Endpoint Security Webinars

Discover Security Events in Endpoint Security

Get Endpoint Security Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Endpoint Security: Current Status

Endpoint Security has become increasingly complex and critical as organizations manage diverse device ecosystems spanning traditional workstations, mobile devices, IoT sensors, and cloud workloads. The explosion of remote work and bring-your-own-device policies has expanded the attack surface exponentially, requiring sophisticated protection strategies that extend beyond traditional perimeter defenses.

Evolution to EDR and XDR

The industry has evolved from basic antivirus software to comprehensive Endpoint Detection and Response (EDR) platforms that provide continuous monitoring, threat hunting, and automated response capabilities. Many organizations are now adopting Extended Detection and Response (XDR) solutions that integrate endpoint data with network, email, and cloud telemetry for unified threat detection and response. These platforms leverage behavioral analysis, machine learning, and threat intelligence to identify sophisticated attacks that evade signature-based detection.

Persistent Threat Challenges

Endpoints remain primary targets for ransomware, malware, zero-day exploits, and advanced persistent threats. Attackers increasingly exploit legitimate administrative tools, living-off-the-land techniques, and fileless malware to evade detection. The proliferation of unmanaged and partially managed devices creates visibility gaps and enforcement challenges. Organizations struggle with alert fatigue, skills shortages, and the complexity of managing security across heterogeneous endpoint environments.

Modern Protection Strategies

Contemporary endpoint security strategies employ defense-in-depth approaches combining next-generation antivirus, application control, device encryption, patch management, and privileged access management. Zero-trust principles mandate continuous verification of endpoint posture before granting access to resources. Organizations are implementing unified endpoint management platforms, conducting regular vulnerability assessments, and establishing incident response procedures specifically tailored to endpoint compromise scenarios.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

8th January 2026 | From Overwhelm to Efficiency: Revolutionizing Security Teams with Singularity Hyperautomation

Security teams often struggle to keep up with rising alert volumes, and this session shows how hyperautomation can change that reality. The webinar highlights how SentinelOne’s SOC team uses Singularity Hyperautomation to streamline investigations, reduce alert overload and improve daily efficiency. Attendees will hear from a practitioner who has experienced alert fatigue firsthand and will see how AI and automation reshape routine SOC workflows.

The session breaks down practical steps for reducing manual effort, speeding up response and building more consistent processes across the SOC. Real examples demonstrate how automated workflows help teams manage investigations at scale and improve overall productivity. It is designed for security teams looking for a more efficient way to handle growing alert demands.

Company_Webinar • Part of SentinelOne

_flag

15th January 2026 | See Morphisec in Action: Securing Agentic AI Against Ransomware Risks

This session showcases how Morphisec protects Linux environments from ransomware threats that are now rapidly evolving across enterprise infrastructure. The demo focuses on how attackers target Linux systems, from exploiting outdated software to encrypting shared network storage, and shows how Morphisec blocks these techniques before they cause damage. Real world examples illustrate how ransomware campaigns operate and why Linux has become a prime target for cybercriminals.

Through a guided demonstration, attendees will see how kernel level eBPF based protection prevents ransomware execution, how network file share encryption attempts are detected and stopped and how automated decoys and isolation safeguard business critical files. The session also highlights how Morphisec identifies vulnerable software across Linux environments to reduce exposure and strengthen overall resilience against ransomware attacks.

Company_Webinar • Part of Morphisec

_flag

21st January 2026 | AI in Cybersecurity: From Hype to Real-World Defense

AI’s role in cybersecurity is often overstated in headlines, but this session focuses on what the technology is actually delivering in real defensive environments. The discussion breaks down which capabilities are real today, how AI strengthens detection and response and why it is becoming a practical tool for organizations facing modern threats. Attendees will see how AI supports human analysts by improving speed, accuracy and decision making across core security workflows.

The webinar also outlines straightforward ways to adopt AI driven tools and incorporate them into existing defenses without adding complexity. The speaker shares insight into the next stage of AI enabled security and what teams can expect as threat actors and defenders continue to evolve. Participants will leave with a clearer understanding of AI’s true value and actionable guidance they can apply immediately.

Company_Webinar • Part of SecPod

_flag

18th December 2025 | Mappint the Future of Endpoint Protection: Insights from IDC

This session examines how endpoint threats are evolving and what security teams need to prepare for in 2026. IDC analyst Mike Jude shares insights from real world environments, showing how attackers are targeting modern endpoints, mobile devices and BYOD setups. The discussion outlines how the threat landscape is shifting and what new challenges organizations should expect as they update their endpoint strategy.

The webinar highlights key market trends, including the growing influence of AI, the move toward platformized security and the changing maturity of EPP and EDR deployments. Attendees receive practical recommendations for strengthening endpoint defenses, improving resilience and aligning their strategy with the next wave of XDR and AI driven capabilities.

Company_Webinar • Part of SentinelOne

_flag

18th December 2025 | 2026 Patch Management Trends, Threats & Priorities

Patch management is entering a more difficult phase as attackers move faster and vulnerabilities are exploited before teams can react. This webinar breaks down the threats shaping 2026, including AI driven attacks, identity exposure and supply chain weaknesses, then explains how these trends change patching priorities for security teams.

Attendees will see which risks are gaining momentum, what to address first to limit real world exposure and how to strengthen identity, supply chain controls and patching strategies using current threat intelligence. The session offers practical guidance that helps teams build a clearer plan for tackling emerging challenges.

Company_Webinar • Part of Action1

_flag