Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 hours ago
Security operations are evolving as AI becomes more integrated into modern security practices. In this webinar, David Seidman, Head of Platform Security at Plaid, joins Landen Brown and Samuel Hill to discuss how artificial intelligence is reshaping the way security teams operate and respond to threats.
The discussion focuses on how AI is influencing security operations and the practical implications for teams responsible for protecting systems and data. Speakers will share their perspectives on the changing role of AI within security environments and how it is shaping the future of operational security practices.
4 days from now
Microsoft 365 has become essential to daily operations, but it also introduces security risks that many organizations underestimate. This session focuses on strengthening cyber resilience across M365 environments, addressing threats such as ransomware, accidental deletion, identity compromise and data exposure. It examines where native protections may fall short and why additional safeguards are often necessary to prevent data loss and compliance gaps.
The discussion highlights how Rubrik’s Security Cloud enhances protection across SharePoint, OneDrive, Exchange and Entra ID through stronger labeling controls, immutable and air gapped backups, anomaly detection and faster granular recovery. Attendees will gain insight into building a more resilient Microsoft 365 strategy that reduces risk and improves recovery readiness in the face of evolving cyber threats.
1 day ago
AI is transforming retail operations, and this webinar explores how retailers are using real time Customer 360 data to power agentic commerce at scale. The session highlights how unified customer, commerce and media data creates an AI ready foundation that supports personalization, retail media optimization and smarter enterprise decisions. Insights drawn from industry research and NRF discussions will show how leading brands are moving beyond experimentation toward measurable AI driven growth.
The discussion also addresses what it takes to operationalize AI responsibly in production environments. Speakers will outline how fragmented data can be consolidated, how AI can be embedded across end to end retail workflows and how organizations can transition from isolated pilots to governed, scalable AI platforms that deliver sustained business impact.
1 day ago
Organizations are increasingly using AI to manage and understand large volumes of data across distributed environments. This webinar explores how AI driven data discovery and classification can help identify, organize, and manage content more effectively. The session focuses on how automated classification of sensitive data supports better data governance and improves visibility across enterprise data ecosystems.
Attendees will see how machine learning can categorize documents, automate retention, and enhance search through metadata driven insights. The discussion also highlights how improved data visibility can support governance and compliance efforts. The webinar provides practical insight into using AI to transform content management while strengthening control over sensitive information.
1 day ago
Cybercriminal groups continue to exploit configuration weaknesses in widely used platforms to gain access to sensitive data. This webinar examines a recent campaign attributed to the ShinyHunters group that targeted Salesforce Experience Cloud environments by abusing guest user misconfigurations. The attackers reportedly used a modified version of the AuraInspector auditing tool to query CRM data without authentication.
The session explores how the campaign operated, how configuration errors in public facing applications can expose sensitive information, and how this activity aligns with known ShinyHunters tactics. Speakers will also discuss broader trends in cybercrime, including emerging AI related security risks and evolving competition among large language model platforms. Attendees will gain insights into attack patterns and practical considerations for strengthening platform security.
1 day ago
Enterprises often rely on multiple secrets management platforms such as HashiCorp Vault and cloud native services like AWS Secrets Manager, Azure Key Vault, and Google Cloud Secret Manager. As these deployments expand across teams and environments, maintaining consistent governance, access control, and audit visibility becomes increasingly difficult. This webinar explores how organizations can address fragmented secrets governance without migrating existing secrets or disrupting established workflows.
The session demonstrates how centralized governance can be applied across multiple vault platforms to enforce consistent role based access control and improve audit visibility. Speakers will show how security and platform teams can maintain oversight while allowing teams to continue using their preferred secrets managers. Attendees will see a live demonstration of integration approaches that support gradual adoption across namespaces, environments, and vault deployments.
1 day ago
Many enterprises rely on HashiCorp Vault, yet governance can become fragmented across teams and environments. This webinar demonstrates how Akeyless Multi Vault Governance adds centralized RBAC, audit logging, and visibility to an existing Vault deployment without requiring secret migration or changes to application workflows. The session focuses on how platform and security teams can strengthen governance while allowing existing Vault operations to continue.
The live demo presents how organizations can enforce consistent access control, gain real time audit coverage, and address governance gaps across environments. It also introduces the two integration models behind Akeyless Multi Vault Governance, Universal Secret Connector for Akeyless native workflows and HashiCorp Vault Proxy for teams that need the Vault API to remain unchanged.
1 day ago
Modern cloud environments require organizations to balance speed, cost, and security while protecting sensitive data and infrastructure. This webinar explores how a unified approach to security lifecycle management can help teams reduce risk over time. The session focuses on how organizations can progressively adopt tools such as Vault and Boundary to manage secrets, control access, and strengthen security across cloud environments.
Attendees will learn practical strategies for inspecting, protecting, and governing sensitive assets using integrated security workflows. The discussion includes live demonstrations of Vault, Boundary, and Vault Radar, highlighting how teams can discover, manage, and secure secrets across their infrastructure. The webinar provides guidance on implementing a scalable security lifecycle approach that aligns with evolving cloud and operational requirements.
2 days ago
AI has transformed the threat landscape, giving attackers new tools to scale and refine their tactics. This webinar brings together Matt Radolec, Roberto Galdamez, Zachary Lewis, and Stephen Kowski to share the CISO perspective on how AI is reshaping cybersecurity. As data creation accelerates and attacks become more precise and human-like, security leaders face growing pressure to adapt.
Speakers will examine the impact of AI on email security, identity based attacks, and data exposure. The session focuses on how organizations can adjust their security strategies to respond to these evolving risks and remain ahead of increasingly sophisticated threats.
1 week ago
MSPs face growing pressure to protect servers and virtual machines while reducing complexity and response time. This session focuses on building cyber resilience through a unified approach that combines backup, disaster recovery and cybersecurity within a single platform. Acronis experts will demonstrate how consolidating tools helps close security gaps, streamline operations and improve overall recovery performance for servers and VMs.
The discussion also challenges traditional recovery metrics like RTO and RPO, introducing measures such as mean time to clean recovery and maximum tolerable downtime as more realistic indicators of success. Attendees will see a live demo of recovery using the Protected Server solution, including disaster recovery failover and failback. The webinar concludes with a live Q and A for participants who want deeper insight into strengthening resilience for their clients.
1 week ago
This webinar examines the growing threat of attackers targeting backup systems to prevent organizations from recovering after a cyberattack. The session highlights research showing that many organizations face attempts to compromise or destroy backups, often through credential-based attacks that allow adversaries to access both production environments and recovery systems.
Experts from Rubrik and Google Cloud will discuss why traditional backup strategies are vulnerable and how a separation of trust model can improve resilience. The webinar also explains how implementing a logical air gap for cloud data can protect backup environments and ensure recoverability. Attendees will learn practical approaches to strengthening cyber resilience and maintaining business continuity in Google Cloud environments.
1 week ago
Databases remain critical to business operations, yet many organizations still depend on legacy tools for database activity monitoring that require heavy upkeep and deliver limited reporting value. This webinar introduces a modern approach to replacing outdated DAM solutions with a SaaS first model designed to improve visibility and reduce operational burden.
During the live demo, Terry Ray will demonstrate how Varonis modernizes database activity monitoring to provide stronger security outcomes without the complexity of legacy systems. The session focuses on practical improvements in monitoring and reporting, helping organizations move toward more effective and streamlined database protection.