As organizations scale their AI initiatives, many encounter persistent challenges with cloud GPUs: unpredictable costs, limited availability where capacity is needed, and underutilized resources. At the same time, modern AI applications,from real-time analytics to generative AI,require inference closer to users, (...)
How today’s SOC challenges and emerging trends are reshaping security operations — and what organizations can do now to build a modern, resilient SOC for the future.
Key discussion points:
- The reality today. SOC teams face alert overload, limited context and (...)
Financial markets have been highly volatile in recent months, reinforcing our view that disruption – geopolitical and economic – is the new normal. Against an unpredictable market backdrop, absolute return strategies play a crucial role in navigating uncertainty through genuine (...)
During this episode of Coffee and Content, discover the hidden layers of digital music and how metadata shapes your listening experience. Jerry Bartlett, Content Operations Consultant at Content Pro Tech Ltd., will reveal why even simple questions (like when the (...)
Since Post Quantum Cryptography (PQC) algorithms (ML-KEM, ML-DSA, SLH-DSA) are standardized by NIST, many standard organizations have started incorporating PQC into their specifications. NSA and NIST published the PQC transition timeline (CNSA 2.0 and NIST IR 8547). US and Europe (...)
Elegir un ERP es una decisión estratégica para la próxima década. En este webinar, ponemos frente a frente a los tres líderes del mercado para analizar cómo están abordando la integración de la IA y cuál ofrece el mejor retorno (...)
El verdadero riesgo ya no está solo en si alguien entra o no en la red, sino en quién accede, a qué recursos accede, con qué privilegios, durante cuánto tiempo y con qué nivel de visibilidad y control.
Ese enfoque encaja (...)
AI is already reshaping every stage of the cyberattack chain. IBM reports that 97% of organizations affected by an AI‑related breach lacked proper AI access controls, revealing a significant oversight gap. And with AI accelerating breach impact, automating reconnaissance, and (...)
오늘날 빠르게 변화하는 위협 환경 속에서, 지능형 지속 위협(APT)은 여전히 산업과 지역을 막론하고 많은 조직에 큰 도전 과제가 되고 있습니다.
정교해지는 사이버 공격에 앞서 나갈 수 있도록, 최신 동향과 기법, 기술을 함께 살펴보는 인사이트 웨비나에 여러분을 초대합니다.
이 세션은 위협 인텔리전스 역량을 강화하고, 견고한 탐지 및 대응 전략을 구축하고자 하는 보안 전문가분들을 위해 마련되었습니다.
As cyber threats continue to evolve, mastering the art of digital forensics investigation is an essential for investigating security incidents and safeguarding critical systems. This webinar will focus on Windows digital forensics, offering an overview of the tools and techniques (...)
Discover Dell's AI PC portfolio and see how it's redefining the modern workplace. Learn about our updated branding, uncover the "Why Dell for AI PCs" story, and dive deep into the power of Intel, AMD and NVIDIA-powered systems. Plus, explore (...)
Identity is the new attack surface. Credential theft, privilege abuse, and orphaned accounts are letting attackers slip past traditional defences. Join us to learn how to turn identity from a soft spot into your strongest control plane, grounded in Zero (...)
Join our two-part SAP LeanIX webinar. In “LeanIX for Beginners,” get a deep dive into Application Portfolio Management (APM), the LeanIX meta-model, and data structuring. See a high-level demo, learn to maintain a high-fidelity inventory with Fact Sheets, and streamline (...)
Presented by Akamai Senior Solutions Engineer Douglas Holland, this session explores how web application architecture behind the firewall drives resiliency across DNS, network, application, and infrastructure layers. Douglas will break down practical strategies for DNS redundancy, intelligent edge self-healing, Layer (...)
Join us for an in-depth look at Red Hat tools designed to simplify and accelerate your virtualization migration.
We’ll introduce the OpenShift Migration Advisor (OMA) and explore how it assesses your existing landscape, identifies risks, and generates actionable insights for a (...)
Identity Management Day 2026 is coming at you! Mark your calendars for April 14th and prepare yourself for an exciting event packed with 21 hours of identity goodness from around the world. This session will provide you with a preview (...)
In this talk, Sybil will discuss expectations she holds as a TEDx organizer, what other organizers are doing and how to understand the TEDx process as an applicant.
By the end of this presentation, audience members will understand what it takes (...)
Many enterprises are juggling multiple regulatory mandates, whether it's to sustain existing business, to enter new markets, or to stay competitive. As organization grows so do their regulatory requirements.
Join us for “From Checkbox to Catalyst: How Continuous Audit (...)
