Join Sabeen Malik, a leading expert on geo and cyber risk, to learn practical, high-impact strategies for creating a robust, contextual risk framework. This webinar will explore why traditional, static risk assessments are no longer sufficient for managing risk in (...)
Join us for a fast-paced look back at the biggest cybersecurity developments of 2025, and what defenders should be preparing for in 2026. We’ll break down what’s changing, what’s escalating, and what “staying ahead” really looks like in a world (...)
Quantum computing is redefining the cybersecurity landscape, challenging the cryptographic foundations that safeguard financial data, transactions, and trust. As APAC regulators push for quantum-resilient security frameworks and stronger compliance readiness, financial institutions must act now to stay ahead of the (...)
Behind every red team engagement is a mindset built to mimic the unpredictable, creative, and often chaotic behavior of real-world adversaries. But what exactly goes into thinking like an attacker—and how do today’s red teamers stay ahead in an ever-shifting (...)
AI is reshaping software security faster than ever. The BSIMM16 report, built on insights from 111 firms, shows what’s working—and what’s next. Since its start in 2008, BSIMM has been a trusted resource for organizations navigating the challenges of securing (...)
AI is reshaping software security faster than ever. The BSIMM16 report, built on insights from 111 firms, shows what’s working—and what’s next. Since its start in 2008, BSIMM has been a trusted resource for organizations navigating the challenges of securing (...)
En esta última sesión, los expertos de Kardex llevarán a cabo un taller interactivo basado en datos reales aportados por los asistentes para modelizar en directo una solución AutoStore™ personalizada.
Para ello, utilizaremos el StoreX Calculator de Kardex, una herramienta que (...)
Join Sabeen Malik, a leading expert on geo and cyber risk, to learn practical, high-impact strategies for creating a robust, contextual risk framework. This webinar will explore why traditional, static risk assessments are no longer sufficient for managing risk in (...)
The Dark Web has evolved into a structured marketplace. While we track trends on LinkedIn, a parallel "Shadow HR" world is recruiting talent with corporate precision. To defend your business, you must understand the infrastructure fueling these modern threats.
In this (...)
As organizations increasingly migrate to OpenStack from proprietary virtualization solutions, they usually encounter a critical operational gap: OpenStack, on its own, does not provide an end-to-end backup solution. For enterprise infrastructure teams, this forces a difficult choice between building complex (...)
AI bots are rapidly reshaping the web — and they’re doing so in two very different ways. For retailers and commerce brands, AI bots are powerful growth engines, driving discovery, recommendations, and frictionless transactions. For publishers, they’re a direct threat, (...)
Implementing AI capabilities presents a critical yet complex opportunity for enterprises striving to gain a competitive advantage through innovation. Technology leaders feel the immense pressure to implement AI -- in some form or fashion -- but realize the odds are (...)
Join HPE and Thales for an engaging webinar as we dive into the dynamic world of cyber resilience one year after the launch of the Digital Operational Resilience Act (DORA)! Financial institutions around the world that operate in the European (...)
Is your legacy storage infrastructure holding you back? As data volumes explode and workloads span on-premises, edge, and cloud environments, government and enterprise organizations need a modern approach to data management that doesn't compromise on security, compliance, or performance.
Join Cloudian (...)
Open source and package registries are now primary attack surfaces. What begins as a malicious or backdoored dependency on a developer workstation can quickly cascade through CI/CD pipelines and into production, creating high-blast-radius incidents that evade traditional AppSec controls. In (...)
A practical playbook for CSP product and innovation leaders to turn AI, edge, network intelligence and APIs into sellable services in the next 12–24 months. Traditional CSP revenues are under pressure, while AI, edge and platformisation unlock new—and very real—paths (...)
Remote access has become mission-critical — yet many organizations are still relying on legacy VPN architectures built for a different era. As VPN solutions approach end of life (EOL), small and midsize enterprises face increasing security exposure, operational complexity, and (...)
Collaboration is vital for defending against global threats like Log4j and React4Shell. As technologies such as AI continue to grow, sharing insights and integrating workflows are essential to enterprise protection. Join us to discover how these risks affect your network (...)
Join Sabeen Malik, a leading expert on geo and cyber risk, to learn practical, high-impact strategies for creating a robust, contextual risk framework. This webinar will explore why traditional, static risk assessments are no longer sufficient for managing risk in (...)
Behind every red team engagement is a mindset built to mimic the unpredictable, creative, and often chaotic behavior of real-world adversaries. But what exactly goes into thinking like an attacker—and how do today’s red teamers stay ahead in an ever-shifting (...)
The EU Cyber Resilience Act (CRA) is a sweeping regulation that will redefine how software and digital products are placed on the European market. While CRA is European legislation, its impact is global, directly affecting North American organizations that develop, (...)
Join Parasoft’s compliance experts, Arthur Hicken and Ricardo Camacho, as they break down what the CRA means for your organization, regardless of where you’re based. They’ll outline a practical, engineering-focused path to compliance.
Learn how automation, shift-left security, and (...)
In this webinar, we detail the transformative power of Agentic Test Automation, a newly released agentic AI solution specifically trained for the Tosca environment. With Agentic Test Automation, QA teams can create test cases autonomously using natural language prompts, significantly (...)
Every enterprise is being told to 'use AI,' but few are being told how to build it. Today’s stacks already include RPA, workflow engines, scripts and orchestration layers. Now AI agents, agentic workflows and automations are being layered on top (...)
Join Tony Anscombe, ESET’s Chief Security Evangelist, and Pedro Kertzman, Senior Solutions Architect, for an expert walkthrough of the most significant findings from ESET’s H2 2025 Threat Report. This webinar will explore the emergence of AI‑assisted attacks, including ESET’s discovery (...)
Agentic security is no longer a future concept – it’s already reshaping how today’s SOCs operate. But with the hype accelerating, security leaders need clarity on what “agentic” actually looks like in production, which capabilities are real today, and what’s (...)
Intel® Xeon® provides enterprise-grade compute performance, reliability, and security. Corent’s SaaSOps™ platform transforms software running on Xeon into a fully operational, AI-ready SaaS platform in only 1-2 weeks, without any coding.
Together, they offer ISVs / SaaS providers the fastest, (...)
AI is reshaping software security faster than ever. The BSIMM16 report, built on insights from 111 firms, shows what’s working—and what’s next. Since its start in 2008, BSIMM has been a trusted resource for organizations navigating the challenges of securing (...)
Despite significant investments in data platforms, advanced analytics and generative AI, many organizations remain stuck—unable to convert these technologies into actionable, scalable decisions that drive measurable business outcomes. Fragmented data, static dashboards and inconsistent workflows often stand in the way (...)
本セッションでは、Akamai Guardicore Segmentation(AGS)とHuntの組み合わせによる、ネットワーク型検知アプローチにより実現できる脅威ハンティングについてご紹介します。Huntでは、AGS導入後間もないお客様環境であっても、攻撃活動の検知が可能です。セッション後半では、Huntによる攻撃活動の検知からAGSを活用した対処までの事例も併せてご紹介します。
【こんな課題をお持ちの方におすすめ】
内部セグメンテーションの制御ポリシーへの能動的改善手法を知りたい
潜伏型・環境内寄生型攻撃(Living Off the Land)への対策を検討したい
脅威ハンティングにおけるEDR派生のサービス、マイクロセグメンテーション派生のサービスの違いを整理したい
"Friday Forward" is a 30-minute conversation that takes place every 2 weeks and covers the Public Sector digital transformation topics that are driving conversations in the federal government, state and local governments, public safety, education and health care.
