Discover Security Events in Mssp
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 weeks from now
New cybersecurity certification requirements are reshaping the Canadian defence supply chain, making compliance essential for organizations seeking government contracts. This webinar explores the Canadian Program for Cyber Security Certification (CPCSC) and its impact on businesses handling controlled information. The session focuses on how evolving regulations are shifting from self attestation to mandatory verification and structured audits.
Attendees will learn how to navigate CPCSC requirements, prepare for upcoming assessment levels, and align with evolving compliance timelines. The discussion also covers key differences between CPCSC and frameworks such as CMMC, particularly for organizations operating across borders. The webinar provides practical guidance on turning compliance into a competitive advantage while strengthening security and regulatory readiness.
2 days ago
Small and midsize organizations face increasingly sophisticated cyber threats but often lack the resources to deploy and manage traditional SIEM platforms. This webinar explores how a Mini SOC approach can deliver effective security operations using Microsoft Extended Detection and Response capabilities. The session focuses on building a cost efficient and flexible security model that enables organizations to detect, investigate, and respond to threats without the complexity of full scale SIEM solutions.
Attendees will learn how to unify security tools into an integrated platform, improve threat detection and incident response, and reduce operational overhead. The discussion includes practical examples and strategies for strengthening security operations in both cloud and on premises environments. The webinar provides guidance on creating a scalable SOC model tailored to organizational size and needs.
3 days ago
Transaction activity increases cyber risk, especially during mergers and acquisitions when threat actors actively monitor deal announcements. This webinar focuses on how organizations can use threat informed, data driven methods to improve cybersecurity readiness before, during, and after transactions. The speakers explain how attack simulation and real security data help buyers and sellers identify defensive gaps and communicate risk clearly during due diligence.
The discussion covers both buy side and sell side perspectives, highlighting common security weaknesses that delay deals or increase remediation costs. Attendees will gain practical insight into preparing for technical cybersecurity due diligence, avoiding common mistakes, and strengthening security posture ahead of transaction milestones. The session is designed for investors, deal teams, and security leaders involved in M and A activity.
3 days ago
Major changes to UK cyber regulation under the proposed Cyber Security and Resilience Bill are the focus of this strategic session, outlining how expanded requirements will affect both existing Operators of Essential Services and newly in scope organizations. The discussion explains how the Bill broadens regulatory coverage beyond traditional critical infrastructure and places stronger expectations on supply chain security, assurance and oversight.
Legal and technical experts examine new incident reporting obligations, supply chain compliance monitoring and contractual approaches that support resilience. The webinar also explores how the UK framework may interact with global cyber regulations and what organizations should anticipate once the Bill becomes law. Attendees will gain practical guidance on preparing governance, compliance and cybersecurity teams for the incoming regulatory shift.
1 week ago
Security teams running Splunk with limited resources will see how to optimize deployments without adding tools or increasing spend. This hands on masterclass focuses on practical ways to reduce data sprawl, improve performance, and get more value from Splunk by aligning ingestion and tuning decisions with real security priorities.
The session covers how to route logs intelligently across Splunk, data lakes, and cloud storage, reduce noise without missing risk, and make smarter security decisions with fewer false positives. Built on real world deployments, the discussion is designed for lean teams that want to regain control of their Splunk environment while improving security outcomes and operational efficiency.
1 week ago
Attackers are increasingly targeting identity systems, edge infrastructure, and human trust to gain access to organizational environments. Rather than relying solely on technical vulnerabilities, many modern attacks begin with compromised credentials, exposed edge devices, or social engineering tactics. This webinar examines key findings from the 2026 Cyber Threat Outlook Report and what they reveal about current attack patterns.
The session explores how identity compromise has become a common entry point for breaches, along with the growing exploitation of edge technologies such as firewalls and VPN appliances. Speakers will also discuss the continued effectiveness of phishing and other social engineering techniques. Attendees will gain insights into the underlying trends connecting many recent incidents and practical guidance on where security teams should focus their defensive efforts.
