Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
8 hours ago
Education IT teams are under growing pressure to secure large numbers of endpoints with limited staff, budgets, and visibility. This webinar brings together IT leaders from K to 12 and higher education to discuss real world challenges around patching, access control, and endpoint security, especially as devices move off campus and risks increase. The conversation focuses on how teams are adapting their security approach without adding complexity or operational burden.
Speakers share practical examples of improving patching processes, securing distributed devices, and gaining better visibility across education environments. The session highlights how small IT teams can reduce risk, streamline operations, and maintain control at scale using proven strategies. The discussion also draws on findings from the Action1 Cybersecurity in Education Report, giving attendees clear, experience based insight they can apply within their own institutions.
8 hours ago
AI’s role in cybersecurity is often overstated in headlines, but this session focuses on what the technology is actually delivering in real defensive environments. The discussion breaks down which capabilities are real today, how AI strengthens detection and response and why it is becoming a practical tool for organizations facing modern threats. Attendees will see how AI supports human analysts by improving speed, accuracy and decision making across core security workflows.
The webinar also outlines straightforward ways to adopt AI driven tools and incorporate them into existing defenses without adding complexity. The speaker shares insight into the next stage of AI enabled security and what teams can expect as threat actors and defenders continue to evolve. Participants will leave with a clearer understanding of AI’s true value and actionable guidance they can apply immediately.
15 hours from now
This webinar focuses on how Istio Ambient Mode delivers secure service mesh capabilities for Kubernetes without the complexity of sidecars. It explains how built in mutual TLS, traffic control, and deep visibility are achieved while reducing operational overhead as part of Calico’s unified networking, security, and observability platform.
The session covers how pod to pod traffic is secured at scale, how waypoint proxies protect east west application traffic, and how teams can gain L7 visibility without impacting performance. Attendees will also hear best practices for adopting Istio Ambient Mode in real Kubernetes environments and see how Calico and Istio work together to simplify security, observability, and scalability.
1 day from now
See how the Xcitium platform brings prevention first security, centralized visibility and scalable management together in a single environment. This live demo walks through how the platform works, what features are available within an account and how teams can activate and use Xcitium without confusion.
The session highlights ZeroDwell Containment and how it stops unknown threats before execution, along with unified access, license management and workflow driven capabilities designed for real world security operations. Attendees will gain a clear view of how partners and enterprise teams can simplify operations, speed adoption and achieve faster time to value using Xcitium’s integrated security platform.
5 days from now
A forward-looking discussion on how organizations can secure themselves as AI-driven threats reshape the risk landscape in 2026. This webinar brings together insights from Forrester research and Tanium to examine the trends, technologies, and security challenges that security and risk leaders are expected to face in the coming year.
The session focuses on how agentic AI is changing the nature of cyber risk and what organizations must do to prepare. Attendees will hear practical recommendations for building AI-native, quantum-ready, and continuously adaptive defenses, with a strong emphasis on how Autonomous IT can help teams respond faster and stay ahead of emerging threats.
6 days from now
Endpoint and cloud security failures exposed in 2025 showed how misconfigurations, unmanaged assets, and slow remediation continue to leave enterprises vulnerable despite growing security investments. This webinar examines where defenses broke down and how attackers exploited gaps across hybrid environments.
The session outlines what security leaders need to change in 2026, with a focus on continuous visibility, unified control, and risk based action across endpoints and cloud workloads. Attendees will walk away with clear priorities and practical approaches for strengthening endpoint and cloud security at scale, helping organizations move from reactive controls to a more proactive and resilient security posture.
6 days from now
Security teams are seeing firsthand why manual security operations can no longer keep pace with today’s attack landscape. This webinar focuses on the key lessons from 2025 that revealed how rising vulnerability volumes, faster attacks, and limited resources are overwhelming traditional workflows. The session explains why organizations that depended on manual processes struggled to respond effectively, while those that adopted automation were able to reduce risk and improve response times.
The discussion highlights where manual security processes commonly fail and how automation improves scanning, normalization, detection, remediation, and compliance. Attendees will gain insight into the security challenges that defined 2025, why automation is essential for consistent and timely response, and which areas deliver the most measurable impact. The webinar also outlines practical ways to introduce automation without increasing operational complexity.
6 days from now
Get direct guidance on using and implementing the Adlumin MDR platform during this interactive Office Hours session. The discussion focuses on practical usage of the MDR toolset, helping security teams understand how to get the most value from its core capabilities and day to day workflows.
Led by Adlumin’s MDR experts, the session gives attendees a chance to ask questions, share feedback and hear about upcoming enhancements to the platform. Participants will also see newly released features as they go live and gain insight into the product roadmap. This Office Hours webinar is designed for teams that want hands on clarity, real time answers and a better understanding of how Adlumin MDR fits into their security operations.
6 days from now
Security automation emerged as a critical requirement in 2025 as security teams struggled to keep up with rising alert volumes, faster attacks, and limited resources. This webinar focuses on why manual security operations are no longer sufficient and how automation has become essential for reducing risk and scaling security programs effectively.
The session reviews key security lessons from 2025, showing where manual processes break down across vulnerability management, detection, remediation, and compliance. Attendees will gain insight into how automation improves consistency and response speed, which areas deliver the greatest impact, and practical ways to adopt automation without increasing operational complexity.
6 days from now
This webinar focuses on scaling file security using ICAP and REST APIs without disrupting existing workflows. It addresses the common challenge of adding stronger protections while maintaining speed and flexibility as operations grow. The session shows how security can be applied to files in motion and at rest without forcing major changes to current systems.
Attendees will see a practical approach to integrating security where data already lives, making it easier to expand coverage as needs evolve. The discussion is designed for teams that want to strengthen protection without sacrificing agility or breaking established processes.
1 week from now
This live discussion examines how AI is reshaping cyber risk and widening the gap between attackers and defenders. Red Sift CEO Rahul Powar and Billy McDiarmid explore how AI is driving more effective social engineering, increasing identity based threats, and changing how digital trust is established.
The session shares forward looking insights into how email and identity threats are expected to evolve in 2026, the expanding role of domain trust and DMARC, and how defenders can use AI to counter AI driven attacks. Attendees will also see a walkthrough of Radar Lite, a free AI powered tool that assesses domain security posture and helps teams identify and prioritize remediation quickly.
1 week from now
This event focuses on how organizations can use AI to strengthen cyber defense as threats become faster, more automated, and more costly. CrowdStrike and CSIS will share insights into how attackers are leveraging AI to scale their operations and how modern security teams can respond with smarter, more efficient defenses. The discussion highlights current threat trends and the role AI plays on both sides of the security landscape.
Attendees will hear real world perspectives from organizations that have already advanced their cybersecurity approach and learn what matters most when selecting and building modern security solutions. The program includes expert presentations and customer experiences aimed at decision makers and specialists responsible for cybersecurity strategy, technology, and investment.