Michael Hackmer will (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
The clock is ticking on F5’s iSeries. As these legacy ADC platforms reach end-of-support, organizations face escalating maintenance costs, security exposure, and migration uncertainty. For many, this moment isn’t just a hardware refresh — it’s an opportunity to rethink their (...)
A behind-the-scenes look at how Malwarebytes turned customer feedback into their biggest growth lever.
Join Alchemer and Malwarebytes as we unpack the exact steps that helped the leading cybersecurity platform scale their VoC program, build internal alignment, and transform transparency (...)
Zero Trust isn’t just for remote users — it’s for everyone. In this episode, JT and Wayson explore how organizations can apply unified, consistent protection across all environments: on-prem, in the cloud, and everywhere in between.
They’ll discuss how device posture, (...)
Bauen Sie Ihre Cyber-Resilienz auf!
Verpassen Sie nicht dieses informative Webinar über die wachsende Bedrohung durch Account-Takeover-Angriffe (ATO) und wie Sie sich dagegen schützen können.
Nehmen Sie an einer aktuellen Diskussion mit den E-Mail-Sicherheitsexperten von Barracuda teil, in der es um die (...)
Even with a robust threat prevention stack in place, attackers can still infiltrate your network, moving laterally or exploiting unmanaged and IoT devices that endpoint detection tools can't see.
Join us to explore how FortiNDR delivers the extended visibility and AI-driven (...)
A behind-the-scenes look at how Malwarebytes turned customer feedback into their biggest growth lever.
Join Alchemer and Malwarebytes as we unpack the exact steps that helped the leading cybersecurity platform scale their VoC program, build internal alignment, and transform transparency (...)
Since the initial Valsartan contamination incident in 2018, the issue of N-Nitrosamines has continued to present major challenges for the pharmaceutical industry. This webinar will seek to chart the evolution of the issue, from the initial concerns relating to formation (...)
Experience Deutsche Bahn’s enterprise architecture management compass for IT efficiency, providing overall orientation and easy navigation. Discover pioneering strategies that enable the consequent IT master planning and IT landscape consolidation. In this session, you’ll learn how we leverage powerful partnerships (...)
(WEBINAR CONDUCTED IN SPANISH)
Effectively managing third-party risks is challenging. But what if you could know in real time the state of the cybersecurity of your suppliers? In this webinar, we'll show you how to assess vendors' cybersecurity capability to (...)
A behind-the-scenes look at how Malwarebytes turned customer feedback into their biggest growth lever.
Join Alchemer and Malwarebytes as we unpack the exact steps that helped the leading cybersecurity platform scale their VoC program, build internal alignment, and transform transparency (...)
Mike Anderson kicks off this series by diving into the intricacies of the data layer, exploring its evolution and significance in today's digital landscape. This session highlights the importance of customer-centric data strategies and how they drive digital transformation. You’ll (...)
In this webinar, Supermicro and Scontain explore how confidential AI and confidential computing can unlock the value of telecoms’ most sensitive data without compromising privacy or control. Drawing on real-world deployments in regulated sectors such as healthcare, our speakers will (...)
Join us for one of our weekly sessions where we do a deep dive into ESET's latest offerings in security software and services. In today's session we will go over ESET's MDR service. Following the demo one of our engineers (...)
Explore the latest cybersecurity landscape in the financial industry with Fabio Assolini from Kaspersky's GReAT. This webinar examines the most significant security incidents, evolving threats, and technological trends from 2025 that specifically impacted financial organizations.
Learn how to defend against these (...)
As rail and mobility systems become increasingly digital and interconnected, cybersecurity risks are evolving in ways that challenge traditional safety and security models. From IT/OT convergence and remote access to growing geopolitical and ransomware-driven threats, rail operators are facing a (...)
In 2026, cybersecurity leaders will face a decisive shift from reactive defense to risk-driven operations. In a lively discussion featuring two Qualys cybersecurity experts, Richard Seiersen, Chief Risk Technology Officer and Alex Kreilein, Vice President of Product Security & Public (...)
Creating an environment where employees feel safe to express themselves, share ideas, and take risks without fear of retaliation is essential to fostering innovation, collaboration, and overall well-being.
Led by a certified educator and psychological safety practitioner, this workshop is (...)
In this insightful session with Scott Brinker, we delve into the evolving landscape of marketing technology and the pivotal role of data and AI. Scott shares his expertise on how professionals at different stages of their careers can navigate the (...)
In today’s evolving IT landscape, selecting the right storage architecture is critical for optimal performance, scalability, data governance, and cost-efficiency. Furthermore, AI workloads have uniquely influenced how we meet these demands from our storage infrastructure. This webinar provides a technical (...)
In today’s evolving IT landscape, selecting the right storage architecture is critical for optimal performance, scalability, data governance, and cost-efficiency. Furthermore, AI workloads have uniquely influenced how we meet these demands from our storage infrastructure. This webinar provides a technical (...)
In today’s evolving IT landscape, selecting the right storage architecture is critical for optimal performance, scalability, data governance, and cost-efficiency. Furthermore, AI workloads have uniquely influenced how we meet these demands from our storage infrastructure. This webinar provides a technical (...)
In today’s evolving IT landscape, selecting the right storage architecture is critical for optimal performance, scalability, data governance, and cost-efficiency. Furthermore, AI workloads have uniquely influenced how we meet these demands from our storage infrastructure. This webinar provides a technical (...)
In today’s evolving IT landscape, selecting the right storage architecture is critical for optimal performance, scalability, data governance, and cost-efficiency. Furthermore, AI workloads have uniquely influenced how we meet these demands from our storage infrastructure. This webinar provides a technical (...)
Traditional identity governance approaches were designed for environments with fewer applications and identities. As organizations scale, they must govern access across hundreds of applications and millions of human and non-human identities, often using manual processes, periodic access reviews, and static (...)
AI workloads are reshaping how data moves across modern networks. In this Q4 2025 Network Stats webinar, Technical Lead Network Engineer Brent Nowak breaks down real-world traffic data to show how neoclouds, hyperscalers, and traditional ISPs are contributing to a (...)
During this training, we'll review how to navigate the different features of Kintone as an End User. This includes running through Portal Home, interacting with the People Feature, using Spaces, and reviewing/adding data in an App.
Forcing AppSec tests into developer pipelines, without aligning them to their preferred tools, can lead to inefficiencies and security oversights. Security teams need full risk visibility and developers need to meet shipping deadlines. While developers should not take full responsibility (...)
Join us to see how Black Duck Polaris helps you automatically keep your applications secure without slowing down your teams. We’ll show how you can quickly bring in all your GitHub projects and scan them in minutes, using built‑in tools (...)
Nella corsa agli strumenti di difesa più aggiornati contro la nuova generazione di criminali informatici, l’innovazione costante è indispensabile per difendersi efficacemente da minacce in rapida evoluzione.
Ma non sono solo i cybercriminali a cui bisogna prestare attenzione.
Anche le autorità di (...)
