Discover Security Events in Security Analytics
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 day from now
The role of the Chief Information Security Officer is evolving as organizations accelerate AI adoption, face increasing regulatory pressure, and demand stronger cyber resilience. Security leaders are expected to manage risk, support innovation, and provide clear insight to boards on the value and effectiveness of security programs. This webinar explores how the CISO role is changing in response to these growing expectations.
The session examines key findings from The CISO Report 2026 and discusses how security leaders are balancing innovation with regulatory compliance while strengthening organizational resilience. Speakers will share real world perspectives on leading security at scale, addressing evolving threats, and communicating risk and performance to executives. Attendees will gain practical insights for navigating leadership challenges and building resilient security programs in the AI era.
1 day from now
Modern IT operations face increasing complexity from distributed systems, hybrid and multi-cloud environments, and growing data volumes. These challenges create visibility gaps, slow incident response, and add pressure from rising costs and compliance requirements.
A live demonstration showcases how the Splunk Platform helps centralize and normalize data across environments for real-time analysis. It highlights capabilities for accelerating incident detection, improving root cause analysis, and optimizing data pipelines for performance and cost control. Attendees will see practical examples of moving from reactive troubleshooting to proactive operations, enabling better service reliability, stronger operational visibility, and improved alignment with compliance and organizational goals.
1 day from now
Modern infrastructure and AI driven applications require advanced observability to maintain performance, reliability, and visibility. This webinar explores new capabilities in Elastic Observability that help teams monitor complex environments more effectively. The session focuses on how improved infrastructure and service visibility, along with automated log processing, can support faster detection of issues and better operational insight.
Attendees will learn how AI assisted log pipelines, service mapping, and preconfigured alert templates simplify monitoring and reduce manual effort. The discussion also covers observability for AI driven applications, including monitoring agent health and performance. The webinar provides practical guidance on improving visibility, accelerating troubleshooting, and supporting more efficient operations across modern cloud environments.
5 days ago
Modern cloud environments rely on observability tools to monitor application and database performance across distributed systems. This webinar explores how integrated database monitoring within Splunk Observability Cloud helps teams gain visibility into query performance, resource utilization, and system behavior. The session focuses on improving troubleshooting by correlating database activity with application and infrastructure performance.
Attendees will learn how to identify inefficient queries, analyze execution patterns, and accelerate issue resolution using AI driven recommendations. The discussion also highlights how centralized monitoring reduces reliance on siloed tools and improves operational efficiency. The webinar provides practical insight into enhancing observability practices in cloud environments, with limited relevance to broader security considerations.
5 days ago
AI adoption in financial services is accelerating, bringing new challenges around trust, security, and regulatory compliance. This webinar explores how organizations can deploy AI responsibly while aligning with frameworks such as the EU AI Act, GDPR, and DORA. The session focuses on balancing innovation with governance to ensure AI systems operate securely and within regulatory boundaries.
Attendees will learn how to implement explainable AI, establish effective guardrails, and design architectures that support both compliance and performance. The discussion also covers how to manage risk, improve transparency, and maintain control over AI driven decisions. The webinar provides practical guidance on building secure, compliant, and trustworthy AI systems in highly regulated environments.
6 days ago
Organizations are increasingly leveraging cloud platforms and AI technologies to enhance digital experiences and application performance. This webinar explores how WP Engine uses Elastic and Google Cloud to deliver scalable, AI driven website functionality. The session focuses on how cloud infrastructure and modern data architectures support search, content processing, and application performance across diverse environments.
Attendees will learn how hybrid retrieval techniques and cloud based services enable more efficient data handling and faster innovation. The discussion also highlights how managed infrastructure supports scalability and reliability during traffic spikes. The webinar provides insight into building AI powered applications on cloud platforms, with limited relevance to security considerations.
1 week ago
Modern phishing attacks increasingly target human behavior across multiple workplace platforms, extending beyond traditional email into tools like messaging and collaboration systems. As AI-driven threats become more personalized and adaptive, legacy email security approaches struggle to provide effective protection.
This event introduces an adaptive, AI-powered approach to email and workplace security that combines behavioral intelligence with real-time coaching. It explores how unifying detection and training across communication channels can reduce phishing risk at the source. Attendees will gain insight into evolving attack methods and how integrated, cross-channel security models can better protect users and productivity environments from advanced threats.
1 week ago
AI adoption in the public sector has introduced both opportunities and challenges, particularly around governance, data control, and operational impact. This webinar explores how initial expectations around AI have evolved, highlighting key lessons, missteps, and emerging realities. The session focuses on topics such as data sovereignty, agentic AI, and the need for human oversight in increasingly automated environments.
Attendees will gain insight into how governments are reassessing AI strategies, including the importance of strong data foundations and human centered approaches. The discussion also examines how geopolitical pressures influence data control and AI deployment decisions. The webinar provides perspective on shaping responsible AI adoption in the public sector, with some relevance to security and governance considerations.
1 week ago
Hybrid networks have replaced the traditional security perimeter, creating new challenges for detecting threats across distributed environments. This webinar examines how visibility gaps across hybrid infrastructure can allow attackers to move undetected and contribute to some of today’s most damaging breaches. The session focuses on why detection strategies must evolve to address the complexity of modern networks that span on premises systems, cloud services, and remote access environments.
Experts will discuss how current security tools may leave organizations exposed to unseen attack paths and how adversaries exploit these blind spots. The webinar also presents a real world breach scenario to illustrate where detection typically fails and where it could have been prevented. Attendees will gain a practical framework for improving visibility and strengthening threat detection across hybrid network environments.
2 weeks ago
Modern malware campaigns are increasingly complex, using multiple delivery methods and shared infrastructure to evade detection and persist within environments. This webinar explores a real world investigation that began with a single blocked VBS file and uncovered a broader, multi vector attack campaign. The session focuses on how attackers reuse infrastructure, rotate techniques, and maintain persistence across different entry points.
Attendees will learn how to analyze threats beyond isolated alerts and identify patterns that indicate larger campaigns. The discussion also covers how modular malware execution and open infrastructure support evasion tactics. The webinar provides practical guidance on improving threat investigation, connecting signals across environments, and detecting persistent threats earlier in the attack lifecycle.
2 weeks ago
AI is transforming how security teams detect, investigate, and respond to threats in increasingly complex environments. This webinar explores how Splunk’s latest AI capabilities enhance threat detection, investigation, and response workflows within security operations. The session focuses on how purpose built AI tools can streamline analysis and improve efficiency in security processes.
Attendees will learn how AI assistants support faster investigations and reduce manual effort in security operations. The discussion also covers new AI driven capabilities designed to improve visibility, accelerate response times, and enhance decision making. The webinar provides practical insight into leveraging AI to strengthen security operations and improve threat detection and response outcomes.
3 weeks ago
Accelerating mainframe development also plays a critical role in strengthening application security and cyber resilience, especially in environments that handle highly sensitive financial and personal data. This hands on virtual workshop shows how BMC AMI DevX uses AI driven insights to help developers understand complex COBOL, PL/I, and assembler code faster, reducing hidden technical debt that can introduce security weaknesses and operational risk.
The session demonstrates how modern tooling and visual code analysis support a shift left approach by making it easier to identify logic flaws, risky dependencies, and potential vulnerabilities earlier in the lifecycle. Attendees will see how integrating mainframe development into modern workflows improves visibility, auditability, and control, while supporting more secure and resilient application delivery.