Discover Security Events in Mssp
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 days from now
This month’s TRU Intelligence Briefing gives security teams an inside look at the latest cyber threats identified by eSentire’s Threat Response Unit. The session highlights new research findings from TRU’s analysts, who track malware activity, vulnerability exploitation and threat actor behavior across global environments. Attendees will see what is shaping the current threat landscape and how these trends impact enterprise defense.
The briefing covers the major Adversary in the Middle campaigns seen throughout 2025, including techniques used by prominent toolkit operators and their affiliates. TRU will also break down recent Phishing as a Service activity, detection opportunities and common infrastructure abused in these operations. Additional insights include updates on recently disclosed vulnerabilities, notable malware families observed by the SOC and a short geopolitical overview focusing on AI enabled cyberespionage.
4 days from now
The Q1 Roadmap Webinar will highlight AgileBlue’s newest updates to its AI native SecOps platform and preview what is planned for 2026. The session will cover improvements in AI driven detection and response, upgrades that reduce alert overload and new capabilities designed to simplify day to day security operations. Attendees will also hear how the platform continues to support organizations with full stack monitoring, vulnerability scanning and automated incident response.
The speakers will share real examples of how customers are improving detection speed, lowering false positives and strengthening overall protection through the combination of agentic AI and 24 by 7 human expertise. This webinar offers a clear view of what AgileBlue delivers today and what users can expect as the platform evolves.
6 days from now
Insider risk is becoming harder to manage as organizations adopt hybrid work, generative AI, and cloud-based collaboration. This non technical webinar focuses on how Microsoft Purview provides visibility, governance, and actionable insights to help organizations monitor and reduce insider risk without disrupting productivity.
The session shows how Purview can detect risky data sharing, monitor activity involving removable media and personal cloud storage, and strengthen protection of sensitive and personal data. Attendees will also see how insider risk monitoring can support compliance requirements and provide leadership teams with confidence that risks are being actively addressed.
1 week from now
A focused look at the threats shaping cybersecurity in 2026, this webinar breaks down key findings from the Arctic Wolf 2026 Threat Report. The session connects threat intelligence research on how the landscape evolved in 2025 with expert analysis to highlight the risks organizations are most likely to face in the year ahead.
Arctic Wolf specialists share insights drawn from real world data and interviews with internal experts, helping security teams understand emerging attack patterns, shifting adversary behavior, and where to prioritize defenses moving forward.
1 week from now
This session focuses on zero day threat detection and the platform shifts organizations are making to stay ahead of modern attacks. As part of the Arctic Wolf and Marco Technologies webinar series, the discussion looks at how evolving threats challenge traditional security models and why updated detection approaches are becoming essential.
The webinar highlights practical considerations for improving visibility, strengthening response capabilities and adapting security platforms to meet today’s risk landscape. Attendees can join this session on its own or as part of the broader series, depending on their interests and priorities.
3 weeks from now
This webinar outlines AgileBlue’s updated approach to sharing its product roadmap for 2026 and explains why the company is shifting to a single annual roadmap event supported by targeted product webinars throughout the year. The session focuses on how this new format provides a clearer, more strategic view of future direction while aligning updates more closely with actual feature releases.
Attendees will gain insight into how this roadmap structure allows for deeper product discussions when they matter most and more timely communication as new capabilities are introduced. The webinar is designed for customers and stakeholders who want better visibility into AgileBlue’s product plans and how upcoming developments will be rolled out over the coming year.
1 month from now
Many organizations rely on Conditional Access policies that were created early in their Microsoft Entra deployments and expanded over time. This webinar examines how these legacy and organically grown configurations can introduce hidden security gaps that attackers may exploit.
The discussion covers common misconfigurations, recent Conditional Access enhancements announced at Microsoft Ignite, and new considerations such as agentic identities. Attendees will gain practical guidance on designing a stronger, scalable Conditional Access strategy that improves identity security and supports future growth.
2 months from now
Transaction activity increases cyber risk, especially during mergers and acquisitions when threat actors actively monitor deal announcements. This webinar focuses on how organizations can use threat informed, data driven methods to improve cybersecurity readiness before, during, and after transactions. The speakers explain how attack simulation and real security data help buyers and sellers identify defensive gaps and communicate risk clearly during due diligence.
The discussion covers both buy side and sell side perspectives, highlighting common security weaknesses that delay deals or increase remediation costs. Attendees will gain practical insight into preparing for technical cybersecurity due diligence, avoiding common mistakes, and strengthening security posture ahead of transaction milestones. The session is designed for investors, deal teams, and security leaders involved in M and A activity.
2 days ago
Security leaders and practitioners get a forward looking view of the trends shaping the cybersecurity landscape in 2026, based on real world experience from senior experts at GuidePoint Security. The discussion centers on how emerging technologies, evolving attacker behavior and shifting security architectures are redefining how organizations must defend themselves in the coming year.
The panel covers the growing use of autonomous AI by attackers and defenders, the move toward identity as the primary security perimeter and the expanding risks tied to ransomware services, supply chain exposure and global compliance demands. Attendees will gain practical insights into building resilient security frameworks and preparing teams and controls for the challenges ahead, whether they are setting strategy or executing day to day security operations.
3 weeks ago
This session gives an inside look at how the BWT Alpine Formula One Team strengthens its cybersecurity program through its partnership with Arctic Wolf. The discussion highlights the unique security pressures that come with operating in a fast paced, data driven racing environment and shows how Arctic Wolf supports Alpine with continuous protection and operational resilience.
Attendees will hear insights from both teams on the challenges they face, the value of 24x7 monitoring and response and the role of an empathetic, security first culture in keeping a global racing operation secure. The webinar offers a clear view of how strategic collaboration improves agility and defense in a high stakes setting.
3 weeks ago
This debate brings together cybersecurity leaders to examine which emerging threats are most likely to shape 2026. The speakers compare identity based attacks, cloud misconfigurations and AI driven offensive techniques, outlining why each vector is becoming more dangerous as environments expand and attackers move faster. Their discussion draws heavily on evidence from ongoing investigations and industry wide intelligence.
Participants will hear competing viewpoints on the trends and tactics that demand the most immediate attention and what organizations should do now to prepare. The session offers a clear look at the attacker behaviors that are gaining momentum and highlights the operational weaknesses businesses need to close before these threats intensify. Attendees will also have the opportunity to vote on which perspective best outlines the dominant risk for the coming year.
4 weeks ago
This session examines how remote worker fraud has become a growing insider threat and shows how recruitment and security teams can collaborate to prevent attacks before they unfold. The discussion highlights the techniques used by fraudulent applicants, including deepfakes, false identities and interview manipulation, and explains why these risks are harder to detect when employees operate from anywhere in the world.
Attendees will hear real examples of threats stopped by Field Effect MDR and gain practical guidance on strengthening defenses through behavioral analytics, endpoint monitoring and stronger identity verification practices. The webinar focuses on helping organizations recognize early warning signs and reduce exposure to insider style attacks that originate far outside the physical workplace.