The EU created the Digital Operational Resilience Act (DORA) to help the financial sector withstand, respond to, and recover from Information and Communication Technology (ICT) disruptions. But what does that mean from a security testing perspective?
Join this webinar (...)
Join us to see how Black Duck Polaris helps you automatically keep your applications secure without slowing down your teams. We’ll show how you can quickly bring in all your GitHub projects and scan them in minutes, using built‑in tools (...)
The Cyber Resilience Act (CRA) is more than a regulatory requirement—it changes how you secure products across the EU and beyond. Deadlines are fast approaching, and penalties can hit hard if you’re not ready. The question is: Are you ready? (...)
The recent discovery of the Chrysalis backdoor - delivered through a compromise of Notepad++ update infrastructure - offers a clear look at how modern nation-state attackers are evolving their supply chain tradecraft.
In this session, Rapid7 Senior Director of Threat Analytics (...)
The maturity of any Site Reliability Engineering (SRE) team is defined by its ability to proactively prepare for incidents and recover from them swiftly. At ScienceLogic, the SRE team is pioneering a transformative approach to modernize the SaaS Incident Response (...)
Container security doesn’t have to be a black box. Join us for a deep dive into the 10 Steps of Container Security, where we provide a repeatable "recipe" for securing the entire lifecycle—Build, Deploy, and Runtime. We’ll show you exactly (...)
In this engaging episode of the Data Layer Sessions, Zack Wenthe hosts Giorgio Suighi, Global Lead at WPP Media. They discuss the evolving landscape of data strategy, AI integration, and the importance of foundational data in driving business success. Giorgio (...)
Earn 1.5 CPE Credits on this webinar
Autonomous and AI‑driven attacks are accelerating the speed and scale of identity and data compromise. As adversaries automate reconnaissance, credential abuse, and privilege escalation, traditional defenses struggle to keep up. Organizations need modern controls (...)
Organizations face pressure to modernize security strategies to counter AI-enabled adversaries executing attacks at unprecedented speed and scale. While security teams recognize the need for proactive approaches, limited resources and program gaps challenge efforts to secure expanding attack surfaces. Midmarket (...)
AI coding assistants are transforming business, with adoption driven both by developers seeking help and by executives seeking savings. But this evolution should not come at the cost of enterprise security or valuable intellectual property. This session explores the most (...)
Join us to see how Black Duck Polaris helps you automatically keep your applications secure without slowing down your teams. We’ll show how you can quickly bring in all your GitHub projects and scan them in minutes, using built‑in tools (...)
Join us for a weekly session to see ESET's latest offerings in an in depth demo of ESET Protect Complete. This software bundle is full of our secure components such as Vulnerability & Patch Management, Ransomware Remediation and Full Disc (...)
The recent discovery of the Chrysalis backdoor - delivered through a compromise of Notepad++ update infrastructure - offers a clear look at how modern nation-state attackers are evolving their supply chain tradecraft.
In this session, Rapid7 Senior Director of Threat Analytics (...)
Known as The Data Governance Coach, Nicola Askham helps organisations understand and manage their data better.
For over two decades she has helped organisations reduce costs and inefficiencies. Typically, people turn to her because their data is a mess and they (...)
A well-structured data layer is critical in driving successful AI initiatives and meaningful business impact. In this session Zack Wenthe and Nick Albertini explore the challenges organizations face with first-party data, the importance of contextually relevant data, and the necessity (...)
This is a great training for anyone who will be a Kintone Administrator because we’ll go through the highlights of each of our admin sections. This will give you a good base as you start to set up Kintone for (...)
The release of NIST CSWP 39, Considerations for Achieving Crypto Agility, marks a major shift in how cryptography should be managed across modern organizations. For the first time, NIST frames crypto agility not as a theoretical concept or future requirement, (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through building an app and a few features to set up to prepare it for use. This will give you a good base (...)
Customers are sharing everything—reviews, social posts, survey comments, even videos—but most of that feedback never makes it to the teams who need it.
In this webinar, we’ll show how AI-powered reputation management helps multi-location brands cut through the noise, surface real (...)
Global Endpoint Detection and Response adoption is on the rise, making it a de-facto standard for many organizations. Everybody has heard about it, but sometimes it’s hard to determine what you need for a particular task: EPP or EDR.
Join Nikita (...)
As hybrid work expands, unmanaged devices and third-party access pose growing risks.
Watch this session from the 4th Annual Fortinet SASE Summit featuring Ramnath Shenai, Product Marketing Director at Fortinet, and discover how Fortinet's Agentless ZTNA and Enterprise Browser (...)
Identity-based attacks are surging, and Microsoft 365 and Entra ID accounts are prime targets. Join Barracuda for a live session on how to protect user identities, prevent account takeover, and stop attackers from moving laterally across your environment.
In this session, you’ll learn how Western Digital’s high capacity SMR drives, combined with Swiss Vault’s intelligent data management software, deliver reliable, high performance solutions for backup, active archival, and Big Data workloads. We’ll show you how this technology reduces (...)
Customers are sharing everything—reviews, social posts, survey comments, even videos—but most of that feedback never makes it to the teams who need it.
In this webinar, we’ll show how AI-powered reputation management helps multi-location brands cut through the noise, surface real (...)
Europe’s investment landscape is undergoing a structural shift. After a standout year marked by renewed industrial policy, strategic autonomy, and increased capital deployment, investors are now asking whether the forces that powered last year’s surge can persist into 2026, and (...)
Customers are sharing everything—reviews, social posts, survey comments, even videos—but most of that feedback never makes it to the teams who need it.
In this webinar, we’ll show how AI-powered reputation management helps multi-location brands cut through the noise, surface real (...)
oin us for one of our weekly sessions where we do a deep dive into ESET's latest offerings in security software and services. In today's session we will go over ESET's MDR service. Following the demo one of our engineers (...)
For decades, cybersecurity teams have relied on the “patient zero” model—detecting and responding to the first instance of a new threat before it spreads. However, in a post-AI world, this approach is increasingly ineffective. AI-powered attacks can morph, propagate, and (...)
The NIS2 Directive marks one of the most significant shifts in Europe’s cybersecurity landscape, expanding regulatory obligations, strengthening governance requirements and introducing stricter incident-reporting timelines for organizations operating across critical and important sectors, for example, Energy, Transport, Banking and Financial (...)
2025 didn’t just increase vulnerability volume; it exposed a broken patching model.
With 1,130+ CVEs, escalating zero-day attacks, and elevation-of-privilege vulnerabilities dominating breach paths, security and IT teams learned the hard way that patch-first doesn’t always mean risk-reduced.
In this (...)
Identity and access management is at a crossroads. Reliant on passwords and centralized directories, traditional IAM can’t meet the demands of today’s distributed infrastructures and increasingly sophisticated cyber threats. As businesses expand their digital presence, they need adaptable, privacy-preserving solutions (...)
AI Adoption: Innovation vs Exploitation - AI is transforming FSI—but what happens when attackers poison models or deepfakes slip through? Explore how to safeguard AI, prevent data leaks, and meet the EU AI Act.
For decades, cybersecurity teams have relied on the “patient zero” model—detecting and responding to the first instance of a new threat before it spreads. However, in a post-AI world, this approach is increasingly ineffective. AI-powered attacks can morph, propagate, and (...)