You vet your core SaaS apps, but what about the 100+ third-party apps, OAuth tokens, and API integrations they connect to? This is the new, undefended shadow supply chain where trust has shifted from the app to the connection, and (...)
Artificial intelligence has rapidly moved from experimental promise to operational reality in software development. AI is no longer just a tool in the application security stack—it’s becoming an active participant—but not without tradeoffs, blind spots, and growing expectations. This (...)
Developers have utilized source code management (SCM) tools since the 1980s to track, control, and manage changes across the software development life cycle. But the use of SCM tools is even more widespread now due to the emergence of distributed (...)
The Cyber Resilience Act requires that manufacturers and software suppliers integrate continuous vulnerability monitoring, SBOM accuracy, vulnerability reporting capabilities, and secure development practices throughout the product life cycle. But translating regulatory text into executable engineering processes is challenging.
(...)
Simmering geopolitical tensions, the proliferation of AI-powered threats, tightening regulations, fragile supply chains, and shrinking budgets are exerting untenable pressure on cyber security teams. Predictably, stress levels are soaring, CISO tenure is shortening, and the gap between attackers and defenders (...)
On a typical work day, a finance manager receives what looks like a routine email: a shared file link from a trusted service and a short note asking them to “review and approve.” A few clicks later, their credentials are (...)
The 2026 Thales Data Threat Report examines the complex calculus that organizations must undertake to enable innovation while securing their most valuable asset — their data. The proliferation of AI and agentic operations is compounding stress on data management (...)
Reimagine your writing process by building an AI-powered workflow that accelerates publishing while preserving what makes your voice unique. Join Claudia Faith, startup entrepreneur and SubStack consultant, as she reveals a practical system for transforming a single idea into a (...)
In this fireside chat, LogicMonitor’s CMO, Brooke Cunningham, and CPO, Garth Fort, unpack findings from the 2026 Observability and AI Outlook—exploring how five forces accelerate autonomous IT. Learn what’s driving the shift, what it means for your organization, and why (...)
6.8x higher likelihood of attack. That’s the correlation cyber insurers report for organizations with certain on prem VPNs and firewalls. Attackers are taking their toolkits where EDR can’t go. Vulnerable Firewalls, VPNs, and routers are exploited more than ever.
And what (...)
Financial services organizations use diverse and complex IT infrastructure that often changes at an accelerated pace. Protecting that infrastructure requires dynamic, resilient cybersecurity strategies. Research further shows that FinServ organizations often have a higher bar when it comes to cybersecurity, (...)
Join us to see how Black Duck Polaris helps you automatically keep your applications secure without slowing down your teams. We’ll show how you can quickly bring in all your GitHub projects and scan them in minutes, using built‑in tools (...)
Join us for a weekly session to see ESET's latest offerings in an in depth demo of ESET Protect
Complete. This software bundle is full of our secure components such as Vulnerability & Patch
Management, Ransomware Remediation and Full Disc Encryption. Following (...)
A newly uncovered set of vulnerabilities in the Linux kernel has exposed a serious weakness in one of its core security mechanisms. Named CrackArmor, these nine vulnerabilities, discovered by the Qualys Threat Research Unit (TRU), target the AppArmor security framework (...)
Too often, teams have to choose between dashboards that are fast but shallow, or advanced but complex and slow to use.
That tradeoff is finally over!
In this webinar, see Advanced Dashboard, Alchemer’s AI-powered analytics experience built for customer feedback. We’ll show (...)
SMBs are surrounded by security noise — new tools, new features, and new threats — yet breaches still happen through simple mistakes and stolen credentials.
In this webinar, JT Fanning and Andrew McCarter take an educational, outcome-focused approach to SMB security. (...)
Cybercriminals have evolved. Has your security? With phishing, RaaS, spyware and zero-day exploits now hitting mid-market companies just as often as enterprises, IT professionals need more than endpoint-level detection.
This webinar breaks down the limitations of EDR and shows how Kaspersky (...)
Find out where to focus for maximum impact
With all the hype around cloud security and AI, it can be difficult to know what to believe and where to focus.
Join us as we cut through the hype using real-world data (...)
Too often, teams have to choose between dashboards that are fast but shallow, or advanced but complex and slow to use.
That tradeoff is finally over!
In this webinar, see Advanced Dashboard, Alchemer’s AI-powered analytics experience built for customer feedback. We’ll show (...)
Multi-cloud Kubernetes environments increase operational entropy with more network paths, greater latency variance, and a larger failure surface. Traditional monitoring surfaces symptoms but does not govern system behavior. When automation or AI-assisted optimization is introduced without safety boundaries, it can (...)
