Discover Security Events in Threat Intelligence
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
1 week from now
Understanding how vulnerabilities are actively exploited is critical for effective defense. This webinar series explores real world exploitation activity, focusing on how attackers leverage vulnerabilities and what security teams are observing in live environments. The session emphasizes practical, evidence based insights into attacker behavior and evolving threat techniques.
Attendees will learn how vulnerabilities are being exploited in the wild, how attacker tradecraft is evolving, and what signals matter most for detection and response. The discussion also highlights the gap between industry narratives and actual threat activity. The webinar provides actionable intelligence to help security teams prioritize risks and respond more effectively to active threats.
6 days ago
Intelligence programs often struggle when large volumes of data fail to translate into meaningful decisions. This live webinar focuses on building and operationalizing Priority Intelligence Requirements, helping organizations connect intelligence efforts to defined decision authority. The session explains how to turn broad monitoring activities into structured requirements tied to specific risk conditions and measurable outcomes.
Attendees will learn how to distinguish true PIRs from routine tracking, apply a four step operating model, and convert recurring risk drivers into observable signals and workflows. The training also covers how to measure intelligence maturity through signal coverage, alignment tracking, and metrics that demonstrate impact on organizational posture.
6 days ago
Artificial intelligence is increasingly influencing how threat intelligence is collected, analyzed, and operationalized. At the same time, adversaries are also using AI to accelerate attacks and adapt their tactics. This webinar provides a practical overview of how AI is currently shaping the threat intelligence landscape and what security teams should realistically expect from these technologies today.
The session examines how AI is being used in defensive intelligence operations and highlights emerging threats driven or accelerated by AI technologies. Speakers will discuss where current expectations around AI exceed real world capabilities and where the technology is already delivering measurable value. Attendees will also explore practical use cases for integrating AI into threat intelligence programs and gain lessons for organizations assessing the risks and opportunities associated with AI adoption.
1 week ago
Security teams often struggle with disconnected tools, manual alert enrichment, and limited scalability. The challenge is not the lack of tools, but the absence of integrated intelligence that enables efficient and coordinated security operations.
A practical workshop format walks through three integration workflows designed to operationalize threat intelligence across existing systems. Topics include automating alert enrichment within SIEM and SOAR environments, prioritizing vulnerabilities based on active exploitation, and identifying the right starting point based on organizational maturity. Attendees gain clear, actionable approaches to improve SOC efficiency, reduce manual effort, and move toward more scalable and intelligence-driven security operations.
1 week ago
Recent exploit intelligence findings reveal how vulnerabilities are actively used in real-world attacks, highlighting the gap between disclosed risks and actual exploitation. Analysis of 2025 data shows shifts in threat actor behavior, the rise of routinely targeted vulnerabilities, and increasing noise from fake proof-of-concept exploits that can mislead defenders.
Insights from the 2026 report break down which CVEs were most exploited, why attackers and researchers prioritized them, and how trends such as AI-generated content are impacting risk assessment. It also examines changes in global threat activity, including the rise and decline of exploits linked to specific regions, helping organizations better understand where to focus defensive efforts.
2 weeks ago
Cybercrime has evolved into interconnected ecosystems where supply chain attacks exploit trust relationships, shared access, and data dependencies. Threat actors increasingly target upstream vendors and service providers to expand reach, operate stealthily, and amplify the impact of attacks across multiple organizations.
Drawing on recent threat intelligence, this session examines how supply chain attacks are structured and why they are difficult to detect using traditional approaches. It highlights ways to identify weak points within vendor and service networks and outlines strategies to disrupt attack chains before they escalate into broader incidents. Attendees will gain a clearer understanding of emerging trends and how to strengthen defenses against complex, multi-stage cyber threats.
3 weeks ago
This session of Out of the Woods: The Threat Hunting Podcast challenges participants to identify a malware family through live analysis. Hosts reveal behavior in stages, walking through execution patterns, infrastructure indicators, and operational tradecraft tied to an active campaign. Attendees will assess how observed activity maps to MITRE ATT&CK and how tactics evolve across campaigns.
The webinar examines delivery methods, post exploitation behavior, and signals that support attribution. Participants can submit their guess before the final reveal. The discussion centers on real world malware behavior, behavioral fingerprinting across variants, and how infection chains reflect operator intent.
1 month ago
Threat hunting requires a different approach to prioritization than alerts or incident response. This workshop explains why it is not about chasing the most severe threat, but about identifying weak visibility, incomplete detection coverage, and areas of unknown risk. Scott Poley presents a structured method for managing threat hunting as a discovery driven capability that strengthens the overall security program.
The session explores how prioritization often becomes clearer after execution, compares actor focused and technique focused strategies, and shows how hunting improves detection engineering and telemetry coverage. It also outlines a management level framework for measurable coverage tracking and program growth. Participants who complete the workshop and final challenge earn a certification from Intel 471's Threat Hunting Management Program.
1 month ago
Legacy DRP and SAT tools are struggling to keep up with modern social engineering attacks that spread across email, SMS, voice, chat, social platforms, and paid ads. Security teams face high alert volumes and slow manual workflows while attackers move quickly across multiple channels. This webinar presents a different approach built for today’s threat landscape.
The session introduces an AI native, unified platform designed to correlate signals across communication surfaces and autonomously disrupt attacker campaigns. It also highlights how organizations can train employees to serve as the first line of defense against social engineering threats.
1 month ago
Modern social engineering attacks span multiple channels, including email, SMS, voice, chat, and social platforms, making them difficult to detect and contain using traditional tools. This webinar explores the limitations of legacy digital risk protection (DRP) and security awareness training (SAT) approaches in addressing fast moving, multi channel threats. The session focuses on how organizations can improve detection and response by correlating signals across different attack surfaces.
Attendees will learn how AI driven platforms can help identify and disrupt attacker campaigns in real time while reducing reliance on manual processes. The discussion also highlights the role of employees as a critical line of defense and how training can be integrated into broader security operations. The webinar provides insight into modernizing defenses against evolving social engineering threats.
1 month ago
Modern security teams must move beyond manual threat intelligence processes to keep pace with evolving threats. This webinar demonstrates how autonomous threat operations can transform threat intelligence into automated detection and response actions. The session focuses on how organizations can operationalize intelligence at scale to reduce response times and improve overall security effectiveness.
Attendees will see real world examples of automated threat hunting, including the use of translated detection rules and continuously validated indicators. The discussion also covers how automated workflows can streamline detection, reduce mean time to respond, and eliminate fragmented processes across tools. The webinar provides practical insight into building a proactive, intelligence driven security program that operates efficiently at scale.
1 month ago
New research from GreyNoise highlights how attackers are targeting edge infrastructure and where defenses still fall short. In this webinar, GreyNoise's Founder, VP of Data Science and Research, and Director of Intelligence examine findings from the 2026 State of the Edge Report. The session reviews large scale exploitation activity observed across internet facing systems and explains how targeting patterns challenge common assumptions about where defenses are strongest.
Speakers analyze trends such as remote code execution attempts from previously unseen IPs, rapid botnet growth across residential networks, and the continued exploitation of older vulnerabilities. The discussion also covers why reputation based blocking and patching based on recency can leave gaps, and how clustering techniques at the ASN and fingerprint level can help security teams turn large volumes of attacker activity into actionable defense decisions.