Discover Security Events in Security Analytics
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
21 hours ago
Elasticsearch plays a central role in modern security operations, especially within SIEM environments that rely on fast search and large scale log analysis. This webinar introduces the fundamentals of Elasticsearch, the core engine of the Elastic Stack, and explains how it stores and indexes data for real time search and analytics. The session walks through deployment basics, data ingestion, and management using REST APIs and the user interface.
Attendees will also see how to run search queries, configure fields with text analysis, and use aggregations for analytics. The webinar covers geo spatial queries and analyzer features, which are commonly applied in security monitoring and investigation workflows.
1 day from now
Get a focused update on Darktrace’s latest cybersecurity direction, solutions, and partner strategy in this quarterly briefing designed for security and technology partners. The session shares key insights into where Darktrace is heading, highlights new capabilities entering the portfolio, and explains how recent innovations are shaping the broader cybersecurity landscape.
The webinar also covers how Darktrace is working alongside Microsoft to strengthen security outcomes and create new opportunities in the market. Attendees will come away with a clearer understanding of current priorities, upcoming developments, and how these updates can support stronger customer conversations and planning for the quarter ahead.
2 days from now
Darktrace partners get a focused strategic briefing on the latest company direction, initiatives, and AI driven security developments in this quarterly webinar. The session delivers a clear update on what is changing across Darktrace and how those changes impact partners working with customers and prospects.
The discussion features leadership perspectives on business strategy, key priorities, and upcoming initiatives, along with practical guidance for service providers adopting an AI native approach to security. Attendees will also receive marketing insights, messaging, and campaign resources designed to support customer engagement and growth. This webinar is built to help partners stay aligned, informed, and ready for the quarter ahead.
6 days from now
Strengthen data protection across hybrid, cloud, and AI driven environments in this hands on Virtual Data Loss Prevention Dev Day. The workshop focuses on applying practical DLP controls to reduce insider risk, prevent accidental data exposure, and manage new data leakage challenges introduced by Generative AI, while staying aligned with GDPR and modern data protection requirements.
During the session, Trellix and AWS experts guide participants through real world DLP use cases covering endpoints, cloud storage, email, web, and AI platforms. Attendees will see how to design and enforce effective DLP policies, investigate incidents with proper audit context, and use AI powered insights to prioritize response across complex environments. Interactive labs provide direct experience with insider risk prevention, compliance scenarios, and protecting sensitive data in dynamic ecosystems.
5 days ago
Operation Epic Fury has expanded beyond physical conflict into coordinated cyber activity. This webinar examines Iran’s structured escalation model, where espionage, access development, disruption, and influence operations operate alongside visible events such as widespread Internet disruption. The session focuses on the activation of Iranian state sponsored cyber operators and the broader implications for hybrid conflict.
Ziv Mador, VP Security Research, shares observations from LevelBlue SpiderLabs, including recent monitoring adjustments for clients. The discussion outlines current threat activity and highlights detection and response priorities that security leaders should implement to address escalating risks.
5 days ago
Security teams often struggle with disconnected tools and fragmented workflows. This webinar demonstrates how Elastic Security unifies security operations from large scale data ingestion to real time threat response within a single platform. The session highlights AI powered workflows, including automated ingestion, intelligent alert triaging, and a context aware AI assistant designed to support investigations and reduce noise.
Attendees will see how built in analytics, machine learning, and detection capabilities support SIEM operations at scale. A live demo walks through a complete analyst workflow, from alert detection to incident response and case resolution, including integrated response actions such as isolating an endpoint without switching tools.
6 days ago
Detect and respond to modern hybrid network attacks through a hands-on blue team workshop focused on real world post compromise behavior. This session centers on identifying threats without relying on signatures, helping teams recognize when a hybrid environment has already been breached and how attackers move inside the network.
Participants will practice deeper attack investigations using Vectra AI’s network detection and response platform to contain threats before they escalate. The workshop is designed for security teams looking to strengthen network visibility, improve response skills, and gain practical experience identifying advanced attacks in modern environments.
1 week ago
Security and observability teams get a close look at Splunk’s hosted GenAI foundation models built directly into the Splunk Cloud Platform. This webinar focuses on how native AI models can be used for security operations and time series analysis without the overhead of managing GPUs or external AI services, allowing teams to work faster inside existing investigation and monitoring workflows.
The session walks through Splunk’s new hosted AI models service and the three model types now available, including a security focused foundation model for SOC investigations, a zero shot time series model for predictive alerting and anomaly detection, and large scale models designed for complex reasoning tasks like root cause analysis and SPL generation. Attendees will see how these models support threat intelligence correlation, contextual analysis, and advanced forecasting within a single cloud environment.
1 week ago
A deep dive into Cybereason’s TTP Briefing Q4 2025 report highlights the latest adversary tactics, techniques and procedures observed in real world investigations. Threat intelligence and incident response experts examine what proved effective, what failed and how these frontline findings are shaping the threat landscape in 2026. The session draws on expanded visibility that now includes large scale telemetry from SpiderLabs to show how active threat actors are refining their methods.
Real examples include phishing campaigns that bypass common defenses and recently exploited vulnerabilities impacting organizations today. The discussion focuses on practical detection priorities and defensive adjustments that security teams can apply immediately. Attendees will gain actionable intelligence and have the opportunity to engage directly with incident response specialists during a live Q and A.
1 week ago
Security teams are under pressure to investigate faster while dealing with growing alert volume and complexity. This webinar focuses on how finding based detections improve the analyst experience by reducing alert fatigue and making security incidents easier to understand and prioritize. The session explains how contextual alerts help analysts quickly see what matters most and respond with greater confidence.
The discussion covers how finding based detections identify multi stage attacks, group related activity using risk based alerting best practices, and present a unified view of high priority incidents. Live demos and real world examples show how these capabilities shorten investigation time and improve response to sophisticated threats, while giving analysts the context they need to act efficiently.
2 weeks ago
A deep technical examination of LockBit 5.0 reveals how this ransomware group continues to evolve its capabilities across enterprise environments. Researchers from LevelBlue SpiderLabs break down a newly discovered cross platform variant based on analysis of 19 samples targeting Windows, Linux and VMware ESXi systems. The session explains how the malware encrypts data, evades analysis and operates within compromised networks.
The webinar highlights the key technical changes introduced in this version, including updated anti analysis techniques and operational improvements that increase speed and stealth. Attendees will also gain practical detection and threat hunting considerations derived from observed behavior. The discussion is designed for security professionals who need a clear understanding of the latest LockBit tradecraft and how to respond effectively.
2 weeks ago
This session focuses on how security teams can get more value from Elastic Security by using its newest features to improve detection, response, and day to day operations. The webinar walks through practical ways Elastic integrates with existing security stacks, showing how organizations can enhance SIEM and EDR capabilities using the AI SOC Engine and simplify migrations through automatic rule and dashboard conversion.
The discussion also highlights recent additions such as privileged user monitoring, asset criticality assessment, and auto extracted observables, with real world demos to show how they work in practice. Designed for both new and experienced Elastic users, the webinar offers actionable guidance to streamline security operations and concludes with a live Q and A session with Elastic experts.