Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
Windows 10 end of support is creating a growing security and compliance risk for operational technology environments, especially where legacy systems cannot be easily replaced. This webinar focuses on how unsupported Windows systems increase exposure in OT and OT adjacent zones and why attackers are increasingly able to move laterally from IT into production systems.
The session breaks down practical options for handling Windows 10 in OT environments, including migration, extended updates and compensating controls, with a clear look at the risks and tradeoffs of each approach. Attendees will gain guidance on meeting regulatory requirements, protecting HMIs, SCADA servers and engineering workstations, and maintaining operational safety without forcing rushed migrations. The discussion is designed to help organizations build a defensible and standards aligned strategy for securing OT systems.
2 days from now
Reduce exposure to CIPA lawsuits by understanding how wiretap laws intersect with modern data privacy practices and consent management platforms. This webinar focuses on why California Invasion of Privacy Act claims are increasing and how businesses are being targeted under long standing regulations that were never designed for today’s digital environments. The discussion breaks down where risk commonly appears, including timing issues, data collection practices and common sources of complaints.
The session also walks through practical steps organizations can take to lower CIPA risk using a CMP, with Osano shown as a working example. Attendees will see how configuration choices and privacy controls can help demonstrate compliance and strengthen defenses against opportunistic lawsuits. The webinar is relevant for companies using Osano, other consent platforms, or no privacy solution at all who want clearer guidance on reducing legal and privacy risk.
2 days from now
See a live comparison of Akeyless Modern PAM and HashiCorp Boundary focused on secure remote access at scale. This webinar shows how a SaaS native approach consolidates privileged access and session management into a single control plane, reducing the operational overhead tied to self managed clusters, workers, and separate credential vaults.
The demo walks through real world workflows to highlight differences in setup effort, maintenance, and scalability. Topics include ephemeral and just in time access, agentless connections to common protocols, SSO integration, and full session visibility with audit logs. The session is designed for teams evaluating modern PAM options who want simpler operations without sacrificing Zero Trust security.
1 week from now
Partners supporting multicloud and hybrid environments need stronger security, clearer governance, and better cost control without increasing operational complexity. This webinar focuses on how AvePoint is expanding its platform to help partners deliver secure, compliant, and scalable services while protecting margins and strengthening customer trust.
The session highlights new capabilities around cyber resiliency, including broader multi cloud protection, faster recovery, and centralized control for SaaS, IaaS, and PaaS data. It also covers simplified compliance through consistent governance baselines, automated alerts, and improved audit readiness, along with cloud optimization features that provide visibility into costs, licenses, and performance. The discussion is designed for partners looking to streamline operations, differentiate their services, and support long term growth.
1 week from now
AI driven payments are reshaping how merchants manage risk, trust, and control across the payment stack. This webinar focuses on architecting agentic payments safely, with a clear look at how increasing agent autonomy changes validation, liability, and resiliency. The discussion centers on the realities merchants face as agent driven transactions become more common and why reliability and security must be designed in from the start.
The session dives into two core pillars of success in the agentic payments era: AI payments intelligence and universal tokens. Speakers explain how better visibility into payment data supports safer automation, stronger compliance, and more confident decision making. Attendees will gain a practical framework for building payment architectures that remain adaptable and controlled while reducing operational and fraud risk as agent based commerce scales.
1 week from now
A realistic walkthrough of a cloud ransomware attack shows how quickly a single incident can escalate from early warning signs to full scale business disruption. This webinar follows a fictional global retailer as it faces a ransomware attack impacting its AWS environment, highlighting the critical moments security teams encounter from initial detection through recovery decisions.
The session moves step by step through alert investigation, impact assessment and the challenges of recovery when backups are compromised. As the situation worsens, the discussion covers operational pressure, public exposure and the difficult choice between paying attackers or rebuilding systems. Expert commentary throughout the scenario provides practical insight into how organizations can better prepare for and respond to cloud based ransomware incidents.