The year 2025 marked a pivotal moment for the Mobile Driving License (mDL) ecosystem in the U.S. With over 20 states, including California and New York, now live and 250+ airports accepting digital credentials, mDLs are no longer experimental—they are (...)
What we will cover:
- The US Securitised assets universe
- Key differences vs. Europe, plus how it has evolved post-global financial crisis
- Role in pension portfolios and characteristics of securitised asset strategies
In the spirit of Valentine’s Day, we often hear about love, loyalty and protecting what matters most. In much the same way, your data deserves protection, devotion, and a fail-safe plan. For MSPs and SMBs alike, data loss isn’t just (...)
AI is reshaping cyber risk on both sides of the field. Attackers are using generative AI to move faster, automate lateral movement, and exploit gaps in flat networks, while defenders are increasingly looking for AI-driven tools to mitigate these risks. (...)
When incidents hit and the clock is ticking, answers aren’t enough.
Operations teams are drowning in alerts, data, tickets, and tools, what they need is clear direction on what matters now and what to do next, with confidence.
Skylar Advisor (...)
The gap between detection and remediation leaves your organization exposed. It's time to move from manual analysis to autonomous action.
Join us for "Expose and Eliminate: Mastering Agent Sara and Agent Nova" webinar to discover how Qualys' new Agentic AI capabilities (...)
In this session, we’ll introduce Zero Trust Workload Identity Manager (ZTWIM), our productized SPIFFE/SPIRE–based solution for OpenShift, and how it delivers strong, cryptographic workload identity for zero trust environments. We’ll explore real-world use cases across modern AI workloads, traditional microservices, (...)
For decades, cybersecurity teams have relied on the “patient zero” model—detecting and responding to the first instance of a new threat before it spreads. However, in a post-AI world, this approach is increasingly ineffective. AI-powered attacks can morph, propagate, and (...)
F5's source code leak underscored a critical reality: thousands of organizations run vulnerable edge devices that attackers are actively exploiting. Combined with Cisco ASA compromises, the RedNovember campaign, and recent CISA emergency directives, network infrastructure has become the most active (...)
Discover iboss's Breakthrough AI-Powered Dashboard Insights—Powered by Our New SaaS Security Posture Management (SSPM) Solution—to Transform Overwhelming Data into Crystal-Clear Posture Visibility, Prioritized Risks, and One-Click Remediation.
In today's hyper-connected world, traditional SASE reporting overwhelms teams with data, delaying decisions and (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
As identity becomes the primary attack vector in cybersecurity, the rise of AI-driven adversaries is reshaping the threat landscape. From deepfake-enabled social engineering to synthetic identities, attackers are using AI to bypass authentication, steal credentials and escalate privileges. For businesses, (...)
Not only do cybercriminals make money by committing cybercrime, but they also expand their operations by offering services to individuals without strong technical skills in malware development. This business model is known as Malware-as-a-Service (MaaS), and it operates on various (...)
Do you know how to navigate the risks of AI-powered development? How can you establish secure DevSecOps initiatives?
This presentation will highlight key aspects of the latest AI-trends and the risk implications for business operations. Get crucial (...)
Join us for a webinar discussing the challenges organizations face in transitioning to PCI-DSS 4.0 and implementing new security measures. We will explore the updates to the security framework and the critical need to secure APIs to protect sensitive payment (...)
Upfront cost, delivery risk and long-term performance concerns still hold many businesses back from investing in solar. Shawton Energy and AMPYR Distributed Energy explain why fully funded solar is fast becoming the simplest way for organisations to access on-site generation, (...)
As digital identity solutions gain momentum, 2026 is poised to be a pivotal year with the EU digital wallet deadline and the US's state-by-state rollout of mobile driving licenses. These advancements promise greater convenience for users and enhanced protection against (...)
In this webinar, PRI and the Inevitable Policy Response (IPR) will present the annual IPR 2026 Transition Forecast. The Forecast is informed by input from several hundred international climate, policy and sustainable investment experts via our Climate Expert Survey, conducted (...)
The rapid growth of digital identities, evolving compliance demands and advanced cyber threats have made identity governance and administration (IGA) a critical priority for modern enterprises. Without a structured governance framework, organizations risk operational inefficiencies, data breaches and reputational harm. (...)
GenAI platforms are rapidly entering enterprise workflows, but most organizations lack the visibility and controls needed to prevent data leakage, Shadow AI, and policy violations. As users adopt AI tools outside approved workflows, security teams are left blind to how (...)
What if you could give your SOC team 60 hours back every week? New Hero AI expert agents and agent builder capabilities allow you to rapidly deploy a customizable AI workforce that acts as an intelligence microservice within your existing (...)
AI is spreading across the enterprise faster than leaders can track it—inside SaaS apps, shadow projects, vendor tools, and emerging AI agents. In this 15-minute session, we’ll unpack how organizations can move from uncontrolled AI sprawl to disciplined AI control. (...)
This webinar will introduce you to Bureau Veritas Cybersecurity’s Penetration Testing as a Service (PTaaS) portal and the Continuous Threat Exposure Management (CTEM) module, powered by Strobes. Combined, this provides a powerful combination of on-demand security assessments to assess new (...)
Modern HPC workloads can be very complex, requiring a long list of libraries, tools, and software packages from many different sources, and blending between on-premises and cloud infrastructure. This is why Red Hat is excited to announce the launch of (...)
As Agentic AI moves beyond foundational theory into real-world deployment, the focus shifts to the architectural and operational enablers that make scalable intelligence possible. This session explores the emergence of Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication as critical (...)
Identity governance and administration (IGA) programs are critical for managing enterprise security and compliance, yet many organizations face persistent challenges. Operational inefficiencies, reliance on manual processes, and the growing complexity of managing diverse applications and identities often hinder success. As (...)
For years, PMOs have been the backbone of governance and portfolio visibility. But the rise of AI has redefined the landscape by automating reporting, predicting delivery risks, and even recommending investment reallocations in real time.
This session explores how AI (...)
AI risk doesn’t start with the model, it starts with the data feeding it. As sensitive data is pulled into AI tools, analytics workflows, and third-party services, many security teams lose visibility as soon as data moves beyond its original (...)
As Agentic AI moves beyond foundational theory into real-world deployment, the focus shifts to the architectural and operational enablers that make scalable intelligence possible. This session explores the emergence of Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication as critical (...)
As Agentic AI moves beyond foundational theory into real-world deployment, the focus shifts to the architectural and operational enablers that make scalable intelligence possible. This session explores the emergence of Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication as critical (...)
As Agentic AI moves beyond foundational theory into real-world deployment, the focus shifts to the architectural and operational enablers that make scalable intelligence possible. This session explores the emergence of Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication as critical (...)
As Agentic AI moves beyond foundational theory into real-world deployment, the focus shifts to the architectural and operational enablers that make scalable intelligence possible. This session explores the emergence of Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication as critical (...)
Two technological forces are converging to reshape cybersecurity forever: AI and quantum computing. Most organizations are dangerously unprepared for what's coming next. These aren't just buzzwords—they're fundamentally changing how attacks happen, who can launch them, and which defenses will fail (...)
Patch Tuesday Webinar: This Month in Vulnerabilities and Patches
Join us for a critical breakdown of the threat landscape for February. Our Qualys Threat Research (TRU) experts will analyze high-impact vulnerabilities—including a deep dive into the Microsoft Patch Tuesday cycle—and demonstrate (...)
