Discover Security Events in Threat Intelligence
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
5 days from now
This session focuses on cognitive warfare and how narrative attacks are increasingly used to influence perception, trust, and decision making across societies and institutions. It explains how digital platforms and advances in artificial intelligence have accelerated the scale and impact of coordinated information campaigns, turning narratives into powerful tools for manipulation.
The webinar brings together Blackbird.AI, the Center for Information Advantage and Effectiveness, and the DISARM Foundation to examine how modern adversaries weaponize information and distort truth. Speakers discuss the real world consequences of these campaigns and outline how governments, civil society, academia, journalists, and technology companies can work together to defend against them. The discussion highlights a unified approach to narrative defense by combining open frameworks, AI driven analysis, and cross sector collaboration to protect institutions in the age of AI powered influence operations.
5 days from now
This session focuses on cognitive warfare and how modern narrative attacks manipulate perception, trust, and decision making across governments, markets, and institutions. It examines how digital platforms and artificial intelligence have amplified the speed and impact of coordinated information campaigns, turning narratives into a powerful tool for adversaries operating in the gray zone between peace and conflict.
The discussion brings together Blackbird.AI, the Center for Information Advantage and Effectiveness, and the DISARM Foundation to explain how hostile actors weaponize information and what that means for public trust and institutional stability. Speakers outline how open frameworks, AI driven narrative defense, and cross sector collaboration can work together to counter these threats. The webinar highlights practical approaches for governments, civil society, researchers, journalists, and technology providers to defend against AI enabled narrative attacks and protect the information environment.
6 days from now
Modern cyber risk extends far beyond what most organizations can actively scan or monitor. This webinar focuses on how security teams can gain full visibility into their own external attack surface and the hidden infrastructure risks introduced by third party partners. Team Cymru introduces RADAR, an external asset and vulnerability discovery tool built on passive global telemetry, designed to reveal internet facing exposure without relying on active scanning.
The session walks through how RADAR identifies unmanaged assets, maps vendor infrastructure and prioritizes vulnerabilities that are actively exploited in the wild. A live demonstration shows how attack surface management, supply chain risk assessment and threat investigations can be streamlined using RADAR, with direct integration into Team Cymru’s Scout and Recon platforms. The webinar is aimed at security teams responsible for external risk, vulnerability prioritization and threat intelligence who need clearer, faster insight into real world exposure.
1 week from now
Human risk can no longer be measured by phishing click rates alone as attackers use AI driven social engineering that goes far beyond email. This webinar focuses on why traditional metrics fail to capture real employee behavior and how security teams can better understand human risk in realistic attack scenarios.
The session highlights how Doppel’s Human Risk Management approach helps organizations evaluate how people actually respond to advanced threats and where behavior creates risk. Attendees will see how modern measurement and training strategies give security leaders clearer insight into human decision making and stronger tools to reduce exposure as social engineering continues to evolve.
2 weeks from now
Cyber and geopolitical threats are increasingly overlapping, creating new risks for digital operations, supply chains, and critical services. This webinar focuses on how organizations can gain real time visibility by using open source intelligence and structured intelligence frameworks to identify emerging risks earlier and respond with greater confidence. The discussion centers on improving awareness across both cyber and geopolitical domains to support faster, better informed decisions.
The session explains how Priority Intelligence Requirements help teams cut through noise, focus intelligence efforts, and deliver context that decision makers can actually use. Attendees will see how OSINT supports early detection and how structured prioritization strengthens operational resilience. A live Silobreaker demo shows how these concepts come together in practice to help security and risk teams improve defenses and response readiness.
3 weeks ago
Threat actors are rapidly turning AI into a force multiplier for ransomware, phishing, and vulnerability exploitation, changing how attacks are launched and scaled. This webinar looks at how AI is being weaponized in real world threat activity and why many security teams struggle to keep pace as attack surfaces evolve.
The panel brings together leaders from EclecticIQ to discuss how defenders can respond to this shift without sacrificing trust or ethical standards. The discussion covers the role of agentic AI in threat intelligence, the challenges of monitoring fast changing environments, and how AI driven approaches can strengthen CTI operations. Attendees will gain a clearer understanding of how to balance efficiency, visibility, and responsible use of AI in modern defense strategies.
4 weeks ago
This webinar examines how Doppel uses advanced OpenAI models to automate core SOC workflows and accelerate the takedown of social engineering attacks. The session explains how AI driven detection, paired with human oversight, reduces operational load and expands the capacity of security teams. Attendees will see how reinforcement fine tuning supports high reliability in low fault tolerance environments.
The discussion highlights recent performance gains, including major reductions in SOC workload and significant improvements in response speed. Speakers walk through how Doppel refines AI models, how human analysts guide system reliability and how autonomous detection and response can strengthen business impact. The session also outlines the path toward a fully autonomous SOC designed to identify, triage and neutralize threats at internet scale.
4 weeks ago
Practical techniques for preparing OSINT so intelligence reaches the people who need it quickly, safely, and in a decision-ready format. Skopenow’s OSINT expert Steve Adams leads the session and shares hands-on methods to keep sensitive tradecraft protected while accelerating information flow to investigators and analysts.
You will see how to grade source reliability and credibility, apply techniques that shield sensitive details, choose dissemination approaches that match each consumer’s needs, and tailor intelligence formats so decision makers receive only what is relevant. The session delivers clear, practical workflows for effective OSINT sharing across teams and organizations.
8 months ago
The "Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries" event provided insightful analysis on the evolving threat landscape. Experts discussed the tactics of Scattered Spider, emphasizing the vulnerabilities in cloud infrastructures. Attendees gained valuable knowledge on prevention strategies and incident response. The event was well-organized, featuring engaging presentations and interactive Q&A sessions, making it a must-attend for professionals in the insurance and financial sectors seeking to bolster their cybersecurity defenses.
8 months ago
The "Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries" webinar provided valuable insights into the evolving threat landscape. Experts discussed the tactics of the Scattered Spider group, emphasizing their focus on insurance and financial sectors. Attendees appreciated the detailed analysis of recent attacks and the practical strategies for enhancing cloud security. The event was well-received for its timely content and actionable advice, making it a must-attend for cybersecurity professionals.
8 months ago
The "Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries" event provided insightful analysis on the evolving threat landscape. Experts discussed the tactics of Scattered Spider, emphasizing the vulnerabilities in cloud infrastructures. Attendees gained valuable knowledge on prevention strategies and incident response. The event was well-organized, featuring engaging presentations and interactive Q&A sessions. It was particularly beneficial for professionals in the insurance and financial sectors seeking to enhance their cybersecurity posture.
8 months ago
Cyber Resilience 2025: Battling Emerging Regional Threats provided a comprehensive overview of the latest cybersecurity challenges and solutions. Attendees praised the event for its insightful presentations and expert panels, which addressed regional threats and strategies for enhancing cyber resilience. The conference facilitated valuable networking opportunities, allowing professionals to exchange ideas and best practices. Overall, it was a well-organized event that equipped participants with practical knowledge to combat evolving cyber threats effectively.