Discover Security Events in Mssp
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 days from now
Major changes to UK cyber regulation under the proposed Cyber Security and Resilience Bill are the focus of this strategic session, outlining how expanded requirements will affect both existing Operators of Essential Services and newly in scope organizations. The discussion explains how the Bill broadens regulatory coverage beyond traditional critical infrastructure and places stronger expectations on supply chain security, assurance and oversight.
Legal and technical experts examine new incident reporting obligations, supply chain compliance monitoring and contractual approaches that support resilience. The webinar also explores how the UK framework may interact with global cyber regulations and what organizations should anticipate once the Bill becomes law. Attendees will gain practical guidance on preparing governance, compliance and cybersecurity teams for the incoming regulatory shift.
4 days from now
Transaction activity increases cyber risk, especially during mergers and acquisitions when threat actors actively monitor deal announcements. This webinar focuses on how organizations can use threat informed, data driven methods to improve cybersecurity readiness before, during, and after transactions. The speakers explain how attack simulation and real security data help buyers and sellers identify defensive gaps and communicate risk clearly during due diligence.
The discussion covers both buy side and sell side perspectives, highlighting common security weaknesses that delay deals or increase remediation costs. Attendees will gain practical insight into preparing for technical cybersecurity due diligence, avoiding common mistakes, and strengthening security posture ahead of transaction milestones. The session is designed for investors, deal teams, and security leaders involved in M and A activity.
1 day ago
AI driven impersonation is becoming a serious fraud risk as synthetic identities, cloned voices, and deepfake video make attackers appear legitimate. This webinar examines how these techniques allow fraudsters to impersonate executives, vendors, and employees during high stakes financial or operational transactions. The discussion focuses on how traditional trust signals and common fraud warnings are no longer reliable defenses.
The session introduces an operational resilience approach to addressing AI enabled fraud. Topics include how impersonation bypasses standard verification methods, why employee awareness training alone is no longer sufficient, and how organizations can strengthen processes to prevent unauthorized transactions or access to sensitive data. Speakers will also outline structural changes to financial approval workflows and verification practices.
1 day ago
Security teams running Splunk with limited resources will see how to optimize deployments without adding tools or increasing spend. This hands on masterclass focuses on practical ways to reduce data sprawl, improve performance, and get more value from Splunk by aligning ingestion and tuning decisions with real security priorities.
The session covers how to route logs intelligently across Splunk, data lakes, and cloud storage, reduce noise without missing risk, and make smarter security decisions with fewer false positives. Built on real world deployments, the discussion is designed for lean teams that want to regain control of their Splunk environment while improving security outcomes and operational efficiency.
1 day ago
Attackers are increasingly targeting identity systems, edge infrastructure, and human trust to gain access to organizational environments. Rather than relying solely on technical vulnerabilities, many modern attacks begin with compromised credentials, exposed edge devices, or social engineering tactics. This webinar examines key findings from the 2026 Cyber Threat Outlook Report and what they reveal about current attack patterns.
The session explores how identity compromise has become a common entry point for breaches, along with the growing exploitation of edge technologies such as firewalls and VPN appliances. Speakers will also discuss the continued effectiveness of phishing and other social engineering techniques. Attendees will gain insights into the underlying trends connecting many recent incidents and practical guidance on where security teams should focus their defensive efforts.
2 days ago
Security and IT teams often struggle with large volumes of alerts, where identifying issues is easier than resolving them quickly. The challenge lies in moving from detection to effective remediation while reducing operational overhead. This webinar explores how automation can help organizations respond to alerts more efficiently and prevent issues from escalating into incidents.
The session examines how continuous asset intelligence combined with automated remediation can reduce alert noise and minimize manual response tasks. Speakers will discuss approaches for addressing configuration drift, shortening remediation timelines, and turning alerts into automated corrective actions. Attendees will gain insight into how organizations are adopting automated workflows to create more resilient and self healing IT and security operations.
2 days ago
Higher education is facing a rapidly intensifying cyber threat landscape as ransomware, data breaches, and hacktivist activity continue to rise heading into 2026. This webinar focuses on the specific risks universities and colleges face, including the impact of geopolitical tensions, predictable academic cycles, and the increasing use of automation and AI by attackers.
The session combines threat intelligence with real world operational insight to help higher education leaders understand how these threats are evolving and what practical steps can improve resilience. Attendees will gain clarity on what is changing in the threat environment and how to move from awareness to actionable security decisions tailored to the higher education sector.
3 days ago
Cyber incidents affecting suppliers, software providers, and service partners have become a major operational risk for organizations. This webinar examines how supply chain cyber attacks unfold and how breaches in trusted third parties can expose internal systems, disrupt operations, and trigger regulatory reporting requirements. The session draws on real world incident response experiences to explain how attacks propagate across interconnected business relationships.
Experts will discuss how organizations can strengthen readiness for supply chain incidents through clear ownership, tested response plans, and forensic evidence preparation. The webinar also addresses reporting obligations and the coordination required between security, risk, and compliance teams during an incident. Attendees will gain practical insight into detecting, containing, and responding to modern supply chain cyber threats.
3 days ago
Ransomware attacks in 2026 are faster, more evasive and increasingly driven by identity compromise, lateral movement and data extortion beyond simple encryption. This session examines how modern ransomware campaigns unfold, combining phishing, credential abuse and automated post exploitation techniques that bypass traditional controls and shorten the time to impact. Understanding these evolving tactics is essential for reducing dwell time and limiting operational disruption.
Richard Ford of Integrity360 joins SentinelOne to analyze real world incidents and map attacker behavior using MITRE ATT and CK style walkthroughs. The discussion highlights emerging access vectors, privilege escalation methods and common detection gaps, while outlining how autonomous detection and response approaches can interrupt attacks earlier in the kill chain. Security leaders and practitioners will gain practical insight into preparing for the next generation of ransomware threats.
1 week ago
Penetration testing in operational technology environments requires a careful approach to avoid disrupting critical systems or impacting safety. This webinar focuses on how OT penetration testing differs from traditional IT testing and explains why standard methods can introduce serious risk when applied to industrial environments.
The session outlines practical techniques for testing OT systems safely, reducing the chance of downtime while still identifying real vulnerabilities. Attendees will gain insight into common weaknesses found in OT estates, real world examples that affect reliability and safety, and key factors to consider when selecting an OT penetration testing provider. The webinar is designed to help organizations strengthen OT security without compromising operations.
1 week ago
Airports rely heavily on third party and remote access to keep operations running, yet those same connections expose critical systems to significant cyber risk. This webinar examines how attackers exploit vendor access, shared accounts, and remote tools to reach sensitive airport environments and disrupt operations.
The session breaks down common access gaps identified during real airport security assessments and explains how those weaknesses are abused in practice. Attendees will gain a clear framework for identifying and securing third party access, along with practical steps to reduce risk and better protect critical aviation systems from cyber threats.
2 weeks ago
Quantifying cyber risk reduction and proving the financial value of security operations takes center stage in this 60 minute session. Arctic Wolf leaders explain how organizations can translate technical security activity into measurable business impact using actuarial validated modeling and continuous risk measurement. The discussion focuses on turning security outcomes into metrics that resonate with finance leaders and executive stakeholders.
A live walkthrough of an ROI calculator demonstrates how to measure annualized cyber risk exposure, uncover hidden operational costs and show improvements in risk posture over time. The session highlights practical ways to reduce complexity, strengthen resilience and clearly demonstrate how security investments contribute to reduced financial and operational risk.