Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
20 hours ago
Many zero trust initiatives address VPN replacement, SaaS access, and authentication, but often leave critical access paths unprotected. This webinar examines how tools such as SSH, RDP, and database clients can fall outside consistent zero trust enforcement, creating hidden security gaps. The session focuses on why these overlooked access points present significant risk and how attackers exploit them.
Attendees will learn how next generation ZTNA extends zero trust principles across all access channels. The discussion explores how to enforce consistent security controls, improve visibility, and reduce exposure across environments. The webinar provides practical insight into closing last mile gaps and achieving a more complete zero trust architecture.
20 hours ago
Modern Kubernetes environments rely on advanced networking and security technologies to manage connectivity, observability, and protection across cloud native infrastructure. This webinar explores practical applications of eBPF and Cilium for addressing complex Kubernetes networking and security challenges through real world case studies and technical examples.
As the final session in the Isovalent webinar series, the event reviews how eBPF powered networking can support improved visibility, security, and operational control in cloud native environments. Participants will also take part in an interactive Jeopardy style Kahoot game that tests knowledge of Cilium, Kubernetes networking, and related technologies. The session provides an opportunity to learn from experts while engaging with the broader Isovalent community.
20 hours ago
KVM devices provide remote physical access to enterprise systems but can introduce significant security risks if not properly secured. This webinar explores newly identified vulnerabilities in modern KVM devices, particularly lower cost models that may lack robust protections. The session focuses on how compromised KVMs can become a critical attack vector within enterprise environments.
Attendees will learn how attackers can exploit vulnerable KVM devices to perform keystroke injection, modify BIOS and firmware, and bypass security tools such as endpoint detection and vulnerability management systems. The discussion also covers practical strategies for mitigating these risks while maintaining the operational benefits of KVM technology. The webinar provides insight into identifying and addressing hardware level security blind spots.
3 hours from now
Patch Tuesday often introduces critical updates that require immediate attention from IT and security teams. This community session creates a space to discuss real-world experiences following the latest round of patches and updates.
Participants can share how their rollout is progressing, exchange practical approaches, and discuss challenges with peers and security professionals. The format focuses on open conversation rather than formal presentation, encouraging collaboration and knowledge sharing around patch management, vulnerability response, and operational best practices in maintaining secure systems.
3 hours from now
Regulatory compliance is often treated as a checkbox exercise, but it can be a powerful driver of stronger security outcomes. This webinar explores how organizations can use audit insights to identify gaps and transform compliance efforts into strategic advantages. The session focuses on moving beyond basic compliance to build a more resilient and risk aware security posture.
Attendees will learn how to leverage audit findings to reduce risk exposure and improve security effectiveness. The discussion also covers how to align compliance activities with broader business objectives and implement outcome driven security strategies. The webinar provides practical guidance on turning regulatory requirements into opportunities for strengthening governance and long term resilience.
4 days from now
AI is accelerating long-standing third-party software risks, making it harder to trust code that organizations did not create. As open source ecosystems face increasing volumes of AI-generated contributions, traditional challenges around dependency trust, visibility, and validation are becoming more complex and urgent.
The discussion explores how proven security practices can still apply in this fast-moving environment. It examines ways to evaluate upstream contributions, move beyond static SBOMs toward actionable risk decisions, and manage third-party code without slowing development. Attendees will gain practical insight into balancing security and velocity while addressing evolving supply chain threats in modern software development.
4 days from now
Lessons from real-world cybercrime investigations reveal that many security breaches stem from preventable gaps rather than advanced tactics. Drawing on insights from over 1,000 cases, recurring issues such as poor asset visibility, weak access control, and inconsistent patching continue to expose organizations to unnecessary risk.
The discussion examines what investigators commonly uncover in compromised environments and why exposure is often underestimated. It also highlights how attackers take advantage of operational shortcuts and where defenses tend to fail. Practical perspectives on strengthening prevention strategies are included, along with guidance on building more disciplined and resilient security practices across IT environments.
6 days from now
Mac and mobile devices are becoming increasingly targeted as organizations expand beyond traditional endpoints. Findings from recent Security 360 research highlight how threat activity is evolving across these platforms, supported by real-world incident data and expert analysis.
The discussion breaks down key risks affecting Mac and mobile environments in 2026, including how multiple threat vectors combine to increase overall exposure. It also examines where organizations are falling short and what a modern, layered defense strategy should include. Attendees will gain practical insight into improving configurations, strengthening security strategies, and selecting tools that better protect devices against emerging and platform-specific threats.
6 days from now
AI is evolving from a supportive tool into an autonomous execution layer, introducing new security challenges as agents interact with sensitive data and perform complex tasks. Traditional security models are not designed to manage systems that operate with this level of independence and speed.
The discussion explores the rise of agentic AI and the need for new security architectures such as Unified Agentic Defense Platforms. It examines emerging risks including prompt injection, shadow AI, and agent hijacking, along with gaps in monitoring and control. Attendees will gain insight into securing data access, governing AI behavior, and building a structured approach to protecting the full AI lifecycle while enabling continued innovation.
1 week from now
This session explores the current cybersecurity threat landscape across Europe, drawing from real-world investigations and frontline intelligence. It highlights how modern adversaries gain initial access, move laterally, and exploit cloud and SaaS environments, providing a grounded view of today’s most active attack patterns.
Attendees will gain practical insights into defensive strategies that have proven effective against evolving threats. The session is designed to support both security leaders and practitioners by offering actionable guidance that can be applied to strengthen detection, response, and overall organizational resilience.
1 week from now
This session provides an in-depth look at adversary behavior through a live demonstration of attack and defense techniques. It focuses on how threat actors operate in real environments, showcasing tactics used to compromise systems and how defenders can respond effectively in real time.
Participants will gain a clearer understanding of attacker methodologies alongside practical defensive approaches. The session emphasizes applied learning, helping security teams improve their ability to detect, analyze, and mitigate threats using strategies grounded in real-world scenarios.
1 week from now
This session examines the tactics and techniques associated with the SCATTERED SPIDER threat group, using adversary intelligence to break down how these attacks unfold. It provides insight into how targeted campaigns operate and the risks they pose to modern organizations.
Attendees will learn how intelligence-driven defense can improve threat detection and response. The discussion focuses on actionable methods for identifying indicators of compromise and strengthening security operations to better defend against sophisticated and persistent adversaries.