Endpoint Security Webinars

Discover Security Events in Endpoint Security

Get Endpoint Security Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Endpoint Security: Current Status

Endpoint Security has become increasingly complex and critical as organizations manage diverse device ecosystems spanning traditional workstations, mobile devices, IoT sensors, and cloud workloads. The explosion of remote work and bring-your-own-device policies has expanded the attack surface exponentially, requiring sophisticated protection strategies that extend beyond traditional perimeter defenses.

Evolution to EDR and XDR

The industry has evolved from basic antivirus software to comprehensive Endpoint Detection and Response (EDR) platforms that provide continuous monitoring, threat hunting, and automated response capabilities. Many organizations are now adopting Extended Detection and Response (XDR) solutions that integrate endpoint data with network, email, and cloud telemetry for unified threat detection and response. These platforms leverage behavioral analysis, machine learning, and threat intelligence to identify sophisticated attacks that evade signature-based detection.

Persistent Threat Challenges

Endpoints remain primary targets for ransomware, malware, zero-day exploits, and advanced persistent threats. Attackers increasingly exploit legitimate administrative tools, living-off-the-land techniques, and fileless malware to evade detection. The proliferation of unmanaged and partially managed devices creates visibility gaps and enforcement challenges. Organizations struggle with alert fatigue, skills shortages, and the complexity of managing security across heterogeneous endpoint environments.

Modern Protection Strategies

Contemporary endpoint security strategies employ defense-in-depth approaches combining next-generation antivirus, application control, device encryption, patch management, and privileged access management. Zero-trust principles mandate continuous verification of endpoint posture before granting access to resources. Organizations are implementing unified endpoint management platforms, conducting regular vulnerability assessments, and establishing incident response procedures specifically tailored to endpoint compromise scenarios.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

4th December 2025 | From None to Done: 100% Patching Coverage in Just 5 Minutes EMEA

This session shows how organizations can reach complete patch coverage in minutes using the Action1 platform. The webinar focuses on how its scalable architecture and built in security controls streamline patching for distributed environments and remove many of the manual steps that slow teams down.

Attendees will see how the platform automates patch deployment, improves visibility across endpoints and helps IT teams close vulnerabilities faster. The demonstration highlights how fast full coverage can be achieved and why reliable patching remains one of the most effective ways to strengthen overall security.

Company_Webinar • Part of Action1

_flag

4th December 2025 | Exploiting Outlook RCE: A Deep Dive into SecTor 2025’s Signature of Destruction

This webinar examines the latest Outlook remote code execution vulnerabilities and the growing risks tied to roaming signatures and cloud based settings. Michael Gorelik, CTO and Head of Malware Research at Morphisec, will break down the recent issues highlighted at SecTor 2025, including CVE 2025 21357 and CVE 2025 41176, and explain what these weaknesses mean for enterprise security. The session will review how attackers exploit improper pathname sanitization, roaming signatures and other overlooked gaps to gain persistence and carry out targeted attacks.

Attendees will see a live demonstration that walks through each stage of the exploitation process, showing how real world attacks unfold from the attacker’s perspective to the victim’s system. The discussion also covers new research findings from SecTor, including unsanitized APIs, non standard file types and image based data exposure risks. The session concludes with practical defense strategies, such as patching priorities, monitoring techniques and layered controls that help reduce the impact of Outlook focused threats. This webinar is designed for security teams that want a deeper understanding of emerging exploit methods and clear steps to strengthen their defenses.

Company_Webinar • Part of Morphisec

_flag

9th December 2025 | Cellebrite + Corellium: Where Digital Forensics Meets Mobile Security

This session focuses on how Cellebrite and Corellium are combining their strengths to advance digital investigations and mobile security. The discussion explains how digital intelligence capabilities and a high fidelity mobile virtualization platform work together to improve threat identification, support complex forensic needs and strengthen security for organizations and government agencies. Attendees will see how this partnership enhances both defensive capabilities and operational efficiency across mobile environments.

The webinar walks through how Corellium’s platform improves mobile app testing, accelerates security research and supports faster and more reliable workflows. The speakers will share practical use cases that show how customers can protect sensitive data, reduce compliance challenges and limit operational risk. A live demo highlights how the platform works in action, followed by a Q and A with experts to address attendee questions.

Company_Webinar • Part of Cellebrite

_flag

10th December 2025 | Turn Noise Into Action with Insights Agent

This session gives security teams a clear look at how Insights Agent strengthens real time detection and response across hybrid and multi cloud environments. The discussion explains how attackers move quietly through complex environments and shows how an AI powered security graph helps surface meaningful signals instead of noise. Speakers break down how the agent monitors activity continuously, learns from each event and adapts as new attack patterns emerge.

Attendees will see how the tool turns network behavior into clear, actionable insights that speed up investigation and response. The webinar also covers why AI driven context is essential for identifying lateral movement and how the agent provides guided remediation steps for high risk findings. A live demo will show the technology in action.

Company_Webinar • Part of Illumio

_flag

10th December 2025 | Preparing Your IT for the 2025 December Holiday Season: A practical guide with SecPod Saner platform

The discussion focuses on how IT and security teams can prepare their infrastructure for the upcoming December 2025 peak season, a period marked by higher transaction loads, rapid changes in staffing and a rise in targeted attacks. The session walks through a clear preparation plan built around the SecPod Saner platform, showing how teams can strengthen visibility, reduce exposure and improve operational readiness before demand spikes.

Attendees get a practical look at rapid asset discovery, shadow IT identification, large scale vulnerability remediation and configuration hardening. The webinar also covers how automation supports continuous monitoring and keeps patching, prioritization and compliance workflows on track during high impact business periods. The goal is to help teams build a stable, secure and resilient environment capable of handling holiday traffic and increased threat activity.

Company_Webinar • Part of SecPod

_flag