Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
Cyberattacks are increasingly premeditated, with adversaries building and staging infrastructure well before launching campaigns. This webinar explores how DNS activity reveals early indicators of attack preparation, including newly registered domains, domain generation algorithms, and staged malware activation. The session focuses on how attackers use the DNS layer to prepare and execute phishing and malware campaigns while evading traditional detection methods.
Attendees will learn how DNS threat intelligence can uncover early signals of staged attacks and enable proactive defense. The discussion also covers how AI driven analysis helps detect patterns at scale and disrupt attacks before they are activated. The webinar provides practical insight into leveraging DNS visibility to identify and respond to threats earlier in the attack lifecycle.
2 days from now
Traditional site to site VPNs and network centric approaches to business to business connectivity can introduce complexity and security risks. Extending network access to external partners may increase exposure to lateral movement and supply chain attacks. This webinar examines how organizations can modernize partner connectivity using a Zero Trust approach designed to reduce risk while improving operational flexibility.
The session explores how a Zero Trust architecture can replace legacy connectivity models and better secure digital supply chains. Attendees will learn about common challenges in B2B connectivity and how Zero Trust solutions can support secure partner access and faster onboarding. The webinar also includes demonstrations of ZPA B2B Extranet and B2B Federation capabilities, along with strategies to support partner integrations and merger and acquisition activities without adding new infrastructure.
3 days from now
Security teams rely on visibility that turns raw data into clear, actionable insight, and this webinar focuses on how modern firewall management supports a secure by design approach. The session looks at how correlated analytics and reporting help teams understand security posture, identify weaknesses early, and prevent misconfigurations from becoming attack paths.
The discussion highlights a built in Security Assessment Report that evaluates configuration hygiene and surfaces gaps before they are exploited. Attendees will also see how advanced search across analytics logs, system events, and detailed reports speeds investigations and improves anomaly detection. The webinar is designed for security and network administrators who want stronger operational assurance, continuous validation, and greater confidence in day to day security operations.
1 day ago
Small and midsize businesses often struggle to manage growing security complexity while still facing breaches caused by simple errors and compromised credentials. This webinar explores a practical approach to SMB security, focusing on how existing tools and controls can work together more effectively. The session highlights common gaps in protection and explains how organizations can improve their security posture without requiring enterprise level resources.
Attendees will learn how a Zero Trust Network Access approach can unify identity, email, and endpoint security into a more cohesive architecture. The discussion also covers how to reduce the impact of human error and simplify secure access for users. The webinar provides actionable insight into building stronger, more efficient security strategies tailored to SMB environments.
2 days ago
Hybrid and multicloud environments have become standard, but their complexity creates performance and security blind spots, slower troubleshooting, and higher risk of outages. This webinar examines how these challenges affect operations and introduces a new F5 product designed to turn BIG IP telemetry into actionable intelligence across applications, services, and infrastructure. The session focuses on improving visibility and helping teams quickly assess application health.
Attendees will see how expert built dashboards, health report cards, anomaly detection, and proactive alerting can reduce downtime and improve MTTR. The webinar also covers MCP support and integration with F5 AI Data Fabric, enabling natural language interactions that generate AI driven operational narratives and optimization guidance.
2 days ago
Network Detection and Response has become a key control as attackers move laterally within networks and conceal activity in encrypted traffic. Many security teams still face challenges when investigating alerts, understanding the scope of incidents, and responding effectively. This webinar reviews findings from the 2025 SPARK Matrix for Network Detection and Response and explains how the market is evolving.
Analysts from Quadrant Knowledge Solutions share insights into evaluation criteria and current market trends, while NETSCOUT discusses how packet derived network intelligence can support faster investigations and more accurate response. The session also examines persistent visibility gaps in NDR deployments and explains how packet level data and historical network evidence can help security teams improve incident investigation and response.
2 days ago
Cyber threats across the Asia Pacific region are evolving rapidly, with attackers increasingly relying on identity abuse, social engineering, and data extortion rather than traditional vulnerability exploitation. This webinar examines key trends shaping the 2026 cyber threat landscape and the risks CISOs must prepare for as organizations adapt to new attacker strategies.
The session explores how social engineering is expanding beyond email into voice, chat, and collaboration platforms, and how identity based attacks are bypassing controls such as multi factor authentication and helpdesk verification. Speakers will also discuss the role of unmanaged devices in ransomware incidents and the shift toward data extortion focused attacks. Attendees will gain practical priorities to help security leaders detect threats earlier and reduce business impact.
3 days ago
DNS has become a critical dependency in AI driven and multi cloud environments, where outages can disrupt operations at scale. This webinar examines the business impact of DNS failures in AI powered settings, using real world incidents to highlight the risks created by automation and complex system interdependencies.
Attendees will gain practical guidance on strengthening DNS resilience to protect business continuity. The session outlines best practices for securing DNS infrastructure across hybrid and multi cloud environments, helping organizations reduce exposure and maintain reliable digital services.
3 days ago
Protect your website against the most critical web application threats by understanding the OWASP Top 10 attack vectors and the controls designed to stop them. This session breaks down common exploitation techniques, explains the security rules that mitigate them and outlines practical testing methods to identify and address vulnerabilities before they are abused.
The discussion also covers secure website onboarding, proper ACL configuration and effective security rule management. A live demonstration will show how these protections function in real time, giving attendees clear guidance on strengthening web defenses and improving overall security posture.
3 days ago
Financial institutions are entering 2026 with a resilience mandate shaped by evolving cyber threats and rapid AI adoption. This webinar examines how adversaries are shifting from breaching defenses to exploiting stolen identities, while AI introduces new shadow supply chain risks. Designed for CIOs, CISOs, and CTOs, the session brings together global threat intelligence and strategic insights to help leaders prepare for the changing landscape.
Speakers discuss identity focused defense beyond MFA, AI governance as a board level risk issue, and policy based trust for machine to machine interactions. The conversation also addresses hidden risks in over privileged SaaS and AI integrations, along with the need to modernize legacy technology stacks.
3 days ago
The integration of large language models into modern applications introduces new security risks that traditional defenses are not designed to address. This interactive session explores how AI driven systems can be exploited through techniques such as prompt injection, data extraction, and model abuse. Participants will gain hands on experience in a controlled lab environment, simulating real world attacks against AI applications.
During the live lab, attendees will test and defend against common AI threats while observing how advanced security controls detect and mitigate malicious inputs in real time. The session demonstrates how vulnerabilities can be exploited and how modern application security approaches can protect AI systems without disrupting user experience. This event is designed for security engineers, developers, and DevOps practitioners seeking practical exposure to AI security challenges.
3 days ago
Proper activation of a VeloCloud Edge device is a critical step in establishing a secure SD WAN and SASE architecture. This webinar provides interactive access to Arista technical experts who walk through GUI based and CLI based Edge activation workflows. The session focuses on secure provisioning practices and validation steps to ensure devices are authenticated and authorized before joining the network.
Attendees will review common activation failures and practical troubleshooting techniques, including pre and post activation validation. The discussion also covers how to isolate Edge versus VCO issues, supporting stronger network visibility and operational resilience within secure WAN environments.