As enterprises rapidly adopt AI, the digital fabric enabling these experiences is powered by APIs. Every interaction, every data exchange, and every AI model call depends on APIs to connect and perform. Yet that same connectivity introduces new vulnerabilities that (...)
Too often, teams have to choose between dashboards that are fast but shallow, or advanced but complex and slow to use.
That tradeoff is finally over!
In this webinar, see Advanced Dashboard, Alchemer’s AI-powered analytics experience built for customer feedback. We’ll show (...)
Discover the hidden engines behind your content’s discoverability and learn why even the best-crafted resources fall short if users cannot find them. Most organizations pour effort into creating valuable content but overlook the critical role of search—and traditional keyword-based systems (...)
You Said Your SPM Was Fine. The Metrics Disagreed.
A Candid Conversation with Chris Sloan
“We have SPM covered.”
Chris Sloan hears this often. But when he reconnects with organizations six months later, the portfolio metrics tell a different story — stalled initiatives, (...)
Most Azure environments aren't unsecured — they're under-unified. Teams are running native tools, responding to alerts, yet still feeling exposed. The gap isn't effort, it's architecture.
In this session, Dami Baiyeroju, Co-Founder of Amyntor Cloud Consulting, breaks down why a fragmented (...)
As organizations rapidly deploy AI and generative AI systems, responsible AI is becoming a critical requirement for security, compliance, and trust. However, many enterprises struggle to move beyond high-level principles toward practical implementation. Responsible AI cannot rely solely on policies (...)
The Boston Celtics have taken their technology game to the next level by leveraging the power of AWS (Amazon Web Services) for deep statistical analysis and data processing. In partnership with Mission Cloud, a CDW Company and AWS Premier Tier (...)
For years, AI governance has existed outside the systems it was designed to regulate—implemented through policy documents, review boards, and compliance processes that operate separately from production infrastructure. As AI systems evolve into autonomous actors capable of initiating workflows and (...)
Actors update their intrusion techniques and tactics non-stop. Large-scale, industrialized attacks squeeze every dollar out of victims while lowering the barrier for new actors to join. For defenders, the stakes are high, as outdated security controls leave organizations exposed to (...)
Security did not fail in 2025 because defenders were slow, it failed because speed was no longer the advantage. Automation and AI have shortened the time between exposure and exploitation, eliminating the buffer organizations once relied on to detect and (...)
As enterprises navigate increasing demands for real-time insights and seamless scalability, traditional IT systems are falling behind. Intelligent infrastructure and edge computing are reshaping the way businesses operate, enabling a shift from rigid, reactive systems to dynamic, AI-driven environments that (...)
This webinar will be delivered in German.
Künstliche Intelligenz verändert die Spielregeln moderner DDoS-Angriffe grundlegend. Automatisierte, lernfähige Angriffsmuster passen sich in Echtzeit an, umgehen Schutzmechanismen – präzise, skalierbar und schwer erkennbar.
DDoS wird zunehmend als strategisches Instrument eingesetzt, um Organisationen gezielt zu (...)
Securing the New Insurance Ecosystem - Insurers face a “perfect storm” of cloud, partners, and regulation. How can they gain visibility, manage supply-chain risk, and empower lean teams with AI-driven resilience?
Découvrez comment Check Point Cloud Firewall fournit une sécurité réseau cloud axée sur la prévention, avec des politiques basées sur l’identité, une prévention avancée des menaces et des opérations simplifiées. Nous verrons quand utiliser des pare‑feu cloud natifs par rapport (...)
Zjistěte, jak Check Point Cloud Firewall poskytuje cloudovou síťovou bezpečnost založenou na prevenci díky politikám řízeným identitou, silné prevenci hrozeb a jednoduchému provozu. Ukážeme, kdy použít cloud‑native firewally a kdy je vhodnější Check Point Cloud Firewall, včetně osvědčených postupů nasazení (...)
Descubre cómo Check Point Cloud Firewall ofrece seguridad de red en la nube con enfoque en la prevención, mediante políticas basadas en identidad, una sólida prevención de amenazas y operaciones simplificadas. Analizaremos cuándo usar firewalls cloud‑native frente a Check Point (...)
bstract ottimizzati per BrightTALK:
Scopri come Check Point Cloud Firewall offre una sicurezza di rete cloud “prevention‑first” con policy basate sull’identità, una solida prevenzione delle minacce e operazioni semplificate. Vedremo quando utilizzare firewall cloud‑native rispetto a Check Point Cloud Firewall, (...)
