Discover Security Events This Week
All security events are automatically streamed into this table on a daily basis.
15th December 2025 | International Conference on AI and Materials for Sustainability - AIMS 2025
AIMS 2025 is a global conference focused on leveraging artificial intelligence and materials science to address sustainability challenges. Scheduled for 15–17 December 2025 at Fairmont Bab Al Bahr, Abu Dhabi, the conference brings together researchers, industry leaders, and policymakers to explore innovations in water, energy, and climate.
Key themes include carbon capture, hydrogen technologies, sustainable energy materials, AI-driven material design, digital sustainability, and circular energy transitions. The conference also emphasizes collaboration between academia and industry, and the integration of science, engineering, and policy.
Abstract submissions are open until 20 September 2025 via https://www.aims2025.com/abstractportal.
For details, contact aims@iitdabudhabi.ac.ae or call +971 (2) 495 8510.
Physical • Paid • Part of MCI Middle East LLC
15th December 2025 | International Conference on AI and Materials for Sustainability - AIMS 2025
AIMS 2025 is a global conference focused on leveraging artificial intelligence and materials science to address sustainability challenges. Scheduled for 15–17 December 2025 at Fairmont Bab Al Bahr, Abu Dhabi, the conference brings together researchers, industry leaders, and policymakers to explore innovations in water, energy, and climate. Key themes include carbon capture, hydrogen technologies, sustainable energy materials, AI-driven material design, digital sustainability, and circular energy transitions. The conference also emphasizes collaboration between academia and industry, and the integration of science, engineering, and policy.
Abstract submissions are open until 20 September 2025 via https://www.aims2025.com/abstractportal.
For details, contact aims@iitdabudhabi.ac.ae or call +971 (2) 495 8510.
Physical • Paid • Part of MCI Middle East LLC
15th December 2025 | State of Cybercrime: The React2Shell Crisis
This episode focuses on the growing impact of the React2Shell zero click remote code execution vulnerability and why it is turning into one of the most serious security events of the year. The session explains how threat groups are weaponizing the flaw, why emergency patches have created operational challenges and what security teams need to prioritize to stay protected.
Matt Radolec and David Gibson also examine the Shai hulud 2.0 attacks targeting cloud infrastructure and review the factors behind the largest recorded DDoS campaign. The discussion gives defenders a clear picture of how these threats are evolving and what steps can reduce risk across modern environments.
Company_Webinar • Part of Varonis
16th December 2025 | Rubrik Holiday Lunch & Learn: Sleigh Your Cyber Recovery
Rubrik is hosting a technical deep-dive on Isolated Recovery Environments and how to achieve the fastest possible cyber RTO through automated orchestration and strategic architecture. If you're finalizing 2025 disaster recovery plans or evaluating ways to improve your recovery posture, this session on December 10th at noon is designed exactly for that.
You'll see a live demo of the platform, learn about IRE architecture options including partnerships with Rackspace and Iron Mountain, and walk away with actionable insights. Plus, they're sending all attendees a $50 UberEats card as a holiday thank you, and anyone who books a follow-up meeting gets a $150 gift card for holiday shopping.
Company_Webinar • Part of Rubrik
16th December 2025 | QCon AI 2025 | December 16-17
QCon AI (Dec 16-17, 2025): The AI software conference for senior practitioners using AI to accelerate the SDLC. Learn practical patterns from peers to build faster, avoid missteps, manage MLOps, and scale reliably. No hype, just real-world takeaways.
Physical • Paid • Part of QCon
16th December 2025 | Threat Watch Live - December
This session reviews the most significant cyber incidents of 2025 and highlights the lessons security teams should carry forward into the new year. Heimdal founder Morten Kjaersgaard joins the discussion to break down what these events revealed about attacker behavior, organizational weaknesses and the trends reshaping the threat landscape.
The webinar also looks ahead to the major risks expected in 2026, outlining which shifts are likely to matter most and what actions security leaders can take now to strengthen readiness. Attendees receive practical guidance for adapting their strategy, anticipating emerging threats and preparing their organization for the challenges of the coming year.
Company_Webinar • Part of Heimdal
16th December 2025 | Mac in 2026: Secure by Design Meets the Enterprise
This session looks at how Apple’s Secure by Design approach is evolving inside the enterprise and why Mac devices are becoming a stronger option for organizations focused on Zero Trust security. The discussion explains how integrated hardware and software protections support modern security outcomes while fitting smoothly into existing enterprise environments and management workflows.
Attendees will hear the key reasons behind rising Mac adoption in large organizations, the challenges teams face when applying Zero Trust principles to Apple endpoints and the innovations that improve security and performance for Mac fleets. The webinar also highlights how Jamf works with Microsoft, CrowdStrike, Palo Alto Networks, Zscaler and Okta to support enterprise workflows and addresses the most common issues that appear as Mac usage expands.
Company_Webinar • Part of Jamf
16th December 2025 | Navigating Privacy Regulations Without Losing Fraud Visibility
This session focuses on how rising privacy protections are reshaping fraud detection and why many organizations are struggling to maintain visibility in a privacy first world. The webinar examines the real impact of regulations like GDPR, CPRA and DMA on identification accuracy and shows how reduced insight creates opportunities for more sophisticated attackers. Participants will also see why so many teams are now exploring persistent, privacy compliant identification methods to close these new gaps.
