Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
12 hours ago
A practical discussion on how an MSP strengthened customer protection and business performance through a modern data protection approach. This webinar features a real world conversation with Nerds That Care on how updating backup and recovery practices helped reduce complexity, improve resilience, and deliver measurable results for clients.
The session focuses on modern data protection in today’s threat landscape, covering cloud native backup models, immutable and encrypted backups, and the operational benefits of simplifying data protection workflows. Attendees will hear how these changes improved service reliability, customer satisfaction, and overall efficiency, while also supporting long term growth for an MSP environment.
12 hours ago
A live cyber simulation workshop that places participants inside a realistic incident response scenario based on active adversaries targeting organizations today. Led by the CrowdStrike Incident Response Team, the session walks through how fast moving attacks unfold, how threat actors infiltrate mature environments, and how early decisions can change the outcome of an incident.
The interactive format allows attendees to guide the response through real time voting, with each decision influencing escalation paths, response options, and time pressure. The scenario centers on a sophisticated China nexus threat compromising a managed service provider and impacting downstream customers. Participants gain practical insight into adversary behavior, prioritization under pressure, team coordination, and the actions security leaders must be ready to take during a real cyber incident.
11 hours from now
Ransomware incidents often reveal gaps that remain hidden until an attack is already underway. This panel discussion digs into real world ransomware breaches, drawing on firsthand experience from incident responders and security leaders who have managed active attacks from initial compromise through recovery. The conversation focuses on how attackers bypass defenses, where controls fail under pressure, and what actually happens inside organizations during a crisis.
The session breaks down common entry points, the operational and financial fallout of ransomware, and why many organizations overestimate their level of preparedness. Panelists also discuss how AI is accelerating attacker capabilities and reshaping the threat landscape. Attendees will come away with practical lessons on building stronger ransomware resilience based on what has worked, and what has not, during real incidents.
11 hours from now
Agentic AI systems are introducing new attack surfaces that traditional security models were not designed to handle. This webinar focuses on the most common attack patterns targeting AI agents and autonomous systems, explaining how adversaries exploit abnormal behavior, misuse runtime access, and escalate privileges in AI driven environments.
The session covers how Zero Trust AI Detection and Response can be applied to continuously monitor agent behavior, detect misuse in real time, and prevent data exposure. Attendees will gain practical insight into securing agentic AI workloads, understanding how these attacks differ from traditional threats, and building controls that reduce risk as AI systems become more autonomous.
11 hours from now
This session focuses on how AI and automation are shaping the way organizations use and manage N-able products. The discussion covers recent updates, new capabilities and what is coming next across the N-able platform, with a strong emphasis on real world application rather than theory.
Product specialists and practitioners will walk through practical use cases, showing how AI features and automation tools can improve daily operations. The webinar also highlights how APIs, scripting and integrations are being used to streamline workflows, followed by an open discussion where attendees can raise questions based on their own environments.
11 hours from now
Kick off your eBPF journey with an interactive introduction to the fundamentals behind modern cloud networking and security. This webinar opens the Isovalent World Cup series by breaking down what eBPF is, why it matters for Kubernetes environments, and how it is used to build secure and scalable infrastructure in real world deployments.
The session combines practical learning with live engagement, including Q and A and a Kahoot based knowledge challenge. Attendees will gain a clear understanding of core eBPF concepts, common use cases, and how Isovalent applies eBPF, Cilium, and related technologies to networking and security. This first session sets the foundation for deeper technical labs and advanced topics covered in later parts of the series.
11 hours from now
Get hands on with real world disaster recovery techniques in this interactive masterclass focused on preparing IT teams before an incident happens. The session walks through building and launching recovery environments across Hyper V, VMware ESXi, and Microsoft Azure, while covering essential recovery prerequisites and cyber recovery best practices that reduce risk during critical moments.
Participants will practice restoring a full server, learn which decisions must be made ahead of time, and understand common mistakes that often cause recovery failures. The class is designed to help attendees strengthen resilience, validate recovery processes, and build confidence in responding to outages, ransomware incidents, and other disruptive events through guided, live instruction.
5 days from now
A modern endpoint management strategy is becoming essential as IT environments grow more complex. This webinar looks at how IT and MSP leaders can reduce risk, control costs, and improve security by aligning their endpoint strategy with current market expectations. The session translates insights from the Gartner Magic Quadrant for Endpoint Management Tools into a practical framework that teams can use to evaluate vendors and strengthen day to day operations.
The discussion highlights key trends shaping endpoint management and explains how Gartner assesses vendors through execution and vision. Attendees will also see how automation across patching, monitoring, remote support, and backup supports stronger compliance and operational efficiency. Real world examples show how organizations have improved security posture and streamlined IT workflows through a modern endpoint management approach.
6 days from now
Ransomware remains one of the most damaging threats to modern organizations, capable of disrupting operations and exposing sensitive data in a single incident. This workshop focuses on building a practical, multi layered defense strategy that helps organizations prevent attacks, detect threats earlier, and respond quickly when incidents occur.
The session walks through real world ransomware scenarios and explains how to strengthen protection across endpoints, networks, and cloud environments. Participants will gain clear guidance on improving resilience, reducing business impact, and applying defensive best practices that work in real operational settings. The workshop is designed for IT professionals, security leaders, and risk managers looking to improve their organization’s readiness against ransomware attacks.
1 week from now
Secure Kubernetes outbound traffic while reducing NAT gateway costs by redesigning how egress is handled at the cluster level. This webinar shows how to replace cloud managed NATs with Calico Egress Gateway to gain stable egress IPs, stronger controls, and lower data processing costs without sacrificing availability.
The demo walks through identity aware egress for Kubernetes, including assigning specific egress IPs to namespaces and restricting access to external services. It also covers how to track, log, and audit outbound connections using the Calico Service Graph to support compliance and prevent unauthorized traffic from leaving the cluster.
1 week from now
This webinar provides a technical walkthrough of Linux and Mac patching using N-central and N-sight through the new multi-OS patch engine. The session gives a clear view of how patching works in its current public preview state and what teams can expect when managing non-Windows systems.
Attendees will see live examples of Linux and Mac patching in action, along with an explanation of the engine’s capabilities and current limitations. The discussion focuses on how the new approach improves patch management, enhances operational control and supports more consistent system security across mixed environments.
1 week from now
This session focuses on improving enterprise patch management by combining Tanium and ServiceNow to deliver real time visibility, automation, and stronger operational control. The webinar explains how modern IT teams can manage patching more effectively, from assessment through deployment, while reducing manual effort and improving reliability across environments.
The discussion covers how Tanium Patch Management integrates with ServiceNow workflows, including setup requirements, automated monthly patch cycles, and change driven deployments. Attendees will see how enhanced visibility supports better risk assessment and faster remediation, followed by practical demos and a live Q and A to address real world patching challenges.