Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
12 hours ago
Get an early look at the new Fastpath Risk Insights and the enhanced Assure analytics engine, designed to give security and compliance teams clearer visibility into access risk. This webinar focuses on what is changing in Assure, how the new analytics experience improves dashboards, and what the transition means for existing reports and customizations.
The session also introduces Fastpath Risk Insights, a new add on for teams that need more flexible reporting and custom visualizations for leadership, auditors, and compliance stakeholders. Attendees will see how the new capabilities support complex environments, simplify risk communication, and speed up decision making through improved charts, exports, and tailored reporting views.
12 hours ago
Modern enterprise networks are becoming harder to manage as hybrid environments, distributed users and AI workloads increase operational pressure. This session focuses on how Extreme Platform ONE and Fabric address that complexity through unified management, automation and AI driven operations. The discussion highlights ways to simplify network administration while maintaining visibility and control across environments.
The webinar outlines how centralized automation can improve security and compliance, reduce manual configuration work and support digital transformation initiatives. It also reviews research findings showing potential long term cost savings driven by efficiency gains in planning, configuration, upgrades and license management. IT leaders will gain insight into strategies for streamlining operations, strengthening network security posture and reducing total cost of ownership through AI powered network automation.
12 hours ago
Regulatory pressure from DORA, NIS2, and the UK Cyber Assessment Framework is forcing organizations to answer a critical question: can they clearly prove which machines accessed which resources, when, and for what purpose. This webinar examines the compliance risks created by unmanaged machine identities and weak secrets governance, drawing on real world experience from security teams working with customers across EMEA.
The session highlights four common pitfalls, including incomplete asset inventories, access controls that overlook non human identities, fragmented vault usage across cloud and on premises environments, and unmanaged third party credentials. Presenters will share how these gaps turn into audit findings and explain practical, field tested approaches for strengthening centralized discovery and governance. Attendees will gain insight into how improving machine identity management and secrets control can reduce regulatory exposure without disrupting development workflows.
12 hours ago
Hybrid AD environments are becoming harder to manage as manual processes, privilege sprawl, and outdated tools introduce hidden risk. This webinar examines how these challenges affect security and operations across Active Directory and Entra environments. It addresses common concerns such as script based management, misconfigurations, and privilege drift that can weaken overall control.
The session outlines how organizations are reducing onboarding time, limiting privileged accounts, and improving recovery speed in hybrid environments. It also explains why continuous monitoring and just in time recovery have become critical to maintaining resilience and minimizing disruption across identity infrastructure.
11 hours from now
Many identity lifecycle management programs stop at applications that support SCIM or APIs, leaving significant gaps across disconnected systems. This webinar addresses how enterprises can extend lifecycle management to SaaS, legacy, custom, and on premise applications that require manual onboarding, offboarding, and access updates. The session highlights the security risks, audit exposure, and operational strain caused by these limitations.
Attendees will see a live demo of Cerby IdLCM for applications without SCIM or APIs and learn how organizations manage roles, entitlements, and flexible offboarding across cloud and on premise environments. Real examples show how automated, auditable controls reduce manual access tasks while complementing existing identity platforms.
11 hours from now
Uncontrolled SaaS usage is creating hidden security gaps as finance and IT lose visibility into who has access to critical business applications. This webinar focuses on how collaboration between IT and finance helps uncover shadow IT, reduce offboarding risks, and strengthen access governance across a growing SaaS environment.
The discussion shows how better visibility into SaaS spend also improves security by identifying unmanaged tools, preventing former employees from retaining access, and tightening control over application identities. Real examples highlight how aligning procurement, finance, and IT teams reduces risk while bringing order to SaaS sprawl, turning spend management into a practical layer of cybersecurity defense.
1 day from now
Quantum computing is expected to reshape the security landscape by threatening the cryptographic systems widely used today. This webinar examines why organizations should begin preparing now, even as large scale quantum attacks remain years away. The session explains how adversaries may already be collecting encrypted data with the intention of decrypting it once quantum capabilities mature.
The discussion introduces post quantum cryptography and outlines key attack vectors organizations should understand. It also reviews emerging standards and guidance, along with considerations for transitioning to quantum resistant systems. Attendees will see how hardware backed authentication and quantum resistant credentials can help strengthen long term cryptographic resilience.
6 days from now
AI powered browsers are reshaping how users interact with the web, but new research shows they may also be introducing serious security gaps. This session takes a close look at how CyberArk Labs uncovered critical vulnerabilities in Perplexity’s Comet browser, including prompt injection attacks that enabled unauthorized purchases, local file access and full account takeovers. The discussion explains how these weaknesses challenge long standing browser security assumptions.
Researchers walk through the discovery process, from early testing to coordinated disclosure, offering practical insight into how modern vulnerability research unfolds. The webinar highlights why large language models cannot be treated as security boundaries and what these findings mean for organizations evaluating AI driven tools. Attendees will gain a clearer understanding of the risks surrounding AI integrated browsers and the broader implications for future web security models.
6 days from now
Identity based attacks are becoming the fastest way for adversaries to move inside organizations, using stolen credentials, session hijacking, and abused access to bypass traditional defenses. This webinar focuses on how Okta’s Identity Threat Protection helps security teams detect and stop these attacks in real time before they spread across the environment.
The session explains why fragmented identity signals slow down response and how unified visibility shortens detection timelines from hours or days to minutes. Attendees will see how real time identity intelligence enables faster investigation, blocks lateral movement, and strengthens overall security posture by putting identity at the center of threat protection.
1 week from now
Building secure, production ready AI agents starts with identity, not afterthought security. This webinar dives into how identity becomes the foundation for scaling AI safely, especially as organizations move beyond pilots into real world deployment. The session explains why many AI initiatives stall and how weak identity controls create hidden security risks as AI agents interact with users, systems, and data.
The discussion focuses on how Auth0 enables AI agents to operate with secure, manageable identities without adding complexity. Attendees will see how identity driven design helps organizations protect AI powered products, reduce risk, and prepare for an evolving AI ecosystem where trust and access control are critical.
5 days ago
Just in time privilege is becoming a practical way to reduce standing access and strengthen identity security across modern environments. This session focuses on how organizations are applying JIT in real world settings, moving beyond theory to clear, actionable use cases. Delinea experts will explain how JIT supports broader identity security remediation efforts and where it can deliver immediate impact.
The discussion highlights four common implementation areas, including credential access, administrative activity on endpoints and applications, privileged control across server infrastructure and extending JIT into cloud native environments. Attendees will gain practical guidance on expanding JIT adoption, reducing persistent privilege and getting more value from existing identity security investments.
5 days ago
Identity security has become one of the most targeted areas in modern SaaS and AI driven environments, and this quarterly session examines how credential risk is evolving. The webinar reviews current attacker tactics, including advanced phishing and credential abuse, and explains why fragmented visibility across users and machine identities increases exposure. It also explores how AI driven workflows are reshaping access risk across organizations of all sizes.
The discussion outlines why extending credential protection to every employee is critical for closing security gaps and reducing compromise risk. Attendees will see how 1Password supports organization wide credential security at scale and hear updates on recent product innovations. The session is designed to help security teams strengthen identity controls and improve visibility across their entire environment.