Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 hours ago
Organizations are facing increasing pressure to manage data privacy alongside evolving cybersecurity threats and regulatory requirements. This webinar explores current challenges in protecting sensitive data and maintaining digital trust in a rapidly changing landscape. The session focuses on how privacy considerations are becoming a central component of modern security strategies.
Speakers will discuss emerging privacy risks, best practices for safeguarding sensitive information, and approaches to building stronger privacy and security frameworks. Attendees will gain insight into aligning data protection efforts with broader cybersecurity initiatives, helping organizations stay compliant while improving overall security posture and resilience.
2 hours ago
Security teams often face the challenge of responding to alerts outside of normal working hours, when rapid investigation and containment are critical. While endpoint detection tools can identify suspicious activity, many organizations struggle to maintain continuous monitoring and timely response with limited internal resources. This webinar examines how Managed EDR services address these operational gaps.
The session explores how organizations use Managed EDR to provide around the clock monitoring, expert investigation, and faster response to endpoint threats. Speakers will discuss how managed security services can reduce alert fatigue, improve incident response coverage, and help security teams manage the growing volume of endpoint alerts. Attendees will gain insight into how continuous monitoring and expert support can strengthen endpoint security operations.
2 days from now
Autonomous AI agents are increasingly being deployed within enterprise infrastructure, creating new governance and security challenges for organizations. As these systems operate across applications, data, and infrastructure, they introduce risks related to identity management, authorization, and auditability. This webinar examines the architectural and security considerations required to safely run autonomous AI agents in production environments.
The session focuses on governance patterns and control plane strategies for managing AI agents within Kubernetes environments. Speakers will discuss approaches for establishing secure agent identities, implementing authentication and authorization controls, and applying Zero Trust principles to autonomous systems. Attendees will gain insight into practical security patterns for operating agentic AI systems within regulated enterprise environments while maintaining visibility and control.
5 days from now
Manual IT operations are struggling to keep pace with evolving threats, hybrid work, and growing expectations for seamless digital experiences. This webinar examines how organizations can reduce support tickets and strengthen their security posture through autonomous endpoint management using Ivanti solutions. The session highlights unified endpoint visibility to support faster decision making and simplified operations for distributed teams.
Speakers will address autonomous patching to close vulnerabilities faster and reduce manual effort, as well as proactive remediation to resolve issues before employees notice them. A real world case study from SouthStar Bank will share outcomes and lessons learned. Attendees will also receive a roadmap outlining stages and practical steps toward autonomous endpoint management maturity.
5 days from now
As Mac adoption continues to grow across organizations, IT teams must adapt their management and security practices to support macOS environments effectively. This webinar explores the fundamentals of Mac management and highlights how modern management platforms help organizations maintain device security while supporting user productivity.
The session reviews key concepts for managing macOS devices, including device enrollment, application provisioning, patching, and configuration management. Speakers will also discuss the challenges of managing mixed device environments and how integrated management and security capabilities can help address them. Attendees will gain practical insight into common workflows and best practices that support secure and efficient Mac device management within enterprise environments.
5 days from now
AI driven adversaries are increasing the speed and sophistication of cyber attacks. This webinar highlights findings from the CrowdStrike 2026 Global Threat Report, including a 27 second breakout time, an 89 percent rise in AI enabled attacks, and the growing use of legitimate tools in malware free activity. Speakers examine how threat actors are scaling operations with AI while also targeting AI systems.
The session covers evasive techniques such as exploiting unmanaged devices, using zero day vulnerabilities before disclosure, abusing valid credentials, and intensifying cloud targeting. CrowdStrike leaders share threat intelligence insights and practical guidance to help security teams respond to this evolving landscape.
1 week from now
Android firmware and pre installed system applications operate with high level privileges, making them a critical layer for device security. This webinar explores the risks associated with firmware vulnerabilities, including potential data exposure, privilege escalation, and full device compromise. The session introduces a security testing approach designed to identify and address these risks before devices are released to users.
Attendees will learn how multi layered analysis techniques can detect insecure interfaces, uncover vulnerabilities, and identify potential malware within firmware environments. The discussion also covers how security testing aligns with established standards such as NIAP, NIST, and OWASP MASVS. The webinar provides practical insight into strengthening firmware security and ensuring mobile devices meet privacy and security requirements before deployment.
2 weeks from now
Vulnerability and patch management often create friction between IT and security teams, balancing the need for rapid remediation with maintaining system stability. This webinar explores how organizations can align IT operations and security priorities to reduce exposure without disrupting production environments. The session focuses on modern approaches to managing vulnerabilities more efficiently while avoiding tool sprawl and operational complexity.
Attendees will learn how to transition from reactive patching to a structured and scalable remediation strategy. The discussion highlights how to prioritize vulnerabilities based on real risk, streamline patching processes across environments, and improve collaboration between IT and security teams. The webinar provides practical guidance for accelerating remediation, reducing backlogs, and achieving measurable security improvements without compromising uptime.
3 weeks from now
Modern Kubernetes environments rely on advanced networking and security technologies to manage connectivity, observability, and protection across cloud native infrastructure. This webinar explores practical applications of eBPF and Cilium for addressing complex Kubernetes networking and security challenges through real world case studies and technical examples.
As the final session in the Isovalent webinar series, the event reviews how eBPF powered networking can support improved visibility, security, and operational control in cloud native environments. Participants will also take part in an interactive Jeopardy style Kahoot game that tests knowledge of Cilium, Kubernetes networking, and related technologies. The session provides an opportunity to learn from experts while engaging with the broader Isovalent community.
1 month from now
Experience a hands-on virtual ransomware recovery simulation designed to test real world response skills without real world consequences. This interactive event places attendees inside a live breach scenario, where they work through decision making, coordination, and recovery steps alongside other IT and security professionals.
The session focuses on practical ransomware response, resilience building, and lessons learned from active attack scenarios. Participants gain actionable guidance on strengthening incident response plans and improving readiness against ransomware threats, all through an engaging, simulation based format that goes beyond a traditional webinar.
1 day ago
Incidents still occur despite strong prevention and detection controls, and the real challenge begins after containment. This webinar, part of the Attack Threat Resilience series, focuses on post attack recovery when downtime and business pressure are highest. Subject matter experts examine why recovery efforts often fail during real ransomware events and what organizations must do to restore systems safely and reliably.
The session addresses common backup failures, attacker tactics targeting recovery infrastructure, and the requirements for clean recovery in today’s threat landscape. It also explores immutability, isolation, anomaly detection, and practical planning steps that support faster and more confident system restoration.
2 days ago
Digital forensics is becoming central to modern public safety investigations as smartphones, cloud platforms and other digital sources shape how cases are built and decisions are made. This session reviews findings from Cellebrite’s 2026 Industry Trends Survey and examines how public safety agencies are adapting to the growing role of digital evidence in their daily work.
The discussion highlights year over year trends influencing digital investigations, along with real world perspectives from agencies facing operational and modernization challenges. Attendees will gain insight into how peers are managing rising data demands, shifting priorities and evolving investigative workflows, while better understanding how their own approach compares across the public safety landscape.