Discover Security Events in Operations
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
16 hours ago
This session focuses on how data exfiltration risk appears inside real AWS environments and how security teams investigate it at the storage layer. AWS and Cloud Storage Security walk through the signals teams rely on when suspicious data movement is detected, including access trails and bulk download activity.
The discussion covers what native AWS guardrails and telemetry can reveal, where visibility gaps remain, and how added context helps investigations move faster. Attendees will see how tying activity to specific actors, objects, and timelines improves confidence during incident response. The session is practical and grounded in real world investigation workflows used in modern cloud environments.
7 hours from now
Microsoft 365 environments often appear secure at a glance, yet hidden configuration gaps leave many tenants exposed to real world attacks. This webinar digs into why average Secure Scores remain low and how common misconfigurations give attackers easy entry points and freedom to move laterally once inside.
The session breaks down the most frequent and dangerous Microsoft 365 settings issues seen across tenants, explains how attackers actively exploit them, and clarifies what a strong baseline should look like in practice. It also addresses the operational challenge facing IT teams and MSPs, where ticket overload and tenant sprawl cause critical fixes to fall through the cracks. The discussion concludes with an overview of Huntress’s approach to Identity Security Posture Management and a preview of its managed ISPM service, designed to help organizations close gaps at scale and maintain consistent security across Microsoft 365.
7 hours from now
A live discussion on the key changes shaping how security teams will work, collaborate, and manage risk in 2026. The session focuses on how AI adoption, rising cyber risk, and shifting expectations are redefining priorities for security leaders and practitioners. Insights are drawn from research with more than 1,800 security professionals, offering a clear view of what is changing and why it matters.
The conversation covers emerging approaches to AI governance, differences in priorities between leadership and frontline teams, and how workloads and skill requirements are evolving. It also looks at how intelligent workflows support secure scaling and interoperability, along with ways security teams are gaining greater visibility and influence at the board level. The webinar delivers practical, data backed insights to help teams navigate the year ahead with confidence.
7 hours from now
This session focuses on how organizations can strengthen data protection and recovery by adopting a resilience operations approach using Commvault Cloud Unity. The discussion shows how enterprises can operationalize resilience while managing limited resources, with a unified platform that supports both IT and security teams across on premises and cloud environments.
The webinar walks through how critical workloads can be protected and restored using integrated data protection, identity resilience and cyber resilience capabilities. It also highlights clean recovery methods, intelligent prioritization and data security features such as discovery, classification and access controls. The session explains how these capabilities work together to support secure operations, enable responsible AI adoption and help organizations deploy new technologies with confidence and resilience.
1 day from now
Security teams no longer need to choose between visibility, speed, and cost when building effective detection programs. This webinar focuses on modern detection strategies that challenge the traditional “store everything” model and explains how approaches such as at source and in transit detection help control costs while maintaining strong security coverage. The discussion highlights how smarter telemetry management supports faster response and better operational efficiency as attacks become more complex.
The session covers practical ways to identify threats earlier in the attack lifecycle, reduce attacker dwell time, and improve detection accuracy without overspending on storage. It also examines how centralized orchestration and flexible deployment models contribute to a scalable and resilient detection strategy. This webinar is designed for security teams looking to balance coverage, performance, and cost without compromising effectiveness.
1 day from now
See how security leaders are putting AI driven SOC capabilities into real world operations and moving beyond demos to measurable impact. This webinar brings together security operations and IT leadership to discuss what it takes to run an AI SOC as a dependable, day to day function rather than a theoretical solution.
The discussion focuses on gaining organizational buy in, setting realistic evaluation criteria and driving adoption across teams. Speakers also cover how AI can help security operations handle alerts at machine speed and scale while maintaining consistency and control in fast paced environments.
1 day from now
Turn raw security scan data into meaningful action by improving how vulnerabilities are refined, routed, and reported inside DefectDojo. This webinar focuses on what happens after data ingestion, showing how security teams can move beyond basic aggregation and create workflows that drive real remediation and accountability.
The session introduces a practical framework for vulnerability management that covers effective triage, accurate handling of false positives and risk exceptions, and consistent decision tracking across future scans. It also shows how to route findings into the tools teams already use and how to report risk, progress, and program maturity to leadership. Attendees will come away with clear best practices to strengthen day to day vulnerability management and demonstrate measurable security impact.
2 days from now
AI is rapidly changing how cyber attacks are planned, executed, and defended against. This webinar looks at how threat actors are using AI to scale social engineering, automate reconnaissance and evade traditional defenses, and why many security teams struggle to keep pace. Drawing from findings in the 2026 Inside the Mind of a Hacker report, the discussion highlights how hackers are adopting AI both offensively and responsibly.
The session features perspectives from an ethical hacker and a senior security leader at Bugcrowd, who examine real world AI driven attack techniques and the growing role of AI in security research. Attendees will gain insight into how attackers think, how defenders can adapt and what practical steps organizations can take to reduce risk from AI powered threats.
2 weeks from now
Explore how organizations can approach AI risk in a structured and practical way while balancing innovation, governance, and investment decisions. This webinar looks at how AI risk fits within existing data and software risk frameworks and helps clarify what is genuinely new versus what builds on long established security and governance practices.
Taking a Nordic perspective, the discussion draws on real experience from regulated industries and private enterprises to show how AI and data related risks are being evaluated today. Attendees will gain practical frameworks and best practices for governing AI initiatives, aligning investments with business value, and moving forward with confidence while maintaining strong oversight and responsible risk management.
5 days ago
Attackers are shifting away from technical exploits and instead relying on trust based deception to gain access, making social engineering the dominant delivery method for modern threats. This webinar examines new ReliaQuest threat research showing how recent malware campaigns use legitimate looking ads, software, and system tools to blend into normal activity and bypass traditional defenses. The discussion explains why security programs built to detect obvious malicious behavior struggle against attacks designed to appear genuine at every step.
The session breaks down current social engineering techniques, including malware delivered through trusted channels, and explains how these tactics scale across organizations. Speakers share practical recommendations for improving detection and response, along with insights into how collective intelligence and agentic AI can support earlier and more coordinated defense against trust based attacks.
5 days ago
Attackers closed out 2025 by turning trusted developer tools and package ecosystems into delivery channels for malicious activity. This webinar breaks down five real world supply chain campaigns uncovered in Q4 2025, showing how attackers abused platforms like NuGet, PyPI, PowerShell Gallery, and VS Code to bypass traditional security controls. The session focuses on how implicit trust in open source tooling is being exploited at scale and why these attacks are difficult to spot early.
Researchers walk through the shared tradecraft behind these incidents, from malicious packages harvesting OAuth tokens to fake extensions and bootstrap scripts used for deeper compromise. Attendees will gain clarity on why metadata based scanning often fails, how deeper binary and package intelligence exposes risk earlier, and what practical steps organizations can take to reduce software supply chain exposure as threats continue to evolve into 2026.
5 days ago
This session focuses on how Mastercard and Picus approach modern security validation by moving beyond periodic testing. The discussion explains why traditional penetration testing and red teaming alone are no longer enough to keep pace with constantly evolving threats and how continuous validation helps uncover hidden control gaps before attackers do.
The webinar highlights real world use cases from the Mastercard and Picus partnership to show measurable security improvements in practice. Attendees will also receive a practical starting framework that outlines what to validate first and how to demonstrate impact within the initial stages of adoption. The session is designed for security teams looking to replace assumptions with ongoing, evidence based validation.