Discover Security Events in Application Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
12 hours ago
AI generated code is changing application security faster than traditional tools can keep up. This webinar focuses on how Semgrep is rebuilding AppSec for an era where large volumes of code are written by AI and no longer reviewed line by line by humans.
The session introduces a multimodal AppSec engine that combines deterministic analysis with LLM reasoning to improve vulnerability detection while eliminating false positives. Attendees will see how deeper context awareness uncovers issues legacy SAST tools miss and how security systems can evolve faster than the models producing modern code.
12 hours ago
Real world security review breaks down when AI generated code moves faster than traditional checks can handle. This webinar walks through how teams shipping AI assisted code in production review pull requests at scale and catch security issues that automated pattern based tools often miss. Using real examples, the session shows how agent generated changes introduce logic, authorization, and multi tenant risks that require deeper context to evaluate.
The discussion includes live pull request reviews, highlighting flaws that initially slipped through and explaining how contextual security analysis exposed them. Attendees will see real cases involving privilege escalation, tenant boundary violations, and credential exposure, along with practical insight into reviewing AI generated code with confidence in fast moving engineering environments.
11 hours from now
n8n’s move to Docker Hardened Images highlights how strengthening the base layer of the software supply chain can significantly reduce security risk. This webinar focuses on why n8n adopted Docker DHI to lower its attack surface, improve provenance, and deliver secure by default automation for customers running sensitive workloads.
The session explains how Docker Hardened Images provide a low CVE foundation with continuous patching and verified builds, and why that matters for AI driven automation platforms operating inside customer environments. Attendees will see how migrating to DHI simplified n8n’s maintenance process while improving security assurances across all self hosted deployments.
11 hours from now
Security and development teams are facing a growing gap between innovation speed and software risk, driven by rising security debt, high risk vulnerabilities, and the expanding impact of AI. This webinar examines key findings from the 2026 State of Software Security Report and explains why many organizations are struggling to keep up as flaws accumulate faster than they can be fixed.
The session breaks down the major trends shaping software security today, including remediation challenges, third party code exposure, and how AI is both increasing risk and reshaping defenses. Attendees will gain data driven insight into how security debt is evolving and what practical strategies can help teams strengthen software security without slowing development.
11 hours from now
A practical look at how threat modeling is applied in real environments, this webinar follows Synchronoss’s journey toward building and maintaining secure by design systems. The session explains why threat modeling matters, how it has been adopted over time, and how it supports consistent security decisions across complex architectures.
The discussion focuses on real challenges teams face as they scale, including maintaining consistency, managing architectural complexity, and improving workflows. Attendees will hear lessons learned, honest insights, and actionable guidance for strengthening and expanding threat modeling practices within growing organizations.
5 days from now
Modern application security is moving beyond chat based AI toward autonomous systems that can act at machine speed. This webinar focuses on how context intelligence and AI orchestration work together to create a self protecting software development lifecycle that can keep up with zero day threats and supply chain attacks.
The session explains how agentic security platforms use context intelligence to understand why decisions are made and AI orchestration to execute actions automatically across the SDLC. Attendees will see how organizations can identify shadow AI, prioritize real risks based on business context, and automate remediation while maintaining visibility and control. The discussion shows how security teams can transition from manual, human speed processes to an orchestrated and autonomous approach built for modern development environments.
1 week from now
Organizations are weighing whether consolidated web application security platforms can adequately protect the client side or if specialized tools offer stronger risk reduction and compliance. This webinar focuses on the tradeoffs between platform based approaches and dedicated client side protection as web threats continue to evolve.
The discussion draws on Forrester research and real world perspectives to explain why many enterprises turn to specialized client side security to address regulatory pressure, protect customer data, and maintain trust. Attendees will gain clarity on when consolidation makes sense and when best of breed solutions deliver greater security value.
1 week from now
Threat modeling practices change significantly as organizations grow, and this webinar focuses on how security teams can adapt as they scale from startup to enterprise. The session examines how mature teams keep security built into design decisions while maintaining consistency across expanding systems and teams.
The discussion covers common challenges such as fragmented processes, uneven risk coverage, and duplicated or missing controls. Attendees will see how the right balance of services, tools, and best practices supports scalable and sustainable threat modeling programs, helping security evolve in step with business growth.
3 weeks from now
Application security automation takes center stage in this interactive session focused on protecting web, mobile and API environments in 2026. The webinar examines how AI is influencing modern development, including the risks introduced by automated coding and new vulnerabilities linked to rapid application creation. It also reviews common security weaknesses behind data breaches and highlights the relevance of the OWASP Top 10 for large language models in today’s threat landscape.
The discussion moves into practical implementation, covering how to build a risk based application security testing program and integrate automated scanning into CI CD pipelines. Attendees will see how mobile, web and API security testing can be streamlined using specialized tools, along with how AI can enhance detection and testing efficiency. This session is designed for security and development teams looking to strengthen application defenses through automation.
1 day ago
Mobile finance security often fails when rigid controls hurt user experience and still leave real risk unaddressed. This webinar focuses on why one size fits all enforcement creates a cycle of blocked users, relaxed policies, and growing exposure, and how financial services teams are moving toward risk based mobile app security instead. The discussion centers on using real signals and data to distinguish between different threat types and respond proportionally.
The session covers how teams can analyze large datasets to identify suspicious patterns, automate appropriate actions, and protect applications without punishing legitimate users. It also looks at practical defenses such as obfuscation, runtime protection, device binding, attestation, and ongoing threat monitoring. The webinar concludes with guidance on shifting from reactive incident handling to continuous visibility and adaptive enforcement as mobile threats continue to evolve.
6 days ago
Selecting the right Dark Web monitoring and Continuous Threat Exposure Management vendor in 2026 requires a clear understanding of evolving risks, regulatory pressure and AI driven threats. This webinar breaks down what organizations should look for when evaluating CTEM solutions, including coverage of attack surface management, third party risk, data sovereignty and automated security testing. It also examines how Dark Web monitoring supports breach prevention and how modern platforms address ransomware, phishing takedowns and cyber insurance challenges.
The session covers emerging risks tied to AI technologies and large language models, including the relevance of the OWASP Top 10 for LLMs in exposure management strategies. Attendees will gain practical guidance on reducing risk, controlling costs and aligning CTEM programs with regulatory expectations in 2026. The interactive format provides actionable insight for security leaders, risk teams and decision makers assessing vendors in a rapidly shifting threat landscape.
6 days ago
This webinar examines how dark web monitoring and continuous threat exposure management will evolve in 2026 as AI driven threats become more common. The session breaks down emerging risks tied to AI technologies, attack surface management strategies and security challenges in multi cloud environments. Speakers also address phishing takedowns, ransomware response and the role of cyber insurance.
Attendees will gain insight into preventing data breaches through dark web monitoring, responding to GenAI driven attacks and improving detection and response capabilities. The discussion provides practical guidance for security teams looking to manage exposure, reduce risk and strengthen defenses against modern cyber threats.