Discover Security Events in Operations
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
5 days from now
Investigative teams increasingly rely on digital tools to gather intelligence from online sources and social platforms. This webinar introduces new capabilities in an OSINT platform designed to enhance investigative workflows and improve the speed and accuracy of analysis. The session focuses on how advanced features can support deeper insights into digital identities and online activity.
Attendees will see practical demonstrations of new functionality, including one click background checks, enhanced Telegram analysis, social media metadata collection, and AI driven text analysis. The discussion highlights how these tools can expand investigative reach and improve efficiency. The webinar provides insight into leveraging OSINT technologies to support security investigations and intelligence gathering.
5 days from now
Government agencies must meet strict security and compliance requirements while addressing evolving cyber threats and limited security resources. This webinar explores the benefits of Bugcrowd’s FedRAMP Moderate authorized offensive testing platform and how it enables organizations to access global security researcher expertise while meeting federal security standards.
The session explains how Bugcrowd redesigned its platform architecture and operational capabilities to isolate and secure government data in accordance with FedRAMP requirements. Speakers will discuss how this authorization affects trust in security research programs and how offensive security testing can help federal agencies identify vulnerabilities despite cybersecurity workforce shortages. Attendees will also learn how these improvements can benefit private sector organizations through stronger data protection and data sovereignty practices.
3 weeks from now
SAP migrations introduce complex operational and security challenges that organizations often underestimate. As environments transition to platforms such as S/4HANA or cloud infrastructure, legacy configurations, custom code, and outdated security controls can expose hidden risks. This webinar examines the SAP migration journey and the security considerations that arise before, during, and after the transition.
The session explores how organizations can identify risks early, manage security exposure during active migration, and maintain control once systems go live. Speakers will discuss challenges such as hybrid environments, shifting performance demands, and evolving security requirements after migration. Attendees will gain a framework for maintaining visibility and reducing operational risk throughout the SAP migration process while preparing for ongoing security and governance needs.
2 days ago
Enterprise DFIR teams are facing rising pressure as AI adoption grows, cyber incidents increase, and mobile evidence becomes harder to access. This webinar brings together industry practitioners to discuss findings from the 2026 State of Enterprise DFIR Report. The panel reflects on how investigative environments are becoming more complex as toolkits expand faster than teams can integrate them.
Speakers examine four defining shifts shaping enterprise digital investigations: AI as both a force multiplier and a threat vector, the importance of real time collaboration in SaaS adoption, the growing complexity of mobile evidence, and operational strain caused by fragmented tools. Backed by survey data from private sector DFIR professionals, the session focuses on practical changes affecting modern investigation teams.
2 days ago
The EU Cyber Resilience Act introduces new requirements for organizations to report vulnerabilities and security incidents, with enforcement deadlines approaching in 2027. As these requirements take effect, security teams must begin preparing processes for monitoring vulnerabilities, managing remediation, and ensuring timely reporting. This webinar examines how organizations can begin structuring vulnerability management programs aligned with CRA expectations.
The session explores practical steps security teams can take to build effective vulnerability management processes, including organizing and tracking vulnerabilities across development and operational environments. Speakers will discuss how tools such as DefectDojo can support program structure and reporting while helping teams manage vulnerability backlogs. Attendees will also learn how emerging responsibilities, including the Open Source Stewards definition, may affect the maintenance and governance of open source software projects.
2 days ago
Applying Zero Trust and microsegmentation across hybrid networks remains difficult for many organizations due to fragmented tools, policy drift, and inconsistent enforcement. This webinar focuses on the practical challenges of reducing lateral movement in complex, multi vendor environments and why segmentation often breaks down at scale.
The session shows how Tufin’s unified control plane helps security teams gain full visibility, automate policy enforcement, and maintain consistent Zero Trust controls across hybrid infrastructure. Attendees will see how centralized policy management, topology aware validation, and continuous monitoring support scalable microsegmentation without slowing application delivery, while reducing risk and strengthening compliance.