AI adoption is accelerating across every industry, bringing unprecedented opportunity — and unprecedented uncertainty. As organizations race to deploy AI applications, models, and agentic systems, many are discovering that traditional security frameworks weren’t designed for this new frontier. The emerging (...)
Join two of our cybersecurity experts for a lightning round that cuts through the hype and addresses the immediate challenges of AI in software development. We'll explore the paradigm shift that is reshaping creativity and problem-solving in development, the new (...)
Join us for a weekly session to see ESET's latest offerings in an in depth demo of ESET Protect Complete. This software bundle is full of our secure components such as Vulnerability & Patch Management, Ransomware Remediation and Full Disc (...)
"Friday Forward" is a 30-minute conversation that takes place every 2 weeks and covers the Public Sector digital transformation topics that are driving conversations in the federal government, state and local governments, public safety, education and health care.
Michael Hackmer will (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
Don’t just read the report—see how top performers are actually doing it. In our 2025 State of ITSM Report, a select group of high-performing organizations achieved a 54.3% reduction in resolution time by strategically integrating GenAI. In this on-demand session, (...)
As release cycles speed up and architectures grow more complex, traditional performance testing often comes too late to prevent risk. Join this session to learn how NeoLoad enables teams to shift performance testing left, executing earlier, more often, and across (...)
Marketers and finance leaders may speak different languages, but they share the same goal: driving growth. The key is translating marketing success into numbers your CFO cares about. Great campaigns spark engagement. Smart marketers turn that engagement into measurable business (...)
Increased attack sophistication resulting from advances in Gen AI has led CISOs and SOC teams worldwide to revisit the attack killchain with a renewed focus on the pre-attack stage to stop threats before they materialize - by mapping an organization's (...)
Here’s an uncomfortable truth: your EDR solution is generating alerts, but who’s responding at 2AM on a Sunday? Who’s investigating that suspicious process execution? Who’s isolating the compromised endpoint before ransomware spreads laterally across your network?
The evolution from EDR to (...)
Marketers and finance leaders may speak different languages, but they share the same goal: driving growth. The key is translating marketing success into numbers your CFO cares about. Great campaigns spark engagement. Smart marketers turn that engagement into measurable business (...)
As investors continue to navigate a market shaped by elevated rates, persistent volatility and heightened sensitivity to risk, the search for resilient sources of income has taken on renewed importance. Preferred stocks offer a compelling middle ground, combining elements of (...)
Ten years since the Paris Agreement, what is the way forward for net zero policy?
Join us for this webinar to explore the findings of the Taskforce on Net Zero Policy's COP30 report, “Policy Matters: From pledges to delivery – a (...)
Cyberattacks are a growing threat, with 86% of small and medium-sized businesses facing attempted ransomware attacks in the past year. The increasing complexity of IT environments adds to the challenge, as 85% of mid-sized organizations report greater infrastructure complexity over (...)
In modern data centers and IT environments, the biggest operational risks often come from what you can’t see: unmanaged assets, hidden capacity constraints, power inefficiencies, and compliance blind spots that stay unnoticed until they become costly.
That’s why Nlyte Software, a (...)
In this Under the Hood webinar we will be introducing the CloudGuard Network Ops App (NOA).
NOA represents a significant leap forward in simplifying CloudGuard Network Security. It brings together orchestration, visibility, deployment, configuration, and operations into a single modern SaaS (...)
Join us to explore how the new collections and content for Red Hat Ansible’s integration with Microsoft technologies streamline operations and ensure consistency across your hybrid environment.
In this webinar, we'll dive into the core capabilities of the new integrations and (...)
Marketers and finance leaders may speak different languages, but they share the same goal: driving growth. The key is translating marketing success into numbers your CFO cares about. Great campaigns spark engagement. Smart marketers turn that engagement into measurable business (...)
This webinar explores the hidden risks in apps leveraging modern AI systems, especially those using large language models (LLMs) and retrieval-augmented generation (RAG) workflows. The speaker will demonstrate how sensitive data, such as personally identifiable information (PII), can be extracted (...)
For public safety agencies, reliable communication can mean the difference between saving lives and losing them. As first responders face rising demands, new threats, and tighter resources, many are asking: How can we ensure faster, safer, and more connected emergency (...)
Join us for one of our weekly sessions where we do a deep dive into ESET's latest offerings in security software and services. In today's session we will go over ESET's MDR service. Following the demo one of our engineers (...)
Die Chrysalis-Backdoor zeigt, wie Angreifer legitime Software-Updates als Einfallstor nutzen — und warum klassische Sicherheitsmechanismen solche Angriffe oft nicht erkennen.
Die Entdeckung dieser Backdoor, die über die kompromittierte Update-Infrastruktur von Notepad++ verbreitet wurde, verdeutlicht, wie gezielt moderne Bedrohungsakteure Software-Lieferketten angreifen und (...)
Welcome to Akamai's Defend Together, built for architects, engineers, and hands-on defenders to focus on the real challenges shaping cybersecurity today. Our first episode will cover Securing AI-Generated Code with Active Testing.
Medium-chain fatty acids are used extensively as additives to plastics and elastomers. Plastics and elastomers are in turn used in the fabrication of components which then are used in the fabrication of drug product container closure-delivery systems and medical devices. (...)
Small and mid-sized businesses face pressure to adopt transformative technologies like AI and cloud-native architectures while managing security threats and regulations. Research shows six in ten organizations report rising IT complexity due to digital transformation, security, and data growth. For (...)
Whether you are brand new to speaking or need to refine your message, in this presentation, you will learn 3 powerful shifts to leverage speaking as a marketing and sales tool—without waiting for a big stage!
Audiences will learn to:
- Increase (...)
As we move into 2026, the cybersecurity landscape is shifting from "AI as a tool" to "AI as a teammate." Agentic AI - systems capable of autonomous reasoning, multi-step planning, and direct tool interaction - is no longer a lab (...)
Join us for an inside look at what’s coming next in Rally. From new features to usability enhancements, you’ll get a first-hand preview of
how we’re evolving the platform to support your teams better, improve visibility, and help you scale with (...)
The competition for skilled cybersecurity professionals has never been more intense. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores proven, practical strategies organizations can use to attract top-tier security talent—and keep them engaged for (...)
The competition for skilled cybersecurity professionals has never been more intense. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores proven, practical strategies organizations can use to attract top-tier security talent—and keep them engaged for (...)
The 2025 Year-End Drive Stats Report distills a full year of real-world hard drive reliability data from Backblaze’s global storage fleet. In this session, the Drive Stats team reviews 2025 annualized failure rates alongside key Q4 and lifetime trends, highlighting (...)
Recent research from Qualys and IDC reveals a critical disconnect while enterprises rapidly adopt cloud and AI; their security and compliance maturity is dangerously low. Traditional, manual approaches to security and compliance are failing to keep pace with evolving mandates (...)
During this training, we'll review how to navigate the different features of Kintone as an End User. This includes running through Portal Home, interacting with the People Feature, using Spaces, and reviewing/adding data in an App.
Recent breakthroughs in quantum computing hardware and algorithms have accelerated the timeline for Q-DAY, signaling that the era of utility-scale quantum computing is arriving faster than anticipated. This technical velocity, however, amplifies the urgency of the 'harvest now, decrypt later' (...)
