Data Security Webinars

Discover Security Events in Data Security

Get Data Security Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Data Security: Current Status

Data Security has evolved into one of the most challenging and regulated aspects of cybersecurity as organizations manage exponentially growing volumes of sensitive information across hybrid and multi-cloud environments. The proliferation of data sources, storage locations, and access points has created a complex landscape requiring sophisticated protection strategies.

Regulatory Pressure and Compliance

Global privacy regulations including GDPR, CCPA, HIPAA, and emerging frameworks have transformed data security from a technical concern into a business imperative with significant legal and financial consequences. Organizations face substantial penalties for data breaches, with compliance requirements mandating encryption, access controls, data classification, breach notification, and data subject rights. The patchwork of regional regulations creates complexity for multinational organizations managing cross-border data flows.

Expanding Attack Surface

Data breaches continue to increase in frequency and severity, with ransomware attacks, insider threats, and sophisticated exfiltration techniques targeting valuable information assets. The shift to remote work, cloud adoption, and bring-your-own-device (BYOD) policies has dispersed data beyond traditional perimeter controls. Organizations struggle with data visibility, lacking comprehensive understanding of where sensitive data resides, who accesses it, and how it flows through their ecosystems.

Advanced Protection Technologies

Modern data security strategies employ multiple layers including encryption at rest and in transit, data loss prevention (DLP), data masking, tokenization, and database activity monitoring. Organizations are implementing zero-trust data access models, privileged access management, and data governance frameworks. Emerging technologies like confidential computing and homomorphic encryption promise enhanced protection for data during processing, addressing critical gaps in traditional security models.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

10th December 2025 | Cybersecurity Predictions 2026: Tactics, Threats and Defensive Measures

This webinar explores the major cybersecurity challenges expected in 2026 and helps MSPs and IT teams understand how the threat landscape is shifting. The Acronis Threat Research Unit will walk attendees through current attacker tactics, key developments in cybercrime and the factors driving risk in the year ahead. The session highlights new threat insights, practical defensive strategies and expert perspectives from researchers who study global cyber activity every day.

Participants will learn which emerging risks are likely to impact organizations most in 2026 and how to strengthen their defenses using up to date intelligence. The discussion covers lessons from the past year, forward looking predictions and guidance on preparing for evolving threats. A live panel and Q and A give attendees the chance to hear real world advice from cybersecurity leaders. This event is designed for MSPs, CISOs, IT decision makers and executives who want to improve readiness for the coming year.

Company_Webinar • Part of Acronis

_flag

10th December 2025 | Understanding EU Data & AI Regulations

This session gives security teams a clear view of how upcoming EU data and AI regulations will change their compliance obligations. The discussion focuses on the European Commission’s Digital Omnibus package, which brings NIS2, GDPR, DORA and the EU AI Act under a more unified regulatory approach that will influence security, privacy and governance practices across the region.

The panel features experts closely involved in shaping and interpreting these rules, offering practical insight into what is changing and how organizations can prepare. Attendees will gain guidance on adjusting security strategies, understanding new requirements and avoiding compliance gaps as digital governance evolves. The webinar also includes access to an EU AI Act compliance guide to support planning and readiness.

Company_Webinar • Part of Varonis

_flag

10th December 2025 | Drive Crypto Agility with Next-Gen HSM

This webinar examines why traditional enterprise security models are struggling as AI driven threats and quantum advances reshape the attack surface. The session explains how machine to machine communication, cryptographic exchanges and certificate based authentication have created a large and complex environment of keys and credentials that legacy tools can no longer keep up with. Attendees will hear why older HSMs, scattered key vaults and cloud point solutions fail to meet the speed and scale required to protect modern data and applications.

The discussion introduces the concept of next generation HSMs and how unified, scalable architectures can reduce risk, close compliance gaps and simplify control. Participants will also learn about the challenges created by fragmented security tools and why a consolidated approach is becoming essential for future ready protection.

Company_Webinar • Part of Fortanix

_flag

16th December 2025 | Rubrik Holiday Lunch & Learn: Sleigh Your Cyber Recovery

Rubrik is hosting a technical deep-dive on Isolated Recovery Environments and how to achieve the fastest possible cyber RTO through automated orchestration and strategic architecture. If you're finalizing 2025 disaster recovery plans or evaluating ways to improve your recovery posture, this session on December 10th at noon is designed exactly for that.

You'll see a live demo of the platform, learn about IRE architecture options including partnerships with Rackspace and Iron Mountain, and walk away with actionable insights. Plus, they're sending all attendees a $50 UberEats card as a holiday thank you, and anyone who books a follow-up meeting gets a $150 gift card for holiday shopping.

Company_Webinar • Part of Rubrik

_flag

3rd December 2025 | Your Catalog Investment Works Perfectly, on 20% of Your Data.

This webinar explains how organizations can extend their catalog governance practice to include unstructured data, using lessons learned from real deployments in financial services, manufacturing and government. The session introduces a practical framework that shows why most catalogs only cover structured data, why this blind spot affects adoption and how technical debt builds up when unstructured files remain unmanaged. Attendees will see how unstructured data can be brought into an existing catalog without replacing core systems.

The presentation walks through the main options for addressing this challenge, including the tradeoffs of replacing, building or extending a catalog. The speakers also explain the architecture required for successful integration and how expanded visibility turns a catalog from a static inventory into an active knowledge system. A live demo will show unstructured data discovery, classification and catalog integration in practice, including on premises and air gapped deployment setups where data stays fully controlled.

Company_Webinar • Part of Ohalo

_flag