Endpoint Security Webinars

Discover Security Events in Endpoint Security

Get Endpoint Security Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Endpoint Security: Current Status

Endpoint Security has become increasingly complex and critical as organizations manage diverse device ecosystems spanning traditional workstations, mobile devices, IoT sensors, and cloud workloads. The explosion of remote work and bring-your-own-device policies has expanded the attack surface exponentially, requiring sophisticated protection strategies that extend beyond traditional perimeter defenses.

Evolution to EDR and XDR

The industry has evolved from basic antivirus software to comprehensive Endpoint Detection and Response (EDR) platforms that provide continuous monitoring, threat hunting, and automated response capabilities. Many organizations are now adopting Extended Detection and Response (XDR) solutions that integrate endpoint data with network, email, and cloud telemetry for unified threat detection and response. These platforms leverage behavioral analysis, machine learning, and threat intelligence to identify sophisticated attacks that evade signature-based detection.

Persistent Threat Challenges

Endpoints remain primary targets for ransomware, malware, zero-day exploits, and advanced persistent threats. Attackers increasingly exploit legitimate administrative tools, living-off-the-land techniques, and fileless malware to evade detection. The proliferation of unmanaged and partially managed devices creates visibility gaps and enforcement challenges. Organizations struggle with alert fatigue, skills shortages, and the complexity of managing security across heterogeneous endpoint environments.

Modern Protection Strategies

Contemporary endpoint security strategies employ defense-in-depth approaches combining next-generation antivirus, application control, device encryption, patch management, and privileged access management. Zero-trust principles mandate continuous verification of endpoint posture before granting access to resources. Organizations are implementing unified endpoint management platforms, conducting regular vulnerability assessments, and establishing incident response procedures specifically tailored to endpoint compromise scenarios.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

9th December 2025 | Cellebrite + Corellium: Where Digital Forensics Meets Mobile Security

This session focuses on how Cellebrite and Corellium are combining their strengths to advance digital investigations and mobile security. The discussion explains how digital intelligence capabilities and a high fidelity mobile virtualization platform work together to improve threat identification, support complex forensic needs and strengthen security for organizations and government agencies. Attendees will see how this partnership enhances both defensive capabilities and operational efficiency across mobile environments.

The webinar walks through how Corellium’s platform improves mobile app testing, accelerates security research and supports faster and more reliable workflows. The speakers will share practical use cases that show how customers can protect sensitive data, reduce compliance challenges and limit operational risk. A live demo highlights how the platform works in action, followed by a Q and A with experts to address attendee questions.

Company_Webinar • Part of Cellebrite

_flag

10th December 2025 | Turn Noise Into Action with Insights Agent

This session gives security teams a clear look at how Insights Agent strengthens real time detection and response across hybrid and multi cloud environments. The discussion explains how attackers move quietly through complex environments and shows how an AI powered security graph helps surface meaningful signals instead of noise. Speakers break down how the agent monitors activity continuously, learns from each event and adapts as new attack patterns emerge.

Attendees will see how the tool turns network behavior into clear, actionable insights that speed up investigation and response. The webinar also covers why AI driven context is essential for identifying lateral movement and how the agent provides guided remediation steps for high risk findings. A live demo will show the technology in action.

Company_Webinar • Part of Illumio

_flag

10th December 2025 | Preparing Your IT for the 2025 December Holiday Season: A practical guide with SecPod Saner platform

The discussion focuses on how IT and security teams can prepare their infrastructure for the upcoming December 2025 peak season, a period marked by higher transaction loads, rapid changes in staffing and a rise in targeted attacks. The session walks through a clear preparation plan built around the SecPod Saner platform, showing how teams can strengthen visibility, reduce exposure and improve operational readiness before demand spikes.

Attendees get a practical look at rapid asset discovery, shadow IT identification, large scale vulnerability remediation and configuration hardening. The webinar also covers how automation supports continuous monitoring and keeps patching, prioritization and compliance workflows on track during high impact business periods. The goal is to help teams build a stable, secure and resilient environment capable of handling holiday traffic and increased threat activity.

Company_Webinar • Part of SecPod

_flag

11th December 2025 | NinjaOne 11.0 Feature Updates: What You Need to Know

This session gives a clear look at the new capabilities in NinjaOne 11.0 and how they strengthen endpoint management and cloud protection. The walkthrough highlights updated features that make device setup easier, expand visibility across environments and improve identity and data safeguards in the cloud.

Attendees will see the new OS deployment options for large scale rollouts, upgraded backup and recovery support for Microsoft Entra and custom SaaS data, and deeper integration with Microsoft Intune for unified oversight. The webinar is designed for teams that want a practical view of how to simplify operations and streamline management with the latest NinjaOne release.

Company_Webinar • Part of NinjaOne

_flag

16th December 2025 | App-Centric Security: How Mobile App Vetting Fits Into Your Security Stack

This session focuses on the security risks that remain inside mobile applications even when organizations rely on MDM and MTD tools. The webinar explains why mobile app vetting has become a necessary layer in enterprise protection and how evaluating apps for security, privacy and compliance issues helps close gaps that traditional controls miss.

Quokka walks through the core elements of an effective app vetting program and shows where this approach fits within a modern security stack without disrupting users. The presentation includes a demo of Q scout and how it integrates with platforms such as Microsoft and Hexnode to support app centric security across the enterprise.

Company_Webinar • Part of Quokka

_flag