Discover Security Events in Application Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
Threat modeling practices change significantly as organizations grow, and this webinar focuses on how security teams can adapt as they scale from startup to enterprise. The session examines how mature teams keep security built into design decisions while maintaining consistency across expanding systems and teams.
The discussion covers common challenges such as fragmented processes, uneven risk coverage, and duplicated or missing controls. Attendees will see how the right balance of services, tools, and best practices supports scalable and sustainable threat modeling programs, helping security evolve in step with business growth.
1 week from now
Application security automation takes center stage in this interactive session focused on protecting web, mobile and API environments in 2026. The webinar examines how AI is influencing modern development, including the risks introduced by automated coding and new vulnerabilities linked to rapid application creation. It also reviews common security weaknesses behind data breaches and highlights the relevance of the OWASP Top 10 for large language models in today’s threat landscape.
The discussion moves into practical implementation, covering how to build a risk based application security testing program and integrate automated scanning into CI CD pipelines. Attendees will see how mobile, web and API security testing can be streamlined using specialized tools, along with how AI can enhance detection and testing efficiency. This session is designed for security and development teams looking to strengthen application defenses through automation.
2 weeks from now
Supply chain attacks through malicious open source packages are becoming a major risk for modern applications. This webinar focuses on how Chainguard Libraries helps teams reduce that risk by using rebuilt from source dependencies designed to prevent malware by default, with signed provenance, SBOMs, and remediated CVEs.
The session walks through real world engineering workflows, showing how to update existing dependencies to trusted sources and how Chainguard Libraries for Python addresses critical and high severity vulnerabilities. Attendees will see practical examples of securing application supply chains and gain a clearer understanding of how verified libraries improve both security and reliability.
1 month from now
Penetration testing continues to evolve as web, mobile, and cloud environments grow more complex. This 60 minute webinar examines common pitfalls and best practices for 2026, along with the legal and regulatory landscape affecting testing activities. The session also addresses risks and benefits of AI driven and automated penetration testing, including testing LLMs and AI powered applications for AI specific vulnerabilities.
Additional topics include the OWASP Top 10 for LLM, accountability for AI related failures, red teaming, continuous breach and attack simulation, and use of the MITRE ATT&CK Matrix. The discussion compares continuous and one time testing, as well as external versus in house penetration testing approaches.
2 days ago
Organizations are weighing whether consolidated web application security platforms can adequately protect the client side or if specialized tools offer stronger risk reduction and compliance. This webinar focuses on the tradeoffs between platform based approaches and dedicated client side protection as web threats continue to evolve.
The discussion draws on Forrester research and real world perspectives to explain why many enterprises turn to specialized client side security to address regulatory pressure, protect customer data, and maintain trust. Attendees will gain clarity on when consolidation makes sense and when best of breed solutions deliver greater security value.
3 days ago
AI driven development is reshaping application security, creating decentralization and fragmented visibility across the software delivery lifecycle. This webinar examines why traditional scanning tools struggle to keep pace as AI coding agents and MCP servers accelerate development. Jens Eckels and Janet Worthington discuss the industry shift from disconnected scanners to unified security solutions that preserve context from code creation through final release.
The session explores how consolidation strengthens security posture across teams, reduces blind spots linked to Shadow AI, and addresses emerging risks tied to MCP servers and AI agents. It also covers proactive controls such as package firewalls and curation strategies to prevent malicious binaries before production.
4 days ago
Modern development teams are redefining how quality, security, and resilience work together in the AI era. This webinar from Kiuwan and PreEmptive examines how organizations are connecting code scanning, quality signals, and runtime protection to reduce risk while maintaining delivery speed. The session looks at why traditional quality and security models are shifting and how teams are aligning risk management and reliability with faster release cycles.
Speakers will discuss reducing friction between security, QA, and engineering without adding extra approvals or process overhead. The session also explores where scanning tools are effective, where blind spots remain, and how teams are linking code analysis with runtime protection to focus on signals that strengthen security and resilience before production.
4 days ago
Modern application security is moving beyond chat based AI toward autonomous systems that can act at machine speed. This webinar focuses on how context intelligence and AI orchestration work together to create a self protecting software development lifecycle that can keep up with zero day threats and supply chain attacks.
The session explains how agentic security platforms use context intelligence to understand why decisions are made and AI orchestration to execute actions automatically across the SDLC. Attendees will see how organizations can identify shadow AI, prioritize real risks based on business context, and automate remediation while maintaining visibility and control. The discussion shows how security teams can transition from manual, human speed processes to an orchestrated and autonomous approach built for modern development environments.
1 week ago
n8n’s move to Docker Hardened Images highlights how strengthening the base layer of the software supply chain can significantly reduce security risk. This webinar focuses on why n8n adopted Docker DHI to lower its attack surface, improve provenance, and deliver secure by default automation for customers running sensitive workloads.
The session explains how Docker Hardened Images provide a low CVE foundation with continuous patching and verified builds, and why that matters for AI driven automation platforms operating inside customer environments. Attendees will see how migrating to DHI simplified n8n’s maintenance process while improving security assurances across all self hosted deployments.
1 week ago
Security and development teams are facing a growing gap between innovation speed and software risk, driven by rising security debt, high risk vulnerabilities, and the expanding impact of AI. This webinar examines key findings from the 2026 State of Software Security Report and explains why many organizations are struggling to keep up as flaws accumulate faster than they can be fixed.
The session breaks down the major trends shaping software security today, including remediation challenges, third party code exposure, and how AI is both increasing risk and reshaping defenses. Attendees will gain data driven insight into how security debt is evolving and what practical strategies can help teams strengthen software security without slowing development.
1 week ago
A practical look at how threat modeling is applied in real environments, this webinar follows Synchronoss’s journey toward building and maintaining secure by design systems. The session explains why threat modeling matters, how it has been adopted over time, and how it supports consistent security decisions across complex architectures.
The discussion focuses on real challenges teams face as they scale, including maintaining consistency, managing architectural complexity, and improving workflows. Attendees will hear lessons learned, honest insights, and actionable guidance for strengthening and expanding threat modeling practices within growing organizations.
1 week ago
AI generated code is changing application security faster than traditional tools can keep up. This webinar focuses on how Semgrep is rebuilding AppSec for an era where large volumes of code are written by AI and no longer reviewed line by line by humans.
The session introduces a multimodal AppSec engine that combines deterministic analysis with LLM reasoning to improve vulnerability detection while eliminating false positives. Attendees will see how deeper context awareness uncovers issues legacy SAST tools miss and how security systems can evolve faster than the models producing modern code.