On this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, spoke with Daniel Martin, Director of Product Management at Rapid7. They discussed how modern Security Operations Centres (SOCs) are evolving, where AI truly adds (...)
n today’s relentless cybersecurity landscape, threats can still slip through undetected and compromise organizations, despite multiple security controls. In this webinar, Victor Sergeev and Amged Wageh, from Kaspersky, deep dive into real-world cases where compromise assessment became the last line (...)
Join us for an exclusive insider session! We’ll explore the latest trends and challenges in embedded software development. “The State of Embedded Software Quality and Safety” report uncovers key issues in the industry. It highlights the fast rise of AI, (...)
En la carrera por la ciberseguridad frente a los hackers, la innovación constante es clave para defenderse de amenazas cada vez más sofisticadas.
No solo hay que estar al día frente a los ciberdelincuentes: los organismos reguladores y las aseguradoras exigen (...)
The regulatory landscape is evolving constantly. Legal frameworks like the Cyber Resilience Act (CRA) and the Digital Operational Resilience Act (DORA) are redefining compliance requirements and posing significant challenges for AppSec, DevSecOps, and compliance teams.
Do you have effective strategies (...)
Securing your workspace has never been more challenging—or more critical.
Today’s AI-driven threats are more convincing than ever. With deepfakes and synthetic voice phishing to malware-generated tools like FraudGPT, attackers are targeting users and data in highly convincing ways, often through (...)
You can read about detection logic. Or you can see how it actually works.
In this webinar, Kaspersky experts will open Hunt Hub live inside our Threat Intelligence portal and show how detection logic is built, structured, and used in practice (...)
This session in the NHS Cyber Assessment Framework (CAF) series focuses on the Detect function of the framework and how NHS organisations can move from reactive security to proactive cyber defence. Early detection is critical to minimising the impact of (...)
Dans la course à l’armement numérique face aux hackers criminels, l’innovation constante est indispensable pour se défendre efficacement contre des menaces en évolution rapide.
Mais il n’y a pas que les cybercriminels qu’il faut surveiller. Les autorités de régulation et les (...)
On this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, spoke with Daniel Martin, Director of Product Management at Rapid7. They discussed how modern Security Operations Centres (SOCs) are evolving, where AI truly adds (...)
Security champions programs are a proven way to scale security across large development teams, but the rise of AI-assisted development introduces new challenges, risks and opportunities that traditional programs were not designed to handle. As AI coding assistants and autonomous (...)
IT and security teams face rising licensing fees and unpredictable renewals, making their job more challenging.
But what if you could minimize those difficulties and costs?
On February 19, our live session, Breaking Free from the Cost Trap: Smarter (...)
Small and midsize businesses face a critical challenge: turning AI ambition into production-ready systems without enterprise-scale resources. While 22% of SMBs have advanced AI implementations, most struggle with deployment friction, compliance, and talent gaps, creating a barrier between pilot projects (...)
Businesses are sitting on vast amounts of data but turning that data into actionable insights remains a major challenge. Fragmented tools, limited visibility, and manual analysis make it harder to stay ahead of threats and deliver proactive value to customers.
Join (...)
De aplicación tradicional a Plataforma inteligente
Incorporar chatbots IA en las aplicaciones empresariales de todo tipo es hoy una obligación tanto en los equipos de desarrollo de software como los departamentos IT. Además hay que poner en marcha estos proyectos de (...)
On this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, spoke with Daniel Martin, Director of Product Management at Rapid7. They discussed how modern Security Operations Centres (SOCs) are evolving, where AI truly adds (...)
The Red Hat Partner Demand Center is your self-serve, central location to customize content, execute demand generation campaigns, and track your success. This global platform is available in nine different languages and free for Red Hat partners. Partners will have (...)
Earn 1.5 CPE Credits on this webinar.
Approximately $350 million in preventable losses stem from polymorphic malware, malicious software that constantly changes its code to evade detection. With 18% of new malware using adaptive techniques that challenge traditional defenses, now is (...)
Security champions programs are a proven way to scale security across large development teams, but the rise of AI-assisted development introduces new challenges, risks, and opportunities that traditional programs were not designed to handle. As AI coding assistants and autonomous (...)
This webinar shows how to design and operate resilient multi-cluster Kubernetes platforms for AI workloads with Mirantis k0rdent AI. We’ll break down a practical reference pattern where training, inference, and shared services run in separate clusters so you can isolate (...)
Most API testing tools claim to be AI-powered, but not all deliver meaningful value. Without a clear evaluation framework, teams risk investing in AI features that look impressive but fail to improve test effectiveness or delivery speed.
In this webinar, (...)
Generative AI is revolutionizing how organizations operate, accelerating software development, enhancing productivity, and unlocking new business value. Presidio’s hAI Build platform exemplifies this transformation, enabling enterprises to deploy private GenAI solutions that are secure, scalable, and tailored to their needs.
Yet, (...)
Securing your software supply chain requires that you analyze dependencies for risk, harden your development pipeline, and secure the artifacts that you deploy or ship to customers. Are you prepared for the four common attack vectors that bad actors exploit? (...)
Navigating the Request for Proposal (RFP) process is a critical yet often challenging step in outsourcing IT support or contact center operations. A well-crafted RFP can attract top-tier vendors and set the stage for a successful partnership, while common pitfalls (...)
Join us for a weekly session to see ESET's latest offerings in an in depth demo of ESET Protect Complete. This software bundle is full of our secure components such as Vulnerability & Patch Management, Ransomware Remediation and Full Disc (...)
This is a great training for anyone who will be a Kintone Administrator because we’ll go through the highlights of each of our admin sections. This will give you a good base as you start to set up Kintone for (...)
In this webinar, MSP leaders and operations teams will discover how SCC transformed its observability strategy with LogicMonitor to deliver faster resolutions, improve uptime, and unlock new revenue opportunities.
This is a great training for anyone who will be a Kintone App Builder because we’ll go through building an app and a few features to set up to prepare it for use. This will give you a good base (...)
In only 5 years, SASE has turned the networking world on its head but is still sufficiently shrouded in the mystery of claims and counterclaims to beg the question – how does it really work and how can it be (...)
Cybercriminals are increasingly targeting email and cloud platforms with sophisticated account takeover (ATO) attacks. Manual remediation isn’t enough anymore. Join Barracuda’s email security experts for an in-depth discussion on how to stop credential theft and lateral movement across Microsoft 365 (...)
With water scarcity risks and water and energy costs in the headlines, get the know-how to make a difference to increase efficiency and reduce costs in your organisation. Lower risk and protect revenue, with the insight you'll gain from multi-award (...)
Every year, Proofpoint's threat experts examine trends from the prior year and anticipate changes in the threat landscape for the year ahead. As we move into 2026, organisations face unprecedented challenges driven by agentic AI, cloud complexity and the ever-present (...)
PCI DSS compliance is no longer just about identifying vulnerabilities—it’s about how quickly organizations can remediate them. Delayed patching and high Mean Time to Remediate (MTTR) continue to be the primary reasons for repeated audit findings, increased breach exposure, and (...)
Ensure the highest level of legal compliance and security. Discover how Entrust Signhost provides eIDAS-compliant Qualified Electronic Signatures for your most critical business documents.