1 week from now
Banks are being pushed to detect financial crime more accurately while strict regulations limit how data can be shared across institutions. This webinar focuses on how privacy preserving technologies help resolve that conflict by enabling collaboration without exposing sensitive information. It explains why traditional transaction monitoring fails in an open banking environment and how gaps between institutions are exploited by criminals.
The session covers how Multi Party Computation and digital identity approaches allow banks to analyze cross bank activity, improve fraud and AML detection, and meet requirements under frameworks such as the AI Act, DORA, AMLD6, and PSR. Attendees will see how secure data collaboration, stronger identity verification, and verifiable compliance can work together to support a more resilient and data driven banking model.
2 weeks from now
An interactive tabletop exercise simulating a full scale Microsoft 365 breach that begins with identity provider compromise and escalates into a ransomware crisis. The webinar walks through how modern attackers exploit legitimate identity access rather than breaking in, showing how a single suspicious login can quickly turn into data exfiltration, lateral movement and on premises impact inside a fictional enterprise.
Guided by expert hosts, the session examines the critical decision points teams face during an identity driven incident, from detection through response and recovery. Attendees will see how attackers abuse identity platform functionality to bypass defenses, where incident response efforts often fail and how organizations can manage the legal, operational and reputational fallout of a confirmed breach. The discussion also covers how to prepare for recovery when identity and data infrastructure can no longer be trusted.
1 month from now
Ensure manufacturing operations remain resilient by addressing the most common causes of factory floor downtime and recovery delays. This on demand demo focuses on operational technology environments and explains how backup and recovery strategies help maintain uptime across critical production systems. The session looks at current OT challenges and why fast, reliable recovery is essential for continuous manufacturing.
The webinar shows how organizations can simplify and automate backups, reduce recovery time objectives, and restore PCs that run SCADA, HMI, historians, and DCS with minimal disruption. It also highlights how non IT factory staff can safely perform recoveries when needed. The discussion connects downtime risks to real world threats such as ransomware, limited on site IT support, and aging systems, making it especially relevant for teams responsible for OT resilience and operational continuity.
4 days ago
The webinar focuses on how Salesforce data management is changing as security threats, AI adoption and regulatory pressure continue to increase. Odaseva outlines the key Salesforce data trends shaping 2026 and explains what organizations need to do to protect data while maintaining resilience and control. The discussion addresses how recent OAuth breaches and ransomware incidents have pushed enterprises to rethink their security and recovery strategies.
The session also covers shifts in data architecture, including hybrid models, data mobility and the growing importance of active backups. Governance topics such as data sovereignty, evolving cost structures and the expanding role of the CISO are explored to show how leadership teams are adapting. This webinar is designed for organizations looking to strengthen Salesforce data security and prepare for the challenges ahead.
4 days ago
This Q and A session focuses on building cyber resilience for Microsoft 365 in the face of ransomware, identity based threats and rapid AI adoption. Chad Pallett, acting CISO at BioIVT, shares real world experience on strengthening M365 security and recovery capabilities inside a global life sciences organization.
The discussion covers how BioIVT uses Rubrik to move beyond basic backup toward end to end cyber resilience. Attendees will hear practical guidance on improving M365 data protection, speeding up recovery after incidents, establishing a provable security posture and adopting AI tools such as Microsoft Copilot in a secure and controlled way.
5 days ago
AI driven email attacks are changing how phishing, business email compromise, and social engineering bypass traditional defenses. This webinar breaks down how attackers are using automation and machine learning to target inboxes at scale and why legacy email security tools struggle to keep up with these techniques.
The session explains how modern AI based defenses detect and stop these threats by analyzing behavior, intent, and patterns that humans and rules alone can no longer catch. Email security experts will walk through real attack scenarios and show why defending email now requires AI fighting AI. This webinar is designed for security teams looking to stay ahead of evolving email based threats.