Discover Security Events in Operations
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
Security Operations has evolved into a sophisticated discipline focused on continuous monitoring, threat detection, incident response, and proactive threat hunting to protect organizations from cyber threats. Modern Security Operations Centers (SOCs) serve as the nerve center for enterprise cybersecurity, coordinating defensive activities and responding to incidents 24/7 across global organizations.
Traditional SOCs have transformed from reactive alert triage centers into proactive threat intelligence hubs employing advanced analytics, automation, and orchestration. Security Information and Event Management (SIEM) platforms now integrate with Security Orchestration, Automation and Response (SOAR) solutions, Extended Detection and Response (XDR) systems, and threat intelligence platforms to provide comprehensive visibility and coordinated response capabilities. Cloud-native SOCs leverage scalable infrastructure and managed services to reduce operational overhead.
Security operations teams face overwhelming alert volumes, with analysts spending significant time investigating false positives while sophisticated threats go undetected. The global cybersecurity skills shortage has created staffing challenges, high turnover, and burnout among SOC personnel. Organizations struggle to maintain 24/7 coverage, retain experienced analysts, and develop specialized expertise in emerging threat domains. Many are supplementing internal teams with managed security services or adopting follow-the-sun models using geographically distributed operations.
Security operations increasingly relies on automation to handle routine tasks, enrich alerts, and execute standardized response playbooks. Artificial intelligence and machine learning enhance threat detection by identifying behavioral anomalies and correlating indicators across diverse data sources. However, automation requires careful implementation to avoid introducing new risks, and human expertise remains essential for complex investigations, threat hunting, and strategic security decisions.
All security events are automatically streamed into this table on a daily basis.
17th December 2025 | Level Up Your Defense: Reduce Risk Across Your Network
This event takes a straightforward look at how security teams can reduce network risk as environments grow more complex. FireMon specialists outline practical ways to gain real time visibility across hybrid networks and show how stronger control over firewall policies helps teams cut down noise, focus on real issues, and stay ahead of emerging threats.
The session highlights key use cases that demonstrate how faster issue discovery, smarter cleanup of outdated rules, and continuous policy tuning improve both security posture and compliance. Attendees also see how integrated change tracking and contextual insights support quicker response and more confident decision making across the network.
Company_Webinar • Part of FireMon
14th January 2026 | 2026 Trends in Data and AI
This session examines how organizations can move from AI experimentation to autonomous systems that deliver measurable business impact. Guest speaker Mike Gualtieri from Forrester Research joins industry leaders to outline the trends that will shape the autonomous enterprise in 2026, with a focus on the data foundations and Private AI strategies needed to support real world execution. The discussion highlights why trusted, well governed data is essential for scale and how agentic AI can unlock new revenue opportunities.
Attendees will explore the shift toward enterprise architectures that bring AI directly to where data lives, allowing teams to build flexible and open ecosystems capable of supporting advanced automation. The webinar also explains how AI initiatives can evolve from cost efficiency projects to engines of top line growth through real time decisioning. The session concludes with an overview of the key data and AI trends expected to define the year ahead.
Company_Webinar • Part of Cloudera
12th December 2025 | Beyond Scanning: Test Your Code Like a Hacker From Build to Deploy
This webinar focuses on how security teams can evaluate code the same way attackers do, moving beyond basic scanning to uncover real exploitable risks before deployment. The session outlines how Mayhem Security, now part of Bugcrowd, uses automated offensive testing to surface both new and known vulnerabilities in running code and APIs during development, without generating unnecessary noise.
Attendees will see how this approach strengthens traditional AppSec programs, supports faster and safer releases and reduces testing costs. The discussion includes examples from well known organizations and shows how Mayhem integrates with human led penetration testing and Bugcrowd’s broader testing ecosystem. The event is designed for teams that want clearer visibility into attacker level risks throughout the software lifecycle.
Company_Webinar • Part of Bugcrowd
11th December 2025 | December Office Hours: A 2025 Recap for DefectDojo
This session offers a clear recap of the major advancements DefectDojo delivered throughout 2025, highlighting updates that improved vulnerability management workflows and strengthened operational security. The discussion walks through new platform enhancements, expanded integrations and progress made in SOC prioritization and AI driven features that support faster, more informed security decisions.
Attendees will also get an early look at what is coming next, including improvements to the Product Hierarchy and new details on Sensei, DefectDojo’s self contained LLM. The webinar closes with a review of the most impactful features released across both the Pro and Community editions, giving teams a concise overview of the year’s evolution and what to expect moving forward.
Company_Webinar • Part of DefectDojo
10th December 2025 | Modern offensive security: Integrating pen testing and bug bounty for continuous assurance
This session examines how penetration testing and bug bounty programs work together to create a more effective offensive security strategy. The discussion shows why point in time testing is no longer enough for modern threats and how continuous input from ethical researchers expands coverage beyond traditional assessments. Participants will see how these two approaches complement one another and where each delivers the most value.
The webinar breaks down how organizations can design and run hybrid testing models that blend structured pen test depth with the broader visibility of a global researcher community. The session also highlights how continuous validation strengthens security posture and supports faster remediation. Attendees will come away with practical guidance for improving their own testing programs and building a more resilient approach to offensive security.
Company_Webinar • Part of Bugcrowd