Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
12 hours ago
Cloud resilience is no longer just about uptime, especially when attackers are actively targeting recovery capabilities. This session introduces the Cloud Cyber Resilience Maturity Model, a structured framework that helps IT leaders evaluate how prepared their organization truly is for modern cloud based threats. The discussion challenges the common assumption that operational durability equals cyber resilience and explains why even organizations with air gapped backups can still face extended downtime after an attack.
The webinar walks through the four levels of cloud resilience, from basic compliance to automated recovery. It also examines the growing trend of attackers disrupting recovery processes and the risks behind relying solely on immutable backups without validating data integrity. Attendees will gain practical insight into moving from reactive incident response toward a more proactive, predictable recovery strategy.
12 hours ago
Sovereignty, security and operational simplicity are becoming critical priorities as hybrid cloud environments expand. This session examines how organizations can protect data, meet regulatory requirements and maintain control without adding unnecessary complexity. Experts from HYCU, Nutanix and OVHcloud outline practical approaches to strengthening security posture while keeping data residency and governance requirements firmly in place.
The discussion covers how to align hybrid environments with frameworks such as DORA, NIS2 and NIST, and how to reduce backup sprawl while maintaining resilience across cloud and on premises workloads. Real world examples illustrate how teams balance modernization with compliance and control. Attendees will gain clear guidance on building compliant, secure and scalable protection strategies across evolving hybrid infrastructures.
12 hours ago
Examine how qualified custody for digital assets is built on advanced cybersecurity controls designed to protect institutional funds at scale. This session walks through Fireblocks Trust and explains how private key management, multi party computation and cryptographic controls remove single points of failure that attackers typically target. The discussion highlights how custody architecture is structured to reduce exposure while maintaining operational flexibility.
The walkthrough also addresses how modern attack vectors are mitigated through governance policies, hardware backed security controls and strict approval workflows that limit insider and external threats. Attendees will gain insight into how regulated custody frameworks enforce penetration testing, audit standards and asset segregation, along with the reporting and oversight mechanisms that support accountability and incident response in high value digital environments.
11 hours from now
Databases remain critical to business operations, yet many organizations still depend on legacy tools for database activity monitoring that require heavy upkeep and deliver limited reporting value. This webinar introduces a modern approach to replacing outdated DAM solutions with a SaaS first model designed to improve visibility and reduce operational burden.
During the live demo, Terry Ray will demonstrate how Varonis modernizes database activity monitoring to provide stronger security outcomes without the complexity of legacy systems. The session focuses on practical improvements in monitoring and reporting, helping organizations move toward more effective and streamlined database protection.
11 hours from now
Enterprise finance teams are facing growing data risk as AI driven modernization accelerates across IT environments. This webinar focuses on why data sanitization is often overlooked during refresh cycles, migrations, and decommissioning, and how those gaps create exposure as AI environments become more distributed and data intensive. The discussion centers on securing sensitive data throughout the IT asset lifecycle while maintaining control during rapid change.
Blancco and IBM share practical guidance on how modern data sanitization supports enterprise AI initiatives and strengthens governance as adoption scales. The session connects sanitization practices to lifecycle management and explains how verifiable data protection helps organizations reduce risk, protect end of life assets, and move forward with greater confidence in AI driven environments.
11 hours from now
Ensure manufacturing operations remain resilient by addressing the most common causes of factory floor downtime and recovery delays. This on demand demo focuses on operational technology environments and explains how backup and recovery strategies help maintain uptime across critical production systems. The session looks at current OT challenges and why fast, reliable recovery is essential for continuous manufacturing.
The webinar shows how organizations can simplify and automate backups, reduce recovery time objectives, and restore PCs that run SCADA, HMI, historians, and DCS with minimal disruption. It also highlights how non IT factory staff can safely perform recoveries when needed. The discussion connects downtime risks to real world threats such as ransomware, limited on site IT support, and aging systems, making it especially relevant for teams responsible for OT resilience and operational continuity.
