Network Security Webinars

Discover Security Events in Network Security

Get Network Security Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Network Security: Current Status

Network Security remains fundamental to cybersecurity despite dramatic changes in network architectures driven by cloud adoption, remote work, and software-defined networking. Traditional perimeter-based defenses have given way to distributed security models that protect data flows across hybrid environments, requiring new approaches to visibility, control, and threat prevention.

Evolving Network Architecture

The dissolution of traditional network perimeters has fundamentally changed network security. Organizations now protect assets distributed across on-premises data centers, multiple cloud providers, branch offices, and remote workers. Software-defined wide area networks (SD-WAN), cloud-native architectures, and containerized applications create dynamic, ephemeral network environments challenging conventional security controls. Zero-trust network access (ZTNA) principles mandate verification of every connection attempt regardless of source location, replacing implicit trust models.

Advanced Threat Prevention

Next-generation firewalls, intrusion prevention systems, and network detection and response platforms employ deep packet inspection, behavioral analysis, and threat intelligence integration to identify sophisticated attacks. Encrypted traffic has become ubiquitous, requiring specialized inspection capabilities while respecting privacy requirements. Organizations deploy network segmentation, micro-segmentation, and software-defined perimeters to limit lateral movement and contain breaches.

Visibility and Management Challenges

Security teams struggle with maintaining comprehensive visibility across fragmented network environments. Shadow IT, unmanaged cloud services, and IoT devices create blind spots. Network security management requires coordinating policies across disparate platforms, correlating events from multiple sources, and adapting to constant infrastructure changes. Automation, orchestration, and AI-driven analytics have become essential for managing network security at scale while addressing the persistent cybersecurity skills shortage.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

16th December 2025 | Threat Watch Live - December

This session reviews the most significant cyber incidents of 2025 and highlights the lessons security teams should carry forward into the new year. Heimdal founder Morten Kjaersgaard joins the discussion to break down what these events revealed about attacker behavior, organizational weaknesses and the trends reshaping the threat landscape.

The webinar also looks ahead to the major risks expected in 2026, outlining which shifts are likely to matter most and what actions security leaders can take now to strengthen readiness. Attendees receive practical guidance for adapting their strategy, anticipating emerging threats and preparing their organization for the challenges of the coming year.

Company_Webinar • Part of Heimdal

_flag

17th December 2025 | PCI DSS 4.0.1 Controls are Not Stopping eSkimming

This session focuses on the growing gap between PCI DSS 4.0.1 requirements and the realities of eSkimming threats on modern websites. The discussion outlines why common controls like CSP, SRI and homegrown script monitoring fail to keep pace with dynamic scripts, frequent third party changes and the scale of client side activity in every customer session. Speakers explain how these shortcomings create openings for eSkimming, credential theft and silent data leakage that PCI programs often underestimate.

Attendees will hear what card brands and QSAs are now expecting in PCI reviews, how browser side risks are evaluated and what a modern, behavior based defense looks like in practice. The session shows how organizations can build a reliable script inventory, close client side security gaps and reduce the effort required to stay compliant. Practical guidance is included for eliminating sitewide vulnerabilities and strengthening protection against real world eSkimming attacks.

Company_Webinar • Part of Source Defense

_flag

17th December 2025 | VPN Replacement Made Simple: How SMEs Can Modernize Secure Access with ZTNA

Small and midsize enterprises are facing growing security gaps as legacy VPNs reach end of life and struggle to support modern remote and hybrid work. This webinar shows how ZTNA provides a more secure and reliable access model by removing the latency, connection issues and management overhead that come with traditional VPNs. The session explains how ZTNA improves user experience, strengthens verification and reduces the risks created by outdated remote access tools.

Speakers will outline the essential capabilities to look for in an enterprise ready ZTNA solution and share practical steps for migrating without downtime. The discussion also highlights how unified ZTNA brings continuous posture checks, inline threat defense and smoother performance for cloud and SaaS access. The webinar is designed for security and network leaders preparing to modernize secure access before VPN EOL forces rushed changes.

Company_Webinar • Part of Versa Networks

_flag

11th December 2025 | 2025 Cyber Security Recap: Trends, Threats, and Takeaways Fireside Chat

This session gives security leaders a clear view of the major shifts that shaped 2025, with Check Point executives leading the discussion on what those changes mean for the year ahead. Nataly Kremer and Ruma Balasubramanian break down how AI driven threats evolved, which breakthroughs had the biggest impact and why resilience first architectures are becoming a priority for modern organizations.

The conversation explains how AI has changed both attacker tactics and defensive playbooks, then moves into Check Point’s top cybersecurity predictions for 2026 to help teams prepare early. Attendees will gain a practical understanding of the most influential threats, the architectural trends redefining enterprise security and the steps needed to stay ahead as the landscape continues to shift.

Company_Webinar • Part of Check Point

_flag

10th December 2025 | What does HardenStance predict for Telco DDoS in 2026?

The webinar examines how DDoS threats are rising across the telco sector and what service providers can do to stay resilient as attack volumes grow. HardenStance and Allot outline the trends shaping DDoS activity in 2026 and explain how telcos are adapting their defenses to handle larger, more complex attacks. The session gives a clear view of what is changing in the threat landscape and what operators should anticipate next.

Attendees will hear practical guidance on assessing protection options, balancing accuracy with cost and preparing for the added pressure that 5G, fixed wireless access and IoT growth place on network security. The discussion is designed to help teams build a more adaptive DDoS strategy. All participants receive access to the webinar recording and the HardenStance briefing.

Company_Webinar • Part of Allot

_flag