Discover Security Events in Security Analytics
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 days from now
Accelerating mainframe development also plays a critical role in strengthening application security and cyber resilience, especially in environments that handle highly sensitive financial and personal data. This hands on virtual workshop shows how BMC AMI DevX uses AI driven insights to help developers understand complex COBOL, PL/I, and assembler code faster, reducing hidden technical debt that can introduce security weaknesses and operational risk.
The session demonstrates how modern tooling and visual code analysis support a shift left approach by making it easier to identify logic flaws, risky dependencies, and potential vulnerabilities earlier in the lifecycle. Attendees will see how integrating mainframe development into modern workflows improves visibility, auditability, and control, while supporting more secure and resilient application delivery.
2 days from now
Operational technology environments are increasingly targeted by cyber threats, requiring stronger security controls without disrupting critical systems. This webinar explores how organizations can secure OT environments while modernizing operations using Splunk. The session focuses on improving visibility, integrating security tools, and aligning with industrial architectures such as the Purdue Model.
Attendees will learn how to detect and respond to threats in industrial control systems, including ransomware and adversary techniques mapped to MITRE ATT&CK for ICS. The discussion also covers integrating OT security solutions, unifying monitoring across systems, and leveraging automation to improve response and efficiency. The webinar provides practical guidance for strengthening resilience, enhancing visibility, and securing OT infrastructure in complex industrial environments.
3 weeks from now
Modern infrastructure and AI driven applications require advanced observability to maintain performance, reliability, and visibility. This webinar explores new capabilities in Elastic Observability that help teams monitor complex environments more effectively. The session focuses on how improved infrastructure and service visibility, along with automated log processing, can support faster detection of issues and better operational insight.
Attendees will learn how AI assisted log pipelines, service mapping, and preconfigured alert templates simplify monitoring and reduce manual effort. The discussion also covers observability for AI driven applications, including monitoring agent health and performance. The webinar provides practical guidance on improving visibility, accelerating troubleshooting, and supporting more efficient operations across modern cloud environments.
2 days ago
Data security and sovereignty are becoming more complex as information expands across cloud environments and jurisdictions. This webinar explores the growing difficulty of protecting data that must remain globally accessible while meeting local compliance requirements. It also examines how artificial intelligence is shaping both defensive strategies and attacker capabilities.
The session addresses managing borderless cloud environments and responding to the intelligence arms race driven by AI. Attendees will gain perspective on strengthening data lifecycle management and maintaining control over sensitive information in an evolving regulatory and threat landscape.
2 days ago
Organizations migrating data and applications to the cloud must manage costs, performance, and operational efficiency while maintaining secure and reliable environments. This webinar explores how organizations can optimize cloud usage and data management strategies as part of their broader digital transformation efforts.
The session examines approaches for improving visibility into cloud resources, optimizing total cost of ownership, and supporting data driven operations across cloud environments. Speakers will discuss how modern tools and insights can help organizations manage cloud infrastructure more effectively while enabling innovation and business growth. Attendees will gain practical perspectives on aligning cloud management, data strategy, and operational outcomes in modern cloud deployments.
3 days ago
Artificial intelligence is transforming the cybersecurity landscape as both attackers and defenders adopt AI driven capabilities. Threat actors are increasingly using AI to automate reconnaissance, accelerate attacks, and evade detection, while security teams are applying AI to improve threat detection and response. This webinar explores the growing AI driven arms race shaping modern cyber defense strategies.
The session examines how AI is being used to launch faster and more sophisticated cyberattacks and how cybersecurity services are responding with AI powered detection, prevention, and response capabilities. Speakers will discuss the evolving risks organizations face as AI adoption expands and how AI enabled security platforms can strengthen cyber resilience, improve threat visibility, and reduce incident response times.
3 days ago
Supply chain disruption is no longer a temporary challenge but an ongoing security risk. This webinar focuses on supply chain vulnerability and risk management, addressing how geopolitical shifts, logistics bottlenecks, and material shortages expose organizations to operational and cyber threats. The session emphasizes moving beyond reactive fixes toward building a proactive and resilient framework.
Key topics include best practices for securing the digital chain and strengthening zero trust strategies. The discussion also covers how network detection and response and intrusion prevention capabilities support improved visibility and control across complex supply chain environments.
4 days ago
Advanced persistent threats linked to nation state actors are reshaping the cybersecurity landscape. This webinar examines how rising geopolitical tensions are blurring the line between national and corporate security, making organizations across finance, energy, and technology potential targets. The session breaks down the motivations behind these attacks and the latest techniques, including the growing use of living off the land tactics.
Attendees will gain insight into major threat actor profiles and evolving playbooks. The discussion also highlights strategic defense approaches, including the role of threat intelligence, endpoint detection and response, and forensic capabilities in building resilience and operating with an assume breach mindset.
1 week ago
Security operations centers handle large volumes of alerts every month, yet many workflows fail to capture insights that could improve future detections. This webinar explores how AI can be embedded across the SOC to create a feedback loop that strengthens detection, investigation, and response processes. The session focuses on how AI driven platforms can analyze alerts with full contextual awareness and support more effective security operations.
Speakers will demonstrate how AI agents investigate alerts in a manner similar to experienced analysts and use those findings to continuously refine detection logic. The discussion also examines how closed loop detection tuning reduces false positives and improves threat hunting beyond static rules. Attendees will gain insight into how AI powered SOC platforms enable more proactive security work while safely scaling automated response capabilities.
1 week ago
Security leaders are facing growing pressure as organizations adopt AI technologies, expand digital supply chains, and demand measurable cyber resilience. At the same time, many CISOs expect AI powered attacks and deepfake threats to increase in the near future. This webinar presents an executive level discussion on how security leaders are adapting their strategies to address evolving cyber risks.
The session explores how organizations are approaching cyber resilience, including how responsibility is shared across leadership teams and security functions. Speakers will discuss preparation for AI driven threats, ongoing challenges in securing the software supply chain, and methods CISOs use to communicate risk effectively with executives and boards. Attendees will gain insights into how security leaders are shifting from reactive defense to measurable resilience.
1 week ago
Strengthen defensive skills against modern network attacks through an interactive Blue Team workshop focused on practical, hands on experience. This 120 minute session guides participants through scenario based exercises designed to improve threat detection, incident response and overall network protection in today’s evolving threat landscape.
The workshop combines expert briefings with simulated real world challenges that allow attendees to apply defensive techniques across multiple attack surfaces. Participants will practice identifying and responding to network threats in a structured but self paced format, while earning CPE credits. The session is built for security professionals who want to sharpen their defensive capabilities and better protect modern network environments.
1 week ago
Artificial intelligence and advanced analytics are increasingly used by organizations to process large datasets and generate insights that support data driven decision making. This webinar explores how AI models and analytics platforms can transform raw data into meaningful insights through real world applications and large scale data processing.
The session examines how AI systems are designed, built, and operationalized to analyze complex datasets and support predictive modeling. Speakers will discuss considerations around responsible AI adoption, including governance, accountability, and organizational roles when deploying AI technologies. Attendees will gain an overview of how AI driven analytics can be applied in practical scenarios while understanding the importance of structured AI development and operational practices.