Discover Security Events in Operations
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 hours from now
Hybrid and multi cloud environments are reshaping how organizations approach network security, and new research from 500 security leaders highlights what is changing in 2026. This session breaks down findings from AlgoSec’s State of Network Security Report, focusing on how AI, automation and platform consolidation are influencing security strategy across cloud and on premises infrastructure.
The discussion examines visibility gaps that continue to weaken security silos, the growing risks tied to manual processes and the renewed importance of firewalls in cloud environments. Speakers will also explore the practical realities of Zero Trust adoption, the impact of SD WAN and SASE on the network edge and how AI is increasingly being used to manage and optimize security operations.
2 hours from now
An OSINT driven incident analysis examining the Le Constellation Bar Fire and how open source intelligence can be used to reconstruct complex real world events. This webinar walks through how SL Crimewall supports incident reconstruction by bringing together publicly available data to identify key factors and timelines surrounding the case.
The session demonstrates how OSINT techniques help provide clarity in high impact investigations and support the work of public safety officials, investigative journalists, and law enforcement teams. Attendees will see how structured OSINT analysis can turn fragmented information into a clearer operational picture during critical incident reviews.
2 hours from now
An introductory session focused on using DefectDojo to manage and streamline vulnerability workflows across security teams. The webinar walks through how the open source platform helps prioritize findings, remove duplicates and automate triage for vulnerabilities and SOC alerts, making it easier to manage results from multiple security tools in one place.
The discussion covers DefectDojo’s core features and architecture, along with practical guidance on integrating it with common security scanners and CI CD pipelines. Attendees will also see best practices for organizing findings, generating reports and tracking remediation efforts, helping AppSec and SOC teams improve visibility and efficiency in their vulnerability management process.
1 day from now
See how Huntress helps organizations detect and respond to active cyber threats through a live product demonstration and open discussion. This webinar showcases Huntress’s approach to monitoring, threat detection, and response, giving attendees a clear view of how security teams handle real world attacks and ongoing risk.
The session includes an interactive AMA where participants can raise real scenarios, ask detailed questions, and discuss common security challenges directly with the Huntress team. It is designed for organizations that want a practical look at modern threat protection and a better understanding of how to strengthen everyday security operations.
1 day from now
Threat intelligence becomes far more effective when context and behavior are analyzed together rather than in isolation. This webinar focuses on how static, enrichment, and dynamic analysis each play a role in improving detection accuracy and response speed, and why relying on only one approach often leaves gaps in visibility.
The session explains when to use signatures and indicators for fast triage, how enrichment adds critical context to reduce noise and prioritize risk, and how behavior driven analysis exposes real world attacker activity that static methods miss. Attendees will gain practical guidance on combining these techniques in SOC, threat hunting, and incident response workflows to produce higher quality intelligence and better security outcomes.
1 day from now
Network security posture management plays a critical role in reducing real world exposure by adding context to vulnerability data. This webinar focuses on how security teams can distinguish between issues that are merely identified and those that are truly reachable and exploitable within hybrid and distributed environments. By incorporating network visibility, segmentation awareness and attack path analysis, organizations gain a clearer understanding of which risks require immediate attention.
The session demonstrates how a unified control plane improves exposure management through centralized visibility, policy automation and continuous compliance. Attendees will see how network context reshapes risk prioritization beyond standard CVSS scoring and enables faster remediation using topology aware insights and automated policy orchestration. The discussion is designed for security teams seeking more accurate vulnerability management and stronger control across complex infrastructures.
1 day from now
Turn your SOC into an AI driven operation with a structured and low risk approach to adoption. This session outlines six practical entry points for introducing AI into security operations, covering areas such as threat research, detection engineering, incident response and threat hunting. Each use case is presented with a focus on measurable impact and controlled implementation, helping teams avoid both over automation and stalled progress.
Security leaders will gain a clear roadmap for aligning AI initiatives with real operational needs and outcomes. The discussion highlights proven practices for scaling AI across core SOC functions while maintaining oversight and reducing risk. Attendees will leave with actionable guidance for accelerating AI integration in a way that strengthens, rather than complicates, their security posture.
1 day from now
Major cyber incidents from 2025 are examined to uncover the security lessons organizations need for 2026. The session analyzes how recent breaches were driven less by failed technology controls and more by abused trust, particularly through compromised credentials, SaaS access and third party relationships. Real world attacks are translated into practical takeaways for managed service providers and security teams looking to strengthen their defensive posture.
The discussion highlights large scale credential exposure, identity based attacks that led to operational disruption, healthcare service impacts, abuse of trusted SaaS ecosystems and the rapid exploitation of newly disclosed vulnerabilities. Attendees will gain insight into how attackers moved faster than defenders and what allowed these incidents to escalate. The webinar concludes with guidance on reducing risk in the year ahead by improving visibility, accelerating response and prioritizing identity, SaaS security and trust management.
1 day from now
Breaking down the Digital Operational Resilience Act and what it means for financial institutions and their critical third parties, this session provides a practical roadmap to meeting the new EU requirements. The discussion focuses on the core pillars of DORA, including ICT risk management, incident reporting obligations and third party risk oversight, while translating regulatory language into clear operational steps.
The webinar also examines how automation and integrated platforms can simplify compliance by streamlining data collection, reporting and documentation. Attendees will gain guidance on strengthening operational resilience through real time threat visibility and centralized management, as well as understanding the type of evidence auditors expect. The goal is to help organizations shift from reactive compliance efforts to a structured, audit ready approach aligned with DORA standards.
6 days from now
Get a hands on look at how Huntress helps security teams respond to real world threats through a live AMA and product demo. This interactive session invites participants to bring their toughest security challenges, practical scenarios, and questions directly to the Huntress team for open discussion.
The webinar walks through the platform in real time, showing how it supports detection, response, and day to day security operations as threats continue to evolve. Attendees will gain practical insight into how common security pain points are handled and see how the platform adapts to unpredictable attacker behavior in modern environments.
1 week from now
Digital Parasites are redefining modern malware by favoring stealth, persistence and evasion over noisy encryption attacks. This session breaks down the latest research behind 2026 malware trends and explains how adversaries are maintaining long term access inside compromised networks while avoiding traditional detection methods. The discussion focuses on why most leading attack techniques now center on staying hidden rather than causing immediate disruption.
Attendees will see how so called self aware malware adapts its behavior to evade sandboxes and monitoring tools, and how advanced detection strategies can expose these hidden threats. The webinar also introduces dynamic threat templates designed to uncover unauthorized access and adversaries already operating inside the environment, helping security teams strengthen visibility and response.
1 week from now
AI enabled resilience operations are changing how organizations detect issues, protect data and respond to disruptions across hybrid environments. This session focuses on how ResOps powered by AI helps teams move beyond reactive troubleshooting toward coordinated, proactive response when incidents occur.
The discussion highlights how Commvault applies AI through conversational interfaces and automation to surface insights, reduce manual effort and guide protection and recovery workflows. Real world examples and demonstrations show how operational issues can be identified earlier, decisions made faster and response actions executed more efficiently without adding unnecessary complexity. The webinar is designed for infrastructure, security and AI leaders looking to strengthen operational resilience as AI adoption expands.