Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
11 hours from now
This event focuses on how organizations can use AI to strengthen cyber defense as threats become faster, more automated, and more costly. CrowdStrike and CSIS will share insights into how attackers are leveraging AI to scale their operations and how modern security teams can respond with smarter, more efficient defenses. The discussion highlights current threat trends and the role AI plays on both sides of the security landscape.
Attendees will hear real world perspectives from organizations that have already advanced their cybersecurity approach and learn what matters most when selecting and building modern security solutions. The program includes expert presentations and customer experiences aimed at decision makers and specialists responsible for cybersecurity strategy, technology, and investment.
11 hours from now
Kubernetes networking becomes harder to manage as environments grow across cloud and on premises infrastructure, especially when multiple tools and control planes are stitched together. This webinar focuses on how an integrated Kubernetes networking model reduces complexity, improves security visibility and lowers operational risk for platform teams running at scale.
The session explains how consolidating connectivity, security and observability into a single approach enables consistent behavior across environments and simplifies policy enforcement for ingress, east west and egress traffic. Real world scenarios show why fragmented networking breaks down over time and how teams move to an integrated model that streamlines operations, reduces tooling sprawl and helps Kubernetes scale without slowing the business.
11 hours from now
Internal IT teams are facing major changes as automation, security expectations, device management, and AI continue to accelerate. This webinar focuses on the key trends expected to shape IT operations in 2026 and explains how those shifts will impact planning, delivery, and day to day support.
The session outlines what is changing across modern IT environments, why these trends matter, and how teams can prepare without disrupting current operations. Attendees will gain practical guidance on prioritizing investments, improving efficiency, strengthening security readiness, and supporting better user experiences while building an IT organization prepared for the years ahead.
2 days from now
Nation state conflict is increasingly spilling into cyberspace through coordinated hacktivism that masks true intent and amplifies disruption. This webinar examines how governments and mercenary groups are using malicious activist fronts to conduct cyber operations, influence narratives, and complicate attribution during times of geopolitical tension. The discussion focuses on how tactics such as ransomware, data leaks, DDoS attacks, and psychological operations are blended to appear grassroots while serving strategic objectives.
Led by SentinelOne Senior Threat Researcher Jim Walter, the session breaks down real world case studies and threat patterns shaping this activity today. Attendees will gain insight into why attribution has become more difficult, how traditional hacktivist groups fit into the modern threat landscape, and what security teams should consider when modeling long term risk tied to conflict driven cyber activity.
1 week from now
A live cyber simulation workshop that places participants inside a realistic incident response scenario based on active adversaries targeting organizations today. Led by the CrowdStrike Incident Response Team, the session walks through how fast moving attacks unfold, how threat actors infiltrate mature environments, and how early decisions can change the outcome of an incident.
The interactive format allows attendees to guide the response through real time voting, with each decision influencing escalation paths, response options, and time pressure. The scenario centers on a sophisticated China nexus threat compromising a managed service provider and impacting downstream customers. Participants gain practical insight into adversary behavior, prioritization under pressure, team coordination, and the actions security leaders must be ready to take during a real cyber incident.
1 week from now
This session focuses on how AI and automation are shaping the way organizations use and manage N-able products. The discussion covers recent updates, new capabilities and what is coming next across the N-able platform, with a strong emphasis on real world application rather than theory.
Product specialists and practitioners will walk through practical use cases, showing how AI features and automation tools can improve daily operations. The webinar also highlights how APIs, scripting and integrations are being used to streamline workflows, followed by an open discussion where attendees can raise questions based on their own environments.
1 week from now
Kick off your eBPF journey with an interactive introduction to the fundamentals behind modern cloud networking and security. This webinar opens the Isovalent World Cup series by breaking down what eBPF is, why it matters for Kubernetes environments, and how it is used to build secure and scalable infrastructure in real world deployments.
The session combines practical learning with live engagement, including Q and A and a Kahoot based knowledge challenge. Attendees will gain a clear understanding of core eBPF concepts, common use cases, and how Isovalent applies eBPF, Cilium, and related technologies to networking and security. This first session sets the foundation for deeper technical labs and advanced topics covered in later parts of the series.
1 week from now
Get hands on with real world disaster recovery techniques in this interactive masterclass focused on preparing IT teams before an incident happens. The session walks through building and launching recovery environments across Hyper V, VMware ESXi, and Microsoft Azure, while covering essential recovery prerequisites and cyber recovery best practices that reduce risk during critical moments.
Participants will practice restoring a full server, learn which decisions must be made ahead of time, and understand common mistakes that often cause recovery failures. The class is designed to help attendees strengthen resilience, validate recovery processes, and build confidence in responding to outages, ransomware incidents, and other disruptive events through guided, live instruction.
2 weeks from now
A modern endpoint management strategy is becoming essential as IT environments grow more complex. This webinar looks at how IT and MSP leaders can reduce risk, control costs, and improve security by aligning their endpoint strategy with current market expectations. The session translates insights from the Gartner Magic Quadrant for Endpoint Management Tools into a practical framework that teams can use to evaluate vendors and strengthen day to day operations.
The discussion highlights key trends shaping endpoint management and explains how Gartner assesses vendors through execution and vision. Attendees will also see how automation across patching, monitoring, remote support, and backup supports stronger compliance and operational efficiency. Real world examples show how organizations have improved security posture and streamlined IT workflows through a modern endpoint management approach.
2 weeks from now
This webinar provides a technical walkthrough of Linux and Mac patching using N-central and N-sight through the new multi-OS patch engine. The session gives a clear view of how patching works in its current public preview state and what teams can expect when managing non-Windows systems.
Attendees will see live examples of Linux and Mac patching in action, along with an explanation of the engine’s capabilities and current limitations. The discussion focuses on how the new approach improves patch management, enhances operational control and supports more consistent system security across mixed environments.
1 month from now
Hands-on Cilium labs take center stage in this interactive cybersecurity webinar focused on cloud native networking and eBPF based security. The session puts participants into real Kubernetes scenarios where they work directly with Cilium to understand how networking, observability, and security controls operate in modern container environments. Guided challenges are designed to build practical skills while reinforcing core concepts.
The webinar uses a gamified lab format that lets attendees solve real world problems, track progress on a live leaderboard, and ask questions directly to Isovalent experts throughout the session. It is suited for engineers who want practical experience with eBPF, Cilium, and Kubernetes security rather than theory alone.
4 days ago
This live discussion examines how AI is reshaping cyber risk and widening the gap between attackers and defenders. Red Sift CEO Rahul Powar and Billy McDiarmid explore how AI is driving more effective social engineering, increasing identity based threats, and changing how digital trust is established.
The session shares forward looking insights into how email and identity threats are expected to evolve in 2026, the expanding role of domain trust and DMARC, and how defenders can use AI to counter AI driven attacks. Attendees will also see a walkthrough of Radar Lite, a free AI powered tool that assesses domain security posture and helps teams identify and prioritize remediation quickly.