Discover Security Events in Threat Intelligence
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
Gain a clear view of how rising geopolitical instability can translate into cyber, security, and operational risk for organizations worldwide. This threat briefing focuses on current global events and explains how shifts in the geopolitical landscape may affect people, assets, and business operations, with an emphasis on anticipating escalation and disruption.
The session outlines how intelligence teams can assess first and second order impacts, track key variables shaping risk across global hotspots, and apply threat research from the Recorded Future Platform and Insikt Group to reduce exposure. Designed for organizations that need timely, actionable insight, the webinar helps security and risk leaders make informed decisions in an increasingly uncertain environment.
1 day from now
Cyber and geopolitical threats are increasingly overlapping, creating new risks for digital operations, supply chains, and critical services. This webinar focuses on how organizations can gain real time visibility by using open source intelligence and structured intelligence frameworks to identify emerging risks earlier and respond with greater confidence. The discussion centers on improving awareness across both cyber and geopolitical domains to support faster, better informed decisions.
The session explains how Priority Intelligence Requirements help teams cut through noise, focus intelligence efforts, and deliver context that decision makers can actually use. Attendees will see how OSINT supports early detection and how structured prioritization strengthens operational resilience. A live Silobreaker demo shows how these concepts come together in practice to help security and risk teams improve defenses and response readiness.
1 week from now
Security operations are entering a new phase where autonomous intelligence allows defenders to detect and respond to threats at machine speed. This webinar focuses on how AI driven security operations are changing the balance in favor of security teams, reducing response time while allowing analysts to concentrate on higher value strategic work. The discussion explains why traditional threat intelligence models are no longer sufficient as attack volume and speed continue to increase.
The session brings together insights from Forrester research and Recorded Future to examine how autonomous threat operations can support always on defense. Attendees will gain a clearer view of where the security market is heading, how autonomous intelligence fits into modern operations and what steps security leaders can take to prepare their teams for this shift. The webinar is designed for organizations looking to modernize security operations and stay ahead of rapidly evolving threats.
2 weeks from now
This Level 2 threat hunting workshop focuses on identifying and investigating privilege escalation techniques that attackers use to expand control inside an environment. The session centers on real world telemetry, showing how escalation activity blends into normal administrative behavior and why it is difficult to detect at scale.
Participants will work through realistic datasets to analyze process behavior, permission changes, authentication artifacts, and system modifications that indicate privilege abuse. The workshop emphasizes intelligence driven investigation, using threat intelligence to guide hypotheses and validate findings rather than relying on isolated alerts. Designed for defenders with some hunting experience, this hands on session builds confidence in tracing escalation paths and applying consistent investigative methods in production environments.
2 weeks from now
Threat intelligence is revealing clear signals about where major breaches are headed in 2026 and how attackers are preparing long before incidents make headlines. This webinar examines real threat actor activity and dark web intelligence to show how behavior, tooling, and targeting patterns point to the next wave of high impact attacks. The session focuses on intelligence that appears weeks or months before traditional alerts surface.
The discussion highlights early warning indicators that many SOCs overlook and explains how intelligence led teams turn raw data into timely action. Using real operational examples, the webinar shows how threat intelligence can be embedded into day to day security operations to anticipate attacks and reduce response time.
6 days ago
Human risk can no longer be measured by phishing click rates alone as attackers use AI driven social engineering that goes far beyond email. This webinar focuses on why traditional metrics fail to capture real employee behavior and how security teams can better understand human risk in realistic attack scenarios.
The session highlights how Doppel’s Human Risk Management approach helps organizations evaluate how people actually respond to advanced threats and where behavior creates risk. Attendees will see how modern measurement and training strategies give security leaders clearer insight into human decision making and stronger tools to reduce exposure as social engineering continues to evolve.
1 week ago
Synthetic identity fraud is becoming a major risk for enterprises as attackers use fake personas to enable financial crime, insider access and long term infiltration. This webinar examines why traditional identity verification methods are failing and how synthetic identities are slipping past both human and technical controls in the age of AI.