Erfahren Sie, wie die Check Point Cloud Firewall präventionsorientierte Cloud‑Netzwerksicherheit mit identitätsbasierten Richtlinien, starker Bedrohungsprävention und einfacher Verwaltung bereitstellt. Wir zeigen, wann cloud‑native Firewalls sinnvoll sind und wann die Check Point Cloud Firewall die bessere Wahl ist – inklusive Best (...)
See how CloudGuard FWaaS provides elastic, simplified, consumption‑based cloud firewalling.
We’ll explain where FWaaS fits, onboarding steps, routing patterns, monitoring, and cost controls. Includes a live demo of tenant onboarding, traffic steering, and policy publishing in minutes.
Actors update their intrusion techniques and tactics non-stop. Large-scale, industrialized attacks squeeze every dollar out of victims while lowering the barrier for new actors to join. For defenders, the stakes are high, as outdated security controls leave organizations exposed to (...)
דלמדו כיצ Check Point Cloud Firewall מספק אבטחת רשת עננית המבוססת על Prevention‑First, עם מדיניות מודעת‑זהות, מניעת איומים מתקדמת ותפעול פשוט.
נכסה מתי נכון להשתמש בחומות אש ענניות מובנות בענן לעומת Check Point Cloud Firewall, כולל שיטות עבודה מומלצות לפריסה ולכוונון.
הדגמה כלולה: תכנון מדיניות, אוטומציה מבוססת תגיות, ותוצאות מניעה אמיתיות.
Employees across your organisation could be using unauthorised AI tools and uploading content to social media platforms daily, creating security blind spots and compliance risks.
Traditional DNS filtering can’t see inside encrypted traffic or inspect what’s being uploaded. Join us for (...)
Security did not fail in 2025 because defenders were slow, it failed because speed was no longer the advantage. Automation and AI have shortened the time between exposure and exploitation, eliminating the buffer organizations once relied on to detect and (...)
Internet-scale attacks have entered a new phase. Modern botnets are larger, faster, and harder to detect - capable of generating unprecedented traffic volumes while blending into legitimate user activity. Recent threats such as the Aisuru and Kimwolf botnets illustrate how (...)
2026 has started off strong for Google Threat Intelligence with a number of security-boosting and time-saving updates. We want to make sure none of these new capabilities slipped past you and make sure you are prepared for the new capabilities (...)
Most remediation programs still treat “patch or accept the risk” as the only choice, which forces teams into unsafe rollouts or prolonged exposure when patches are risky, unavailable, or delayed. When patches introduce operational risk, organizations face impossible choices: accept (...)
Security did not fail in 2025 because defenders were slow, it failed because speed was no longer the advantage. Automation and AI have shortened the time between exposure and exploitation, eliminating the buffer organizations once relied on to detect and (...)
The GPU Cloud market is experiencing explosive growth, fueled by massive capital investment and a wave of new entrants. As competition intensifies, monetization is no longer optional. It is essential for survival.
But monetization does not begin with pricing models or (...)
Actors update their intrusion techniques and tactics non-stop. Large-scale, industrialized attacks squeeze every dollar out of victims while lowering the barrier for new actors to join. For defenders, the stakes are high, as outdated security controls leave organizations exposed to (...)
The evolution of AI is shifting from centralised cloud environments to distributed edge ecosystems. This talk from TD Bank's Pankul Chitrav analyses the drivers behind this transition, including the need for ultra-low latency, enhanced data privacy, and reduced network dependency. (...)
Many modernization efforts fail to deliver enterprise-wide value because they remain trapped within organizational silos. This session details the architectural approach of a "connectivity layer," a strategy for bridging disparate systems and applications to create a unified, secure, and efficient (...)
En esta charla abordamos cómo la analítica de datos, el self-service analytics y la inteligencia artificial están redefiniendo la forma en que las organizaciones toman decisiones en áreas clave del negocio.
Exploramos cómo ventas, recursos humanos y marketing pueden acceder, analizar y utilizar datos (...)
By 2029, IDC predicts Agentic AI investments will hit $1.3 trillion, and our recent survey reveals 93% of IT Ops teams have advanced beyond planning with pilots or production already underway.
Prepare for a future driven by autonomous agents. Join Neil (...)
While some of the existing cybersecurity solutions already provide Endpoint Detection and Response functionality for small and medium business, implementation of EDR in these organizations can cause doubts. Kaspersky’s long-term experience in the development and implementation of EDR Solutions found (...)
You can read about detection logic. Or you can see how it actually works.
