible and standards aligned strategy for securing OT systems.
1 week from now
Reduce exposure to CIPA lawsuits by understanding how wiretap laws intersect with modern data privacy practices and consent management platforms. This webinar focuses on why California Invasion of Privacy Act claims are increasing and how businesses are being targeted under long standing regulations that were never designed for today’s digital environments. The discussion breaks down where risk commonly appears, including timing issues, data collection practices and common sources of complaints.
The session also walks through practical steps organizations can take to lower CIPA risk using a CMP, with Osano shown as a working example. Attendees will see how configuration choices and privacy controls can help demonstrate compliance and strengthen defenses against opportunistic lawsuits. The webinar is relevant for companies using Osano, other consent platforms, or no privacy solution at all who want clearer guidance on reducing legal and privacy risk.
1 week from now
See a live comparison of Akeyless Modern PAM and HashiCorp Boundary focused on secure remote access at scale. This webinar shows how a SaaS native approach consolidates privileged access and session management into a single control plane, reducing the operational overhead tied to self managed clusters, workers, and separate credential vaults.
The demo walks through real world workflows to highlight differences in setup effort, maintenance, and scalability. Topics include ephemeral and just in time access, agentless connections to common protocols, SSO integration, and full session visibility with audit logs. The session is designed for teams evaluating modern PAM options who want simpler operations without sacrificing Zero Trust security.
2 weeks from now
A realistic walkthrough of a cloud ransomware attack shows how quickly a single incident can escalate from early warning signs to full scale business disruption. This webinar follows a fictional global retailer as it faces a ransomware attack impacting its AWS environment, highlighting the critical moments security teams encounter from initial detection through recovery decisions.
The session moves step by step through alert investigation, impact assessment and the challenges of recovery when backups are compromised. As the situation worsens, the discussion covers operational pressure, public exposure and the difficult choice between paying attackers or rebuilding systems. Expert commentary throughout the scenario provides practical insight into how organizations can better prepare for and respond to cloud based ransomware incidents.
3 weeks from now
An interactive tabletop exercise simulating a full scale Microsoft 365 breach that begins with identity provider compromise and escalates into a ransomware crisis. The webinar walks through how modern attackers exploit legitimate identity access rather than breaking in, showing how a single suspicious login can quickly turn into data exfiltration, lateral movement and on premises impact inside a fictional enterprise.
Guided by expert hosts, the session examines the critical decision points teams face during an identity driven incident, from detection through response and recovery. Attendees will see how attackers abuse identity platform functionality to bypass defenses, where incident response efforts often fail and how organizations can manage the legal, operational and reputational fallout of a confirmed breach. The discussion also covers how to prepare for recovery when identity and data infrastructure can no longer be trusted.
1 month from now
Ensure manufacturing operations remain resilient by addressing the most common causes of factory floor downtime and recovery delays. This on demand demo focuses on operational technology environments and explains how backup and recovery strategies help maintain uptime across critical production systems. The session looks at current OT challenges and why fast, reliable recovery is essential for continuous manufacturing.
The webinar shows how organizations can simplify and automate backups, reduce recovery time objectives, and restore PCs that run SCADA, HMI, historians, and DCS with minimal disruption. It also highlights how non IT factory staff can safely perform recoveries when needed. The discussion connects downtime risks to real world threats such as ransomware, limited on site IT support, and aging systems, making it especially relevant for teams responsible for OT resilience and operational continuity.
5 days ago
A practical look at how enterprises can scale passwordless authentication without adding operational burden. This session focuses on managing FIDO hardware security keys across large and regulated environments, where onboarding, policy enforcement, recovery, and audit requirements often slow adoption. Thales and Microsoft present their joint solution that connects Thales Authenticator Lifecycle Manager with Microsoft Entra ID to simplify the full FIDO authenticator lifecycle.
The discussion covers how IT teams can centralize control, automate onboarding through pre registration, enforce consistent security policies, and quickly revoke or unblock authenticators while maintaining full audit visibility. Security leaders will see how this approach reduces overhead, improves governance, and supports long term passwordless strategies at enterprise scale. The webinar is aimed at organizations looking to remove friction from passwordless rollouts and gain end to end control over phishing resistant authentication.