Ensure the highest level of legal compliance and security. Discover how Entrust Signhost provides
eIDAS-compliant Qualified Electronic Signatures for your most critical business documents.
The development of mRNA-based medicines requires robust potency assays to assess both translatability and biological activity. These assays can be either cell-free or cell-based assays; each provide a different assessment but are complementary to each other. As such, we will (...)
Join the ConnectALL product team for a forward-looking session on where the platform is headed and how upcoming capabilities are designed to make enterprise integration simpler, faster, and easier to manage at scale.
In this webinar, you will get a practical (...)
Hard to believe the integration between CloudGuard Network Security and Azure Virtual WAN is almost 3 years old already! Perfect time for a knowledge refresh!
In this Under the Hood webinar we will cover:
- Step-by-step instructions on how to upgrade your (...)
Most modern organizations are drowning in monitoring tools while trying to gain visibility over complex, hybrid environments.
This “tool sprawl” creates more noise and less visibility, drives up licensing and maintenance costs, and fragments data—leading to inefficiencies and finger-pointing over (...)
As Android expands into revenue-critical edge systems, enterprises increasingly require platforms prioritizing control, stability, and long-term operability over consumer services. This has driven preference for AOSP-based Android on Intel x86, combining open Android foundations with x86's performance, serviceability, and lifecycle (...)
Much of the discussion around AI in CX is about self-service, agentics, and agent assist. But one of the most powerful uses of AI is its ability to analyze every single conversation. The technology can tell CX and business leaders (...)
As Android moves beyond consumer devices into business-owned edge systems, enterprises and OEMs are standardizing on AOSP-based Android on Intel x86 for control, security, and lifecycle governance. This shift is visible in next-generation POS systems, kiosks, and self-service terminals requiring (...)
Security operations are entering a new era defined by AI, automation, and human collaboration. In this session, Sumo Logic will take you inside Dojo AI, a multi-agent platform built to help teams work smarter, not harder.
Margaret Selid, Principal Product Marketing (...)
In high-stakes moments, AI-powered computer vision provides real-time information that can make or break emergency response. Computer vision for public safety enables first responders to make faster, smarter, and safer decisions by leveraging edge AI to quickly turn incoming data (...)
Network security teams are often overwhelmed by constant access requests. While least-privileged access and advanced filtering build strong security, they result in complex, constantly changing rulebases. Manual request handling is slow, inconsistent, and error-prone, creating delays. This webinar offers a (...)
DNS, DHCP, and IP address management (DDI) are essential to every digital business, yet many organizations still rely on fragmented, legacy tools that can’t keep pace with hybrid and multi-cloud environments. In this webinar, we’ll show how modern, enterprise-grade DDI (...)
The sensitive data stolen from companies during a cyberattack often ends up on darknet markets. With the rise of the cybercrime as a service business model, we observe that not only data obtained from attacks is for sale but also (...)
E‑commerce in APAC is evolving fast: new checkout patterns, growing wallet adoption, and more sophisticated fraud are reshaping how issuers win online. In this focused session, Visa and Entrust show how Visa Click to Pay delivers password‑free, tokenized web checkout (...)
APAC security teams aren’t short on tools, alerts, or data. What they’re missing is clarity.
Across the region, enterprises are struggling with incomplete asset inventories, siloed security controls, and risk prioritization models that rely heavily on CVSS scores, with little (...)
AI initiatives often face resistance—not because they lack potential, but because they’re seen as risky, expensive and hard to justify. Leaders are wary of “shiny-toy” projects with fragile ROI stories and unclear success criteria, fearing they’ll be left defending costly, (...)
Africa’s payments ecosystem is undergoing rapid transformation, driven by mobile-first innovation, digital wallets, and changing consumer expectations. Entrust’s latest African Payment Preferences Report reveals how consumers across the continent are embracing new payment methods, prioritizing security, and demanding seamless experiences. (...)
DNS, DHCP, and IP address management (DDI) are essential to every digital business, yet many organizations still rely on fragmented, legacy tools that can’t keep pace with hybrid and multi-cloud environments. In this webinar, we’ll show how modern, enterprise-grade DDI (...)
Der Cyber Resilience Act (CRA) verändert die regulatorischen Anforderungen an digitale Produkte grundlegend. Hersteller und Distributoren stehen künftig über den gesamten Produktlebenszyklus hinweg in der Verantwortung. Erfahren Sie in unserem Webinar, welche Produkte betroffen sind, wo Risiken und Chancen liegen (...)
As trillions of dollars flow through the AI economy, 2026 marks a turning point: the shift from AI experimentation to AI execution. John Bradshaw (Akamai) and Bryan Glick (Computer Weekly) will discuss four critical predictions; from AI inference and edge (...)
AI governance presents an architectural challenge that centralized approaches cannot solve. Monolithic review processes create friction that development teams bypass; purely decentralized models produce inconsistency that regulators will not accept. The session presents a federated architecture for AI governance: central (...)
Most enterprises aren’t short on customer data or tools. They’re short on strategic ownership that turns technical capability into commercial outcomes. In this session, we’ll unpack the translation crisis between data engineering and go-to-market teams and why a new hybrid (...)
In our 2026 State of Network Operations Report, we asked customers, "In your experience does the internet and cloud (public, private, hybrid) environments create blind spots to network visibility?", 87% said YES...up 7% from 2025. Join us as we demonstrate (...)
Building AI products shouldn’t require months of infrastructure development, custom platform development, or constant operational firefighting. Unfortunately, for many enterprises, slow provisioning processes, fragmented tooling, and hands-on lifecycle management cause significant delays in time-to-market.
In this webinar, we’ll show how Mirantis (...)
Mosaddaq Turabi, is the CTO, Service Provider at Graphiant, where he leads the technical strategy and architecture supporting global service providers. With deep expertise in cloud-native networking, large-scale infrastructure, and carrier-grade solutions, Mosaddaq focuses on helping service providers modernize connectivity, (...)
DNS, DHCP, and IP address management (DDI) are essential to every digital business, yet many organizations still rely on fragmented, legacy tools that can’t keep pace with hybrid and multi-cloud environments. In this webinar, we’ll show how modern, enterprise-grade DDI (...)
New global research shows 95% of organizations say SPM is essential to business success, yet only 44% believe their current SPM processes are effective. The gap is not a lack of commitment; it’s a lack of connected data, persistent organizational (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
Are you struggling to demonstrate the true business value of AI in your service and support operations? Without tracking the right metrics, it's challenging to justify AI investments and scale initiatives effectively.
In this webcast, Jeff Rumburg, Managing Partner of MetricNet, (...)
Join Sabeen Malik, a leading expert on geo and cyber risk, to learn practical, high-impact strategies for creating a robust, contextual risk framework. This webinar will explore why traditional, static risk assessments are no longer sufficient for managing risk in (...)
Join us for a fast-paced look back at the biggest cybersecurity developments of 2025, and what defenders should be preparing for in 2026. We’ll break down what’s changing, what’s escalating, and what “staying ahead” really looks like in a world (...)
Quantum computing is redefining the cybersecurity landscape, challenging the cryptographic foundations that safeguard financial data, transactions, and trust. As APAC regulators push for quantum-resilient security frameworks and stronger compliance readiness, financial institutions must act now to stay ahead of the (...)
