Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 days from now
This hands on virtual workshop provides direct experience building a secure corporate network using Cloudflare’s SASE platform. In a live, interactive lab, participants are guided step by step through configuring network controls to protect users, devices, data, and applications. The session demonstrates how to enable remote access, secure internet use for hybrid workers, and allow contractors to administer infrastructure safely.
Attendees work within a single integrated platform to understand how modern SASE architecture supports secure connectivity. The small group format is limited to eight participants to support focused, practical learning and applied cybersecurity skills.
4 days from now
AI driven network operations depend heavily on accurate and complete data, yet many organizations face visibility gaps that undermine reliability and decision making. This webinar explores how incomplete network data, undiscovered assets, and low confidence in AI outputs can impact enterprise AI initiatives. The session focuses on improving data quality and visibility to support more effective automation.
Attendees will learn how network blind spots affect AI performance and how better asset discovery and data accuracy can improve outcomes. The discussion also covers how DNS and DHCP based intelligence can enhance visibility without additional infrastructure. The webinar provides insight into strengthening network data foundations, with moderate relevance to security through improved visibility and risk awareness.
1 week from now
Cyber resilience is now a critical requirement for organizations, driven by regulatory expectations and increasing threat complexity. Traditional approaches focused on detection and response often fall short in fast-moving environments, while large-scale prevention strategies can be difficult to implement quickly without disrupting operations.
A practical approach to strengthening resilience is outlined through automated, containment-focused strategies that reduce risk and limit impact. Key areas include benchmarking current resilience levels, improving network and identity-based controls, and addressing emerging threats such as shadow AI vulnerabilities and identity-driven attacks. The discussion also highlights how automated containment can restrict lateral movement and help organizations demonstrate measurable resilience aligned with audit and business expectations.
3 weeks from now
Cloud security teams are struggling to respond fast enough as attackers exploit cloud exposures within minutes. This webinar focuses on why fragmentation between CNAPP and SOC teams is slowing response and how a converged, real time security model can close those gaps across multicloud environments. The discussion explains how unifying posture management, runtime visibility, and operational response improves detection, triage, and containment of cloud based threats.
Industry analysts and security leaders examine why current cloud security architectures fail under real world pressure and outline a practical blueprint for CNAPP and SOC convergence. Attendees will gain insight into integrating CNAPP, CDR, SIEM, SOAR, and XDR to reduce MTTR, eliminate alert fatigue, and improve risk reduction. The session also highlights how AI and automation enable faster response and how unified cloud telemetry strengthens visibility, prioritization, and real time defense.
1 day ago
Advances in frontier AI models are reshaping the cyber risk landscape by enabling automated, scalable, and rapid exploitation capabilities. The emergence of systems like Claude Mythos highlights how vulnerability discovery and multi-step attack execution are becoming faster and more accessible, reducing the time between exposure and attack.
The briefing explores how organizations can adapt by shifting from fragmented data to a unified, AI-driven defense strategy. Key topics include the rise of automated attack pipelines, improved visibility into identity and access pathways, and prioritizing risk based on real-world exploitability rather than static scores. It also addresses how to align security efforts with business impact while keeping pace with increasingly sophisticated threats.
1 day ago
eSkimming has developed into a persistent and adaptive threat that operates within the browser, often bypassing traditional security controls and compliance assumptions. Attackers are increasing both the scale and sophistication of these campaigns, targeting digital supply chains and exploiting trusted scripts and services to steal sensitive data.
Findings from Q1 2026 research highlight how techniques such as silent skimming, modular infrastructure, and reinfection strategies enable attackers to evade detection and maintain access. The content examines why common defenses like CSP, SRI, and WAFs are becoming less effective, and outlines how security and compliance teams can respond. It also addresses the impact on PCI DSS alignment, data protection, and reducing the risk of undetected client-side attacks.
1 day ago
Cloud-first enterprises require secure and high-performance connectivity for distributed users and branch locations. Integrating networking and cloud security is essential to reduce complexity, improve user experience, and support scalable architectures in modern environments.
The discussion focuses on how combining SD-WAN with cloud-delivered security enables efficient SASE deployments. It covers approaches to streamline branch-to-cloud connectivity, automate onboarding across large environments, and enhance resilience through redundant and failover-ready configurations. Key capabilities such as CASB, secure web gateways, data loss prevention, and threat protection are examined to show how consistent security can be extended across locations without additional hardware.
2 days ago
Many managed service provider clients continue to rely on VPNs for remote access, despite changes in how users, applications, and infrastructure operate. The shift to hybrid work, cloud adoption, and identity-driven security is driving the need for more modern and flexible access models.
A discussion featuring David Nankervis and Andy Larin explores how MSPs can move clients toward Zero Trust and SASE architectures. It covers approaches to positioning, pricing, and packaging secure access as a managed service, while helping organizations replace legacy VPN environments with scalable, identity-based solutions.
3 days ago
Managing hybrid and multicloud environments has become standard, but the added complexity often creates visibility gaps, performance issues, and security blind spots. These challenges can slow troubleshooting and increase the risk of outages, making it difficult for teams to maintain efficient and reliable operations.
This session focuses on improving operational visibility and control through unified telemetry and observability. It explains how centralized insights, anomaly detection, and proactive alerting can help teams reduce downtime and respond faster to issues. The discussion also highlights how AI-driven analysis and natural language interactions can support smarter decision-making, enabling teams to move from reactive incident handling to more proactive and optimized operations.
3 days ago
Email remains a primary attack vector, with threats such as phishing, account takeover, and impersonation continuing to evolve beyond the capabilities of native protections. Google Workspace environments, while secure by default, often require additional layers to address increasingly sophisticated email-borne attacks.
A closer look at layered email security shows how organizations can enhance detection and response without disrupting productivity. Key areas include identifying gaps in built-in defenses, strengthening protection against advanced threats, and improving overall resilience. Attendees will gain practical insight into building a more effective email security strategy tailored to Google Workspace, with a focus on reducing risk and maintaining secure communication channels.
1 week ago
Zero Trust has become essential for protecting applications, APIs, and data in modern environments. A focus on Zero Trust Application Access highlights how identity- and context-aware controls can reduce risk while enabling secure access across distributed systems.
The content explains the principles behind Zero Trust Architecture and how they apply to application access. It outlines strategies for enforcing consistent policies, simplifying secure access, and aligning existing security frameworks with Zero Trust models. Attendees will gain practical insight into strengthening application security through adaptive access controls and better visibility, helping organizations protect resources regardless of where users or applications are located.
1 week ago
Mergers and acquisitions create complex challenges for IT and security teams as organizations integrate workforces, applications, and infrastructure across newly combined environments. Ensuring secure access while maintaining business continuity is critical during this transition. This webinar explores how a Zero Trust approach can help organizations manage secure connectivity and reduce risk during M&A integration.
The session presents practical lessons from Zscaler’s experience with acquisitions and explains how Zero Trust architecture can simplify networking and reduce challenges such as complex routing and overlapping private subnets. Attendees will learn strategies for providing newly integrated users with secure access from day one while minimizing operational disruption. The webinar also outlines steps organizations can use to develop their own playbook for secure and efficient M&A integration.