In this webinar, Kaspersky experts will open Hunt Hub live inside our Threat Intelligence portal and show how detection logic is built, structured, and used in practice (...)
Application security is evolving rapidly, but gaps remain. Drawing on data from Black Duck’s BSIMM (Building Security in Maturity Model) and OSSRA (Open Source Security and Risk Analysis) reports, this panel brings together security leaders to explore the latest trends (...)
Artificial intelligence is fundamentally changing the rules of modern DDoS attacks. Automated, adaptive attack patterns adjust in real time, circumventing protective mechanisms – precisely, scalable and difficult to detect.
DDoS is increasingly being used as a strategic tool to destabilize organizations, (...)
As security teams face growing alert volumes and increasingly complex threats, many are questioning the role of SIEM. The reality? SIEM has never been more critical—and it has evolved dramatically.
Join our webinar to discover how modern SIEM has become the (...)
As development cycles accelerate and AI becomes integral to coding, the software supply chain is now a prime attack surface. Research shows that while 95% of organizations use AI tools, only 24% fully evaluate AI-generated code for security, IP, and (...)
El Consejo de Ministros aprobó el pasado 24 de marzo de 2026 el Real Decreto que desarrolla el reglamento de la factura electrónica B2B y que está alineado con los estándares europeos y en preparación de las modificaciones técnicas próximas (...)
Certificate lifespans are shrinking fast. With SSL/TLS validity moving to 200 days on March 15 and progressing toward 47 day certificates, certificate lifecycle management is becoming a continuous, high velocity operational requirement. Processes that once worked under longer lifespans now (...)
AI is reshaping software security faster than ever. The BSIMM16 report, built on insights from 111 firms, shows what’s working—and what’s next. Since its start in 2008, BSIMM has been a trusted resource for organizations navigating the challenges of securing (...)
APIs power modern digital experiences across eCommerce, SaaS, healthcare, travel, and financial platforms, but they are increasingly targeted by sophisticated automated threats. The 2025 Thales Bad Bot Report found that 44% of advanced bots now target APIs, exploiting business logic, (...)
Uncover the latest insights into how technical documentation professionals are adopting AI, based on fresh data from the 2026 AI Use in Technical Documentation Survey. Join Dominik Wever, Founder of Promptitude, as he breaks down what hundreds of experienced practitioners (...)
AI models are more capable than ever. Enterprises are experimenting aggressively. Yet many AI initiatives remain stuck in pilot mode. This session explores why.
AI is no longer blocked by model capability. It is blocked by trust — specifically, trust (...)
AI models are more capable than ever. Enterprises are experimenting aggressively. Yet many AI initiatives remain stuck in pilot mode. This session explores why.
AI is no longer blocked by model capability. It is blocked by trust — specifically, trust (...)
Bringing an embedded device to market means navigating a growing web of security regulations, hardware choices, and long-term software commitments. Get any of it wrong, and the cost compounds fast.
Join Canonical, Advantech, and Witekio to see how a coordinated ecosystem (...)
Vivimos un ciclo en el que la estabilidad económica y geopolítica dejan de ser el "estado natural" y pasan a ser un activo escaso que exige atención y gestión activa. La volatilidad, la fragmentación y los shocks se han convertido (...)
Annual pentesting tells you where you were vulnerable last quarter. This webinar shows your clients how Strobes tells them where they’re vulnerable right now — and what to do about it before anyone else finds out.
We’ll walk attendees through the (...)
Earn 1.5 CPE Credits on this webinar.
Modern enterprises increasingly depend on sprawling software ecosystems - commercial tools, open‑source components, cloud services, and vendor‑managed infrastructure. While SBOMs have become a critical step toward transparency, they are not enough to keep pace (...)
Patch Tuesday Webinar: This Month in Vulnerabilities and Patches
Join us for a critical breakdown of the threat landscape for April. Our Qualys Threat Research (TRU) experts will analyze high-impact vulnerabilities—including a deep dive into the Microsoft Patch Tuesday cycle—and demonstrate (...)
Solving the AI Productivity Paradox: From Developer Speed to Delivery Momentum
While AI has significantly accelerated code generation, many organizations are finding that "faster coding" does not automatically translate to faster delivery. In this session, Lance Knight (Chief Value Stream Architect) (...)
Untangle the confusion that meaning drift brings to your organization’s messaging and discover how content clarity can transform your team’s results.
Join Sarah Johnson, Founder and Strategic Consultant at Content-first Design, as she introduces the content-first double diamond framework—a practical approach (...)
