Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 hours ago
Identity related breaches are increasingly driven by machine identities and secrets as cloud scale, automation and AI agents expand across enterprise environments. This session focuses on the growing risk created by non human identities, where secret sprawl makes remediation slow, complex and difficult to manage. It explains why detection alone no longer solves the problem and why many organizations struggle to contain exposure once credentials are leaked.
The discussion walks through the full lifecycle of non human identity management, from provisioning through remediation, and highlights where most teams break down. Attendees will gain clarity on why leaked credentials are so hard to fix at scale and how replacing static secrets with dynamic, ephemeral identities can reduce risk and support a move toward a more secure, secretless approach in the AI era.
4 days from now
This episode brings together leaders from the blockchain ecosystem to examine how decentralized networks approach institutional engagement, governance, and long term financial sustainability. The discussion looks at how blockchain native systems manage treasuries, allocate capital, and design on chain governance models that support growth and resilience at scale.
The conversation also highlights common gaps between decentralized protocol design and traditional institutional expectations. Speakers explore how Polkadot is preparing for broader institutional participation, what on chain governance means for large scale decision making, and what future digital asset infrastructure must deliver to support secure and sustainable adoption. The session offers practical insight for organizations evaluating decentralized technologies from both a governance and risk perspective.
4 days from now
Embedded system security is entering a new phase as quantum computing advances and long lifecycle designs face growing cryptographic risk. This webinar focuses on post quantum security challenges and explains why traditional cryptography is no longer enough for protecting modern embedded environments. The discussion covers the need for crypto agility and strong hardware based security to address emerging threats.
The session highlights how PQShield and Microchip’s PolarFire SoC FPGA technologies approach post quantum protection through hardware and software co design. Attendees will gain insight into defending against risks such as side channel attacks and learn practical ways to prepare embedded systems for a post quantum future while maintaining performance and resilience.
5 days from now
Security and product leaders come together in this webinar to examine what cyber resilience will really mean for enterprises in 2026. The discussion focuses on the forces reshaping recovery and response strategies, including AI powered threats, changing executive expectations and the growing pressure to recover faster from disruptive incidents. The panel shares data driven predictions that help organizations understand where resilience gaps are forming and what will separate prepared enterprises from the rest.
Attendees will gain practical guidance on how to prioritize cyber investments for faster response and recovery, prepare for agentic AI driven attacks and strengthen resilience across sovereign cloud, hybrid environments and global operations. The session is designed for teams looking to align strategy, budget and execution around a more resilient security posture for the year ahead.
6 days from now
Nightfall introduces a new approach to data loss prevention designed for modern threats that traditional DLP tools can no longer handle. This webinar focuses on how AI native detection adapts automatically to shadow AI usage, insider risk and expanding data exfiltration paths that often go unseen.
The session explains how Nightfall provides full visibility across endpoints, developer tools and cloud workflows, while capturing detailed forensic data for fast investigation. Attendees will see how shadow AI discovery supports safe GenAI adoption without blocking productivity and how comprehensive coverage helps organizations regain control of sensitive data movement.
1 week from now
This webinar examines how MSPs can scale endpoint and Microsoft 365 service delivery by combining automation, AI and integrated cybersecurity. Acronis experts and industry leaders outline how platformization is shaping the next stage of MSP growth and why AI driven workflows are becoming essential for improving margins and simplifying day to day operations. The discussion highlights practical ways AI reduces repetitive tasks, strengthens protection and improves overall service delivery from a single platform.
Attendees will see how a unified Microsoft 365 solution supports higher efficiency, hear examples of real world performance gains and understand how autonomous cybersecurity is emerging as a key advantage for modern MSPs. The session also explains how MSPs can advance toward MSP 3.0 maturity through automation, native integration and faster resolution times powered by AI.
1 week from now
A practical look at how enterprises can scale passwordless authentication without adding operational burden. This session focuses on managing FIDO hardware security keys across large and regulated environments, where onboarding, policy enforcement, recovery, and audit requirements often slow adoption. Thales and Microsoft present their joint solution that connects Thales Authenticator Lifecycle Manager with Microsoft Entra ID to simplify the full FIDO authenticator lifecycle.
The discussion covers how IT teams can centralize control, automate onboarding through pre registration, enforce consistent security policies, and quickly revoke or unblock authenticators while maintaining full audit visibility. Security leaders will see how this approach reduces overhead, improves governance, and supports long term passwordless strategies at enterprise scale. The webinar is aimed at organizations looking to remove friction from passwordless rollouts and gain end to end control over phishing resistant authentication.
2 months from now
Ensure manufacturing operations remain resilient by addressing the most common causes of factory floor downtime and recovery delays. This on demand demo focuses on operational technology environments and explains how backup and recovery strategies help maintain uptime across critical production systems. The session looks at current OT challenges and why fast, reliable recovery is essential for continuous manufacturing.
The webinar shows how organizations can simplify and automate backups, reduce recovery time objectives, and restore PCs that run SCADA, HMI, historians, and DCS with minimal disruption. It also highlights how non IT factory staff can safely perform recoveries when needed. The discussion connects downtime risks to real world threats such as ransomware, limited on site IT support, and aging systems, making it especially relevant for teams responsible for OT resilience and operational continuity.
3 weeks ago
This webinar highlights how professionals at every stage of their career can grow and succeed in the rapidly expanding cybersecurity field. Melissa Rappl, CISO at Children’s Nebraska, and Matt Radolec, VP of Incident Response at Varonis, share guidance on developing the skills and mindset needed to advance, whether someone is new to the industry or working toward leadership roles. The session focuses on how the talent landscape is shifting and what opportunities are emerging as cybersecurity continues to evolve.
Attendees will gain practical insights on navigating career growth, understanding modern expectations in security teams and positioning themselves for long term success. The discussion also offers encouragement for those entering the field and direction for experienced professionals aiming to take the next step.
3 weeks ago
Rubrik is hosting a technical deep-dive on Isolated Recovery Environments and how to achieve the fastest possible cyber RTO through automated orchestration and strategic architecture. If you're finalizing 2025 disaster recovery plans or evaluating ways to improve your recovery posture, this session on December 10th at noon is designed exactly for that.
You'll see a live demo of the platform, learn about IRE architecture options including partnerships with Rackspace and Iron Mountain, and walk away with actionable insights. Plus, they're sending all attendees a $50 UberEats card as a holiday thank you, and anyone who books a follow-up meeting gets a $150 gift card for holiday shopping.
3 weeks ago
The webinar examines the identity security threats expected to shape 2026 and outlines the attack vectors that matter most for security teams. Speakers from Akeyless and KuppingerCole Analysts break down how AI, automation and new offensive techniques are accelerating attacks on both human and non human identities. The session also highlights how secrets sprawl and unmanaged machine identities are expanding the internal attack surface across modern enterprises.
Security leaders will get a clear view of the trends that will influence identity programs in the coming year, including the rise of AI driven threats and the growing pressure to secure machine level access. The discussion provides guidance on the risks that require urgent attention and the areas where organizations need to strengthen their defenses before 2026.
3 weeks ago
This episode focuses on the growing impact of the React2Shell zero click remote code execution vulnerability and why it is turning into one of the most serious security events of the year. The session explains how threat groups are weaponizing the flaw, why emergency patches have created operational challenges and what security teams need to prioritize to stay protected.
Matt Radolec and David Gibson also examine the Shai hulud 2.0 attacks targeting cloud infrastructure and review the factors behind the largest recorded DDoS campaign. The discussion gives defenders a clear picture of how these threats are evolving and what steps can reduce risk across modern environments.