Discover Security Events in Application Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
Managing data across multiple systems can create silos that limit visibility and efficiency. This webinar explores how organizations can unify data sources to improve accessibility and collaboration. The session focuses on tools that allow users to visualize complex data relationships, connect external databases using SQL, and build interactive environments for analysis.
Attendees will learn how unified data approaches can support better decision making and reduce operational inefficiencies. The discussion highlights how integrating data sources enables teams to work more effectively across environments. The webinar provides practical insight into building a connected data foundation for analytics and collaboration.
2 weeks from now
Penetration testing continues to evolve as web, mobile, and cloud environments grow more complex. This 60 minute webinar examines common pitfalls and best practices for 2026, along with the legal and regulatory landscape affecting testing activities. The session also addresses risks and benefits of AI driven and automated penetration testing, including testing LLMs and AI powered applications for AI specific vulnerabilities.
Additional topics include the OWASP Top 10 for LLM, accountability for AI related failures, red teaming, continuous breach and attack simulation, and use of the MITRE ATT&CK Matrix. The discussion compares continuous and one time testing, as well as external versus in house penetration testing approaches.
2 weeks from now
Organizations require clear visibility into infrastructure to manage performance, cost, and operational efficiency in cloud environments. This webinar examines how monitoring tools can provide insight into workloads and infrastructure usage. The session focuses on how organizations can optimize resource allocation while maintaining performance across distributed systems.
Attendees will learn how intelligent workload monitoring and infrastructure visibility tools support real time decision making. The discussion covers strategies for improving efficiency, reducing costs, and maintaining control over cloud resources. The webinar provides guidance on managing infrastructure performance while supporting scalable and efficient operations.
1 month from now
Modern systems generate large volumes of operational data, making it difficult for teams to maintain visibility and respond to issues efficiently. This webinar explores how organizations can build an autonomous command center to monitor system health, correlate errors, and streamline incident response. The session focuses on how centralized visibility and intelligent automation improve operational awareness across complex environments.
Attendees will see how real time monitoring, AI assisted health reporting, and personalized dashboards help teams detect and resolve issues more effectively. The discussion also highlights how workflow automation and agentic platforms support faster response and reduced manual effort. The webinar provides insight into improving system reliability
4 days ago
AI is reshaping software development, but increasing complexity across tools, workflows, and security requirements continues to slow delivery. This webinar explores how agentic AI can be integrated across the software development lifecycle to streamline processes while maintaining security and compliance. The session focuses on how automation and orchestration can improve both development speed and security outcomes.
Attendees will learn how AI driven workflows can automate planning, code generation, and review processes while identifying and remediating vulnerabilities. The discussion also covers how integrated platforms enable faster resolution of pipeline issues and improve overall code quality. The webinar provides practical insight into embedding security into AI powered development environments and strengthening software delivery practices.
5 days ago
Managing a 35 million line, multi language monolith presents major security and visibility challenges. This webinar examines how Adyen addressed limited dependency insight within a highly customized build environment. DevSecOps expert Supun Vidana Pathiranage joins JFrog’s Yonatan Arbel to explain the architecture designed to separate dependency resolution from the core build system, enabling scalable visibility and reliable security scanning without disrupting developer workflows.
The session covers architectural patterns for handling dependency visibility in large monorepos, integration of a custom pipeline with JFrog Xray, and the design decisions behind deep software composition analysis. It also reviews the Battlestar framework for actionable scan results and practical shift left AppSec enforcement at the merge request level.
5 days ago
AI is reshaping the software development lifecycle as tools move from assistive features to agentic systems operating across planning, coding, review, and operations. In this Q1 2026 roadmap webinar, GitHub’s chief product officer outlines how GitHub is evolving into a fully AI powered SDLC platform. The session connects recently released capabilities with upcoming investments across GitHub and GitHub Copilot.
Through product walkthroughs, attendees will see how agentic features accelerate workflows, improve quality, and support efficiency at scale. The webinar also explains how governance and security controls are embedded into AI powered processes, giving organizations visibility and confidence as they adopt AI. A live Q&A with the product team is included.
5 days ago
Mobile apps have become a primary channel for banking, shopping, and digital engagement, making them a frequent target for reverse engineering, cloning, fraud, and API abuse. This webinar examines how threats now span the app, device, and backend, creating exposure that can lead to revenue loss, brand damage, regulatory risk, and recurring security incidents.
The session presents a lifecycle based approach to mobile security rather than isolated controls. It covers integrating automated validation into CI CD pipelines, using compiler based polymorphic hardening to resist tampering, and securing API communication with real time, risk based validation. Attendees will gain a clearer view of how to strengthen app resilience and protect backend systems.
1 week ago
Teams using GitHub Copilot often struggle to decide when to use instructions, prompts, custom agents, or skills. This webinar provides a practical walkthrough of how these customization options work and how to choose the right approach based on how your team builds software.
The session breaks down each customization method, explains where it fits best, and uses real examples to show how Copilot can be aligned with team standards, architecture, and preferred development patterns. Live demos illustrate how thoughtful customization leads to more consistent output, less rework, and smoother day to day development workflows.
1 week ago
Managing software risk in the AI era has become increasingly difficult as the speed of AI driven development outpaces human capacity to manage security exposure. This webinar introduces Cycode Maestro, presented by Cycode Field CTO Jimmy Xu, and explains how agentic security can expand the capabilities of product security teams by combining context intelligence, AI skills, and coordinated agent workflows within the software development lifecycle.
The session demonstrates how Maestro uses the Context Intelligence Graph to analyze violations and assess risk posture while coordinating multi agent workflows that address security issues. It also explores use cases such as exposure analysis, risk prioritization, and AI driven remediation, while showing how AI usage can support faster MTTR and improved SLA compliance.
1 week ago
AI driven applications introduce new challenges in monitoring, visibility, and compliance, especially as systems scale across regions. This webinar explores how organizations can improve oversight of AI applications by addressing gaps in monitoring and eliminating fragmented logging practices. The session focuses on how unified visibility helps teams better understand system behavior and maintain control over distributed environments.
Attendees will see demonstrations of AI application monitoring and compliant log visibility across regions. The discussion highlights how removing log silos enables better detection of anomalies, improves observability, and supports compliance requirements. The webinar provides insight into strengthening operational and security awareness for AI driven systems.
1 week ago
Supply chain attacks through malicious open source packages are becoming a major risk for modern applications. This webinar focuses on how Chainguard Libraries helps teams reduce that risk by using rebuilt from source dependencies designed to prevent malware by default, with signed provenance, SBOMs, and remediated CVEs.
The session walks through real world engineering workflows, showing how to update existing dependencies to trusted sources and how Chainguard Libraries for Python addresses critical and high severity vulnerabilities. Attendees will see practical examples of securing application supply chains and gain a clearer understanding of how verified libraries improve both security and reliability.