Phishing, business email compromise (BEC), and account takeover (ATO) remain some of the most disruptive and resource-draining security challenges for modern organizations. AI-generated attacks now convincingly mimic trusted colleagues, vendors, and partners, bypassing traditional defenses and landing directly in user (...)
Webinar overview and key take aways
This webinar focuses on the practical side of data governance (using DAMA principles and real organisational practices.). It explains what effective governance looks like inside an organisation and how it supports better decisions, regulatory compliance, (...)
"Friday Forward" is a 30-minute conversation that takes place every 2 weeks and covers the Public Sector digital transformation topics that are driving conversations in the federal government, state and local governments, public safety, education and health care.
Michael Hackmer will (...)
The #1 reason brands hesitate to use AI to fully automate review responses? Fear of saying the wrong thing.
In this live 30-min session, we'll show how Alchemer's new AI Auto-Responder is built differently — with risk classification guardrails that (...)
As businesses increasingly adopt AI and cloud-native technologies, aligning strategic business drivers with technical architectures is more critical than ever. Without this alignment organizations risk inefficiencies, security vulnerabilities and missed opportunities for innovation. This session explores how to bridge the (...)
As regulators are increasingly measuring the resilience of OT and cyber-physical systems and not individual security controls, it’s important to understand the impact of key trends such as AI, increased regulations, sovereignty requirements, and convergence in this changing environment.
The #1 reason brands hesitate to use AI to fully automate review responses? Fear of saying the wrong thing.
In this live 30-min session, we'll show how Alchemer's new AI Auto-Responder is built differently — with risk classification guardrails that (...)
This presentation will explore the integration of recombinant Cascade Reagents (rCR) with centripetal microfluidic technology. We will detail our multi-matrix approach for comparing LAL and rCR on different sample types and how we assessed performance metrics such as sensitivity, specificity, (...)
Cybercrime continues to evolve into a faster, more scalable, and increasingly service-driven ecosystem. In 2025, this shift became unmistakable as malware activity rebounded after years of decline and attackers leaned heavily on automation, commoditized tooling, and AI-assisted techniques to increase (...)
If you are a manufacturer, software provider, or responsible for product security, incident response, or compliance, the Cyber Resilience Act (CRA) introduces strict, time-bound requirements for vulnerability handling and reporting, and many organizations are not yet prepared.
With mandatory reporting obligations (...)
Despite significant investment, analysts consistently report that most AI projects fail—most often due to challenges accessing, governing, and operationalizing the data that underpins successful AI.
In this webinar, we’ll explore how EverFlex AI Data Hub as a Service helps organizations (...)
Every leader has an AI strategy, but few have the data strategy required to stay competitive. When AI meets real-world systems, or Physical AI, accessing timely data is a massive integration challenge. While digital-first giants model data at human speed, (...)
Cloud environments are central to modern business operations. But they bring a range of new cybersecurity threats. With increasing amounts of valuable data sitting in the cloud, the question is no longer if an attack will occur but when. This (...)
As organizations increasingly rely on interconnected microservices, the surface area for potential cyberattacks has expanded significantly. This EcoCast examines the latest methodologies for protecting the vital links between your software components and external services. We will explore next-generation solutions designed (...)
The #1 reason brands hesitate to use AI to fully automate review responses? Fear of saying the wrong thing.
In this live 30-min session, we'll show how Alchemer's new AI Auto-Responder is built differently — with risk classification guardrails that (...)
Stress is part of our everyday lives. And while it keeps us alert and on our toes it can also on wear us down and cause burnout.
April is National Stress Awareness Month, a time for the cybersecurity community to pause (...)
Modern DevSecOps programs require more than tools, they require alignment between engineering workflows, security policy and actionable visibility. In this session, we'll explore how to integrate Black Duck SCA into your DevOps processes to enforce policy, automate security feedback and (...)
The shift from monolithic architecture to Kubernetes and managed cloud services has revolutionized delivery, but it has also birthed a dangerous myth: that the cloud is secure by default. While your cloud provider manages the physical hardware, the explosion of (...)
As cloud adoption accelerates, organizations face mounting pressure to innovate while safeguarding their digital assets. The complexity of modern cloud environments demands a shift from reactive security measures to a proactive, “secure by design” approach. Without a robust cloud security (...)
Visibility is one of the strongest pillars of a secure-by-design approach, but only when the right insights are available, correlated, and actionable. In this session, we’ll explore how modern firewall management transforms raw data into meaningful security intelligence.
We’ll showcase the (...)
In today's media landscape, we consistently encounter news of companies falling victim to cyberattacks, resulting in the exposure and sale of their data on the dark web. The wide array of data available on the dark web market, including internal (...)
