Discover Security Events in Data Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
Data Security has evolved into one of the most challenging and regulated aspects of cybersecurity as organizations manage exponentially growing volumes of sensitive information across hybrid and multi-cloud environments. The proliferation of data sources, storage locations, and access points has created a complex landscape requiring sophisticated protection strategies.
Global privacy regulations including GDPR, CCPA, HIPAA, and emerging frameworks have transformed data security from a technical concern into a business imperative with significant legal and financial consequences. Organizations face substantial penalties for data breaches, with compliance requirements mandating encryption, access controls, data classification, breach notification, and data subject rights. The patchwork of regional regulations creates complexity for multinational organizations managing cross-border data flows.
Data breaches continue to increase in frequency and severity, with ransomware attacks, insider threats, and sophisticated exfiltration techniques targeting valuable information assets. The shift to remote work, cloud adoption, and bring-your-own-device (BYOD) policies has dispersed data beyond traditional perimeter controls. Organizations struggle with data visibility, lacking comprehensive understanding of where sensitive data resides, who accesses it, and how it flows through their ecosystems.
Modern data security strategies employ multiple layers including encryption at rest and in transit, data loss prevention (DLP), data masking, tokenization, and database activity monitoring. Organizations are implementing zero-trust data access models, privileged access management, and data governance frameworks. Emerging technologies like confidential computing and homomorphic encryption promise enhanced protection for data during processing, addressing critical gaps in traditional security models.
All security events are automatically streamed into this table on a daily basis.
20th January 2026 | The autonomous MSP: Scaling endpoint and Microsoft service delivery with automation and AI
This webinar examines how MSPs can scale endpoint and Microsoft 365 service delivery by combining automation, AI and integrated cybersecurity. Acronis experts and industry leaders outline how platformization is shaping the next stage of MSP growth and why AI driven workflows are becoming essential for improving margins and simplifying day to day operations. The discussion highlights practical ways AI reduces repetitive tasks, strengthens protection and improves overall service delivery from a single platform.
Attendees will see how a unified Microsoft 365 solution supports higher efficiency, hear examples of real world performance gains and understand how autonomous cybersecurity is emerging as a key advantage for modern MSPs. The session also explains how MSPs can advance toward MSP 3.0 maturity through automation, native integration and faster resolution times powered by AI.
Company_Webinar • Part of Acronis
17th December 2025 | Data-First Forum: Holiday Cheer for Your Cybersecurity Career
This webinar highlights how professionals at every stage of their career can grow and succeed in the rapidly expanding cybersecurity field. Melissa Rappl, CISO at Children’s Nebraska, and Matt Radolec, VP of Incident Response at Varonis, share guidance on developing the skills and mindset needed to advance, whether someone is new to the industry or working toward leadership roles. The session focuses on how the talent landscape is shifting and what opportunities are emerging as cybersecurity continues to evolve.
Attendees will gain practical insights on navigating career growth, understanding modern expectations in security teams and positioning themselves for long term success. The discussion also offers encouragement for those entering the field and direction for experienced professionals aiming to take the next step.
Company_Webinar • Part of Varonis
16th December 2025 | Rubrik Holiday Lunch & Learn: Sleigh Your Cyber Recovery
Rubrik is hosting a technical deep-dive on Isolated Recovery Environments and how to achieve the fastest possible cyber RTO through automated orchestration and strategic architecture. If you're finalizing 2025 disaster recovery plans or evaluating ways to improve your recovery posture, this session on December 10th at noon is designed exactly for that.
You'll see a live demo of the platform, learn about IRE architecture options including partnerships with Rackspace and Iron Mountain, and walk away with actionable insights. Plus, they're sending all attendees a $50 UberEats card as a holiday thank you, and anyone who books a follow-up meeting gets a $150 gift card for holiday shopping.
Company_Webinar • Part of Rubrik
16th December 2025 | The 2026 Identity Threat Outlook: Secrets, NHIs, AI Agents and What’s Next
The webinar examines the identity security threats expected to shape 2026 and outlines the attack vectors that matter most for security teams. Speakers from Akeyless and KuppingerCole Analysts break down how AI, automation and new offensive techniques are accelerating attacks on both human and non human identities. The session also highlights how secrets sprawl and unmanaged machine identities are expanding the internal attack surface across modern enterprises.
Security leaders will get a clear view of the trends that will influence identity programs in the coming year, including the rise of AI driven threats and the growing pressure to secure machine level access. The discussion provides guidance on the risks that require urgent attention and the areas where organizations need to strengthen their defenses before 2026.
Company_Webinar • Part of Akeyless
15th December 2025 | State of Cybercrime: The React2Shell Crisis
This episode focuses on the growing impact of the React2Shell zero click remote code execution vulnerability and why it is turning into one of the most serious security events of the year. The session explains how threat groups are weaponizing the flaw, why emergency patches have created operational challenges and what security teams need to prioritize to stay protected.
Matt Radolec and David Gibson also examine the Shai hulud 2.0 attacks targeting cloud infrastructure and review the factors behind the largest recorded DDoS campaign. The discussion gives defenders a clear picture of how these threats are evolving and what steps can reduce risk across modern environments.
Company_Webinar • Part of Varonis