Discover Security Events in Application Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
Protecting LLM powered applications requires visibility into how models behave, respond, and interact with data in real time. This hands on workshop focuses on using Datadog LLM Observability with Gemini to monitor and defend against modern AI driven security risks, including prompt abuse, unsafe outputs, and unintended data exposure. Participants will work with a pre instrumented application on Vertex AI to see how prompts, responses, evaluations, and traces reveal security and safety issues as they happen.
The session shows how correlating LLM traces with logs, metrics, and infrastructure context supports auditability, incident investigation, and risk reduction. Attendees will learn how to detect prompt injection attempts, monitor safety and toxicity signals, prevent sensitive data leakage, and validate that AI workflows remain grounded in approved data. The workshop is designed for teams responsible for securing AI systems and maintaining trust, control, and accountability in production LLM environments.
5 days from now
Supply chain attacks through malicious open source packages are becoming a major risk for modern applications. This webinar focuses on how Chainguard Libraries helps teams reduce that risk by using rebuilt from source dependencies designed to prevent malware by default, with signed provenance, SBOMs, and remediated CVEs.
The session walks through real world engineering workflows, showing how to update existing dependencies to trusted sources and how Chainguard Libraries for Python addresses critical and high severity vulnerabilities. Attendees will see practical examples of securing application supply chains and gain a clearer understanding of how verified libraries improve both security and reliability.
5 days from now
Children’s privacy regulations in the United States are evolving rapidly as federal and state authorities introduce new compliance requirements. With the updated Children’s Online Privacy Protection Act (COPPA) rule approaching its April 2026 compliance deadline and additional state privacy laws emerging, organizations must reassess how they collect, manage, and protect children’s data. This webinar provides an overview of the latest regulatory developments affecting children’s privacy.
The session explores the implications of the new COPPA rule and the growing number of state level privacy regulations. Speakers will discuss key compliance expectations, enforcement trends, and how these regulatory changes affect organizations that handle children’s data. Attendees will gain practical insight into preparing their privacy programs to meet upcoming requirements while reducing regulatory and operational risk.
1 month from now
Penetration testing continues to evolve as web, mobile, and cloud environments grow more complex. This 60 minute webinar examines common pitfalls and best practices for 2026, along with the legal and regulatory landscape affecting testing activities. The session also addresses risks and benefits of AI driven and automated penetration testing, including testing LLMs and AI powered applications for AI specific vulnerabilities.
Additional topics include the OWASP Top 10 for LLM, accountability for AI related failures, red teaming, continuous breach and attack simulation, and use of the MITRE ATT&CK Matrix. The discussion compares continuous and one time testing, as well as external versus in house penetration testing approaches.
1 day ago
This webinar explores how security practices must evolve as AI-native development tools reshape modern software engineering. The session focuses on embedding application security directly into AI-driven development environments, including the Windsurf AI-powered IDE and autonomous software engineering agents. It examines how security guidance can operate alongside AI-assisted coding while maintaining development speed.
Cognition and Checkmarx will discuss how agentic AppSec can provide real-time, contextual remediation guidance inside the IDE. The webinar also covers integrating security capabilities such as SAST, DAST, and software composition analysis into AI-accelerated workflows. Attendees will gain practical insights on maintaining security assurance as development teams increasingly rely on AI tools and autonomous agents to build and ship software at scale.
1 day ago
Application security automation takes center stage in this interactive session focused on protecting web, mobile and API environments in 2026. The webinar examines how AI is influencing modern development, including the risks introduced by automated coding and new vulnerabilities linked to rapid application creation. It also reviews common security weaknesses behind data breaches and highlights the relevance of the OWASP Top 10 for large language models in today’s threat landscape.
The discussion moves into practical implementation, covering how to build a risk based application security testing program and integrate automated scanning into CI CD pipelines. Attendees will see how mobile, web and API security testing can be streamlined using specialized tools, along with how AI can enhance detection and testing efficiency. This session is designed for security and development teams looking to strengthen application defenses through automation.