Speakers break down the common misunderstandings that product, fraud and security teams face when navigating modern privacy rules and explain how organizations can balance user protection with effective detection. The discussion covers how AI agents may influence future privacy policy, how regulatory changes could affect fraud workflows and the principles behind building a compliant, low friction identification strategy that still delivers the visibility teams need.
Company_Webinar • Part of Fingerprint
16th December 2025 | The 2026 Guide to Securing AI-Generated Code at Scale
The webinar examines why AI generated code has quickly become a major security concern for engineering and AppSec teams and outlines what organizations must change as they move into 2026. James Berthoty and Boaz Barzel break down the risks that appear when AI driven development scales and explain how those risks can go unnoticed without the right policies and controls. The session gives a clear picture of the security gaps created by high velocity coding workflows powered by AI assistants.
Attendees will hear practical guidance on defining guardrails, managing Shadow AI and embedding modern application security checks directly into fast moving development pipelines. The speakers also show how AI powered security tools can analyze code, enforce policy and remediate issues at the pace development teams now operate. This webinar is built for CISOs, AppSec leaders and engineering managers who need structured frameworks to secure AI driven development without slowing innovation.
Company_Webinar • Part of OX Security
16th December 2025 | The 2026 Identity Threat Outlook: Secrets, NHIs, AI Agents and What’s Next
The webinar examines the identity security threats expected to shape 2026 and outlines the attack vectors that matter most for security teams. Speakers from Akeyless and KuppingerCole Analysts break down how AI, automation and new offensive techniques are accelerating attacks on both human and non human identities. The session also highlights how secrets sprawl and unmanaged machine identities are expanding the internal attack surface across modern enterprises.
Security leaders will get a clear view of the trends that will influence identity programs in the coming year, including the rise of AI driven threats and the growing pressure to secure machine level access. The discussion provides guidance on the risks that require urgent attention and the areas where organizations need to strengthen their defenses before 2026.
Company_Webinar • Part of Akeyless
16th December 2025 | The Future of DAST
The discussion focuses on how dynamic application security testing must evolve as AI generated code accelerates development and widens the gap between speed and security. The session examines why traditional approaches struggle to keep pace and what a modern, production ready DAST strategy looks like as organizations move into 2026. Experts share practical insight into current market trends, customer experiences and the role unified AppSec platforms play in bringing context and prioritization to testing.
Attendees will hear why DAST is seeing renewed relevance in the AI era, how runtime security expectations are shifting and what tactics organizations are using to strengthen coverage without slowing development. The webinar offers guidance for teams building an updated application security strategy that matches today’s rapid release cycles.
Company_Webinar • Part of Checkmarx
16th December 2025 | Turning Your Tech Stack into Profit: Market Your MSP to Win Clients
This webinar focuses on helping MSPs bring their security stack to market with a clear and compelling message. CyberFOX experts Wes Spencer and Bill Morgan walk through practical approaches for presenting security services in a way that resonates with business decision makers. The session explains how to position an MSP’s security strategy as essential protection, not an optional add on, and how to frame its value in language prospects immediately understand.
Attendees will hear guidance on strengthening credibility, showcasing expertise and creating messaging that supports confident sales conversations. The webinar also includes access to customizable marketing materials that MSPs can use to promote their services and reinforce the importance of a well built security offering.
Company_Webinar • Part of CyberFOX
16th December 2025 | Censys SOC Week: Reducing Your SOC Triage Time
Censys SOC Week brings together two focused sessions designed to help security teams speed up triage and sharpen incident response through stronger internet intelligence. The first webinar shows how SOC analysts can cut through alert fatigue by using Censys asset and certificate data to enrich SIEM alerts, reduce noise and make faster decisions. It highlights how attribution, visibility and historical context improve accuracy across SIEM and SOAR workflows.
The second session examines how incident responders can better understand attacker infrastructure through real time and historical intelligence. It demonstrates how Censys supports deeper IOC enrichment, tracks changes across adversary assets and strengthens CTI investigations with continuously updated data. Together, both webinars give SOC teams practical tools to respond more quickly and with greater confidence.
Company_Webinar • Part of Censys
16th December 2025 | Mac in 2026: Secure by Design Meets the Enterprise
Mac is becoming a core enterprise security endpoint, and this webinar explains how Apple’s Secure by Design approach is shaping modern Zero Trust strategies. The session outlines why Mac adoption is rising in large organizations, what challenges teams face when securing Apple endpoints and how integrated hardware and software features strengthen protection in 2026. It also shows how Mac fits smoothly into existing workflows through ecosystem integrations.
Attendees will see how Jamf connects with tools from Microsoft, CrowdStrike, Palo Alto Networks, Zscaler and Okta to support identity, access control and unified management. The webinar highlights key innovations that boost performance, simplify operations and address the real world obstacles of scaling Mac fleets. The session closes with insights on why Mac is becoming one of the most secure and Zero Trust ready devices in the enterprise.
Company_Webinar • Part of Jamf
16th December 2025 | App-Centric Security: How Mobile App Vetting Fits Into Your Security Stack
This session focuses on the security risks that remain inside mobile applications even when organizations rely on MDM and MTD tools. The webinar explains why mobile app vetting has become a necessary layer in enterprise protection and how evaluating apps for security, privacy and compliance issues helps close gaps that traditional controls miss.
Quokka walks through the core elements of an effective app vetting program and shows where this approach fits within a modern security stack without disrupting users. The presentation includes a demo of Q scout and how it integrates with platforms such as Microsoft and Hexnode to support app centric security across the enterprise.
Company_Webinar • Part of Quokka