Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
12 hours ago
End of Life software has become a growing compliance and security risk, especially as frameworks like SOC 2 and PCI DSS treat unsupported systems as business liabilities. This session examines how organizations get caught in the EOL trap when legacy applications remain in production long after support ends, creating exposure that is difficult to eliminate quickly.
HeroDevs and Anchore walk through practical steps to identify operating system and package level EOL risks that traditional scanners may overlook. The speakers demonstrate how to assess technical debt, maintain compliance and reduce exposure without forcing disruptive migrations. Attendees will see how replacement packages and improved visibility can help security leaders meet risk requirements while allowing development teams to maintain delivery speed.
12 hours ago
Mobile app threats increasingly bypass traditional device level controls, leaving security teams with limited visibility into real application risk. This webinar focuses on how Microsoft Intune and Quokka Q-scout work together to deliver deeper insight into mobile app behavior across iOS and Android environments. The session demonstrates how app level risk intelligence strengthens mobile security posture beyond standard endpoint management.
The discussion covers detecting malicious or risky app activity, responding quickly with guided remediation, and feeding richer app signals into Microsoft Defender for Endpoint and Microsoft Sentinel. Attendees will see how the integrated approach helps security teams identify emerging mobile threats faster and make more informed access and response decisions.
12 hours ago
This session focuses on improving enterprise patch management by combining Tanium and ServiceNow to deliver real time visibility, automation, and stronger operational control. The webinar explains how modern IT teams can manage patching more effectively, from assessment through deployment, while reducing manual effort and improving reliability across environments.
The discussion covers how Tanium Patch Management integrates with ServiceNow workflows, including setup requirements, automated monthly patch cycles, and change driven deployments. Attendees will see how enhanced visibility supports better risk assessment and faster remediation, followed by practical demos and a live Q and A to address real world patching challenges.
12 hours ago
Enterprise security in 2026 is increasingly shaped by threats that blend seamlessly into everyday business processes, making them harder to detect until real damage occurs. This live expert panel examines how modern attacks operate in real world scenarios and highlights the most significant security risks organizations should prepare for in the coming year. The discussion focuses on how trust is being exploited and why traditional assumptions about visibility and control are no longer enough.
Speakers will share insights from a real Lazarus Group infiltration case, explore the rise of AI driven phishing and break down the top risks enterprises are likely to face. The panel also covers practical prevention strategies and the broader business impact of today’s threat landscape. A live Q and A will give attendees the opportunity to engage directly with experts and gain clearer guidance on detection, response and executive level decision making.
12 hours ago
Modern cyber attacks rarely stop at the first breach, and the outcome often depends on how quickly teams can respond. This webinar focuses on what happens after an attacker is already inside an environment, examining how real world attacks progress, how dwell time increases damage, and why fast detection and response are critical to limiting impact.
The session breaks down identity driven lateral movement, the role of automation and AI in accelerating attacks, and what effective detection looks like in practice. Attendees will gain practical guidance on spotting early indicators of compromise, prioritizing alerts, and escalating incidents before they spread. The discussion is designed for IT and security professionals responsible for containing active threats and restoring control under pressure.
11 hours from now
Major changes to the PKI ecosystem in 2026 are putting pressure on organizations to rethink how they manage certificates. Shorter TLS certificate lifecycles, expanding private PKI environments and the growing need to assess cryptographic posture ahead of post quantum cryptography are exposing the limits of traditional certificate lifecycle management. This session examines how the certificate landscape is evolving and why a unified, real time view across public and private PKI is becoming essential.
The discussion highlights continuous discovery, multi CA visibility and private PKI monitoring to reduce misconfiguration risk and prevent outages. Attendees will gain practical guidance on preparing for the upcoming certificate shift, improving real time visibility and building a stronger foundation for long term cryptographic readiness. The webinar is designed for security, PKI and infrastructure teams managing certificates at scale.
11 hours from now
Security leaders face a new set of pressures as organizations move from the challenges of 2025 into an even more demanding threat landscape in 2026. This webinar focuses on the key lessons learned from recent global security incidents, the rapid rise of AI driven attacks, and the growing impact of compliance and operational constraints. Ivanti experts share perspective on how these shifts have exposed hidden weaknesses across modern environments.
The session outlines practical strategies to reduce risk across users, devices, identities, applications, and cloud platforms while balancing usability and budget realities. Attendees will gain guidance on building a layered security approach that is realistic, sustainable, and aligned with how organizations actually operate today, helping teams prepare for the year ahead with greater confidence.
11 hours from now
Explore the latest enhancements in NinjaOne 12.0 and see how the platform is expanding visibility, strengthening device integrity, and improving operational control for IT teams and MSPs. This release session walks through key updates in asset management, network discovery, and system verification, showing how organizations can better track devices, uncover hidden risks, and manage environments from a single interface.
The discussion highlights full asset lifecycle tracking with standardized templates and unified oversight across managed and unmanaged endpoints. It also covers boot verification capabilities that validate system components at startup to detect unauthorized changes and prevent compromised devices from operating. Attendees will gain a clear understanding of how automated network discovery reduces blind spots and supports stronger security across distributed environments.
11 hours from now
Stricter audit expectations and expanding regulatory frameworks are raising the bar for Mac security in 2026. This session focuses on building a continuous and measurable compliance strategy for macOS environments, moving beyond one time configurations and manual validation. It examines how mSCP baselines align with major frameworks such as CIS, NIST, STIG, CNSSI and CMMC, and how those requirements can be translated into enforceable technical controls.
The discussion also covers scaling compliance across fleets of any size through benchmarking, scoring, reporting and automated remediation. Attendees will see how declarative device management, structured blueprints and drift detection help maintain a consistent and audit ready posture. Real world implementation approaches for different types of organizations are explored, along with practical next steps for strengthening Mac security programs and preparing for upcoming audit demands.
1 week from now
Preparing for a cyber incident before it happens is the focus of this pre breach readiness session, which highlights how organizations can secure immediate access to expert responders when an attack occurs. The discussion centers on reducing response delays and ensuring the right support is available from the first critical moments of an incident.
Security leaders will see how locking in dedicated incident response hours in advance helps eliminate uncertainty, speed decision making and minimize operational disruption. The webinar explains how guaranteed access to response expertise strengthens overall readiness and improves confidence when every minute matters during a breach scenario.
1 week from now
Strategic priorities for MSPs in 2026 take center stage in this live session for N-able customers across Australia and New Zealand. N-able CEO John Pagliuca shares his perspective on the evolving managed services landscape, with a focus on cyber resilience as a core business requirement rather than an optional add on. The discussion highlights how providers can strengthen trust, scale operations and respond to increasing market consolidation.
The session also explores how AI is influencing security and innovation across MSP environments, and what that means for service delivery in the year ahead. Attendees will gain insight into the challenges and opportunities shaping 2026, along with the chance to ask questions directly during a live Q and A.
1 week from now
AI driven threats and ransomware are expanding the Microsoft 365 and Azure attack surface faster than many security teams can manage. This webinar brings together insights from Forrester research and Druva to examine how AI, GenAI controls, and cloud adoption are reshaping risk inside Microsoft environments. The discussion focuses on why AI privacy and data protection are now major budget drivers and how attackers are moving beyond traditional perimeter defenses.
The session also looks closely at the real cost of modern ransomware, including operational disruption, data theft, extortion, and insurance impact, especially in cloud environments with inconsistent security controls. Attendees will gain practical guidance on where organizations typically focus after a breach and how to strengthen protection, governance, and recovery across Microsoft platforms using data driven security strategies.