Discover Security Events in Operations
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
19 hours ago
An in depth review of the most significant adversary activity observed in 2025 sets the stage for this Tradecraft Tuesday session. Drawing from the Huntress 2026 Cyber Threat Report, the webinar examines emerging attacker behaviors, newly adopted tools and shifting techniques that impacted healthcare, education, government and other sectors. The focus is on the threats most relevant to non enterprise businesses and managed service providers.
The discussion breaks down how the threat landscape is evolving, including updates on ransomware groups, their changing tactics and the rise of new hacking methods. Attendees will gain practical insight into how different industries are being targeted and what security teams and MSPs should prioritize to better defend against current and emerging cyber risks.
4 hours from now
A critical gap is emerging between rapid AI adoption and the ability to secure it effectively. Based on findings from Pentera’s AI Security and Exposure Survey 2026, this session highlights how many organizations lack visibility into where AI is deployed, depend on legacy controls not built for AI driven workflows and still do not have a defined approach to AI security testing. The result is increased exposure across data, identity and infrastructure that attackers can exploit.
Ryan Dorey from Pentera and Chris Cochran from SANS examine benchmark data from 300 CISOs and explain how these gaps translate into real world risk. The discussion also explores how adversarial testing can help validate AI related threats and strengthen security programs.
4 hours from now
Release delays often come from friction between fast moving development teams and security processes that slow delivery. This webinar focuses on how organizations can align developer and security pipelines to reduce bottlenecks while still identifying and fixing vulnerabilities early in the release cycle.
ReversingLabs and DefectDojo explain practical ways to detect malicious components, uncover software tampering, and manage security debt without sacrificing speed. The session shows how using both platforms together helps teams prioritize findings, track remediation, and maintain momentum from build to release. It is designed for organizations looking to improve vulnerability management while keeping development workflows efficient and predictable.
4 hours from now
Cyber threats are accelerating as AI powered attacks and cloud first architectures expand the modern attack surface. This session examines how organizations can move beyond traditional security thinking and adopt a stronger cyber resiliency strategy built for today’s evolving risks. The discussion focuses on how the threat landscape is changing in speed and complexity, and why prevention alone is no longer enough.
Commvault’s Northern Europe CTO shares practical insight into strengthening resilience so businesses can protect critical data and recover quickly when incidents occur. Topics include the impact of AI on attack methods, the realities of securing distributed cloud environments and clear frameworks for building a strategy that supports both protection and business continuity. Real world lessons from enterprise environments round out the conversation, offering guidance for organizations preparing for the next wave of cyber threats.
4 hours from now
Adversaries are shifting from forced entry to long term persistence within enterprise environments. This webinar demonstrates how to detect and validate the top ten techniques highlighted in the Red Report 2026 using pre configured threat validation templates. The session explores how organizations can identify behaviors linked to critical malware and advanced persistent threats observed across 1.1 million samples.
During the live demo, high severity threats such as TinkyWinkey, Raven, and XLoader will be simulated to assess the resilience of existing security controls. Attendees will see dynamic threat templates mapped to real attack behaviors, along with automated reporting and mitigation paths designed to validate defensive effectiveness.
1 week from now
Applying Zero Trust and microsegmentation across hybrid networks remains difficult for many organizations due to fragmented tools, policy drift, and inconsistent enforcement. This webinar focuses on the practical challenges of reducing lateral movement in complex, multi vendor environments and why segmentation often breaks down at scale.
The session shows how Tufin’s unified control plane helps security teams gain full visibility, automate policy enforcement, and maintain consistent Zero Trust controls across hybrid infrastructure. Attendees will see how centralized policy management, topology aware validation, and continuous monitoring support scalable microsegmentation without slowing application delivery, while reducing risk and strengthening compliance.
1 week from now
Modern cybercrime operates like a business, with teams, tools, and workflows that closely mirror legitimate enterprises. This webinar takes an inside look at how today’s cybercriminal organizations function, showing how they plan, collaborate, and execute attacks using the same cloud platforms, productivity tools, and AI technologies trusted by businesses worldwide.
The session reframes threat analysis by comparing real world business practices with those used by attackers. Attendees will see practical attack examples, learn how threat actors organize and innovate, and gain actionable strategies to recognize and defend against adversaries who think and operate like an internal team. The goal is to help organizations better anticipate threats by understanding cybercriminals as strategic competitors, not just anonymous attackers.
5 days ago
Growing reliance on commercial and third party software has created a gap between trust and verification. Security teams often receive compiled applications and updates that bypass traditional development controls, while approval decisions depend on attestations and SBOMs that cannot be validated at the artifact level. This webinar explains why these limitations expose organizations to hidden risks that may only surface after deployment.
The session outlines where traditional evaluation methods fall short and why artifact level validation is essential before installation or updates. It also explains how binary analysis helps uncover supply chain risks and what security teams should verify to strengthen commercial software onboarding decisions.
5 days ago
A recent high profile case from 2024 provides the backdrop for this session on tracking offline threats through online behavior. In this webinar, OSINT Analyst Costanza Piras examines how real world incidents create digital reactions across the dark and surface web, and how those signals can reveal dangerous extremist activity when analyzed carefully.
The discussion demonstrates how OSINT tools and techniques support investigations across both darknet and clearnet environments. Attendees will see how to map online discussions tied to an offline event, connect related accounts, and identify and profile threat actors. The session highlights how these methods can inform countermeasures against persistent public threats.
6 days ago
Digital investigations now involve more than IT as cyber incidents, fraud, and employee misconduct become more complex. This webinar highlights how enterprise DFIR leaders and service providers can improve collaboration across HR, Legal, Cybersecurity teams, and external stakeholders. It focuses on the growing need for coordinated digital evidence review to support faster and more informed decisions during investigations.
Experts demonstrate how Magnet Review enables real time digital evidence sharing and collaborative data review. The session shows how intuitive workflows can help teams identify relevant insights more efficiently and strengthen the overall investigation process. Attendees can also download a certificate of completion after viewing the webinar.
6 days ago
Real time incident coordination across Security, Business Continuity and IT takes center stage in this session focused on managing both physical and cyber crises as one connected challenge. The discussion highlights how critical events quickly cross departmental lines and why isolated response processes slow down decision making. By creating shared awareness, faster escalation paths and synchronized playbooks, organizations can respond to incidents in minutes instead of hours while protecting people and maintaining operations.
The webinar also introduces High Velocity Critical Event Management and outlines practical steps to automate and streamline response efforts. Attendees will see how to remove operational silos, improve handoffs between teams and establish a unified operating picture during disruptive events. The session is designed for leaders who want stronger resilience and faster, coordinated incident response without restructuring their organizations.
1 week ago
Business Email Compromise remains one of the most damaging threats facing organizations, and MSPs are often left managing the fallout after an attack occurs. This interactive webinar centers on a real world BEC scenario and shows how MSPs can lead effective tabletop exercises that prepare clients for both prevention and response. The session walks through the realities of identity compromise, executive pressure, financial impact, and recovery challenges.
Led as a train the trainer experience, the discussion provides a ready to use tabletop framework that MSPs can run directly with their own clients. Attendees will see how to turn BEC preparedness into a value driven service, identify identity security gaps, and demonstrate why stronger protections are needed. The webinar also highlights how focusing on persistence and rogue application detection helps reduce false confidence and improve resilience during real incidents.