Discover Security Events in Mssp
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
6 days from now
Cybersecurity risk across private equity portfolios is increasing, and its financial impact is becoming harder to ignore. This webinar presents Kroll’s latest research on how private equity firms are managing cyber risk within their portfolio companies and how cyber incidents are disrupting deals, increasing costs, and threatening exit value. The discussion focuses on real financial consequences, common disruption points in deal lifecycles, and why portfolio level cyber governance is now critical.
The session covers current trends in how firms set cybersecurity expectations for portfolio companies, how risk is assessed and managed in practice, and what private equity leaders are seeing firsthand when cyber issues arise. Attendees will gain practical insight into where firms are most exposed, how approaches differ by firm size, and what steps can help reduce risk, limit financial impact, and protect long term portfolio value.
1 week from now
A focused discussion on the cyber risks expected to shape 2026, based on Quorum Cyber’s Global Cyber Risk Outlook. The webinar examines how geopolitical instability and rapid advances in AI are influencing today’s threat landscape and increasing pressure on organizations across sectors.
Experts from Quorum Cyber and Microsoft share key findings from the report, highlight emerging risks for the year ahead, and offer practical guidance on strengthening cyber security posture, resilience, and risk management. The session is designed to help organizations better understand current threats and take informed action to reduce cyber risk in an increasingly uncertain environment.
1 week from now
A focused briefing on the updated Regulation S-P requirements and what financial institutions need to do to stay compliant as the new rules take effect. The webinar breaks down how recent amendments change expectations around safeguarding customer information, data disposal, and privacy controls for investment advisors and other covered firms.
The session outlines the new regulatory requirements, explains their impact on day to day operations, and highlights practical steps organizations should take to prepare for the compliance deadline. Led by Kroll experts, the discussion also covers proven best practices that support stronger data protection, reduce regulatory risk, and help firms maintain long term compliance.
1 week from now
Many organizations rely on Conditional Access policies that were created early in their Microsoft Entra deployments and expanded over time. This webinar examines how these legacy and organically grown configurations can introduce hidden security gaps that attackers may exploit.
The discussion covers common misconfigurations, recent Conditional Access enhancements announced at Microsoft Ignite, and new considerations such as agentic identities. Attendees will gain practical guidance on designing a stronger, scalable Conditional Access strategy that improves identity security and supports future growth.
2 weeks from now
Incident response can define the relationship between an MSP and its clients, especially when pressure is high and expectations are higher. This webinar focuses on how MSPs can take control during cyber incidents by balancing technical response with clear communication and decisive leadership. Drawing from real world incident response experience, the session highlights what matters most from the first alert through recovery.
The discussion covers practical approaches to minimizing disruption through effective detection, containment and escalation, along with guidance on communicating clearly and empathetically during critical moments. Attendees will also gain insight into when to involve specialized incident response partners and how to build stronger operational resilience before the next incident occurs.
2 weeks from now
Penetration testing in operational technology environments requires a careful approach to avoid disrupting critical systems or impacting safety. This webinar focuses on how OT penetration testing differs from traditional IT testing and explains why standard methods can introduce serious risk when applied to industrial environments.
The session outlines practical techniques for testing OT systems safely, reducing the chance of downtime while still identifying real vulnerabilities. Attendees will gain insight into common weaknesses found in OT estates, real world examples that affect reliability and safety, and key factors to consider when selecting an OT penetration testing provider. The webinar is designed to help organizations strengthen OT security without compromising operations.
1 month from now
Security teams running Splunk with limited resources will see how to optimize deployments without adding tools or increasing spend. This hands on masterclass focuses on practical ways to reduce data sprawl, improve performance, and get more value from Splunk by aligning ingestion and tuning decisions with real security priorities.
The session covers how to route logs intelligently across Splunk, data lakes, and cloud storage, reduce noise without missing risk, and make smarter security decisions with fewer false positives. Built on real world deployments, the discussion is designed for lean teams that want to regain control of their Splunk environment while improving security outcomes and operational efficiency.
1 month from now
Transaction activity increases cyber risk, especially during mergers and acquisitions when threat actors actively monitor deal announcements. This webinar focuses on how organizations can use threat informed, data driven methods to improve cybersecurity readiness before, during, and after transactions. The speakers explain how attack simulation and real security data help buyers and sellers identify defensive gaps and communicate risk clearly during due diligence.
The discussion covers both buy side and sell side perspectives, highlighting common security weaknesses that delay deals or increase remediation costs. Attendees will gain practical insight into preparing for technical cybersecurity due diligence, avoiding common mistakes, and strengthening security posture ahead of transaction milestones. The session is designed for investors, deal teams, and security leaders involved in M and A activity.
5 days ago
Security teams are rethinking MDR as growing attack surfaces and evolving threats expose the limits of alert driven security operations. This webinar introduces MDR 3.0, a modern approach that shifts focus from reporting activity to reducing real business risk through stronger alignment with resilience goals.
The session examines how AgenticAI and Continuous Threat Exposure Management support a more proactive and measurable security model. Deepwatch experts explain what is driving this shift and how organizations are moving toward preemptive security programs that prioritize risk reduction over alert volume.
1 week ago
Quantum computing is turning encrypted data into a time sensitive liability as attackers collect information today with plans to decrypt it once current encryption standards fail. This webinar focuses on the real world risk behind Harvest Now, Decrypt Later tactics and why RSA and ECC are approaching the end of their effective lifespan for protecting sensitive data.
The session centers on how organizations, especially SMBs, can begin transitioning to post quantum cryptography without disrupting operations. Speakers discuss building crypto agility, reducing reliance on hard coded algorithms, and preparing systems to adapt as standards change. Attendees will also receive a practical readiness roadmap for 2026, including guidance on auditing cryptographic assets and evaluating vendor preparedness for the post quantum era.
1 week ago
A focused threat intelligence briefing covering the latest attacker activity, critical vulnerabilities, and emerging risks shaping the global cybersecurity landscape. This webinar presents research-driven insights from eSentire’s Threat Response Unit, highlighting how threat actors are weaponizing AI and large language models, abusing authentication and single sign-on flaws, and exploiting newly disclosed vulnerabilities across major enterprise platforms.
The session also examines recent malware activity and provides an update on cyber threats influenced by ongoing geopolitical tensions. Designed to keep security teams informed and prepared, the briefing delivers timely analysis and practical context to help organizations better understand current attack methods and strengthen their defensive posture.
1 week ago
Quantum computing and its impact on modern encryption take center stage in this webinar focused on emerging security risks and practical preparation. The discussion looks at how the threat of harvest now, decrypt later is already influencing attacker behavior and why existing RSA and ECC based protections will not be sufficient in a post quantum world. Speakers break down the real security implications without diving into heavy theory.
The session explains what post quantum cryptography is, why crypto agility matters, and how organizations can begin preparing today. Attendees will hear clear guidance on assessing current encryption exposure, understanding vendor readiness, and taking realistic first steps toward quantum resistant security. Designed for SMB leaders, this webinar delivers a practical roadmap for protecting sensitive data against next generation threats.