Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
21 hours ago
Healthcare phone systems have become a prime target for cybercriminals, putting patients, staff, and sensitive data at risk. This webinar focuses on how voice based attacks such as vishing, spoofed calls, robocalls, and AI generated impersonations are being used to reach patients directly and disrupt care inside hospitals and healthcare systems.
The session explains why patient facing phone systems remain under protected and how attackers exploit trust within clinical environments. Attendees will gain insight into how these threats affect patient safety, care delivery, and operational resilience, and why securing voice communications is now a critical part of healthcare cybersecurity and risk management.
2 hours from now
Security teams gain a clearer defensive advantage when fragmented data environments are consolidated into a unified cloud platform. This webinar centers on modernizing enterprise data with Google Cloud BigQuery and Informatica, showing how consolidation reduces complexity while creating stronger foundations for governance, visibility, and control. By unifying data storage, integration, and management, organizations can better understand where sensitive data lives and how it moves across systems.
The discussion highlights how centralized data architectures support stronger oversight through consistent governance, metadata management, and automation. Attendees will see how AI ready data pipelines and scalable analytics make it easier to detect unusual behavior, enforce policies, and reduce hidden risk created by siloed tools. The session is designed for teams looking to modernize their data estate in a way that also strengthens security posture and long term resilience.
1 day from now
An interactive tabletop exercise simulating a full scale Microsoft 365 breach that begins with identity provider compromise and escalates into a ransomware crisis. The webinar walks through how modern attackers exploit legitimate identity access rather than breaking in, showing how a single suspicious login can quickly turn into data exfiltration, lateral movement and on premises impact inside a fictional enterprise.
Guided by expert hosts, the session examines the critical decision points teams face during an identity driven incident, from detection through response and recovery. Attendees will see how attackers abuse identity platform functionality to bypass defenses, where incident response efforts often fail and how organizations can manage the legal, operational and reputational fallout of a confirmed breach. The discussion also covers how to prepare for recovery when identity and data infrastructure can no longer be trusted.
1 day from now
Strengthen crypto treasury operations by reducing manual processes, minimizing operational risk and enforcing tighter internal controls. This session focuses on how to streamline internal crypto flows using Fireblocks, covering automation of deposits, hot to cold wallet rebalancing, transfers and reconciliation. It addresses common inefficiencies caused by fragmented systems and highlights practical ways to simplify treasury management while maintaining strong oversight.
The discussion walks through policy based automation designed to reduce human error and prevent fraud, while improving governance and scalability. Attendees will see how enterprise grade wallet infrastructure supports secure asset management in one place and gain visibility across treasury accounts for smoother auditing. A live demonstration will show how automation enhances security, enforces governance and supports efficient growth.
1 day from now
Securing Nutanix infrastructure is only part of the resilience equation, and identity platforms like Microsoft Entra ID and Okta can become a single point of failure if they are not protected. This customer focused session explains how to extend existing HYCU protection beyond infrastructure to cover identity systems, ensuring continued access and control during outages, cyber incidents or recovery operations.
The discussion highlights where gaps in Entra ID and Okta coverage can expose environments to risk and why maintaining identity availability is essential for successful recovery. Attendees will also see how HYCU R Graph provides visibility into identity related risks, helping teams identify unprotected workloads and close protection gaps before they impact operations.
1 day from now
This hands on training session focuses on using Virtru for Microsoft Outlook 365 to secure sensitive email communications. The webinar walks through core encryption features and advanced security controls that support compliant messaging while keeping daily workflows efficient. It is designed to help users confidently apply protection measures without slowing down productivity.
The session covers message controls such as expiration, access revocation, and forwarding restrictions, along with practical tips for day to day use. Attendees will see live demonstrations of key features and take part in a Q and A to address real use cases. The training is intended for Outlook 365 users who want to strengthen their ability to protect data and manage secure communications effectively.
1 week from now
Recovery speed alone is no longer enough when ransomware strikes, and this webinar focuses on what real cyber resilience looks like after an attack. The session walks through the critical moments following a ransomware incident, showing how organizations can contain threats, validate clean data, meet compliance requirements, and restore operations without delay. Acronis experts explain why fast RPO, RTO, and reduced mean time to clean recovery directly affect business continuity and risk.
The discussion highlights how integrated backup, security, and disaster recovery work together to support verified recovery rather than simple data restoration. Attendees will see practical scenarios based on real customer experiences and learn how resilient recovery strategies reduce downtime, support audits, and protect productivity after major disruptions.
1 week from now
Governance programs often stall after identifying risk, struggling with manual processes that cannot keep pace with growing data volumes. This session focuses on how to operate governance as a scalable, automated system across petabyte scale environments. It highlights workflow driven policy creation, improved ownership management and more precise exposure controls at the folder level.
The discussion also covers customizable compliance dashboards and multilingual PII extraction to reduce blind spots in global environments. Attendees will see how these capabilities streamline audits, strengthen oversight and help organizations move from reactive risk identification to continuous, operationalized governance.
1 week from now
AI driven threats are starting to bypass traditional security controls by abusing context, permissions, and intent inside trusted systems. This webinar focuses on how these subtle attacks operate without obvious indicators and why small configuration gaps can quickly turn into major security risks for enterprises.
Varonis Threat Labs experts break down the AI attack techniques already appearing in real environments and explain how security teams can detect and contain them before damage occurs. The session outlines what CISOs and defenders need to change in their approach to stay ahead as AI continues to reshape the threat landscape.
3 weeks from now
Ensure manufacturing operations remain resilient by addressing the most common causes of factory floor downtime and recovery delays. This on demand demo focuses on operational technology environments and explains how backup and recovery strategies help maintain uptime across critical production systems. The session looks at current OT challenges and why fast, reliable recovery is essential for continuous manufacturing.
The webinar shows how organizations can simplify and automate backups, reduce recovery time objectives, and restore PCs that run SCADA, HMI, historians, and DCS with minimal disruption. It also highlights how non IT factory staff can safely perform recoveries when needed. The discussion connects downtime risks to real world threats such as ransomware, limited on site IT support, and aging systems, making it especially relevant for teams responsible for OT resilience and operational continuity.
4 days ago
OpenClaw and Moltbook are reshaping the cyber risk landscape as AI agents spread rapidly across enterprise environments without clear oversight or controls. This session examines how an open source AI agent gained massive adoption in a short period of time and why its integration into critical systems is creating new forms of shadow IT. The discussion highlights how enthusiasm for AI driven tools is introducing security gaps that many organizations are not prepared to manage.
The episode also explores how AI agents interacting at scale on emerging platforms are expanding the attack surface, including the risk of prompt injection and hidden manipulation. Security leaders break down why this moment represents a turning point in AI adoption and what it means for governance, monitoring and defensive strategy moving forward.
5 days ago
A realistic walkthrough of a cloud ransomware attack shows how quickly a single incident can escalate from early warning signs to full scale business disruption. This webinar follows a fictional global retailer as it faces a ransomware attack impacting its AWS environment, highlighting the critical moments security teams encounter from initial detection through recovery decisions.
The session moves step by step through alert investigation, impact assessment and the challenges of recovery when backups are compromised. As the situation worsens, the discussion covers operational pressure, public exposure and the difficult choice between paying attackers or rebuilding systems. Expert commentary throughout the scenario provides practical insight into how organizations can better prepare for and respond to cloud based ransomware incidents.