Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
8 hours from now
Attacks inside Microsoft Defender environments often continue even after an alert is triggered, leaving gaps that MSPs must address. This session examines how modern threat actors use stolen credentials, legitimate tools and cloud access to move laterally and escalate impact despite detection. The discussion focuses on why alerting alone is not enough to fully protect customer environments.
The webinar explores what typically happens after an alert fires, why response speed is critical and where visibility and remediation gaps can appear. Attendees will gain insight into how partners can strengthen protection strategies without replacing the tools they already use, shifting the focus from simple detection to more effective response and ongoing defense.
1 day from now
Enterprise security teams are reassessing cloud only SSE as real world requirements around performance, visibility, and compliance continue to grow. This webinar focuses on how a unified SASE approach gives organizations greater flexibility by enforcing security closer to users and applications while maintaining consistent Zero Trust controls both on network and off network.
The session explains where standalone SSE models can fall short and how unified visibility across networking and security simplifies operations, improves troubleshooting, and supports data sovereignty needs. A live demo shows Unified SASE in practice, highlighting how enterprises improve application performance, streamline management, and reduce operational complexity through a single, integrated platform.
1 day from now
Security teams are redefining firewall management by focusing on Secure by Design principles that reduce credential based risk from the start. This webinar introduces the foundations of Secure by Design in the context of firewall environments, with a clear focus on controlling credentials that often become weak entry points due to unmanaged accounts, outdated passwords, and inconsistent policies.
The session covers new automated capabilities that address core security hygiene, including remediation of local user passwords, resetting TOTP bindings, and identifying compromised credentials through Credential Auditor. Attendees will see how these controls are orchestrated centrally within NSM and work across firewall versions. The webinar provides a practical blueprint for improving identity resilience, eliminating credential blind spots, and establishing stronger authentication baselines across the network.
2 days from now
Organizations exploring a move away from F5 will get practical guidance on migrating to the HAProxy One platform in this interactive office hours session. The discussion centers on how teams can reduce application delivery costs, improve performance at scale, and strengthen security while maintaining high availability during and after migration.
The session features live demos with real HAProxy configuration examples, along with coverage of next generation security, observability, and large scale performance. Attendees can ask direct questions and steer the conversation, gaining clear insight into the migration process and what to expect. This webinar is designed for teams looking for more control over deployments, security posture, and overall application delivery efficiency.
2 days from now
A sharp rise in AI driven cyber attacks is forcing organizations to rethink how they define and manage risk. This threat landscape briefing examines findings from the Cyber Security Report 2026, including the reported surge in attacks and the growing role of AI in modern threat campaigns. The session looks at how evolving tactics are reshaping expectations for executive oversight and strategic risk decisions.
The discussion separates insights for leadership and technical teams. Executives will gain perspective on how AI powered threats influence board level risk management and which patterns demand immediate attention. Security practitioners will explore how attackers weaponize AI tools, pivot across identity and access environments and combine AI misuse with ransomware pressure. The briefing translates current threat intelligence into practical guidance for strengthening organizational defenses.
2 days from now
Gain clarity on how to unify DSPM and DLP into a single data security strategy built for the AI driven enterprise. As sensitive data moves across SaaS applications, cloud storage and unmanaged devices, visibility gaps and compliance risks continue to grow. This session examines why traditional tools struggle in distributed environments and what organizations must do to regain control as data volumes expand.
In partnership with Frost and Sullivan, the discussion outlines how integrating Data Security Posture Management with Data Loss Prevention creates a more proactive and comprehensive defense model. Attendees will see practical examples of how a unified approach strengthens protection, reduces complexity and supports compliance. The webinar also highlights Zscaler’s data security platform and its role in delivering end to end coverage for modern cloud environments.
2 days from now
Browsers have become a primary attack surface as GenAI tools, cloud apps, and daily workflows move directly into the web. This webinar focuses on securing the modern browser against phishing, malware, credential misuse, and GenAI driven data leakage without disrupting user productivity. Check Point experts explain why traditional controls fall short and how browser level security addresses today’s most common workspace risks.
The session highlights how GenAI aware data loss prevention and browser enforcement protect users across both managed and unmanaged devices. Attendees will see how browser security works in practice through real examples, including GenAI prompt protection, file upload and download controls, and safe search indicators. The discussion is designed for security teams looking to strengthen endpoint and workspace protection while maintaining compliance and a smooth user experience.
1 week from now
A sales engineer led session showcasing how the WatchGuard Agent consolidates endpoint security operations into a single lightweight installer managed through WatchGuard Cloud. The webinar explains how organizations can unify Endpoint Security, MDR, FireCloud and NDR collectors under one agent, with centralized control, automated updates and flexible deployment options across client devices.
The discussion also covers the WatchGuard Zero Trust Bundle and how it combines identity security, device integrity and secure access within a cloud delivered architecture. Attendees will see how a single purchase and single agent deployment can deliver integrated protection, including Total Identity Security, EPDR and FireCloud Total Access, helping teams simplify management while strengthening zero trust security across their environment.
1 week from now
OT and CPS security is becoming a strategic priority as AI driven threats, regulatory pressure, geopolitical risk, and industrial cloud adoption reshape how critical infrastructure is protected. This virtual event focuses on how organizations must adapt their OT and cyber physical security programs to stay resilient, compliant, and operationally secure in 2026 and beyond.
Industry analysts, critical infrastructure operators, control system vendors, and Fortinet experts share practical strategies for identifying emerging cyber and operational risks, meeting evolving regulatory requirements, and scaling protection through managed OT security models. The discussion also highlights how a consolidated security platform can improve visibility, resilience, and long term operational stability across OT and CPS environments.
1 week from now
Mandatory eSkimming controls under PCI DSS 4.0.1 have now been in place for nearly a year, raising important questions about industry progress. This webinar brings together leading QSAs Art Cooper and Steve Maxwell from TrustedSec, along with eSkimming security experts from Source Defense, for a candid discussion on the current state of payment security and card fraud prevention.
The session examines merchant adoption of required controls, the impact of SAQ A changes, and how organizations are interpreting DSS guidance. It also reviews threat research on evolving attacker tactics and addresses concerns about superficial compliance versus meaningful protection of eCommerce payment environments.
1 week from now
AI driven attackers are expanding the battleground beyond the traditional network perimeter, using fake domains, impersonation, malicious ads, rogue apps and exposed credentials to target organizations before internal defenses are triggered. This session examines how brand abuse, credential leaks and other external threats develop and why they often go undetected in early stages.
Industry leaders from Infoblox and Axur discuss practical approaches to identifying external exposure sooner and disrupting malicious infrastructure faster. The conversation highlights attacker tactics, operational challenges in defending the broader digital ecosystem and the importance of enforcement at control points such as the DNS layer. Attendees will gain insight into how to better protect brands, executives, customers and users in an increasingly AI influenced threat environment.
2 weeks from now
Endpoint security becomes harder to manage when EPP, EDR, DLP, VPN and ZTNA tools operate as separate agents, creating visibility gaps and operational overhead. This session examines how a unified endpoint platform consolidates protection, detection, access control and data security into a single agent to reduce complexity while maintaining strong defense. The discussion focuses on the risks caused by agent sprawl and the impact it has on response speed and security posture.
Fortinet’s experts outline how centralized management and unified licensing can streamline operations and improve efficiency. Attendees will see how correlating endpoint telemetry with broader network and security data strengthens threat detection and accelerates response. The session also covers how a unified endpoint architecture can support cloud, on premises, hybrid and air gapped environments without increasing administrative burden.