1 week ago
AI driven impersonation is becoming a serious fraud risk as synthetic identities, cloned voices, and deepfake video make attackers appear legitimate. This webinar examines how these techniques allow fraudsters to impersonate executives, vendors, and employees during high stakes financial or operational transactions. The discussion focuses on how traditional trust signals and common fraud warnings are no longer reliable defenses.
The session introduces an operational resilience approach to addressing AI enabled fraud. Topics include how impersonation bypasses standard verification methods, why employee awareness training alone is no longer sufficient, and how organizations can strengthen processes to prevent unauthorized transactions or access to sensitive data. Speakers will also outline structural changes to financial approval workflows and verification practices.
1 week ago
Security and IT teams often struggle with large volumes of alerts, where identifying issues is easier than resolving them quickly. The challenge lies in moving from detection to effective remediation while reducing operational overhead. This webinar explores how automation can help organizations respond to alerts more efficiently and prevent issues from escalating into incidents.
The session examines how continuous asset intelligence combined with automated remediation can reduce alert noise and minimize manual response tasks. Speakers will discuss approaches for addressing configuration drift, shortening remediation timelines, and turning alerts into automated corrective actions. Attendees will gain insight into how organizations are adopting automated workflows to create more resilient and self healing IT and security operations.
1 week ago
Higher education is facing a rapidly intensifying cyber threat landscape as ransomware, data breaches, and hacktivist activity continue to rise heading into 2026. This webinar focuses on the specific risks universities and colleges face, including the impact of geopolitical tensions, predictable academic cycles, and the increasing use of automation and AI by attackers.
The session combines threat intelligence with real world operational insight to help higher education leaders understand how these threats are evolving and what practical steps can improve resilience. Attendees will gain clarity on what is changing in the threat environment and how to move from awareness to actionable security decisions tailored to the higher education sector.
1 week ago
Ransomware attacks in 2026 are faster, more evasive and increasingly driven by identity compromise, lateral movement and data extortion beyond simple encryption. This session examines how modern ransomware campaigns unfold, combining phishing, credential abuse and automated post exploitation techniques that bypass traditional controls and shorten the time to impact. Understanding these evolving tactics is essential for reducing dwell time and limiting operational disruption.
Richard Ford of Integrity360 joins SentinelOne to analyze real world incidents and map attacker behavior using MITRE ATT and CK style walkthroughs. The discussion highlights emerging access vectors, privilege escalation methods and common detection gaps, while outlining how autonomous detection and response approaches can interrupt attacks earlier in the kill chain. Security leaders and practitioners will gain practical insight into preparing for the next generation of ransomware threats.
1 week ago
Cyber incidents affecting suppliers, software providers, and service partners have become a major operational risk for organizations. This webinar examines how supply chain cyber attacks unfold and how breaches in trusted third parties can expose internal systems, disrupt operations, and trigger regulatory reporting requirements. The session draws on real world incident response experiences to explain how attacks propagate across interconnected business relationships.
Experts will discuss how organizations can strengthen readiness for supply chain incidents through clear ownership, tested response plans, and forensic evidence preparation. The webinar also addresses reporting obligations and the coordination required between security, risk, and compliance teams during an incident. Attendees will gain practical insight into detecting, containing, and responding to modern supply chain cyber threats.
2 weeks ago
Penetration testing in operational technology environments requires a careful approach to avoid disrupting critical systems or impacting safety. This webinar focuses on how OT penetration testing differs from traditional IT testing and explains why standard methods can introduce serious risk when applied to industrial environments.
The session outlines practical techniques for testing OT systems safely, reducing the chance of downtime while still identifying real vulnerabilities. Attendees will gain insight into common weaknesses found in OT estates, real world examples that affect reliability and safety, and key factors to consider when selecting an OT penetration testing provider. The webinar is designed to help organizations strengthen OT security without compromising operations.