1 week from now
AI is transforming retail operations, and this webinar explores how retailers are using real time Customer 360 data to power agentic commerce at scale. The session highlights how unified customer, commerce and media data creates an AI ready foundation that supports personalization, retail media optimization and smarter enterprise decisions. Insights drawn from industry research and NRF discussions will show how leading brands are moving beyond experimentation toward measurable AI driven growth.
The discussion also addresses what it takes to operationalize AI responsibly in production environments. Speakers will outline how fragmented data can be consolidated, how AI can be embedded across end to end retail workflows and how organizations can transition from isolated pilots to governed, scalable AI platforms that deliver sustained business impact.
1 week from now
Many enterprises rely on HashiCorp Vault, yet governance can become fragmented across teams and environments. This webinar demonstrates how Akeyless Multi Vault Governance adds centralized RBAC, audit logging, and visibility to an existing Vault deployment without requiring secret migration or changes to application workflows. The session focuses on how platform and security teams can strengthen governance while allowing existing Vault operations to continue.
The live demo presents how organizations can enforce consistent access control, gain real time audit coverage, and address governance gaps across environments. It also introduces the two integration models behind Akeyless Multi Vault Governance, Universal Secret Connector for Akeyless native workflows and HashiCorp Vault Proxy for teams that need the Vault API to remain unchanged.
5 days ago
Modern incident response is being tested as attackers move faster and use generative AI to exploit blind spots across enterprise environments. This session brings together experts from Cohesity CERT and Palo Alto Networks Unit 42 to examine how today’s threat actors compress attack timelines and increase the impact of breaches within minutes. The discussion focuses on what is really happening on the front lines of cyber incidents.
Speakers will outline how attackers evade detection, how response teams can modernize their tools and processes, and how coordinated efforts improve recovery outcomes. Real world lessons from joint response engagements will highlight proven playbooks, faster containment strategies and approaches to clean data restoration. Attendees will gain practical insight into strengthening incident response against rapidly evolving threats.
5 days ago
Stablecoins are reshaping financial infrastructure, challenging traditional control models built around intermediated systems. This webinar examines how the Three Lines of Defense, business ownership, risk oversight, and independent audit, must evolve for onchain finance. As transactions execute instantly and governance changes can directly impact supply, institutions must adapt controls to operate closer to execution and maintain continuous oversight.
Experts from Reserve, Reown, Wave Digital Assets, and Hypernative discuss institutional scale stablecoin operations across protocol integrity, transaction controls, governance design, and ecosystem risk management. The session outlines a practical security playbook for managing programmable risk, cross chain exposure, and treasury oversight in production stablecoin environments.
5 days ago
Managing and securing Microsoft 365 requires clear visibility and coordinated controls. This webinar examines Microsoft’s Agent365 native capabilities alongside AvePoint’s AgentPulse, focusing on how the two solutions compare and where they complement each other. Jared Matfess, AI Solution Architect at AvePoint, and Anna Bordioug, Data Security Consultant at Protiviti, provide insights into securing an agentic workforce.
The session highlights where native Microsoft 365 controls are effective and where gaps may appear, as well as how AgentPulse strengthens visibility, policy enforcement, and proactive risk reduction. Attendees will also explore governance strategies that scale, methods to reduce manual effort, and approaches to align IT operations with executive risk priorities.
1 week ago
A practical look at modernizing PowerCenter workloads to support cloud scale, AI use cases, and stronger control over enterprise data environments. This webinar walks through how organizations are moving from PowerCenter to Informatica Intelligent Data Management Cloud using a structured, low risk approach that supports analytics, machine learning, and GenAI while maintaining visibility and governance across data pipelines.
The session shares proven methods from Informatica and LTIMindtree for executing modernization efficiently, reducing migration complexity, and controlling cost and operational risk. Attendees will see how cloud native capabilities enable more secure and scalable data operations and will view a live demo of PowerCenter Cloud Edition in action.