Discover Security Events in Threat Intelligence
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
23 hours ago
Escalating geopolitical tensions between Iran, the United States, Israel, and regional actors are increasingly reflected in cyber activity. This briefing from KELA’s Cyber Intelligence Center examines how ongoing kinetic operations are driving disruptive cyber campaigns targeting government organizations and companies with regional operations.
The session reviews developments since February 28 and analyzes patterns of activity across the operational layer, separating high-volume disruptions such as DDoS from more strategic, high-impact attacks. It also explores emerging risks including account takeovers affecting social and broadcast administration channels. Attendees will gain practical defensive priorities to strengthen availability, secure trusted communication channels, and improve cloud resilience in response to evolving cyber threats.
20 minutes from now
See how security and intelligence teams use CYJAX to unify threat intelligence, reduce noise, and turn fragmented data into clear, actionable decisions. This live product demo shows the CYJAX platform in action, focusing on how it brings context to threat intelligence so teams can understand what is happening, why it matters, and what to do next.
The session is fully hands on, with no slides or theory, and walks through real workflows used by security teams across government, critical infrastructure, and large enterprises. Attendees will see how CYJAX helps cut through tool sprawl, streamline analysis, and support faster, more confident decision making. A recording will be available for those who cannot attend live.
2 weeks from now
This session of Out of the Woods: The Threat Hunting Podcast challenges participants to identify a malware family through live analysis. Hosts reveal behavior in stages, walking through execution patterns, infrastructure indicators, and operational tradecraft tied to an active campaign. Attendees will assess how observed activity maps to MITRE ATT&CK and how tactics evolve across campaigns.
The webinar examines delivery methods, post exploitation behavior, and signals that support attribution. Participants can submit their guess before the final reveal. The discussion centers on real world malware behavior, behavioral fingerprinting across variants, and how infection chains reflect operator intent.
4 days ago
Cyber incidents leave lasting damage well beyond technical recovery, especially when customer trust is lost. This webinar examines how major cyberattacks impact long term customer loyalty and revenue, using real world examples from industries such as hospitality and banking to show the true financial cost organizations often overlook.
The session analyzes how trust erosion affects business performance over time, compares outcomes against industry benchmarks, and explains what cyber risk, insurance, and finance teams can learn from these incidents. Ryan Dodd of Intangic shares insights from recent insurance research and answers key questions on managing cyber risk, helping organizations better understand and prepare for the hidden business consequences of cyberattacks.
4 days ago
Security operations are entering a new phase as agentic AI begins to influence how teams detect and respond to threats. In this webinar, Anomali’s CEO Ahmed Rubaie, Chief Commercial Officer Chris Vincent, and Advisor Christian Karam share their perspectives in a fireside chat on how this technology is expected to reshape security operations.
The session explores how agentic AI is being applied in practice, what is grounded in reality versus hype, and what developments may come next. Attendees will gain insight into what these changes could mean for security teams in 2026 and how operations may continue to evolve.
5 days ago
Protecting high profile leaders requires timely insight across both digital and physical environments. This live 20 minute webinar demonstrates how Flashpoint Physical Security Intelligence transforms large volumes of data into actionable intelligence for executive protection teams. Attendees will see how geospatial mapping can be used to monitor localized threat chatter around offices, travel routes, and event venues in real time.
The session also highlights AI driven analysis through Echosec Assist, which identifies critical sentiment and threatening language across the web. In addition, it covers how human vetted intelligence reports can support internal research efforts and enable faster, more confident security decisions.
1 week ago
Redefine how intelligence teams demonstrate impact by shifting from activity driven reporting to a model focused on strategic value. This webinar examines how intelligence functions can move beyond producing data and indicators to delivering insight that directly supports decision making and organizational priorities. The discussion centers on positioning intelligence as a capability that informs risk, protects critical assets and contributes to long term objectives.
Attendees will explore practical ways to measure performance based on influence and outcomes rather than volume of output. The session also covers how to communicate intelligence value clearly to senior leaders and how to structure programs around decisions and purpose instead of broad data collection. Designed for intelligence professionals, the webinar provides guidance for teams that want their work to shape real business outcomes.
1 week ago
Dark web intelligence is becoming a critical part of proactive threat exposure management as attackers often know about weaknesses before defenders do. This webinar focuses on how integrating dark web intelligence with a mature attack surface management program helps security teams identify exposed credentials and early criminal activity before it turns into an active breach.
Searchlight Cyber and Calian will show how MSSPs and internal security teams use dark web monitoring to uncover risks earlier than traditional perimeter controls. Through live demonstrations and real investigation examples, the session highlights how compromised access is detected, how reconnaissance activity is surfaced, and how these insights support faster and more effective response.
1 week ago
Cyber risk is no longer limited to technical incidents and is increasingly shaping business pressure, leadership decisions, and organizational resilience. This webinar examines how AI driven attacks, ransomware, and hacktivism are changing the nature of cyber threats and why many leaders are missing this shift. The discussion looks at how modern attacks are designed to appear legitimate, apply sustained operational pressure, and escalate into legal, regulatory, and reputational challenges.
The session focuses on understanding this evolving risk landscape and what it means for executive decision making. Led by senior cybersecurity leadership, the webinar provides perspective on why traditional improvements in security posture are no longer enough and how organizations can better interpret and respond to threats that are meant to force strategic choices rather than simply disrupt systems.
2 weeks ago
This threat briefing focuses on how AI is actually being used in real world cyber attacks, separating exaggerated claims from operational reality. The session explains how threat actors are applying AI to amplify existing malware and disinformation tactics, and how media attention is being leveraged to increase pressure during extortion campaigns.
The discussion highlights current AI malware maturity, its impact on incident response, and recent case examples that show how attackers exploit public narratives. Attendees will gain practical guidance on applying intelligence led threat framing, monitoring AI service abuse, strengthening detections, and responding effectively without overreacting to hype.
2 weeks ago
Digital trust is being challenged as AI generated voice, video, and imagery become realistic enough to enable large scale deception. This webinar focuses on how social engineering is evolving into a multi channel, AI native threat that moves beyond email into collaboration tools, messaging platforms, and social networks where defenses are often weakest. The discussion outlines why traditional security stacks struggle to detect these attacks when malicious activity appears legitimate to both tools and employees.
Doppel’s threat briefing presents its key SED predictions for 2026 and explains how organizations can adapt to this new reality. Attendees will gain practical guidance on prioritizing multi channel risk, implementing stronger verification workflows, and adjusting defenses for attacks that target trust rather than infrastructure. The session is designed for security leaders who want to prepare for a threat landscape where deception looks increasingly normal.
3 weeks ago
Brand impersonation has become one of the fastest growing cyber threats, with attackers using phishing, AI driven automation and stolen identity data to exploit trusted organizations. This live session examines how criminals misuse legitimate brands to scale fraud operations and why impersonation scams are driving significant financial losses worldwide.
The discussion highlights current trends behind phishing campaigns, the role of automation in expanding fraud activity and what security leaders can do to reduce exposure. Designed for CISOs, risk leaders, regulators, law enforcement and digital trust teams, the webinar provides insight into protecting brand reputation and strengthening defenses against large scale impersonation attacks.