Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
10 hours ago
This virtual workshop provides hands on experience building a secure corporate network using Cloudflare’s SASE platform. Participants will follow a live, guided lab to configure protections for users, devices, data, and networks within a modern enterprise environment.
The session covers enabling remote access to applications and networks, supporting hybrid remote users with secure internet access, and allowing contractors to administer infrastructure safely. Attendees work directly within Cloudflare’s integrated platform to apply these configurations in real time. The workshop is limited to a small group to support an interactive learning experience.
10 hours ago
Shadow AI is creating new security blind spots as employees adopt unapproved AI tools to store data, generate content and automate daily tasks. This session examines how unsanctioned AI usage introduces hidden risks across client environments and why many traditional security controls struggle to detect or manage this behavior. The discussion focuses on the growing operational challenge this presents for managed service providers.
The webinar outlines practical steps MSPs can take to regain visibility, reduce complexity and strengthen protection across distributed environments. Attendees will explore frameworks that support policy enforcement, improve oversight and simplify ongoing security management. The session is designed to help MSPs address AI driven risks while maintaining consistent protection and operational efficiency.
10 hours ago
Unapproved use of AI tools is creating hidden security gaps as employees store data, automate tasks, and generate content outside approved systems. This webinar focuses on how shadow AI introduces new risks, why these activities are difficult to detect, and how they expand the attack surface across modern enterprise environments.
The session explains why traditional security controls struggle to keep up with AI driven user behavior and outlines practical ways to restore visibility without adding operational complexity. Attendees will hear strategies for enforcing policy consistently, simplifying security management, and preparing for the next wave of AI related threats while maintaining productivity across distributed teams.
10 hours ago
This webinar examines how AI is reshaping cyber attacks and why traditional detection methods struggle to keep pace. The session explores how adversaries use AI agents to automate reconnaissance, code generation, and lateral movement, enabling attacks to progress across the kill chain with greater speed and effectiveness.
The discussion focuses on using deception-based security techniques to detect advanced threats without generating excessive alerts. Topics include deploying decoys, honeytokens, and breadcrumbs that convert attacker activity into actionable intelligence, improving detection accuracy while reducing false positives. Attendees will also learn strategies for defending AI infrastructure, including securing LLM environments, pipelines, and autonomous agents against emerging AI-driven threats.
13 hours from now
Active Directory remains central to enterprise identity, yet legacy protocols and limited modern security controls continue to expose it to risk. This webinar examines why AD is a frequent target in identity based attacks and how evolving audit and insurance expectations are increasing pressure around MFA coverage and reporting. Organizations that rely on AD need stronger protection without rebuilding their infrastructure.
The session outlines practical steps to extend MFA to critical workflows and improve visibility into privileged users and nonhuman identities. It also covers approaches for closing hybrid identity gaps, strengthening compliance, and reducing risk using capabilities designed to simplify implementation and limit disruption.
5 days from now
Cloud WAF Roadmap 2026 takes a forward looking view of how web application firewall technology is evolving to address increasingly complex cloud environments and faster, more automated threats. The session examines emerging attack patterns expected to shape 2026 and outlines how Cloud WAF solutions are adapting through improved intelligence, automation and adaptive protection. It also looks at the architectural changes influencing application security in modern cloud native environments.
The discussion covers protection strategies for APIs, microservices and distributed applications, along with how Cloud WAF integrates into a broader security ecosystem for stronger visibility and control. Attendees will gain insight into aligning security investments with business priorities while maintaining performance and user experience. The webinar provides practical guidance for organizations preparing their cloud application defenses for the next generation of threats.
5 days from now
Rapid growth can create unexpected complexity for digital native businesses. This webinar explores how companies built on cloud technologies can overcome scaling challenges while maintaining speed and resilience. The session explains how fragmented applications, technical debt, and a growing attack surface can slow innovation and increase operational costs as organizations expand.
Attendees will examine architectural approaches that help simplify operations while strengthening security through a Zero Trust model. The discussion also covers the maturity journey of digital native businesses, from foundational web security to protecting intellectual property in the age of AI. The session highlights strategies to build a more resilient and scalable digital environment.
5 days from now
Security transformations often introduce challenges that do not align neatly with standard vendor solutions, particularly when organizations must address regulatory requirements, emerging technologies, and evolving infrastructure. This webinar features insights from Indeed as it navigates these challenges while advancing its security strategy. The session explores how the organization approached Secure Access Service Edge (SASE) adoption and experimented with AI to support evolving security needs.
Harshad Kadam, Senior Infrastructure Security Engineer at Indeed, shares practical experiences from implementing customized security solutions and adapting existing platforms to support new requirements. The discussion highlights lessons learned from MCP server security and configuration management, as well as approaches used to build tailored capabilities using Cloudflare’s developer platform. Attendees will gain practical perspectives on fostering innovation within security programs while addressing complex operational and technical challenges.
6 days from now
Financial institutions are entering 2026 with a resilience mandate shaped by evolving cyber threats and rapid AI adoption. This webinar examines how adversaries are shifting from breaching defenses to exploiting stolen identities, while AI introduces new shadow supply chain risks. Designed for CIOs, CISOs, and CTOs, the session brings together global threat intelligence and strategic insights to help leaders prepare for the changing landscape.
Speakers discuss identity focused defense beyond MFA, AI governance as a board level risk issue, and policy based trust for machine to machine interactions. The conversation also addresses hidden risks in over privileged SaaS and AI integrations, along with the need to modernize legacy technology stacks.
6 days from now
The integration of large language models into modern applications introduces new security risks that traditional defenses are not designed to address. This interactive session explores how AI driven systems can be exploited through techniques such as prompt injection, data extraction, and model abuse. Participants will gain hands on experience in a controlled lab environment, simulating real world attacks against AI applications.
During the live lab, attendees will test and defend against common AI threats while observing how advanced security controls detect and mitigate malicious inputs in real time. The session demonstrates how vulnerabilities can be exploited and how modern application security approaches can protect AI systems without disrupting user experience. This event is designed for security engineers, developers, and DevOps practitioners seeking practical exposure to AI security challenges.
6 days from now
Protect your website against the most critical web application threats by understanding the OWASP Top 10 attack vectors and the controls designed to stop them. This session breaks down common exploitation techniques, explains the security rules that mitigate them and outlines practical testing methods to identify and address vulnerabilities before they are abused.
The discussion also covers secure website onboarding, proper ACL configuration and effective security rule management. A live demonstration will show how these protections function in real time, giving attendees clear guidance on strengthening web defenses and improving overall security posture.
1 week from now
Cyber threats across the Asia Pacific region are evolving rapidly, with attackers increasingly relying on identity abuse, social engineering, and data extortion rather than traditional vulnerability exploitation. This webinar examines key trends shaping the 2026 cyber threat landscape and the risks CISOs must prepare for as organizations adapt to new attacker strategies.
The session explores how social engineering is expanding beyond email into voice, chat, and collaboration platforms, and how identity based attacks are bypassing controls such as multi factor authentication and helpdesk verification. Speakers will also discuss the role of unmanaged devices in ransomware incidents and the shift toward data extortion focused attacks. Attendees will gain practical priorities to help security leaders detect threats earlier and reduce business impact.