Discover Security Events in Testing
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
Security teams are drowning in threat intelligence but struggling to turn it into action. This webinar focuses on how to make threat intelligence useful within a continuous threat exposure management program by narrowing attention to what truly matters for your environment. It explains why CTEM efforts stall when relevance and prioritization are unclear and how hyperlocal context changes that equation.
The session shows how environment specific risk and organizational context help identify which adversaries and exposures deserve immediate attention. Attendees will see how intelligence driven exposure validation works in practice, including a live example, and leave with a clear approach for translating existing threat intelligence into prioritized, actionable outcomes without adding more data or feeds.
1 week ago
Get a clear introduction to threat informed defense and see how organizations are using it to measure and improve security against real world threats. This webinar provides an inside look at the latest updates to the INFORM maturity model, released by MITRE, and explains how the framework helps teams baseline their security posture, prioritize investments and track progress over time.
The session covers the core fundamentals of INFORM, what has changed in the updated model and how it is being applied in active security programs. Attendees will also hear practical insights during a live Q and A discussion, making this webinar useful for teams looking to start or advance a threat informed defense assessment.
1 week ago
Hands on training focused on using SIGMA rules to build portable, vendor neutral detections across modern security environments. This virtual workshop walks participants through creating adversary activity, writing SIGMA rules from scratch and testing them in Splunk within an isolated lab. The session shows how SIGMA enables teams to write detections once and deploy them consistently across multiple tools, improving visibility and reducing duplicated effort.
Participants will practice translating SIGMA into Splunk SPL, validating detections using endpoint logs and SIEM data and hunting for real world behaviors such as malicious PowerShell activity and registry Run key abuse. The workshop also explains how SIGMA supports real time detection and strengthens purple team workflows, making it a practical session for defenders who want to improve detection quality and efficiency.
1 year ago
The "How to Test Firmware for Fault Injection Vulnerabilities" webinar provided a comprehensive overview of techniques to identify and mitigate vulnerabilities in firmware. The speaker effectively explained fault injection methods and their implications on device security. Attendees appreciated the practical demonstrations and the detailed Q&A session, which clarified complex concepts. Overall, the event was well-organized and offered valuable insights for cybersecurity professionals seeking to enhance their skills in firmware testing.