Discover Security Events in Operations
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 days from now
A technical deep dive into the React2Shell vulnerability shows how a flaw in React Server Components is being actively exploited to deliver advanced Linux malware. This webinar breaks down CVE-2025-55182 and explains how attackers are using the unauthenticated remote code execution weakness to deploy the PeerBlight backdoor in real world attacks.
Huntress analysts Anna and Michael walk through how the React2Shell exploit works in practice and examine the design of PeerBlight’s command and control model. The session highlights how the malware uses the BitTorrent DHT network to build a resilient and difficult to disrupt C2 infrastructure. Security teams will gain a clearer understanding of the attack chain, the techniques involved and why this threat represents a serious risk for modern environments.
5 days from now
This session examines how organizations can move from AI experimentation to autonomous systems that deliver measurable business impact. Guest speaker Mike Gualtieri from Forrester Research joins industry leaders to outline the trends that will shape the autonomous enterprise in 2026, with a focus on the data foundations and Private AI strategies needed to support real world execution. The discussion highlights why trusted, well governed data is essential for scale and how agentic AI can unlock new revenue opportunities.
Attendees will explore the shift toward enterprise architectures that bring AI directly to where data lives, allowing teams to build flexible and open ecosystems capable of supporting advanced automation. The webinar also explains how AI initiatives can evolve from cost efficiency projects to engines of top line growth through real time decisioning. The session concludes with an overview of the key data and AI trends expected to define the year ahead.
1 week from now
Step inside a live ransomware crisis and see how quickly a routine workday can collapse when systems, access controls, and operations fail at once. This interactive session places participants in the middle of a realistic attack scenario inspired by real world breaches, where rapid decisions and leadership coordination determine whether the organization recovers or spirals further into disruption.
Working in a small group, attendees take on leadership roles and navigate the critical hours of a ransomware negotiation with guidance from security experts at Commvault and Softcat. The experience focuses on early detection, response strategy, and disaster recovery under pressure. Participants leave with practical takeaways, clearer insight into their own preparedness, and concrete recommendations to strengthen resilience before a real incident occurs.
1 week from now
Protecting healthcare environments requires balancing security, compliance, and uninterrupted patient care. This webinar focuses on a practical approach to defending healthcare systems against modern cyber threats while supporting day to day clinical operations. The discussion centers on real world challenges faced by healthcare organizations, including legacy infrastructure, connected medical devices, and strict regulatory requirements.
The session explains how to secure systems that cannot be easily patched, such as older platforms and IoMT devices, without increasing operational risk. It also shows how to cut through vulnerability noise by prioritizing issues that are truly exploitable, rather than chasing long checklists. Attendees will gain insight into moving beyond paper based compliance frameworks like HIPAA and HITRUST and toward active, real time protection that strengthens both security posture and audit readiness.
1 week from now
See Huntress in action during a live demo and open AMA led by Sasha Roshan, focused on real world security challenges faced by today’s organizations. The session showcases how Huntress helps teams detect and respond to active threats while continuously improving protection across environments.
Participants are invited to bring practical questions, everyday security problems and real scenarios for discussion. The webinar is designed to give clear insight into how Huntress approaches threat detection and response, with direct answers and guidance that security teams can apply immediately.
1 week from now
Runtime security is shifting toward lightweight, AI driven protection built for modern cloud native environments. This webinar focuses on how agentic AI is changing real time threat detection and response by combining eBPF based runtime visibility with intelligent automation that reduces performance impact while improving context across multi cloud workloads.
The discussion looks at how runtime tools are evolving beyond traditional agents, how agentic AI supports faster and more adaptive security decisions, and what this shift means for security teams operating at scale. Attendees will also hear early insights from upcoming research on runtime security trends and learn how organizations are preparing for the next phase of cloud native protection. The session is designed for practitioners and security leaders who want a clear view of where runtime security is heading and how to stay ahead.
1 week from now
Modern engineering teams are moving faster than ever, but traditional SAST tools struggle to keep up with AI assisted development and complex, multi language codebases. This webinar focuses on why legacy static scanning creates friction, produces low quality signals and slows development, even as security demands continue to rise.
The session explains how combining multi agent AI analysis with expert human validation delivers clearer, higher confidence security insight without disrupting developer workflows. Attendees will see real examples of where static scanning falls short, how AI generated code changes the risk landscape and how teams can provide accurate, actionable feedback directly inside the development process while meeting strict data handling and assurance requirements.
1 week from now
CMMC compliance is now a reality for organizations supporting the DoD supply chain, and IT teams are facing new expectations for security controls, documentation and operational readiness. This webinar focuses on what the final CMMC rules mean in practice and how internal IT teams should prepare for contract driven compliance requirements.
The discussion covers the core elements of CMMC, how to properly scope environments that handle CUI, and common mistakes that slow down readiness efforts. Speakers also share practical guidance on navigating vendor relationships and identifying risks that can undermine compliance. This session is designed to help IT teams understand the impact of CMMC and take clear, informed steps toward meeting its requirements.
1 week from now
See how high speed data streaming technologies are used to power modern security operations during this hands on lab focused on Cloudera Data Flow. The session demonstrates how tools like Apache NiFi, Kafka, and Flink are applied to build real time security data pipelines that support log ingestion, threat detection, and forensic analysis inside today’s SOC environments.
Participants will experience how streaming data can be collected, normalized, and analyzed as it moves, enabling faster detection of suspicious behavior and stronger visibility into data lineage. The lab also highlights how filtering and processing security data before it reaches downstream analytics platforms can reduce noise, improve investigations, and lower operational costs. This workshop is especially valuable for security teams looking to strengthen real time detection and security data engineering capabilities.
2 weeks from now
This session focuses on how data exfiltration risk appears inside real AWS environments and how security teams investigate it at the storage layer. AWS and Cloud Storage Security walk through the signals teams rely on when suspicious data movement is detected, including access trails and bulk download activity.
The discussion covers what native AWS guardrails and telemetry can reveal, where visibility gaps remain, and how added context helps investigations move faster. Attendees will see how tying activity to specific actors, objects, and timelines improves confidence during incident response. The session is practical and grounded in real world investigation workflows used in modern cloud environments.
1 day ago
The discussion focuses on how modern Chief Security Officers are moving beyond traditional protection roles to become key contributors to organizational resilience and business performance. The webinar highlights the shift from tactical risk response to strategic leadership, showing how CSOs can influence outcomes across the company while strengthening security posture.
Attendees will hear guidance on communicating in business terms, understanding C suite expectations and building strong executive relationships before a crisis occurs. The session also covers how to evaluate technology, justify investment, rethink staffing needs and connect local threats to broader global impact. The event concludes with a Q and A where participants can raise their security questions for 2026.
2 weeks ago
This session looks at how AI is truly being used inside security operations centers and separates real progress from the hype that surrounded 2025. Former Gartner analysts Augusto Barros and Oliver Rochford share their perspective on where AI is delivering value in SecOps and where expectations still outpace reality. The discussion gives security leaders a clear view of what agentic AI can and cannot solve in day to day operations.
The webinar also explores how AI is being applied in offensive cybersecurity and what these developments may mean for future threats. Attendees receive practical guidance for evaluating AI driven tools, understanding realistic outcomes and planning how AI should fit into a modern SOC strategy moving forward.