Discover Security Events in Application Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
Security teams face their highest risk during cloud migrations, when rapid changes can introduce hidden misconfigurations and policy gaps. This webinar focuses on securing Azure migrations by treating governance, visibility, and control as core security requirements rather than post migration cleanup tasks. Using Microsoft’s Cloud Adoption Framework, the session shows how security and governance tracks run in parallel with application migration to reduce exposure during high change windows.
The discussion highlights how observability supports security outcomes, including maintaining audit ready visibility, enforcing governance guardrails, and detecting issues early through metrics, logs, and traces. Attendees will see how Datadog helps teams maintain control over identity, access, architecture visibility, and cost signals while migrating workloads to Azure, ensuring new environments remain compliant, monitored, and secure from day one.
1 day from now
AI assisted development is changing how application security teams evaluate code and risk. This webinar features James Berthoty of Latio and Jeff Williams, Creator of the OWASP Top 10 and Founder of Contrast Security, discussing the security implications of Claude Code and AI driven SAST. The conversation examines what AI native scanning can realistically deliver today and how it fits into modern AppSec programs.
Speakers will address the strengths and limits of AI SAST, the challenges of pipeline only reviews, and the continued importance of governance and state management. The session also explores function level reachability, runtime visibility, and findings from the 2026 Application Security Market Report, with a focus on exploitability and protection.
1 day from now
Software supply chain security has become a frontline concern as AI accelerates software development. This webinar examines how growing complexity across development lifecycles is expanding risk and challenging CISOs to balance speed with strong security standards. Veracode product leaders Ajay Nigam and Tim Jarrett join GigaOm Field CTO Chris Ray for a data driven discussion on the evolving application security landscape and the rising importance of supply chain security.
Speakers will address how AI reshapes the attack surface, what it means for supply chain strategy, and the steps security teams should take to reduce risk and support compliance. The session also reviews insights from the GigaOm Radar Report for Software Supply Chain Security, including its evaluation approach and market analysis.
1 day from now
Container environments are becoming a core component of AI deployments, but scaling containerized infrastructure often introduces security challenges. Fragmented security scans can generate large volumes of alerts without enough context to guide action. This webinar explores how organizations can modernize container security to support AI workloads while reducing operational complexity.
The session examines how continuous, automated container scanning can improve visibility and reduce blind spots across container registries. Speakers will discuss methods for consolidating fragmented security assessments into a unified view of container images across the software ecosystem. Attendees will also learn how runtime context can support more effective prioritization of security efforts, helping teams focus on the most critical risks while maintaining a developer friendly workflow.
2 days from now
Application security automation takes center stage in this interactive session focused on protecting web, mobile and API environments in 2026. The webinar examines how AI is influencing modern development, including the risks introduced by automated coding and new vulnerabilities linked to rapid application creation. It also reviews common security weaknesses behind data breaches and highlights the relevance of the OWASP Top 10 for large language models in today’s threat landscape.
The discussion moves into practical implementation, covering how to build a risk based application security testing program and integrate automated scanning into CI CD pipelines. Attendees will see how mobile, web and API security testing can be streamlined using specialized tools, along with how AI can enhance detection and testing efficiency. This session is designed for security and development teams looking to strengthen application defenses through automation.
1 week from now
Supply chain attacks through malicious open source packages are becoming a major risk for modern applications. This webinar focuses on how Chainguard Libraries helps teams reduce that risk by using rebuilt from source dependencies designed to prevent malware by default, with signed provenance, SBOMs, and remediated CVEs.
The session walks through real world engineering workflows, showing how to update existing dependencies to trusted sources and how Chainguard Libraries for Python addresses critical and high severity vulnerabilities. Attendees will see practical examples of securing application supply chains and gain a clearer understanding of how verified libraries improve both security and reliability.
1 week from now
Children’s privacy regulations in the United States are evolving rapidly as federal and state authorities introduce new compliance requirements. With the updated Children’s Online Privacy Protection Act (COPPA) rule approaching its April 2026 compliance deadline and additional state privacy laws emerging, organizations must reassess how they collect, manage, and protect children’s data. This webinar provides an overview of the latest regulatory developments affecting children’s privacy.
The session explores the implications of the new COPPA rule and the growing number of state level privacy regulations. Speakers will discuss key compliance expectations, enforcement trends, and how these regulatory changes affect organizations that handle children’s data. Attendees will gain practical insight into preparing their privacy programs to meet upcoming requirements while reducing regulatory and operational risk.
1 month from now
Penetration testing continues to evolve as web, mobile, and cloud environments grow more complex. This 60 minute webinar examines common pitfalls and best practices for 2026, along with the legal and regulatory landscape affecting testing activities. The session also addresses risks and benefits of AI driven and automated penetration testing, including testing LLMs and AI powered applications for AI specific vulnerabilities.
Additional topics include the OWASP Top 10 for LLM, accountability for AI related failures, red teaming, continuous breach and attack simulation, and use of the MITRE ATT&CK Matrix. The discussion compares continuous and one time testing, as well as external versus in house penetration testing approaches.
3 days ago
APIs have become essential infrastructure connecting modern systems, especially as AI applications interact with external services. This webinar explores how APIs enable AI to operate beyond isolated systems while introducing new security risks. Dr Katie Paxton-Fear examines why APIs present unique vulnerabilities and how attackers take advantage of weaknesses such as broken object level authorization, excessive data exposure, workflow manipulation, and agent overreach.
The session focuses on API hacking as a distinct security discipline in the AI era. Attendees will gain insight into the types of vulnerabilities attackers commonly target, how AI driven workflows can increase the impact of API abuse, and practical approaches for testing and securing APIs in modern environments.
4 days ago
Regulatory enforcement and litigation are intensifying around website and app privacy practices. This webinar examines recent actions, including the largest CCPA fine issued to Disney for sharing data after web opt outs and failing to honor account level opt outs, as well as Kaiser Permanente’s $46 million CIPA settlement related to data sharing from its digital platforms. These cases highlight rising expectations for compliance and user level privacy controls.
Privacy consultant Lindsay Hohler and Privado AI discuss how organizations can take a proactive approach to web and app privacy governance. The session focuses on reducing exposure under CCPA and other privacy laws before enforcement or litigation occurs.
4 days ago
Cloud native development requires a secure and efficient path from code to production. As organizations scale, complexity in CI CD integrations, artifact management, Kubernetes authentication, and security remediation can slow delivery. This webinar addresses these operational bottlenecks and outlines practical approaches to improving velocity without compromising security.
Topics include GitHub focused CI CD integrations with JFrog SaaS, managing artifact promotion across complex pipelines, and automated remediation using JFrog’s MCP Server and Catalog APIs. The session also covers open source curation strategies to protect software supply chains while supporting developer productivity, along with guidance on strengthening Kubernetes security and DevSecOps practices.
5 days ago
Threat modeling practices change significantly as organizations grow, and this webinar focuses on how security teams can adapt as they scale from startup to enterprise. The session examines how mature teams keep security built into design decisions while maintaining consistency across expanding systems and teams.
The discussion covers common challenges such as fragmented processes, uneven risk coverage, and duplicated or missing controls. Attendees will see how the right balance of services, tools, and best practices supports scalable and sustainable threat modeling programs, helping security evolve in step with business growth.