1 day ago
AI powered applications are creating new security risks that sit at the intersection of observability, governance, and AI security. This webinar focuses on how visibility into AI models, APIs, and usage patterns helps organizations detect availability issues, prevent resource exhaustion, and maintain control over increasingly complex AI stacks.
The session shows how monitoring AI interactions supports security goals such as identifying shadow AI usage, reducing exposure to misuse, and protecting against costly abuse scenarios like token flooding or performance degradation. Attendees will see how tracking latency, throughput, and cost indicators strengthens both operational resilience and AI security, while supporting safer deployment and compliance as AI features move into production.
2 days ago
Security teams face their highest risk during cloud migrations, when rapid changes can introduce hidden misconfigurations and policy gaps. This webinar focuses on securing Azure migrations by treating governance, visibility, and control as core security requirements rather than post migration cleanup tasks. Using Microsoft’s Cloud Adoption Framework, the session shows how security and governance tracks run in parallel with application migration to reduce exposure during high change windows.
The discussion highlights how observability supports security outcomes, including maintaining audit ready visibility, enforcing governance guardrails, and detecting issues early through metrics, logs, and traces. Attendees will see how Datadog helps teams maintain control over identity, access, architecture visibility, and cost signals while migrating workloads to Azure, ensuring new environments remain compliant, monitored, and secure from day one.
2 days ago
AI assisted development is changing how application security teams evaluate code and risk. This webinar features James Berthoty of Latio and Jeff Williams, Creator of the OWASP Top 10 and Founder of Contrast Security, discussing the security implications of Claude Code and AI driven SAST. The conversation examines what AI native scanning can realistically deliver today and how it fits into modern AppSec programs.
Speakers will address the strengths and limits of AI SAST, the challenges of pipeline only reviews, and the continued importance of governance and state management. The session also explores function level reachability, runtime visibility, and findings from the 2026 Application Security Market Report, with a focus on exploitability and protection.
2 days ago
Software supply chain security has become a frontline concern as AI accelerates software development. This webinar examines how growing complexity across development lifecycles is expanding risk and challenging CISOs to balance speed with strong security standards. Veracode product leaders Ajay Nigam and Tim Jarrett join GigaOm Field CTO Chris Ray for a data driven discussion on the evolving application security landscape and the rising importance of supply chain security.
Speakers will address how AI reshapes the attack surface, what it means for supply chain strategy, and the steps security teams should take to reduce risk and support compliance. The session also reviews insights from the GigaOm Radar Report for Software Supply Chain Security, including its evaluation approach and market analysis.
2 days ago
Container environments are becoming a core component of AI deployments, but scaling containerized infrastructure often introduces security challenges. Fragmented security scans can generate large volumes of alerts without enough context to guide action. This webinar explores how organizations can modernize container security to support AI workloads while reducing operational complexity.
The session examines how continuous, automated container scanning can improve visibility and reduce blind spots across container registries. Speakers will discuss methods for consolidating fragmented security assessments into a unified view of container images across the software ecosystem. Attendees will also learn how runtime context can support more effective prioritization of security efforts, helping teams focus on the most critical risks while maintaining a developer friendly workflow.
1 week ago
APIs have become essential infrastructure connecting modern systems, especially as AI applications interact with external services. This webinar explores how APIs enable AI to operate beyond isolated systems while introducing new security risks. Dr Katie Paxton-Fear examines why APIs present unique vulnerabilities and how attackers take advantage of weaknesses such as broken object level authorization, excessive data exposure, workflow manipulation, and agent overreach.
The session focuses on API hacking as a distinct security discipline in the AI era. Attendees will gain insight into the types of vulnerabilities attackers commonly target, how AI driven workflows can increase the impact of API abuse, and practical approaches for testing and securing APIs in modern environments.