In today’s world, everything is becoming real-time as we look to drive resilience and efficiency. Learn how an AI-Driven Automation Strategy can drive AIOps and why Automation is the foundation for AI. Find out what solutions you (...)
Security teams are drowning in tools, yet breaches continue to rise. The rapid adoption of cloud-native technologies has created a perfect storm of fragmented enforcement, visibility gaps and developer friction. As businesses race to innovate, the challenge is clear: how (...)
Join PRI and the Asian Corporate Governance Association (ACGA) for this joint webinar, building on the launch of ACGA’s new report “Stewardship in Asia: Frameworks, codes and practices.”
This global webinar will provide a comparative perspective on the current state of (...)
Operational inconsistency across teams and shifts drives escalation risk, SLA volatility, and unpredictable cost-to-serve. Join us to learn how Skylar Advisor and the ScienceLogic AI Platform turn noisy telemetry plus your organization’s documentation corpus into prioritized advisories and evidence-backed next (...)
As enterprises accelerate digital transformation, security and compliance remain top priorities for running and scaling production workloads on Kubernetes.
Red Hat Advanced Cluster Security (ACS) empowers organizations to proactively manage risks, enforce policies, and maintain governance across containerized workloads. With widespread (...)
Recent research from Qualys and IDC reveals a critical disconnect while enterprises rapidly adopt cloud and AI; their security and compliance maturity is dangerously low. Traditional, manual approaches to security and compliance are failing to keep pace with evolving mandates (...)
Join us for this session to explore the AppNeta Intelligent Alarms experience, a new thresholding, event, and alarm system designed to revolutionize how your NOC functions. Discover how this innovative system cuts through monitoring noise to highlight only the critical (...)
Are your devices connecting at the right time, or just whenever they can?
Join us for a webinar on how Verizon’s Intelligent Network combines Wireless Network Performance (WNP) insights with Network APIs to help you build IoT solutions that respond to (...)
As cloud environments expand, ops teams need intelligent automation that reduces manual effort and delivers measurable value. This webinar explores how the latest Red Hat Ansible Automation Platform Service on AWS enhancements help teams modernize with real‑time automation, AIOps workflows, (...)
You know the drill. Someone asks for a “quick check,” and suddenly you’re hauling a laptop, cables, and three different tools. Network testing shouldn’t slow you down—or break the budget.
In this launch session, Dr. J (Julio Petrovitch) and Girard Kavelines (...)
You’ve signed the contract, paid the retainer, and the "emergency" light is flashing - but simply hiring an Incident Response (IR) firm doesn't guarantee a fast recovery. The speed of an investigation is often dictated not by the firm’s expertise, (...)
Remote and hybrid work are now permanent realities, but they have dramatically expanded the attack surface and introduced new security challenges. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how organizations can protect users, (...)
Remote and hybrid work are now permanent realities, but they have dramatically expanded the attack surface and introduced new security challenges. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how organizations can protect users, (...)
The rise of "vibe hacking" and autonomous, AI-driven attacks in 2026 represents a critical, paradigm-shifting evolution in cybersecurity, moving from AI-assisted phishing to fully automated, end-to-end intrusion and extortion campaigns. This shift means hackers no longer need high technical expertise (...)
As organizations embrace containerized workloads to drive innovation and scalability, securing these environments is a mission-critical priority. Containers offer unparalleled flexibility, but their dynamic nature introduces unique vulnerabilities that can jeopardize business operations and data integrity. It's vital to address (...)
金融業界において、APIはビジネス成長の中核を担う不可欠なインフラとなりました。しかし、開発スピードが加速する一方で、「セキュリティ部門が把握していない野良API(シャドーAPI)」の増加や、従来のWAFでは防ぎきれないAPI特有のビジネスロジックを突く攻撃(BOLAなど)」が深刻な脅威となっています。
特に厳格なコンプライアンスと顧客データの保護が求められる金融機関において、APIの脆弱性は致命的なインシデントに直結します。「どこに、どのようなAPIが存在し、どのようなデータをやり取りしているか」を正確に把握できていなければ、防御のスタートラインにすら立てません。
本ウェビナーでは、Akamai API Securityの導入事例をご紹介するとともにAkamai API Securityを用いた実践的なアプローチを実際の管理画面のデモンストレーションを交えて解説します。自社の環境に潜むすべてのAPIを網羅的に洗い出す「ディスカバリー(可視化)」から、リスクの評価、そして巧妙な攻撃をリアルタイムで防御する「ランタイム保護」まで、金融システムの堅牢性を高めるための具体的なステップをお見せします。
Traditional static analysis tools have well-understood limitations in detecting complex, context-dependent vulnerabilities and providing comprehensive application coverage. This session explores how large language models and AI-powered scanning capabilities are changing what's possible in application security testing. You'll learn about the (...)
