Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
17 hours ago
Credential theft remains a common entry point for cyberattacks, even in environments that use controls such as multi factor authentication and password managers. Attackers who obtain valid credentials or session tokens can still gain access to networks and cloud services if additional safeguards are not in place. This webinar explores how organizations can prevent attackers from progressing further after credentials have been compromised.
The session focuses on applying Zero Trust access principles to limit the impact of stolen identities. Speakers will demonstrate how device level access controls, secure SaaS and network connections, and controlled remote desktop access can prevent unauthorized activity even when valid credentials are used. Attendees will learn practical methods for reducing the blast radius of credential theft and strengthening identity based access protection.
17 hours ago
Managing security across multiple cloud platforms introduces risk when visibility and controls are fragmented. This webinar focuses on how organizations can strengthen their cloud security posture by addressing misconfigurations, unmanaged assets, and compliance gaps that commonly appear in multi cloud environments.
The session explains how unified cloud posture management helps teams monitor risk in real time, maintain continuous compliance, and automate remediation across AWS, Azure, and other providers. Attendees will gain practical guidance on improving visibility, reducing configuration errors, and building a more resilient and consistent security approach across their entire cloud ecosystem.
6 hours from now
Kubernetes environments often rely on multiple open source networking tools, but integrating these components can introduce hidden costs and security risks. This webinar examines the challenges of building a do it yourself networking stack, focusing on how mismatched configurations and inconsistent APIs can create vulnerabilities and operational complexity. The session highlights how these issues become more pronounced as environments scale.
Attendees will learn how fragmented tooling can lead to limited visibility, making it difficult to detect and respond to issues or security gaps. The discussion also covers the impact of uncoordinated updates and the operational burden of maintaining integrations. The webinar provides insight into reducing complexity, improving visibility, and strengthening security in Kubernetes networking environments.
6 hours from now
Digital forensics is becoming central to modern public safety investigations as smartphones, cloud platforms and other digital sources shape how cases are built and decisions are made. This session reviews findings from Cellebrite’s 2026 Industry Trends Survey and examines how public safety agencies are adapting to the growing role of digital evidence in their daily work.
The discussion highlights year over year trends influencing digital investigations, along with real world perspectives from agencies facing operational and modernization challenges. Attendees will gain insight into how peers are managing rising data demands, shifting priorities and evolving investigative workflows, while better understanding how their own approach compares across the public safety landscape.
6 hours from now
NIS2 has moved from a future requirement to an operational reality for organizations working in or with the European Union. This webinar examines the practical implications for IT teams as regulators expect clear progress toward compliance. The session addresses common challenges organizations face when translating NIS2 requirements into structured controls, documented processes, and defensible evidence while cybersecurity becomes a board level concern.
The discussion explains who falls within the scope of NIS2 and outlines the technical and governance expectations around risk management, incident response, reporting obligations, and supply chain security. Christian Herbst of machCon Group will share practical guidance on aligning existing tools and processes with NIS2 and building a sustainable compliance approach.
1 day from now
Incidents still occur despite strong prevention and detection controls, and the real challenge begins after containment. This webinar, part of the Attack Threat Resilience series, focuses on post attack recovery when downtime and business pressure are highest. Subject matter experts examine why recovery efforts often fail during real ransomware events and what organizations must do to restore systems safely and reliably.
The session addresses common backup failures, attacker tactics targeting recovery infrastructure, and the requirements for clean recovery in today’s threat landscape. It also explores immutability, isolation, anomaly detection, and practical planning steps that support faster and more confident system restoration.
2 days from now
Security teams often face the challenge of responding to alerts outside of normal working hours, when rapid investigation and containment are critical. While endpoint detection tools can identify suspicious activity, many organizations struggle to maintain continuous monitoring and timely response with limited internal resources. This webinar examines how Managed EDR services address these operational gaps.
The session explores how organizations use Managed EDR to provide around the clock monitoring, expert investigation, and faster response to endpoint threats. Speakers will discuss how managed security services can reduce alert fatigue, improve incident response coverage, and help security teams manage the growing volume of endpoint alerts. Attendees will gain insight into how continuous monitoring and expert support can strengthen endpoint security operations.
5 days from now
Autonomous AI agents are increasingly being deployed within enterprise infrastructure, creating new governance and security challenges for organizations. As these systems operate across applications, data, and infrastructure, they introduce risks related to identity management, authorization, and auditability. This webinar examines the architectural and security considerations required to safely run autonomous AI agents in production environments.
The session focuses on governance patterns and control plane strategies for managing AI agents within Kubernetes environments. Speakers will discuss approaches for establishing secure agent identities, implementing authentication and authorization controls, and applying Zero Trust principles to autonomous systems. Attendees will gain insight into practical security patterns for operating agentic AI systems within regulated enterprise environments while maintaining visibility and control.
1 week from now
As Mac adoption continues to grow across organizations, IT teams must adapt their management and security practices to support macOS environments effectively. This webinar explores the fundamentals of Mac management and highlights how modern management platforms help organizations maintain device security while supporting user productivity.
The session reviews key concepts for managing macOS devices, including device enrollment, application provisioning, patching, and configuration management. Speakers will also discuss the challenges of managing mixed device environments and how integrated management and security capabilities can help address them. Attendees will gain practical insight into common workflows and best practices that support secure and efficient Mac device management within enterprise environments.
2 weeks from now
Vulnerability and patch management often create friction between IT and security teams, balancing the need for rapid remediation with maintaining system stability. This webinar explores how organizations can align IT operations and security priorities to reduce exposure without disrupting production environments. The session focuses on modern approaches to managing vulnerabilities more efficiently while avoiding tool sprawl and operational complexity.
Attendees will learn how to transition from reactive patching to a structured and scalable remediation strategy. The discussion highlights how to prioritize vulnerabilities based on real risk, streamline patching processes across environments, and improve collaboration between IT and security teams. The webinar provides practical guidance for accelerating remediation, reducing backlogs, and achieving measurable security improvements without compromising uptime.
4 weeks from now
Modern Kubernetes environments rely on advanced networking and security technologies to manage connectivity, observability, and protection across cloud native infrastructure. This webinar explores practical applications of eBPF and Cilium for addressing complex Kubernetes networking and security challenges through real world case studies and technical examples.
As the final session in the Isovalent webinar series, the event reviews how eBPF powered networking can support improved visibility, security, and operational control in cloud native environments. Participants will also take part in an interactive Jeopardy style Kahoot game that tests knowledge of Cilium, Kubernetes networking, and related technologies. The session provides an opportunity to learn from experts while engaging with the broader Isovalent community.
1 month from now
Experience a hands-on virtual ransomware recovery simulation designed to test real world response skills without real world consequences. This interactive event places attendees inside a live breach scenario, where they work through decision making, coordination, and recovery steps alongside other IT and security professionals.
The session focuses on practical ransomware response, resilience building, and lessons learned from active attack scenarios. Participants gain actionable guidance on strengthening incident response plans and improving readiness against ransomware threats, all through an engaging, simulation based format that goes beyond a traditional webinar.