The session looks at real world examples of organizations that failed to detect synthetic identity activity, including high profile state linked cases. It explains how integrating threat intelligence into identity workflows improves detection of synthetic IDs and compromised credentials. Attendees will gain practical guidance on using AI driven verification, zero trust approaches and intelligence led identity defenses to reduce financial and reputational risk.
1 week ago
Modern cyber risk extends far beyond what most organizations can actively scan or monitor. This webinar focuses on how security teams can gain full visibility into their own external attack surface and the hidden infrastructure risks introduced by third party partners. Team Cymru introduces RADAR, an external asset and vulnerability discovery tool built on passive global telemetry, designed to reveal internet facing exposure without relying on active scanning.
The session walks through how RADAR identifies unmanaged assets, maps vendor infrastructure and prioritizes vulnerabilities that are actively exploited in the wild. A live demonstration shows how attack surface management, supply chain risk assessment and threat investigations can be streamlined using RADAR, with direct integration into Team Cymru’s Scout and Recon platforms. The webinar is aimed at security teams responsible for external risk, vulnerability prioritization and threat intelligence who need clearer, faster insight into real world exposure.
1 week ago
This session focuses on cognitive warfare and how modern narrative attacks manipulate perception, trust, and decision making across governments, markets, and institutions. It examines how digital platforms and artificial intelligence have amplified the speed and impact of coordinated information campaigns, turning narratives into a powerful tool for adversaries operating in the gray zone between peace and conflict.
The discussion brings together Blackbird.AI, the Center for Information Advantage and Effectiveness, and the DISARM Foundation to explain how hostile actors weaponize information and what that means for public trust and institutional stability. Speakers outline how open frameworks, AI driven narrative defense, and cross sector collaboration can work together to counter these threats. The webinar highlights practical approaches for governments, civil society, researchers, journalists, and technology providers to defend against AI enabled narrative attacks and protect the information environment.
1 week ago
This session focuses on cognitive warfare and how narrative attacks are increasingly used to influence perception, trust, and decision making across societies and institutions. It explains how digital platforms and advances in artificial intelligence have accelerated the scale and impact of coordinated information campaigns, turning narratives into powerful tools for manipulation.
The webinar brings together Blackbird.AI, the Center for Information Advantage and Effectiveness, and the DISARM Foundation to examine how modern adversaries weaponize information and distort truth. Speakers discuss the real world consequences of these campaigns and outline how governments, civil society, academia, journalists, and technology companies can work together to defend against them. The discussion highlights a unified approach to narrative defense by combining open frameworks, AI driven analysis, and cross sector collaboration to protect institutions in the age of AI powered influence operations.
1 month ago
Threat actors are rapidly turning AI into a force multiplier for ransomware, phishing, and vulnerability exploitation, changing how attacks are launched and scaled. This webinar looks at how AI is being weaponized in real world threat activity and why many security teams struggle to keep pace as attack surfaces evolve.
The panel brings together leaders from EclecticIQ to discuss how defenders can respond to this shift without sacrificing trust or ethical standards. The discussion covers the role of agentic AI in threat intelligence, the challenges of monitoring fast changing environments, and how AI driven approaches can strengthen CTI operations. Attendees will gain a clearer understanding of how to balance efficiency, visibility, and responsible use of AI in modern defense strategies.
1 month ago
This webinar examines how Doppel uses advanced OpenAI models to automate core SOC workflows and accelerate the takedown of social engineering attacks. The session explains how AI driven detection, paired with human oversight, reduces operational load and expands the capacity of security teams. Attendees will see how reinforcement fine tuning supports high reliability in low fault tolerance environments.
The discussion highlights recent performance gains, including major reductions in SOC workload and significant improvements in response speed. Speakers walk through how Doppel refines AI models, how human analysts guide system reliability and how autonomous detection and response can strengthen business impact. The session also outlines the path toward a fully autonomous SOC designed to identify, triage and neutralize threats at internet scale.