Discover Security Events in Security Analytics
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
2 days from now
Strengthen data protection across hybrid, cloud, and AI driven environments in this hands on Virtual Data Loss Prevention Dev Day. The workshop focuses on applying practical DLP controls to reduce insider risk, prevent accidental data exposure, and manage new data leakage challenges introduced by Generative AI, while staying aligned with GDPR and modern data protection requirements.
During the session, Trellix and AWS experts guide participants through real world DLP use cases covering endpoints, cloud storage, email, web, and AI platforms. Attendees will see how to design and enforce effective DLP policies, investigate incidents with proper audit context, and use AI powered insights to prioritize response across complex environments. Interactive labs provide direct experience with insider risk prevention, compliance scenarios, and protecting sensitive data in dynamic ecosystems.
1 day ago
Darktrace partners get a focused strategic briefing on the latest company direction, initiatives, and AI driven security developments in this quarterly webinar. The session delivers a clear update on what is changing across Darktrace and how those changes impact partners working with customers and prospects.
The discussion features leadership perspectives on business strategy, key priorities, and upcoming initiatives, along with practical guidance for service providers adopting an AI native approach to security. Attendees will also receive marketing insights, messaging, and campaign resources designed to support customer engagement and growth. This webinar is built to help partners stay aligned, informed, and ready for the quarter ahead.
2 days ago
Elastic Observability brings together logging, metrics, APM, synthetic monitoring, and profiling on a unified platform powered by Search AI. This webinar introduces its core capabilities and explains how simplified onboarding and automated insights help teams detect and resolve issues faster. Speakers will outline how generative AI and service level objectives can be applied within the platform to improve visibility and operational response.
The session also reviews how Elastic Observability supports long term scalability and measurable outcomes. Attendees will hear how organizations are using the platform to strengthen monitoring practices, improve efficiency, and enhance overall team performance through integrated observability tools.
2 days ago
Preparing for Cybersecurity Maturity Model Certification (CMMC) can be complex for organizations that handle Controlled Unclassified Information and must meet U.S. Department of Defense security requirements. This webinar provides practical guidance for contractors preparing for CMMC assessments, explaining what the certification evaluates and how organizations can approach compliance in a structured and sustainable way.
The session outlines common pitfalls organizations encounter during preparation and formal assessments, along with strategies for building repeatable compliance processes rather than one time audit readiness. Speakers will discuss how informal gap assessments can help identify current compliance status, when organizations should begin preparing for upcoming deadlines, and how continuous monitoring can support ongoing audit readiness while maintaining long term compliance.
2 days ago
Get a focused update on Darktrace’s latest cybersecurity direction, solutions, and partner strategy in this quarterly briefing designed for security and technology partners. The session shares key insights into where Darktrace is heading, highlights new capabilities entering the portfolio, and explains how recent innovations are shaping the broader cybersecurity landscape.
The webinar also covers how Darktrace is working alongside Microsoft to strengthen security outcomes and create new opportunities in the market. Attendees will come away with a clearer understanding of current priorities, upcoming developments, and how these updates can support stronger customer conversations and planning for the quarter ahead.
4 days ago
Elasticsearch plays a central role in modern security operations, especially within SIEM environments that rely on fast search and large scale log analysis. This webinar introduces the fundamentals of Elasticsearch, the core engine of the Elastic Stack, and explains how it stores and indexes data for real time search and analytics. The session walks through deployment basics, data ingestion, and management using REST APIs and the user interface.
Attendees will also see how to run search queries, configure fields with text analysis, and use aggregations for analytics. The webinar covers geo spatial queries and analyzer features, which are commonly applied in security monitoring and investigation workflows.
1 week ago
Security teams often struggle with disconnected tools and fragmented workflows. This webinar demonstrates how Elastic Security unifies security operations from large scale data ingestion to real time threat response within a single platform. The session highlights AI powered workflows, including automated ingestion, intelligent alert triaging, and a context aware AI assistant designed to support investigations and reduce noise.
Attendees will see how built in analytics, machine learning, and detection capabilities support SIEM operations at scale. A live demo walks through a complete analyst workflow, from alert detection to incident response and case resolution, including integrated response actions such as isolating an endpoint without switching tools.
1 week ago
Operation Epic Fury has expanded beyond physical conflict into coordinated cyber activity. This webinar examines Iran’s structured escalation model, where espionage, access development, disruption, and influence operations operate alongside visible events such as widespread Internet disruption. The session focuses on the activation of Iranian state sponsored cyber operators and the broader implications for hybrid conflict.
Ziv Mador, VP Security Research, shares observations from LevelBlue SpiderLabs, including recent monitoring adjustments for clients. The discussion outlines current threat activity and highlights detection and response priorities that security leaders should implement to address escalating risks.
1 week ago
Detect and respond to modern hybrid network attacks through a hands-on blue team workshop focused on real world post compromise behavior. This session centers on identifying threats without relying on signatures, helping teams recognize when a hybrid environment has already been breached and how attackers move inside the network.
Participants will practice deeper attack investigations using Vectra AI’s network detection and response platform to contain threats before they escalate. The workshop is designed for security teams looking to strengthen network visibility, improve response skills, and gain practical experience identifying advanced attacks in modern environments.
2 weeks ago
Security and observability teams get a close look at Splunk’s hosted GenAI foundation models built directly into the Splunk Cloud Platform. This webinar focuses on how native AI models can be used for security operations and time series analysis without the overhead of managing GPUs or external AI services, allowing teams to work faster inside existing investigation and monitoring workflows.
The session walks through Splunk’s new hosted AI models service and the three model types now available, including a security focused foundation model for SOC investigations, a zero shot time series model for predictive alerting and anomaly detection, and large scale models designed for complex reasoning tasks like root cause analysis and SPL generation. Attendees will see how these models support threat intelligence correlation, contextual analysis, and advanced forecasting within a single cloud environment.
2 weeks ago
A deep dive into Cybereason’s TTP Briefing Q4 2025 report highlights the latest adversary tactics, techniques and procedures observed in real world investigations. Threat intelligence and incident response experts examine what proved effective, what failed and how these frontline findings are shaping the threat landscape in 2026. The session draws on expanded visibility that now includes large scale telemetry from SpiderLabs to show how active threat actors are refining their methods.
Real examples include phishing campaigns that bypass common defenses and recently exploited vulnerabilities impacting organizations today. The discussion focuses on practical detection priorities and defensive adjustments that security teams can apply immediately. Attendees will gain actionable intelligence and have the opportunity to engage directly with incident response specialists during a live Q and A.
2 weeks ago
Security teams are under pressure to investigate faster while dealing with growing alert volume and complexity. This webinar focuses on how finding based detections improve the analyst experience by reducing alert fatigue and making security incidents easier to understand and prioritize. The session explains how contextual alerts help analysts quickly see what matters most and respond with greater confidence.
The discussion covers how finding based detections identify multi stage attacks, group related activity using risk based alerting best practices, and present a unified view of high priority incidents. Live demos and real world examples show how these capabilities shorten investigation time and improve response to sophisticated threats, while giving analysts the context they need to act efficiently.