Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 days from now
Organizations continue to store large volumes of sensitive information in on-premises repositories, and hybrid environments make it difficult to maintain consistent visibility and governance. This webinar examines five key capabilities required in modern Data Security Posture Management (DSPM) to protect on-prem data across hybrid infrastructure. The session explains how security teams can improve discovery and classification of sensitive data across file shares, databases, and applications.
The discussion also demonstrates how AI-powered DSPM tools help identify critical exposures and prioritize risk. Attendees will see how findings can be turned into remediation and compliance workflows, while simplifying deployment and reducing operational complexity compared to traditional approaches. The webinar provides practical guidance for security practitioners and leaders responsible for protecting on-premises data in hybrid environments.
3 days ago
Microsoft 365 has become essential to daily operations, but it also introduces security risks that many organizations underestimate. This session focuses on strengthening cyber resilience across M365 environments, addressing threats such as ransomware, accidental deletion, identity compromise and data exposure. It examines where native protections may fall short and why additional safeguards are often necessary to prevent data loss and compliance gaps.
The discussion highlights how Rubrik’s Security Cloud enhances protection across SharePoint, OneDrive, Exchange and Entra ID through stronger labeling controls, immutable and air gapped backups, anomaly detection and faster granular recovery. Attendees will gain insight into building a more resilient Microsoft 365 strategy that reduces risk and improves recovery readiness in the face of evolving cyber threats.
4 days ago
Financial services organizations must balance rapid innovation with strict requirements to protect sensitive client data and meet regulatory obligations. This webinar demonstrates how firms can replace traditional file servers and legacy cloud storage with a secure content platform designed to manage sensitive financial information. The session focuses on how organizations can handle complex data environments while maintaining compliance with regulations such as SEC 17a-4 and FINRA requirements.
During the live demonstration, attendees will see how automated tools can identify and flag sensitive information such as Social Security numbers and account data. The session also covers secure client portals for document sharing, AI powered discovery for identifying dark data and excessive permissions, and automated reporting that helps teams quickly generate audit ready activity records for regulatory reviews.
1 week ago
Security operations are evolving as AI becomes more integrated into modern security practices. In this webinar, David Seidman, Head of Platform Security at Plaid, joins Landen Brown and Samuel Hill to discuss how artificial intelligence is reshaping the way security teams operate and respond to threats.
The discussion focuses on how AI is influencing security operations and the practical implications for teams responsible for protecting systems and data. Speakers will share their perspectives on the changing role of AI within security environments and how it is shaping the future of operational security practices.
1 week ago
AI is transforming retail operations, and this webinar explores how retailers are using real time Customer 360 data to power agentic commerce at scale. The session highlights how unified customer, commerce and media data creates an AI ready foundation that supports personalization, retail media optimization and smarter enterprise decisions. Insights drawn from industry research and NRF discussions will show how leading brands are moving beyond experimentation toward measurable AI driven growth.
The discussion also addresses what it takes to operationalize AI responsibly in production environments. Speakers will outline how fragmented data can be consolidated, how AI can be embedded across end to end retail workflows and how organizations can transition from isolated pilots to governed, scalable AI platforms that deliver sustained business impact.
1 week ago
Organizations are increasingly using AI to manage and understand large volumes of data across distributed environments. This webinar explores how AI driven data discovery and classification can help identify, organize, and manage content more effectively. The session focuses on how automated classification of sensitive data supports better data governance and improves visibility across enterprise data ecosystems.
Attendees will see how machine learning can categorize documents, automate retention, and enhance search through metadata driven insights. The discussion also highlights how improved data visibility can support governance and compliance efforts. The webinar provides practical insight into using AI to transform content management while strengthening control over sensitive information.
1 week ago
Cybercriminal groups continue to exploit configuration weaknesses in widely used platforms to gain access to sensitive data. This webinar examines a recent campaign attributed to the ShinyHunters group that targeted Salesforce Experience Cloud environments by abusing guest user misconfigurations. The attackers reportedly used a modified version of the AuraInspector auditing tool to query CRM data without authentication.
The session explores how the campaign operated, how configuration errors in public facing applications can expose sensitive information, and how this activity aligns with known ShinyHunters tactics. Speakers will also discuss broader trends in cybercrime, including emerging AI related security risks and evolving competition among large language model platforms. Attendees will gain insights into attack patterns and practical considerations for strengthening platform security.
1 week ago
Enterprises often rely on multiple secrets management platforms such as HashiCorp Vault and cloud native services like AWS Secrets Manager, Azure Key Vault, and Google Cloud Secret Manager. As these deployments expand across teams and environments, maintaining consistent governance, access control, and audit visibility becomes increasingly difficult. This webinar explores how organizations can address fragmented secrets governance without migrating existing secrets or disrupting established workflows.
The session demonstrates how centralized governance can be applied across multiple vault platforms to enforce consistent role based access control and improve audit visibility. Speakers will show how security and platform teams can maintain oversight while allowing teams to continue using their preferred secrets managers. Attendees will see a live demonstration of integration approaches that support gradual adoption across namespaces, environments, and vault deployments.
1 week ago
Many enterprises rely on HashiCorp Vault, yet governance can become fragmented across teams and environments. This webinar demonstrates how Akeyless Multi Vault Governance adds centralized RBAC, audit logging, and visibility to an existing Vault deployment without requiring secret migration or changes to application workflows. The session focuses on how platform and security teams can strengthen governance while allowing existing Vault operations to continue.
The live demo presents how organizations can enforce consistent access control, gain real time audit coverage, and address governance gaps across environments. It also introduces the two integration models behind Akeyless Multi Vault Governance, Universal Secret Connector for Akeyless native workflows and HashiCorp Vault Proxy for teams that need the Vault API to remain unchanged.
1 week ago
Modern cloud environments require organizations to balance speed, cost, and security while protecting sensitive data and infrastructure. This webinar explores how a unified approach to security lifecycle management can help teams reduce risk over time. The session focuses on how organizations can progressively adopt tools such as Vault and Boundary to manage secrets, control access, and strengthen security across cloud environments.
Attendees will learn practical strategies for inspecting, protecting, and governing sensitive assets using integrated security workflows. The discussion includes live demonstrations of Vault, Boundary, and Vault Radar, highlighting how teams can discover, manage, and secure secrets across their infrastructure. The webinar provides guidance on implementing a scalable security lifecycle approach that aligns with evolving cloud and operational requirements.
1 week ago
AI has transformed the threat landscape, giving attackers new tools to scale and refine their tactics. This webinar brings together Matt Radolec, Roberto Galdamez, Zachary Lewis, and Stephen Kowski to share the CISO perspective on how AI is reshaping cybersecurity. As data creation accelerates and attacks become more precise and human-like, security leaders face growing pressure to adapt.
Speakers will examine the impact of AI on email security, identity based attacks, and data exposure. The session focuses on how organizations can adjust their security strategies to respond to these evolving risks and remain ahead of increasingly sophisticated threats.
2 weeks ago
MSPs face growing pressure to protect servers and virtual machines while reducing complexity and response time. This session focuses on building cyber resilience through a unified approach that combines backup, disaster recovery and cybersecurity within a single platform. Acronis experts will demonstrate how consolidating tools helps close security gaps, streamline operations and improve overall recovery performance for servers and VMs.
The discussion also challenges traditional recovery metrics like RTO and RPO, introducing measures such as mean time to clean recovery and maximum tolerable downtime as more realistic indicators of success. Attendees will see a live demo of recovery using the Protected Server solution, including disaster recovery failover and failback. The webinar concludes with a live Q and A for participants who want deeper insight into strengthening resilience for their clients.