Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
11 hours ago
See how Action1 extends Microsoft Intune by closing common security and patching gaps across endpoints and servers. The session focuses on improving real time visibility, automating third party patching, and enabling faster remediation without adding operational complexity. It highlights where Intune falls short and how Action1 complements it to reduce risk and improve compliance.
The webinar covers instant insight into patch status and software inventory, automated patching for third party applications, remote remediation without VPN access, and secure patching for Windows Servers. An interactive Q and A allows attendees to explore practical use cases and clarify how these capabilities strengthen endpoint security and compliance.
12 hours from now
Securing Kubernetes networks without breaking application communication is the focus of this hands-on webinar on microsegmentation and default deny strategies. The session shows how platform and DevOps engineers can move away from flat networks and apply stronger controls that reduce risk, limit lateral movement, and support compliance requirements.
The demo walks through implementing granular microsegmentation at the pod and namespace level using Calico. Attendees will see how staged network policies can be used to preview traffic behavior before enforcement, helping teams lock down clusters without disrupting uptime. The webinar also demonstrates how dynamic service graphs simplify troubleshooting by visualizing network flows and quickly identifying blocked traffic or policy issues.
12 hours from now
Nation state conflict is increasingly spilling into cyberspace through coordinated hacktivism that masks true intent and amplifies disruption. This webinar examines how governments and mercenary groups are using malicious activist fronts to conduct cyber operations, influence narratives, and complicate attribution during times of geopolitical tension. The discussion focuses on how tactics such as ransomware, data leaks, DDoS attacks, and psychological operations are blended to appear grassroots while serving strategic objectives.
Led by SentinelOne Senior Threat Researcher Jim Walter, the session breaks down real world case studies and threat patterns shaping this activity today. Attendees will gain insight into why attribution has become more difficult, how traditional hacktivist groups fit into the modern threat landscape, and what security teams should consider when modeling long term risk tied to conflict driven cyber activity.
5 days from now
Insights from the 2025 GigaOm Radar reveal how container networking and security are evolving in modern Kubernetes environments. This webinar breaks down why Calico was recognized as a leader and what the report’s findings mean for organizations running hybrid and multi cloud infrastructure.
The session covers how unified networking, network security, and observability reduce operational complexity and strengthen security posture. Attendees will also hear about emerging trends in container networking and learn how consistent controls across environments help teams lower risk, simplify operations, and support faster innovation.
6 days from now
A practical discussion on how an MSP strengthened customer protection and business performance through a modern data protection approach. This webinar features a real world conversation with Nerds That Care on how updating backup and recovery practices helped reduce complexity, improve resilience, and deliver measurable results for clients.
The session focuses on modern data protection in today’s threat landscape, covering cloud native backup models, immutable and encrypted backups, and the operational benefits of simplifying data protection workflows. Attendees will hear how these changes improved service reliability, customer satisfaction, and overall efficiency, while also supporting long term growth for an MSP environment.
6 days from now
A live cyber simulation workshop that places participants inside a realistic incident response scenario based on active adversaries targeting organizations today. Led by the CrowdStrike Incident Response Team, the session walks through how fast moving attacks unfold, how threat actors infiltrate mature environments, and how early decisions can change the outcome of an incident.
The interactive format allows attendees to guide the response through real time voting, with each decision influencing escalation paths, response options, and time pressure. The scenario centers on a sophisticated China nexus threat compromising a managed service provider and impacting downstream customers. Participants gain practical insight into adversary behavior, prioritization under pressure, team coordination, and the actions security leaders must be ready to take during a real cyber incident.
1 week from now
This session focuses on how AI and automation are shaping the way organizations use and manage N-able products. The discussion covers recent updates, new capabilities and what is coming next across the N-able platform, with a strong emphasis on real world application rather than theory.
Product specialists and practitioners will walk through practical use cases, showing how AI features and automation tools can improve daily operations. The webinar also highlights how APIs, scripting and integrations are being used to streamline workflows, followed by an open discussion where attendees can raise questions based on their own environments.
1 week from now
Kick off your eBPF journey with an interactive introduction to the fundamentals behind modern cloud networking and security. This webinar opens the Isovalent World Cup series by breaking down what eBPF is, why it matters for Kubernetes environments, and how it is used to build secure and scalable infrastructure in real world deployments.
The session combines practical learning with live engagement, including Q and A and a Kahoot based knowledge challenge. Attendees will gain a clear understanding of core eBPF concepts, common use cases, and how Isovalent applies eBPF, Cilium, and related technologies to networking and security. This first session sets the foundation for deeper technical labs and advanced topics covered in later parts of the series.
1 week from now
Get hands on with real world disaster recovery techniques in this interactive masterclass focused on preparing IT teams before an incident happens. The session walks through building and launching recovery environments across Hyper V, VMware ESXi, and Microsoft Azure, while covering essential recovery prerequisites and cyber recovery best practices that reduce risk during critical moments.
Participants will practice restoring a full server, learn which decisions must be made ahead of time, and understand common mistakes that often cause recovery failures. The class is designed to help attendees strengthen resilience, validate recovery processes, and build confidence in responding to outages, ransomware incidents, and other disruptive events through guided, live instruction.
1 week from now
A modern endpoint management strategy is becoming essential as IT environments grow more complex. This webinar looks at how IT and MSP leaders can reduce risk, control costs, and improve security by aligning their endpoint strategy with current market expectations. The session translates insights from the Gartner Magic Quadrant for Endpoint Management Tools into a practical framework that teams can use to evaluate vendors and strengthen day to day operations.
The discussion highlights key trends shaping endpoint management and explains how Gartner assesses vendors through execution and vision. Attendees will also see how automation across patching, monitoring, remote support, and backup supports stronger compliance and operational efficiency. Real world examples show how organizations have improved security posture and streamlined IT workflows through a modern endpoint management approach.
2 weeks from now
Secure Kubernetes outbound traffic while reducing NAT gateway costs by redesigning how egress is handled at the cluster level. This webinar shows how to replace cloud managed NATs with Calico Egress Gateway to gain stable egress IPs, stronger controls, and lower data processing costs without sacrificing availability.
The demo walks through identity aware egress for Kubernetes, including assigning specific egress IPs to namespaces and restricting access to external services. It also covers how to track, log, and audit outbound connections using the Calico Service Graph to support compliance and prevent unauthorized traffic from leaving the cluster.
2 weeks from now
This webinar provides a technical walkthrough of Linux and Mac patching using N-central and N-sight through the new multi-OS patch engine. The session gives a clear view of how patching works in its current public preview state and what teams can expect when managing non-Windows systems.
Attendees will see live examples of Linux and Mac patching in action, along with an explanation of the engine’s capabilities and current limitations. The discussion focuses on how the new approach improves patch management, enhances operational control and supports more consistent system security across mixed environments.