Discover Security Events in Mssp
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 days ago
Protecting converged IT and OT environments in critical infrastructure requires a different security model than traditional enterprise IT. This session examines how operators in water, energy and transport sectors can build effective security operations that safeguard industrial control systems, SCADA networks and safety critical systems while maintaining uptime and meeting regulatory demands.
The discussion explores the key differences between IT and OT security, recent threat activity including nation state groups such as Volt Typhoon and ransomware targeting critical national infrastructure, and why unified monitoring across both domains is essential. Attendees will see how to design a converged SOC model that blends security and engineering expertise, aligns with frameworks such as CAF v4.0, NIS2 and NIST, and supports phased implementation from quick wins to longer term transformation.
5 days ago
Artificial intelligence is reshaping how organizations approach cybersecurity, shifting focus toward identifying and mitigating vulnerabilities before they are exploited. This event brings together industry leaders and investors to examine how AI-driven, preemptive strategies are influencing security practices and decision-making across the sector.
The discussion explores how proactive threat detection, data-driven insights, and evolving technologies are changing the cybersecurity landscape. It also considers the implications for investment and M&A activity, highlighting how organizations and investors are adapting to emerging risks and opportunities. Attendees will gain perspective on the growing role of AI in strengthening resilience and enabling earlier, more effective responses to potential cyber threats.
1 week ago
New cybersecurity certification requirements are reshaping the Canadian defence supply chain, making compliance essential for organizations seeking government contracts. This webinar explores the Canadian Program for Cyber Security Certification (CPCSC) and its impact on businesses handling controlled information. The session focuses on how evolving regulations are shifting from self attestation to mandatory verification and structured audits.
Attendees will learn how to navigate CPCSC requirements, prepare for upcoming assessment levels, and align with evolving compliance timelines. The discussion also covers key differences between CPCSC and frameworks such as CMMC, particularly for organizations operating across borders. The webinar provides practical guidance on turning compliance into a competitive advantage while strengthening security and regulatory readiness.
1 week ago
Healthcare organizations are facing evolving threats where attackers prioritize data theft, identity abuse, and persistent access over disruption. At the same time, increasing system complexity and regulatory demands are making it harder to maintain visibility, monitoring, and audit readiness with limited resources.
The discussion focuses on balancing HIPAA compliance with effective security operations in constrained environments. It covers how threat patterns are shifting, the challenges of continuous monitoring, and approaches to simplify log retention and audit support. Practical guidance is provided to help organizations strengthen detection and response while meeting compliance requirements and maintaining control over sensitive patient data.
1 week ago
This webinar examines how Arctic Wolf is applying agentic AI within its Aurora® Superintelligence Platform and Aurora Agentic SOC to improve cybersecurity operations. It focuses on how AI can enhance detection speed, investigation accuracy, and response while maintaining trust and control in security environments.
Led by Arctic Wolf experts, the session connects these capabilities to real challenges faced by security teams. Drawing on insights from thousands of customer environments, it provides practical context on operationalizing AI in the SOC. Attendees will gain a clearer view of how agentic AI can be used to strengthen security outcomes and support more effective threat detection and response.
2 weeks ago
Understanding how real world cyber incidents unfold is critical for improving defense strategies. This webinar provides an inside look at current threat activity through the perspective of incident response and negotiation teams. The session focuses on how attackers operate, the techniques they use, and how organizations are being compromised in today’s threat landscape.
Attendees will gain insight into evolving threat actor behaviors, common entry points, and trends in ransomware attacks. The discussion also covers real world incident response experiences and how negotiation processes are handled during cyber incidents. The webinar offers practical knowledge to help security teams better prepare for, detect, and respond to modern cyber threats.
3 weeks ago
Small and midsize organizations face increasingly sophisticated cyber threats but often lack the resources to deploy and manage traditional SIEM platforms. This webinar explores how a Mini SOC approach can deliver effective security operations using Microsoft Extended Detection and Response capabilities. The session focuses on building a cost efficient and flexible security model that enables organizations to detect, investigate, and respond to threats without the complexity of full scale SIEM solutions.
Attendees will learn how to unify security tools into an integrated platform, improve threat detection and incident response, and reduce operational overhead. The discussion includes practical examples and strategies for strengthening security operations in both cloud and on premises environments. The webinar provides guidance on creating a scalable SOC model tailored to organizational size and needs.
3 weeks ago
Major changes to UK cyber regulation under the proposed Cyber Security and Resilience Bill are the focus of this strategic session, outlining how expanded requirements will affect both existing Operators of Essential Services and newly in scope organizations. The discussion explains how the Bill broadens regulatory coverage beyond traditional critical infrastructure and places stronger expectations on supply chain security, assurance and oversight.
Legal and technical experts examine new incident reporting obligations, supply chain compliance monitoring and contractual approaches that support resilience. The webinar also explores how the UK framework may interact with global cyber regulations and what organizations should anticipate once the Bill becomes law. Attendees will gain practical guidance on preparing governance, compliance and cybersecurity teams for the incoming regulatory shift.
3 weeks ago
As AI adoption accelerates across organizations, governance and oversight often lag behind, creating new security and compliance risks. This webinar explores the challenges of managing AI systems, including shadow AI, data exposure, and lack of visibility into how AI tools are used. The session focuses on the importance of governing AI responsibly and aligning with standards and regulatory expectations.
Attendees will learn how to identify and test AI vulnerabilities such as prompt injection, data leakage, and model misuse. The discussion also covers how AI penetration testing works and how to monitor AI usage across the organization. The webinar provides practical guidance on building effective AI governance, improving visibility, and protecting sensitive data and intellectual property in AI driven environments.
3 weeks ago
Transaction activity increases cyber risk, especially during mergers and acquisitions when threat actors actively monitor deal announcements. This webinar focuses on how organizations can use threat informed, data driven methods to improve cybersecurity readiness before, during, and after transactions. The speakers explain how attack simulation and real security data help buyers and sellers identify defensive gaps and communicate risk clearly during due diligence.
The discussion covers both buy side and sell side perspectives, highlighting common security weaknesses that delay deals or increase remediation costs. Attendees will gain practical insight into preparing for technical cybersecurity due diligence, avoiding common mistakes, and strengthening security posture ahead of transaction milestones. The session is designed for investors, deal teams, and security leaders involved in M and A activity.
1 month ago
Security teams running Splunk with limited resources will see how to optimize deployments without adding tools or increasing spend. This hands on masterclass focuses on practical ways to reduce data sprawl, improve performance, and get more value from Splunk by aligning ingestion and tuning decisions with real security priorities.
The session covers how to route logs intelligently across Splunk, data lakes, and cloud storage, reduce noise without missing risk, and make smarter security decisions with fewer false positives. Built on real world deployments, the discussion is designed for lean teams that want to regain control of their Splunk environment while improving security outcomes and operational efficiency.
1 month ago
Attackers are increasingly targeting identity systems, edge infrastructure, and human trust to gain access to organizational environments. Rather than relying solely on technical vulnerabilities, many modern attacks begin with compromised credentials, exposed edge devices, or social engineering tactics. This webinar examines key findings from the 2026 Cyber Threat Outlook Report and what they reveal about current attack patterns.
The session explores how identity compromise has become a common entry point for breaches, along with the growing exploitation of edge technologies such as firewalls and VPN appliances. Speakers will also discuss the continued effectiveness of phishing and other social engineering techniques. Attendees will gain insights into the underlying trends connecting many recent incidents and practical guidance on where security teams should focus their defensive efforts.