Behind every red team engagement is a mindset built to mimic the unpredictable, creative, and often chaotic behavior of real-world adversaries. But what exactly goes into thinking like an attacker—and how do today’s red teamers stay ahead in an ever-shifting (...)
AI is reshaping software security faster than ever. The BSIMM16 report, built on insights from 111 firms, shows what’s working—and what’s next. Since its start in 2008, BSIMM has been a trusted resource for organizations navigating the challenges of securing (...)
AI is reshaping software security faster than ever. The BSIMM16 report, built on insights from 111 firms, shows what’s working—and what’s next. Since its start in 2008, BSIMM has been a trusted resource for organizations navigating the challenges of securing (...)
En esta última sesión, los expertos de Kardex llevarán a cabo un taller interactivo basado en datos reales aportados por los asistentes para modelizar en directo una solución AutoStore™ personalizada.
Para ello, utilizaremos el StoreX Calculator de Kardex, una herramienta que (...)
Join Sabeen Malik, a leading expert on geo and cyber risk, to learn practical, high-impact strategies for creating a robust, contextual risk framework. This webinar will explore why traditional, static risk assessments are no longer sufficient for managing risk in (...)
The Dark Web has evolved into a structured marketplace. While we track trends on LinkedIn, a parallel "Shadow HR" world is recruiting talent with corporate precision. To defend your business, you must understand the infrastructure fueling these modern threats.
In this (...)
As organizations increasingly migrate to OpenStack from proprietary virtualization solutions, they usually encounter a critical operational gap: OpenStack, on its own, does not provide an end-to-end backup solution. For enterprise infrastructure teams, this forces a difficult choice between building complex (...)
AI bots are rapidly reshaping the web — and they’re doing so in two very different ways. For retailers and commerce brands, AI bots are powerful growth engines, driving discovery, recommendations, and frictionless transactions. For publishers, they’re a direct threat, (...)
Implementing AI capabilities presents a critical yet complex opportunity for enterprises striving to gain a competitive advantage through innovation. Technology leaders feel the immense pressure to implement AI -- in some form or fashion -- but realize the odds are (...)
Join HPE and Thales for an engaging webinar as we dive into the dynamic world of cyber resilience one year after the launch of the Digital Operational Resilience Act (DORA)! Financial institutions around the world that operate in the European (...)
Is your legacy storage infrastructure holding you back? As data volumes explode and workloads span on-premises, edge, and cloud environments, government and enterprise organizations need a modern approach to data management that doesn't compromise on security, compliance, or performance.
Join Cloudian (...)
Open source and package registries are now primary attack surfaces. What begins as a malicious or backdoored dependency on a developer workstation can quickly cascade through CI/CD pipelines and into production, creating high-blast-radius incidents that evade traditional AppSec controls. In (...)
A practical playbook for CSP product and innovation leaders to turn AI, edge, network intelligence and APIs into sellable services in the next 12–24 months. Traditional CSP revenues are under pressure, while AI, edge and platformisation unlock new—and very real—paths (...)
Remote access has become mission-critical — yet many organizations are still relying on legacy VPN architectures built for a different era. As VPN solutions approach end of life (EOL), small and midsize enterprises face increasing security exposure, operational complexity, and (...)
Collaboration is vital for defending against global threats like Log4j and React4Shell. As technologies such as AI continue to grow, sharing insights and integrating workflows are essential to enterprise protection. Join us to discover how these risks affect your network (...)
Join Sabeen Malik, a leading expert on geo and cyber risk, to learn practical, high-impact strategies for creating a robust, contextual risk framework. This webinar will explore why traditional, static risk assessments are no longer sufficient for managing risk in (...)
Behind every red team engagement is a mindset built to mimic the unpredictable, creative, and often chaotic behavior of real-world adversaries. But what exactly goes into thinking like an attacker—and how do today’s red teamers stay ahead in an ever-shifting (...)
The EU Cyber Resilience Act (CRA) is a sweeping regulation that will redefine how software and digital products are placed on the European market. While CRA is European legislation, its impact is global, directly affecting North American organizations that develop, (...)
Join Parasoft’s compliance experts, Arthur Hicken and Ricardo Camacho, as they break down what the CRA means for your organization, regardless of where you’re based. They’ll outline a practical, engineering-focused path to compliance.
Learn how automation, shift-left security, and (...)
In this webinar, we detail the transformative power of Agentic Test Automation, a newly released agentic AI solution specifically trained for the Tosca environment. With Agentic Test Automation, QA teams can create test cases autonomously using natural language prompts, significantly (...)
Every enterprise is being told to 'use AI,' but few are being told how to build it. Today’s stacks already include RPA, workflow engines, scripts and orchestration layers. Now AI agents, agentic workflows and automations are being layered on top (...)
Join Tony Anscombe, ESET’s Chief Security Evangelist, and Pedro Kertzman, Senior Solutions Architect, for an expert walkthrough of the most significant findings from ESET’s H2 2025 Threat Report. This webinar will explore the emergence of AI‑assisted attacks, including ESET’s discovery (...)
Agentic security is no longer a future concept – it’s already reshaping how today’s SOCs operate. But with the hype accelerating, security leaders need clarity on what “agentic” actually looks like in production, which capabilities are real today, and what’s (...)
Intel® Xeon® provides enterprise-grade compute performance, reliability, and security. Corent’s SaaSOps™ platform transforms software running on Xeon into a fully operational, AI-ready SaaS platform in only 1-2 weeks, without any coding.
Together, they offer ISVs / SaaS providers the fastest, (...)
AI is reshaping software security faster than ever. The BSIMM16 report, built on insights from 111 firms, shows what’s working—and what’s next. Since its start in 2008, BSIMM has been a trusted resource for organizations navigating the challenges of securing (...)
Despite significant investments in data platforms, advanced analytics and generative AI, many organizations remain stuck—unable to convert these technologies into actionable, scalable decisions that drive measurable business outcomes. Fragmented data, static dashboards and inconsistent workflows often stand in the way (...)
本セッションでは、Akamai Guardicore Segmentation(AGS)とHuntの組み合わせによる、ネットワーク型検知アプローチにより実現できる脅威ハンティングについてご紹介します。Huntでは、AGS導入後間もないお客様環境であっても、攻撃活動の検知が可能です。セッション後半では、Huntによる攻撃活動の検知からAGSを活用した対処までの事例も併せてご紹介します。
【こんな課題をお持ちの方におすすめ】
内部セグメンテーションの制御ポリシーへの能動的改善手法を知りたい
潜伏型・環境内寄生型攻撃(Living Off the Land)への対策を検討したい
脅威ハンティングにおけるEDR派生のサービス、マイクロセグメンテーション派生のサービスの違いを整理したい
"Friday Forward" is a 30-minute conversation that takes place every 2 weeks and covers the Public Sector digital transformation topics that are driving conversations in the federal government, state and local governments, public safety, education and health care.
Michael Hackmer will (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
La Autoridad Portuaria de la Bahía de Algeciras (APBA) ha instalado cámaras térmicas en las zonas de mayor tránsito de pasajeros del puerto para controlar la temperatura corporal de los pasajeros sin necesidad de pararles. ... Leer más ►
Publicamos grabación de webinar que tuvo lugar el pasado 28/03/2019 por el CIO del Grupo de Medios de Comunicación español Vocento Jorge Oteo en el que explica su visión de la Ciberseguridad hoy.
... Leer más ►