Discover Security Events in Api Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
5 days from now
This session takes a candid look at how cybersecurity and API security predictions for 2025 actually played out. Wallarm revisits expectations shared across the industry and compares them with what truly happened throughout the year, highlighting where forecasts were accurate and where reality took a different path.
The discussion examines the forces that shaped real outcomes in 2025 and points out early signals that are influencing security thinking for 2026. The webinar closes with a brief look ahead at emerging expectations for the coming year, giving attendees practical context for planning and risk awareness going forward.
3 weeks ago
This session focuses on how large enterprises are building AI governance programs that manage risk without slowing innovation. Speakers share what actually happens when generative AI tools scale across an organization and explain how security and governance teams can maintain visibility and control while still supporting experimentation. The discussion draws on real incidents and practical lessons from enterprise environments.
Attendees will hear how companies identify new AI related risks, what approaches to oversight work better in practice and why out of band visibility can strengthen governance. The webinar also covers the data needed to build a business case for governance, the shortcomings of proxy based controls and the challenges leaders face when balancing innovation pressure with compliance and board expectations. It is designed for CISOs, CIOs, IT teams and anyone responsible for guiding secure AI adoption.
4 weeks ago
Threat modeling is a critical function for effective cybersecurity and threat models must adapt to emerging threats. As API deployments grow across organizations, cybersecurity teams need to extend their threat modeling to include the API attack surface. In this webinar, we'll examine threat modeling best practices for APIs, focusing on the STRIDE methodology. Attendees will learn: What critical threats are facing APIs today The basics of the STRIDE methodology for threat modeling How to apply STRIDE to APIs
4 weeks ago
This webinar brings together Salt Security Co Founders Roey Eliyahu and Michael Nicosia for a direct conversation on the real state of agentic AI in enterprise environments. The session focuses on the widening gap between AI adoption and operational readiness, especially as many organizations deploy multiple AI agents without the API security or visibility needed to manage them safely.
Attendees will learn what is actually working in production deployments, which assumptions are failing, and what organizations must do to scale agentic AI securely in 2026. The speakers will outline key decisions security leaders need to make around infrastructure, governance and protection in the next 90 days. The session closes with an open Q and A where participants can raise any questions about securing agentic AI.
4 weeks ago
The session examines how identity and access management must evolve as AI agents begin operating more independently inside enterprise environments. The discussion outlines the security challenges created when non human entities make decisions, call APIs or trigger workflows on behalf of users, and explains why traditional IAM models are not built for this level of autonomy.
Attendees will hear how organizations can adapt their identity, delegation and governance strategies to account for agents as first class actors. The webinar also previews emerging capabilities that support agent aware IAM, including demonstrations of early platform features built around Model Content Protocol servers. The content is designed for IAM architects, platform teams and security leaders preparing for the next phase of autonomous systems and looking for clear guidance on securing AI agents today.
1 month ago
We will cover:
How AI agents, MCP/LLM integrations, shadow APIs, multiple gateways, and distributed ownership create API sprawl and weaken visibility and control
Why sprawl expands the risk surface through misconfigurations, context drift, unauthorized access, data leakage, and compliance gaps
How multigateway environments fragment governance, leading to inconsistent policies and uneven developer or partner experiences
Why enterprises need unified, vendor-agnostic control with observability, consistent enforcement, usage limits, cost management, prompt mediation, and context integrity
How to strike the right balance between team autonomy and enterprise-level oversight to scale AI adoption securely
2 months ago
What You’ll Learn
For most leadership teams, the question is no longer if they’ll use AI, but how to turn it into measurable business value. Success hinges on the APIs that feed, govern, and scale AI initiatives — and whether your strategy is built for speed, security, and cost efficiency.
From accelerating product development to delivering real-time customer experiences, the business case for AI is clear. But without the right API strategy, AI initiatives risk falling short — driving up costs, creating compliance gaps, and limiting ROI.
In this executive session, we’ll unpack the business case for AI adoption and show why APIs are the hidden linchpin of success.
Drawing on the latest research, you’ll learn how leading organizations are aligning API strategy with AI ambitions to:
Deliver data and context that drive measurable business outcomes
Avoid hidden risks that drain ROI, from unmanaged API sprawl to runaway consumption
Build an operational foundation that turns AI pilots into scalable, revenue-generating initiatives
3 months ago
Automated pentesting alone isn't enough. Without context—like asset ownership, criticality, network reachability, and exploitability—your findings are incomplete. That’s why we’re combining Agentic pentesting with Escape’s AI-powered ASM (Attack Surface Management), now available publicly for the first time during this session. This powerful combination ensures your findings are actionable and aligned with your actual attack surface.
What attendees can expect to learn:
3 months ago
The event, as highlighted in "Technical Tips for Using Your Static Analysis Toolset," offers valuable insights into optimizing static analysis tools for enhanced cybersecurity. Attendees benefit from expert-led sessions that cover best practices, tool integration, and real-world applications. The conference provides a platform for networking with industry professionals and exchanging innovative ideas. Overall, it is a well-organized event that equips participants with practical knowledge to improve their cybersecurity strategies effectively.
6 months ago
AI is reshaping how software gets built. Developers are now shipping code written (or at least heavily assisted) by tools like GitHub Copilot and ChatGPT-based agents.
The result? A faster development cycle with a whole new category of security risks.
So, how are AppSec teams adapting?
Join us for a live webinar with application security experts and Escape clients - Seth Kirschner (DoubleVerify), Nathan Byrd (Applied Systems), Nick Semyonov (PandaDoc), as they break down how their teams are rethinking testing strategies to keep up with AI-influenced codebases.
You’ll hear real-world insights on:
How AI is changing the way developers write code What new vulnerability patterns are emerging with AI-assisted development Whether we're heading toward an "AI vs. AI" era - where AI-generated code is tested and secured by AI-powered tools How modern AI-powered DAST tools (like Escape) are helping identify and fix real, exploitable risks before they hit production Don't miss this opportunity to learn how your peers are dealing with this shift and ask your questions live!
Whether you’re already running AI-assisted pipelines or preparing for that future, this conversation will show you how to manage evolving risks and put modern DAST at the core of your AppSec strategy.
10 months ago
The API Security Insights for the Connected Vehicle Ecosystem event provided a comprehensive overview of the latest challenges and solutions in securing APIs within the automotive industry. Attendees gained valuable insights from industry experts on best practices for protecting connected vehicles from cyber threats. The event featured engaging discussions on emerging technologies and regulatory requirements, making it an essential gathering for professionals seeking to enhance their understanding of API security in this rapidly evolving field.
11 months ago
The webinar "The Common Security Mistakes Everyone Makes in M&A" provided valuable insights into the often-overlooked cybersecurity risks during mergers and acquisitions. Attendees appreciated the expert panel's practical advice on identifying vulnerabilities and implementing robust security measures. The session highlighted real-world examples, emphasizing the importance of thorough due diligence and post-acquisition integration. Participants left with a clearer understanding of how to protect sensitive data and ensure a secure transition during M&A activities.