Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
Remote access security is breaking down as traditional VPNs become a common entry point for attackers. This webinar examines why SSL VPNs are increasingly exploited and how they enable credential theft, lateral movement, and data exposure in modern networks.
WatchGuard experts explain how a zero trust access model removes these risks while improving performance and simplicity for hybrid environments. Attendees will gain insight into the true cost of maintaining VPNs and learn how MSPs are replacing them with faster, safer zero trust access services that better protect users and infrastructure.
2 days from now
Attackers are increasingly targeting Entra ID data to disrupt access, compromise identities, and cripple business operations. This webinar focuses on how corruption or deletion of Entra ID data can weaken an organization’s ability to operate and why many IT teams underestimate this risk. The discussion outlines current threat activity aimed specifically at identity data and the impact these attacks can have across cloud environments.
The session explains why stronger network security combined with modern, cloud based backup for Entra ID is critical for cyber resilience. Attendees will gain clear insight into how these attacks work and what practical steps organizations can take to protect critical identity data before damage occurs.
2 days from now
This webinar focuses on why traditional patient zero detection no longer works in an AI driven threat landscape and what security teams must do instead. The discussion explains how attackers now use automation and AI to rapidly change techniques, making incident based defenses ineffective almost immediately. As a result, organizations can no longer rely on learning from the first victim and must assume they are a primary target from the start.
The session takes a technical look at how AI enabled adversaries launch large scale, polymorphic attacks and why proactive, behavior based defense models are becoming essential. Attendees will gain insight into modern research, defensive frameworks and strategies designed to improve resilience against fast evolving threats. The content is aimed at security teams looking to adapt their cyber defense approach for the AI era.
2 days from now
This masterclass focuses on how a Zero Trust architecture can reduce security costs while simplifying operations across users, branches, and cloud environments. Using Zscaler’s own internal Zero Trust journey, the session shows how moving to a cloud native approach helped eliminate unnecessary tools, streamline workflows, and improve overall security posture without adding complexity.
The discussion highlights practical strategies for applying Zero Trust in real environments, including ways to improve efficiency, strengthen protection, and scale securely as organizations grow. Attendees will gain clear insight into how Zero Trust can improve agility, reduce operational overhead, and deliver stronger returns by aligning security investments with business priorities.
3 days from now
Point product sprawl is creating growing operational strain and security gaps across modern IT environments. This webinar focuses on how a platform based approach helps organizations reduce complexity, improve efficiency, and strengthen their overall security posture by consolidating fragmented tools into a unified strategy.
The discussion covers current trends in IT platformization and explains how a converged platform simplifies workflows, improves visibility, and enables teams to respond to risk more effectively. Attendees will gain practical guidance on identifying the hidden costs of sprawl and learn actionable steps for moving toward a unified platform that supports stronger security, faster innovation, and long term scalability.
3 days from now
AI driven systems are outpacing traditional security testing, creating new risks that require continuous and adaptive defenses. This webinar focuses on how F5 AI Red Team enables ongoing adversarial testing across AI models, applications, and agents to uncover weaknesses before attackers can exploit them. The session explains how extensive attack libraries, agentic resistance campaigns, and operational stress testing are used to identify vulnerabilities in fast changing AI environments.
Attendees will see how risk scored and severity based results produce clear, audit ready findings that support remediation and governance efforts. The discussion also shows how insights from AI Red Team testing can be translated into real time protections using F5 AI Guardrails, helping organizations maintain resilience as AI systems evolve.
1 week from now
Compliance expectations in 2026 are forcing organizations to prove real security readiness, not just policy alignment. This webinar focuses on how Zero Trust and XDR are becoming essential tools for meeting regulatory demands as frameworks like CRA, NIS2, and SEC disclosure rules place greater pressure on security leaders and executives.
The session explains why Zero Trust is now viewed as a regulatory requirement, how integrated security platforms simplify audits, and why insurers increasingly expect managed detection and response rather than endpoint coverage alone. Attendees will also gain clarity on incident response timelines and what rapid response truly means under modern compliance rules. This webinar is designed for organizations that need to turn compliance into a defensible security posture rather than a liability.
2 weeks from now
State sponsored cyber espionage campaigns targeting critical infrastructure are reshaping how organizations must defend their networks. This session focuses on advanced persistent threats exploiting vulnerabilities in routers, edge devices, and core network infrastructure to gain long term access and visibility across telecom, government, transportation, and military environments.
The discussion outlines practical ways to detect and disrupt these campaigns using advanced threat hunting and proactive detection techniques. Attendees will see how specialized tools can uncover APT activity that often bypasses traditional security controls, helping organizations reduce exposure to long term surveillance and protect critical systems.
2 weeks from now
Modern factory environments are stretching the limits of the traditional Purdue Model as cloud services, remote access, and IT driven workflows become standard. This webinar focuses on applying Zero Trust principles to industrial networks while keeping the Purdue Model’s layered structure intact. The session explains how implicit trust can be replaced with explicit, policy based access to better protect operational technology environments.
The discussion covers practical ways to secure factory connectivity without disrupting operations or adding unnecessary complexity. Attendees will see what a real Zero Trust journey looks like for a manufacturing organization, where to begin implementation, and how this approach helps reduce exposure to ransomware and other industrial cyber threats.
3 days ago
Remote access security risks are increasing in 2026, and new research shows a growing gap between what executives see and what IT teams experience. This webinar presents early findings from RealVNC’s upcoming Remote Access Trends Report, based on a global survey of IT leaders. The discussion focuses on why so called free remote access tools often introduce hidden costs, higher incident rates, and greater exposure across organizations.
The session examines common risk areas such as limited visibility, overreliance on basic RDP controls, and the operational complexity created by too many remote access tools. Speakers break down how these factors contribute to security incidents and why regulated and technology sectors are being affected differently. Attendees will gain a clearer view of remote access threats heading into 2026 and receive early access to the full trends report after the webinar.
4 days ago
Security teams facing PCI DSS audit failures around eSkimming controls will get clear guidance on how to close gaps quickly and build a defensible program. This webinar focuses on establishing effective eSkimming protections for payment pages, with practical steps that address what auditors look for, including script visibility, approval, monitoring, detection, and evidence generation.
The session outlines a realistic approach to standing up an operational eSkimming security program in days, not months. It covers how to inventory and authorize scripts, detect unauthorized changes, respond to alerts, and produce audit ready reporting without heavy manual effort. Attendees will also learn how to structure ownership and processes so controls remain effective after the audit, helping organizations move from remediation to long term compliance confidence.
1 week ago
This session focuses on how Barracuda SecureEdge brings security and network management together into a single, streamlined platform. The webinar highlights how organizations can simplify complex networks while strengthening protection at the edge through zero trust principles and tighter identity and access controls.
The discussion also covers improvements in SD WAN performance, integrated cloud security services and centralized management that reduce reliance on multiple tools. Attendees will see how these capabilities support distributed environments, improve visibility and make onboarding, monitoring and governance easier across the entire network.