Discover Security Events in Mssp
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
16 hours ago
Organizations are facing growing pressure to run AI in ways that respect digital sovereignty while maintaining security, control, and compliance. This session focuses on how enterprises can manage AI workloads across borders, govern data access, and retain operational independence as adoption accelerates. The discussion centers on the evolving definition of digital sovereignty and why it now extends beyond data residency into infrastructure control and AI deployment models.
The webinar presents IBM’s vision for the future of software, highlighting a new AI ready sovereign solution designed to support secure innovation without sacrificing flexibility. Attendees will gain insight into how organizations can balance trust, governance, and adaptability while deploying AI at scale in regulated and complex environments.
1 day from now
Build stronger security awareness across your organization with an expert led training focused on today’s most common cyber threats. This webinar covers how attackers use phishing, ransomware, business email compromise, and social engineering, and explains the real risks these tactics pose to businesses of all sizes. The session emphasizes practical awareness that helps reduce human error and strengthen overall security posture.
The training highlights real world examples, proven prevention techniques, and clear steps to take when suspicious activity is detected. Topics include password hygiene, multi factor authentication, and response actions during a potential breach. Designed for business leaders, IT teams, and employees, this session also supports annual security awareness and compliance requirements while reinforcing everyday cyber safe behavior.
1 day from now
Security leaders face growing pressure to adapt as cyber threats accelerate toward 2026, and this webinar breaks down what cannot be ignored. Drawing from the VikingCloud Cyber Threat Landscape Report, the session examines attack patterns already gaining momentum, the risks spreading fastest, and the shifts reshaping today’s security environment.
The discussion also looks at how AI is increasingly favoring attackers, exposing readiness gaps many teams overlook. Speakers highlight internal weaknesses that quietly increase risk, including missed incident reporting and disconnects between leadership and security teams. Attendees will gain a clearer view of the vulnerabilities and behavioral trends influencing their 2026 cyber risk profile and how organizations are responding now to stay ahead.
1 week from now
This webinar outlines AgileBlue’s updated approach to sharing its product roadmap for 2026 and explains why the company is shifting to a single annual roadmap event supported by targeted product webinars throughout the year. The session focuses on how this new format provides a clearer, more strategic view of future direction while aligning updates more closely with actual feature releases.
Attendees will gain insight into how this roadmap structure allows for deeper product discussions when they matter most and more timely communication as new capabilities are introduced. The webinar is designed for customers and stakeholders who want better visibility into AgileBlue’s product plans and how upcoming developments will be rolled out over the coming year.
1 week from now
Security teams are navigating a crowded and confusing market as AI driven tools promise to transform security operations, often with claims that outpace reality. This webinar focuses on the real tradeoffs between fully automated SOC approaches and AI that augments existing analysts, addressing concerns around hallucinations, oversight, cost justification and inconsistent results across organizations.
The discussion provides practical guidance on where AI delivers the most value today, including alert triage, investigation support, incident summarization and response recommendations. Attendees will also hear how to set clear guardrails and success metrics to reduce risk while achieving measurable efficiency gains. The session is designed for security leaders who want to adopt AI in the SOC without falling for hype or creating new operational blind spots.
4 weeks from now
Many organizations rely on Conditional Access policies that were created early in their Microsoft Entra deployments and expanded over time. This webinar examines how these legacy and organically grown configurations can introduce hidden security gaps that attackers may exploit.
The discussion covers common misconfigurations, recent Conditional Access enhancements announced at Microsoft Ignite, and new considerations such as agentic identities. Attendees will gain practical guidance on designing a stronger, scalable Conditional Access strategy that improves identity security and supports future growth.
1 month from now
Penetration testing in operational technology environments requires a careful approach to avoid disrupting critical systems or impacting safety. This webinar focuses on how OT penetration testing differs from traditional IT testing and explains why standard methods can introduce serious risk when applied to industrial environments.
The session outlines practical techniques for testing OT systems safely, reducing the chance of downtime while still identifying real vulnerabilities. Attendees will gain insight into common weaknesses found in OT estates, real world examples that affect reliability and safety, and key factors to consider when selecting an OT penetration testing provider. The webinar is designed to help organizations strengthen OT security without compromising operations.
1 month from now
Transaction activity increases cyber risk, especially during mergers and acquisitions when threat actors actively monitor deal announcements. This webinar focuses on how organizations can use threat informed, data driven methods to improve cybersecurity readiness before, during, and after transactions. The speakers explain how attack simulation and real security data help buyers and sellers identify defensive gaps and communicate risk clearly during due diligence.
The discussion covers both buy side and sell side perspectives, highlighting common security weaknesses that delay deals or increase remediation costs. Attendees will gain practical insight into preparing for technical cybersecurity due diligence, avoiding common mistakes, and strengthening security posture ahead of transaction milestones. The session is designed for investors, deal teams, and security leaders involved in M and A activity.
5 days ago
A focused look at the threats shaping cybersecurity in 2026, this webinar breaks down key findings from the Arctic Wolf 2026 Threat Report. The session connects threat intelligence research on how the landscape evolved in 2025 with expert analysis to highlight the risks organizations are most likely to face in the year ahead.
Arctic Wolf specialists share insights drawn from real world data and interviews with internal experts, helping security teams understand emerging attack patterns, shifting adversary behavior, and where to prioritize defenses moving forward.
5 days ago
This webinar reviews the most important cybersecurity threat patterns observed during real incident response work in 2025 and explains why those same tactics are expected to influence attacks in 2026. The discussion is based on firsthand investigations of breaches, recovery efforts, and attacker behavior seen repeatedly across organizations.
The session highlights trends such as prolonged stealthy network access, continued reliance on email based financial fraud, persistent use of remote access methods like RDP, and common security hygiene gaps that attackers continue to exploit. Attendees will leave with a clearer understanding of what worked for attackers last year and how those lessons should shape defensive priorities going into 2026.
5 days ago
This session focuses on zero day threat detection and the platform shifts organizations are making to stay ahead of modern attacks. As part of the Arctic Wolf and Marco Technologies webinar series, the discussion looks at how evolving threats challenge traditional security models and why updated detection approaches are becoming essential.
The webinar highlights practical considerations for improving visibility, strengthening response capabilities and adapting security platforms to meet today’s risk landscape. Attendees can join this session on its own or as part of the broader series, depending on their interests and priorities.
5 days ago
An analyst led briefing on ransomware activity heading into 2026, this webinar presents key findings from the GRIT 2026 Ransomware and Cyber Threat Report. The session breaks down why ransomware victim counts reached record levels in 2025, how threat group fragmentation increased attack volume and what emerging groups signal about the direction of the ransomware ecosystem. It also examines how AI use and vulnerability exploitation are speeding up modern attacks.
GuidePoint Security’s Research and Intelligence Team connects these trends to real world defensive challenges, with a focus on what incident responders, SOC analysts and detection engineers should expect in 2026. Attendees will gain practical insight into the industries and regions most targeted and how evolving attacker behavior should shape future defensive priorities.