2 days ago
Modern cybercrime operates like a business, with teams, tools, and workflows that closely mirror legitimate enterprises. This webinar takes an inside look at how today’s cybercriminal organizations function, showing how they plan, collaborate, and execute attacks using the same cloud platforms, productivity tools, and AI technologies trusted by businesses worldwide.
The session reframes threat analysis by comparing real world business practices with those used by attackers. Attendees will see practical attack examples, learn how threat actors organize and innovate, and gain actionable strategies to recognize and defend against adversaries who think and operate like an internal team. The goal is to help organizations better anticipate threats by understanding cybercriminals as strategic competitors, not just anonymous attackers.
3 days ago
Software Bills of Materials (SBOMs) are designed to help organizations track software components and manage supply chain risk, but inconsistencies in how packages are identified can limit their usefulness. The same dependency may appear under different names depending on the tool, ecosystem, or SBOM format, making vulnerability tracking and ownership identification difficult. This webinar explores how Package URLs (PURLs) provide a standardized way to identify software components.
The session explains how PURLs create consistent identifiers that allow teams to compare SBOM data across tools and formats. Speakers will discuss how standardized package identification improves vulnerability matching, triage, and remediation workflows. Attendees will also learn how PURLs support stronger SBOM validation and compliance processes, helping development and application security teams make software supply chain security data easier to trust and act on.
1 week ago
A critical gap is emerging between rapid AI adoption and the ability to secure it effectively. Based on findings from Pentera’s AI Security and Exposure Survey 2026, this session highlights how many organizations lack visibility into where AI is deployed, depend on legacy controls not built for AI driven workflows and still do not have a defined approach to AI security testing. The result is increased exposure across data, identity and infrastructure that attackers can exploit.
Ryan Dorey from Pentera and Chris Cochran from SANS examine benchmark data from 300 CISOs and explain how these gaps translate into real world risk. The discussion also explores how adversarial testing can help validate AI related threats and strengthen security programs.
1 week ago
Security operations in the APAC region rely on skilled analysts who can uncover threats that automated tools often miss. This webinar offers an inside look at the Huntress Detection, Engineering, and Threat Hunting team and how they operate as part of a modern SOC to identify and stop stealthy intrusions targeting businesses.
The session shares real APAC threat hunting stories and walks through how the team thinks, hunts, and responds to complex attacks in the wild. Attendees will see how threat hunters fit into the broader SOC, what a typical day looks like for these analysts, and how attacker techniques are turned into actionable detections. The discussion is designed for MSPs and IT leaders who want a clearer understanding of who is protecting their environments and how advanced threats are handled behind the scenes.
1 week ago
Release delays often come from friction between fast moving development teams and security processes that slow delivery. This webinar focuses on how organizations can align developer and security pipelines to reduce bottlenecks while still identifying and fixing vulnerabilities early in the release cycle.
ReversingLabs and DefectDojo explain practical ways to detect malicious components, uncover software tampering, and manage security debt without sacrificing speed. The session shows how using both platforms together helps teams prioritize findings, track remediation, and maintain momentum from build to release. It is designed for organizations looking to improve vulnerability management while keeping development workflows efficient and predictable.
1 week ago
Cyber threats are accelerating as AI powered attacks and cloud first architectures expand the modern attack surface. This session examines how organizations can move beyond traditional security thinking and adopt a stronger cyber resiliency strategy built for today’s evolving risks. The discussion focuses on how the threat landscape is changing in speed and complexity, and why prevention alone is no longer enough.
Commvault’s Northern Europe CTO shares practical insight into strengthening resilience so businesses can protect critical data and recover quickly when incidents occur. Topics include the impact of AI on attack methods, the realities of securing distributed cloud environments and clear frameworks for building a strategy that supports both protection and business continuity. Real world lessons from enterprise environments round out the conversation, offering guidance for organizations preparing for the next wave of cyber threats.