Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
The gap between theoretical security models and real world operations continues to widen as organizations face evolving threats and complex environments. This webinar examines how geopolitical developments and emerging attack techniques influence organizational risk. The session focuses on translating global threat intelligence into actionable strategies that security teams can apply in their environments.
Attendees will gain insight into regional adversary tactics, techniques, and procedures, along with practical approaches to improving defense. The discussion highlights how organizations can shift from reactive patching to proactive, intelligence led threat hunting. The webinar provides guidance for both security leaders and practitioners on strengthening resilience and aligning security operations with the current threat landscape.
3 days from now
This webinar examines how healthcare organizations can maintain secure, high performance connectivity as care delivery becomes more distributed. Traditional VPN and legacy access models often struggle to provide consistent visibility and control, increasing the risk of downtime that can directly affect patient care and revenue. The session highlights why a resilient security service edge approach is better suited for modern healthcare environments.
Product leaders will explain the difference between secure and resilient access, why legacy VPN models fail, and how Zero Trust policies can be enforced without disrupting clinicians. A live demonstration will show identity and device based policy enforcement, encrypted and compliant access to clinical systems, centralized visibility, and reduced third party risk across distributed care settings.
5 days from now
Android firmware and pre installed system applications operate with high level privileges, making them a critical layer for device security. This webinar explores the risks associated with firmware vulnerabilities, including potential data exposure, privilege escalation, and full device compromise. The session introduces a security testing approach designed to identify and address these risks before devices are released to users.
Attendees will learn how multi layered analysis techniques can detect insecure interfaces, uncover vulnerabilities, and identify potential malware within firmware environments. The discussion also covers how security testing aligns with established standards such as NIAP, NIST, and OWASP MASVS. The webinar provides practical insight into strengthening firmware security and ensuring mobile devices meet privacy and security requirements before deployment.
1 week from now
Vulnerability and patch management often create friction between IT and security teams, balancing the need for rapid remediation with maintaining system stability. This webinar explores how organizations can align IT operations and security priorities to reduce exposure without disrupting production environments. The session focuses on modern approaches to managing vulnerabilities more efficiently while avoiding tool sprawl and operational complexity.
Attendees will learn how to transition from reactive patching to a structured and scalable remediation strategy. The discussion highlights how to prioritize vulnerabilities based on real risk, streamline patching processes across environments, and improve collaboration between IT and security teams. The webinar provides practical guidance for accelerating remediation, reducing backlogs, and achieving measurable security improvements without compromising uptime.
2 weeks from now
Modern Kubernetes environments rely on advanced networking and security technologies to manage connectivity, observability, and protection across cloud native infrastructure. This webinar explores practical applications of eBPF and Cilium for addressing complex Kubernetes networking and security challenges through real world case studies and technical examples.
As the final session in the Isovalent webinar series, the event reviews how eBPF powered networking can support improved visibility, security, and operational control in cloud native environments. Participants will also take part in an interactive Jeopardy style Kahoot game that tests knowledge of Cilium, Kubernetes networking, and related technologies. The session provides an opportunity to learn from experts while engaging with the broader Isovalent community.
1 month from now
Experience a hands-on virtual ransomware recovery simulation designed to test real world response skills without real world consequences. This interactive event places attendees inside a live breach scenario, where they work through decision making, coordination, and recovery steps alongside other IT and security professionals.
The session focuses on practical ransomware response, resilience building, and lessons learned from active attack scenarios. Participants gain actionable guidance on strengthening incident response plans and improving readiness against ransomware threats, all through an engaging, simulation based format that goes beyond a traditional webinar.
1 day ago
AI driven adversaries are increasing the speed and sophistication of cyber attacks. This webinar highlights findings from the CrowdStrike 2026 Global Threat Report, including a 27 second breakout time, an 89 percent rise in AI enabled attacks, and the growing use of legitimate tools in malware free activity. Speakers examine how threat actors are scaling operations with AI while also targeting AI systems.
The session covers evasive techniques such as exploiting unmanaged devices, using zero day vulnerabilities before disclosure, abusing valid credentials, and intensifying cloud targeting. CrowdStrike leaders share threat intelligence insights and practical guidance to help security teams respond to this evolving landscape.
1 day ago
Manual IT operations are struggling to keep pace with evolving threats, hybrid work, and growing expectations for seamless digital experiences. This webinar examines how organizations can reduce support tickets and strengthen their security posture through autonomous endpoint management using Ivanti solutions. The session highlights unified endpoint visibility to support faster decision making and simplified operations for distributed teams.
Speakers will address autonomous patching to close vulnerabilities faster and reduce manual effort, as well as proactive remediation to resolve issues before employees notice them. A real world case study from SouthStar Bank will share outcomes and lessons learned. Attendees will also receive a roadmap outlining stages and practical steps toward autonomous endpoint management maturity.
1 day ago
As Mac adoption continues to grow across organizations, IT teams must adapt their management and security practices to support macOS environments effectively. This webinar explores the fundamentals of Mac management and highlights how modern management platforms help organizations maintain device security while supporting user productivity.
The session reviews key concepts for managing macOS devices, including device enrollment, application provisioning, patching, and configuration management. Speakers will also discuss the challenges of managing mixed device environments and how integrated management and security capabilities can help address them. Attendees will gain practical insight into common workflows and best practices that support secure and efficient Mac device management within enterprise environments.
4 days ago
Autonomous AI agents are increasingly being deployed within enterprise infrastructure, creating new governance and security challenges for organizations. As these systems operate across applications, data, and infrastructure, they introduce risks related to identity management, authorization, and auditability. This webinar examines the architectural and security considerations required to safely run autonomous AI agents in production environments.
The session focuses on governance patterns and control plane strategies for managing AI agents within Kubernetes environments. Speakers will discuss approaches for establishing secure agent identities, implementing authentication and authorization controls, and applying Zero Trust principles to autonomous systems. Attendees will gain insight into practical security patterns for operating agentic AI systems within regulated enterprise environments while maintaining visibility and control.
1 week ago
Organizations are facing increasing pressure to manage data privacy alongside evolving cybersecurity threats and regulatory requirements. This webinar explores current challenges in protecting sensitive data and maintaining digital trust in a rapidly changing landscape. The session focuses on how privacy considerations are becoming a central component of modern security strategies.
Speakers will discuss emerging privacy risks, best practices for safeguarding sensitive information, and approaches to building stronger privacy and security frameworks. Attendees will gain insight into aligning data protection efforts with broader cybersecurity initiatives, helping organizations stay compliant while improving overall security posture and resilience.
1 week ago
Security teams often face the challenge of responding to alerts outside of normal working hours, when rapid investigation and containment are critical. While endpoint detection tools can identify suspicious activity, many organizations struggle to maintain continuous monitoring and timely response with limited internal resources. This webinar examines how Managed EDR services address these operational gaps.
The session explores how organizations use Managed EDR to provide around the clock monitoring, expert investigation, and faster response to endpoint threats. Speakers will discuss how managed security services can reduce alert fatigue, improve incident response coverage, and help security teams manage the growing volume of endpoint alerts. Attendees will gain insight into how continuous monitoring and expert support can strengthen endpoint security operations.