Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
10 hours ago
Mergers and acquisitions create complex challenges for IT and security teams as organizations integrate workforces, applications, and infrastructure across newly combined environments. Ensuring secure access while maintaining business continuity is critical during this transition. This webinar explores how a Zero Trust approach can help organizations manage secure connectivity and reduce risk during M&A integration.
The session presents practical lessons from Zscaler’s experience with acquisitions and explains how Zero Trust architecture can simplify networking and reduce challenges such as complex routing and overlapping private subnets. Attendees will learn strategies for providing newly integrated users with secure access from day one while minimizing operational disruption. The webinar also outlines steps organizations can use to develop their own playbook for secure and efficient M&A integration.
10 hours ago
DNS infrastructure is increasingly targeted by threat actors who use it for command and control, phishing campaigns, and large scale attack coordination. As adversaries continuously refine their tactics, outdated detection methods can leave organizations vulnerable to evolving threats. This webinar provides an overview of the latest DNS threat landscape and the techniques attackers are using to exploit DNS infrastructure.
The session examines recent threat campaigns, emerging DNS based attack patterns, and detection evasion techniques used by adversaries. Speakers will also discuss how attackers leverage multi channel strategies and, in some cases, AI technologies to expand their operations. Attendees will gain insights into current DNS threat metrics and practical strategies for strengthening defenses using predictive intelligence and improved visibility into malicious infrastructure.
13 hours from now
Zero Trust has become essential for protecting applications, APIs, and data in modern environments. A focus on Zero Trust Application Access highlights how identity- and context-aware controls can reduce risk while enabling secure access across distributed systems.
The content explains the principles behind Zero Trust Architecture and how they apply to application access. It outlines strategies for enforcing consistent policies, simplifying secure access, and aligning existing security frameworks with Zero Trust models. Attendees will gain practical insight into strengthening application security through adaptive access controls and better visibility, helping organizations protect resources regardless of where users or applications are located.
1 week from now
This hands on virtual workshop provides direct experience building a secure corporate network using Cloudflare’s SASE platform. In a live, interactive lab, participants are guided step by step through configuring network controls to protect users, devices, data, and applications. The session demonstrates how to enable remote access, secure internet use for hybrid workers, and allow contractors to administer infrastructure safely.
Attendees work within a single integrated platform to understand how modern SASE architecture supports secure connectivity. The small group format is limited to eight participants to support focused, practical learning and applied cybersecurity skills.
1 week from now
AI driven network operations depend heavily on accurate and complete data, yet many organizations face visibility gaps that undermine reliability and decision making. This webinar explores how incomplete network data, undiscovered assets, and low confidence in AI outputs can impact enterprise AI initiatives. The session focuses on improving data quality and visibility to support more effective automation.
Attendees will learn how network blind spots affect AI performance and how better asset discovery and data accuracy can improve outcomes. The discussion also covers how DNS and DHCP based intelligence can enhance visibility without additional infrastructure. The webinar provides insight into strengthening network data foundations, with moderate relevance to security through improved visibility and risk awareness.
1 month from now
Cloud security teams are struggling to respond fast enough as attackers exploit cloud exposures within minutes. This webinar focuses on why fragmentation between CNAPP and SOC teams is slowing response and how a converged, real time security model can close those gaps across multicloud environments. The discussion explains how unifying posture management, runtime visibility, and operational response improves detection, triage, and containment of cloud based threats.
Industry analysts and security leaders examine why current cloud security architectures fail under real world pressure and outline a practical blueprint for CNAPP and SOC convergence. Attendees will gain insight into integrating CNAPP, CDR, SIEM, SOAR, and XDR to reduce MTTR, eliminate alert fatigue, and improve risk reduction. The session also highlights how AI and automation enable faster response and how unified cloud telemetry strengthens visibility, prioritization, and real time defense.
1 day ago
Organizations managing Microsoft DNS and DHCP environments face increasing pressure to modernize infrastructure while maintaining availability and security. This webinar explores how phased modernization can introduce improved visibility and control without disrupting existing services. The session focuses on integrating unified management capabilities alongside current systems to support hybrid and distributed environments.
Attendees will learn practical strategies for scaling branch operations, introducing flexible deployment models, and improving infrastructure resilience. The discussion highlights how organizations can prioritize modernization efforts based on their environment while maintaining continuity. The webinar provides guidance on evolving network and infrastructure management in a way that supports both operational efficiency and security requirements.
1 day ago
Industrial environments often struggle to balance operational visibility with strict security controls, especially when moving data between OT and IT networks. Many organizations must share operational data with enterprise systems while protecting critical infrastructure from cyber threats. This webinar explores how hardware enforced one way communication technologies can enable secure data transfer without introducing new attack paths.
The session examines how protocol filtering data diodes support secure data movement across air gapped or cross domain environments. Speakers will discuss practical use cases such as historian replication, SCADA integration, and sending operational data to enterprise analytics platforms. Attendees will also learn how these architectures align with Zero Trust principles and regulatory frameworks including NERC CIP, IEC 62443, and other industrial cybersecurity requirements.
6 days ago
AI driven infrastructure is placing new demands on cloud networking, requiring scalable, efficient, and reliable systems to support large scale workloads. This webinar explores next generation networking technologies designed for AI environments, focusing on innovations in pluggable optics and data center architecture. The session highlights how modern infrastructure supports performance, efficiency, and system reliability in AI driven operations.
Attendees will learn how high density networking solutions address challenges related to power consumption, scalability, and space efficiency. The discussion also covers how evolving AI workloads are reshaping cloud infrastructure design. The webinar provides insight into building future ready networking environments, with limited and indirect relevance to cybersecurity considerations.
1 week ago
Modern web applications depend on resilient architectures that can withstand disruptions across multiple layers, including DNS, network, and application infrastructure. This webinar explores how organizations can design for resiliency across control planes to maintain availability and reduce the impact of outages. The session focuses on how architectural decisions influence both reliability and security in distributed environments.
Attendees will learn practical strategies such as DNS redundancy, intelligent edge self healing, Layer 7 failover, and global traffic management. The discussion highlights how these techniques help prevent service disruptions and ensure continuity under adverse conditions. The webinar provides insight into building robust, fault tolerant systems that support both operational resilience and security objectives.
1 week ago
Security teams rely on visibility that turns raw data into clear, actionable insight, and this webinar focuses on how modern firewall management supports a secure by design approach. The session looks at how correlated analytics and reporting help teams understand security posture, identify weaknesses early, and prevent misconfigurations from becoming attack paths.
The discussion highlights a built in Security Assessment Report that evaluates configuration hygiene and surfaces gaps before they are exploited. Attendees will also see how advanced search across analytics logs, system events, and detailed reports speeds investigations and improves anomaly detection. The webinar is designed for security and network administrators who want stronger operational assurance, continuous validation, and greater confidence in day to day security operations.
1 week ago
Hybrid work environments are expanding the attack surface as users access applications across SaaS platforms, cloud infrastructure, and distributed networks. Traditional security models often struggle to keep up with the growing number of access requests, security events, and automated attacks. This webinar explores how unified Secure Access Service Edge (SASE) architectures help organizations secure modern workforces while improving operational visibility and control.
The session demonstrates how converging networking and security into a single platform can simplify policy management and strengthen protection across users, devices, and applications. Speakers will highlight how Zero Trust Network Access supports secure connectivity to SaaS and cloud services, while AI powered analytics helps security teams detect risks faster and reduce alert fatigue. Attendees will gain insight into how unified SASE platforms support secure access for remote users, branch offices, and cloud environments.