Discover Security Events in Mssp
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
14 hours ago
Airports rely heavily on third party and remote access to keep operations running, yet those same connections expose critical systems to significant cyber risk. This webinar examines how attackers exploit vendor access, shared accounts, and remote tools to reach sensitive airport environments and disrupt operations.
The session breaks down common access gaps identified during real airport security assessments and explains how those weaknesses are abused in practice. Attendees will gain a clear framework for identifying and securing third party access, along with practical steps to reduce risk and better protect critical aviation systems from cyber threats.
14 hours ago
Penetration testing in operational technology environments requires a careful approach to avoid disrupting critical systems or impacting safety. This webinar focuses on how OT penetration testing differs from traditional IT testing and explains why standard methods can introduce serious risk when applied to industrial environments.
The session outlines practical techniques for testing OT systems safely, reducing the chance of downtime while still identifying real vulnerabilities. Attendees will gain insight into common weaknesses found in OT estates, real world examples that affect reliability and safety, and key factors to consider when selecting an OT penetration testing provider. The webinar is designed to help organizations strengthen OT security without compromising operations.
1 week from now
Higher education is facing a rapidly intensifying cyber threat landscape as ransomware, data breaches, and hacktivist activity continue to rise heading into 2026. This webinar focuses on the specific risks universities and colleges face, including the impact of geopolitical tensions, predictable academic cycles, and the increasing use of automation and AI by attackers.
The session combines threat intelligence with real world operational insight to help higher education leaders understand how these threats are evolving and what practical steps can improve resilience. Attendees will gain clarity on what is changing in the threat environment and how to move from awareness to actionable security decisions tailored to the higher education sector.
1 week from now
AI driven impersonation is becoming a serious fraud risk as synthetic identities, cloned voices, and deepfake video make attackers appear legitimate. This webinar examines how these techniques allow fraudsters to impersonate executives, vendors, and employees during high stakes financial or operational transactions. The discussion focuses on how traditional trust signals and common fraud warnings are no longer reliable defenses.
The session introduces an operational resilience approach to addressing AI enabled fraud. Topics include how impersonation bypasses standard verification methods, why employee awareness training alone is no longer sufficient, and how organizations can strengthen processes to prevent unauthorized transactions or access to sensitive data. Speakers will also outline structural changes to financial approval workflows and verification practices.
1 week from now
Security teams running Splunk with limited resources will see how to optimize deployments without adding tools or increasing spend. This hands on masterclass focuses on practical ways to reduce data sprawl, improve performance, and get more value from Splunk by aligning ingestion and tuning decisions with real security priorities.
The session covers how to route logs intelligently across Splunk, data lakes, and cloud storage, reduce noise without missing risk, and make smarter security decisions with fewer false positives. Built on real world deployments, the discussion is designed for lean teams that want to regain control of their Splunk environment while improving security outcomes and operational efficiency.
2 weeks from now
Transaction activity increases cyber risk, especially during mergers and acquisitions when threat actors actively monitor deal announcements. This webinar focuses on how organizations can use threat informed, data driven methods to improve cybersecurity readiness before, during, and after transactions. The speakers explain how attack simulation and real security data help buyers and sellers identify defensive gaps and communicate risk clearly during due diligence.
The discussion covers both buy side and sell side perspectives, highlighting common security weaknesses that delay deals or increase remediation costs. Attendees will gain practical insight into preparing for technical cybersecurity due diligence, avoiding common mistakes, and strengthening security posture ahead of transaction milestones. The session is designed for investors, deal teams, and security leaders involved in M and A activity.
5 days ago
Quantifying cyber risk reduction and proving the financial value of security operations takes center stage in this 60 minute session. Arctic Wolf leaders explain how organizations can translate technical security activity into measurable business impact using actuarial validated modeling and continuous risk measurement. The discussion focuses on turning security outcomes into metrics that resonate with finance leaders and executive stakeholders.
A live walkthrough of an ROI calculator demonstrates how to measure annualized cyber risk exposure, uncover hidden operational costs and show improvements in risk posture over time. The session highlights practical ways to reduce complexity, strengthen resilience and clearly demonstrate how security investments contribute to reduced financial and operational risk.
5 days ago
Incident response can define the relationship between an MSP and its clients, especially when pressure is high and expectations are higher. This webinar focuses on how MSPs can take control during cyber incidents by balancing technical response with clear communication and decisive leadership. Drawing from real world incident response experience, the session highlights what matters most from the first alert through recovery.
The discussion covers practical approaches to minimizing disruption through effective detection, containment and escalation, along with guidance on communicating clearly and empathetically during critical moments. Attendees will also gain insight into when to involve specialized incident response partners and how to build stronger operational resilience before the next incident occurs.
1 week ago
Edge devices are increasingly targeted by adversaries operating with limited visibility and minimal traditional security controls. This expert led roundtable brings together specialists in threat intelligence, threat hunting, and detection engineering to examine how attackers exploit edge infrastructure for stealthy access, long term persistence, and large scale espionage. The discussion includes nation state activity, firmware level persistence, and the role of generative AI in accelerating vulnerability exploitation.
Speakers will explain why conventional controls often fail at the edge and how attackers leverage firmware abuse, credential access, and proxy infrastructure. Attendees will gain insight into identifying post compromise behavior and how detection engineers build signals from constrained edge telemetry.
1 week ago
Many organizations rely on Conditional Access policies that were created early in their Microsoft Entra deployments and expanded over time. This webinar examines how these legacy and organically grown configurations can introduce hidden security gaps that attackers may exploit.
The discussion covers common misconfigurations, recent Conditional Access enhancements announced at Microsoft Ignite, and new considerations such as agentic identities. Attendees will gain practical guidance on designing a stronger, scalable Conditional Access strategy that improves identity security and supports future growth.
1 week ago
A focused briefing on the updated Regulation S-P requirements and what financial institutions need to do to stay compliant as the new rules take effect. The webinar breaks down how recent amendments change expectations around safeguarding customer information, data disposal, and privacy controls for investment advisors and other covered firms.
The session outlines the new regulatory requirements, explains their impact on day to day operations, and highlights practical steps organizations should take to prepare for the compliance deadline. Led by Kroll experts, the discussion also covers proven best practices that support stronger data protection, reduce regulatory risk, and help firms maintain long term compliance.
1 week ago
A focused discussion on the cyber risks expected to shape 2026, based on Quorum Cyber’s Global Cyber Risk Outlook. The webinar examines how geopolitical instability and rapid advances in AI are influencing today’s threat landscape and increasing pressure on organizations across sectors.
Experts from Quorum Cyber and Microsoft share key findings from the report, highlight emerging risks for the year ahead, and offer practical guidance on strengthening cyber security posture, resilience, and risk management. The session is designed to help organizations better understand current threats and take informed action to reduce cyber risk in an increasingly uncertain environment.