This year marks an important point for PRI Reporting.
In this session, PRI experts will discuss what matters for the 2026 reporting cycle, how the updated Reporting Framework was developed and tested, and what signatories should take away as they plan (...)
As hybrid work and cloud-first strategies redefine enterprise IT, the convergence of Networking and Security has become essential. Join this exclusive webinar featuring Gartner and Fortinet experts, as they unpack the evolution and future of Secure Access Service Edge (SASE).
What (...)
Traditional static analysis tools have well-understood limitations in detecting complex, context-dependent vulnerabilities and providing comprehensive application coverage. This session explores how large language models and AI-powered scanning capabilities are changing what's possible in application security testing. You'll learn about the (...)
Discover how threat intelligence enrichment can transform your product – from adding deep context with Kaspersky Threat Lookup to analyzing suspicious files in the cloud sandbox and blocking threats at the network level with NGFW Feeds. We'll show how to (...)
Join Thales Professionals for an exclusive deep-dive into the UK-specific findings from our highly anticipated Data Threat Report 2026. This essential session will spotlight the latest trends, statistics, and insights shaping the data security landscape across the United Kingdom. Our (...)
This year marks an important point for PRI Reporting.
In this session, PRI experts will discuss what matters for the 2026 reporting cycle, how the updated Reporting Framework was developed and tested, and what signatories should take away as they plan (...)
As the EU Cyber Resilience Act (CRA) moves from concept to enforcement, manufacturers face increasingly stringent requirements:
Can you prove your device’s origin? Can you audit enabled or disabled features? Can you ensure only trusted code runs on your hardware? (...)
As organizations accelerate their move to cloud and hybrid work, many security and network teams are struggling to scale Secure Access Service Edge (SASE) architectures without adding operational complexity or degrading application performance. Traditional backhauling models introduce latency, manual configuration (...)
Security teams have no shortage of data, but they often lack a clear way to connect security posture, risk, and service value across fragmented tools and workflows.
Join Ian Roth, Head of Product Innovation at CyberProof, for the launch of CDC (...)
Innovative Strategies for Aligning Data Center Operations with Modern Business Demands
We invite data center leaders, facility managers, and IT professionals to participate in a webinar designed to enhance operational performance and support business advancement. This webinar will not only highlight (...)
Discover how insider threats, AI governance, and agent-based security are reshaping how CISOs detect, respond, and validate the tools keeping their organizations safe.
You'll Learn:
•How modern insider threat detection is evolving with AI agents
•What incident response looks like when your security (...)
Muchas empresas instalan firewalls, antivirus o soluciones cloud pensando que ya están protegidas, pero la mayoría de brechas provienen de configuraciones incorrectas o nunca revisadas. Esta sesión demostrará por qué “tener la herramienta” no garantiza seguridad, y cómo esa falsa (...)
Hybrid work is driving new expectations for meeting rooms, yet many remain rigid, disengaging, and underpowered. In this 25-minute session, Lenovo ThinkSmart, powered by Intel, and Huddly show how AI cameras, real-time autonomous directing, and multi-camera intelligence improve engagement and (...)
Over the past several months, the threat clusters associated with the ShinyHunters cybercriminal brand have dramatically shifted their focus from traditional perimeter breaches to the aggressive targeting of identity providers and SaaS integrations. By leveraging sophisticated voice phishing (vishing) and (...)
A strong Managed Service Provider (MSP) contract is the foundation of any effective outsourcing relationship, yet many organizations overlook essential components that ensure accountability and mutual success.
In this webcast, Jeff Rumburg, Managing Partner of MetricNet, will examine the core (...)
Temática
Uso de modelos predictivos y analítica avanzada para anticipar comportamientos, riesgos y oportunidades sin depender de equipos técnicos complejos.
Qué se aborda
- Predicción de ventas, churn y demanda
- Análisis de escenarios
- IA aplicada a la planificación
- Cómo Antigravity simplifica la predicción
Interés (...)
Traditional static analysis tools have well-understood limitations in detecting complex, context-dependent vulnerabilities and providing comprehensive application coverage. This session explores how large language models and AI-powered scanning capabilities are changing what's possible in application security testing. You'll learn about the (...)
The transition to 47-day TLS certificates is officially underway.
On March 15, the first CA/Browser Forum certificate lifetime reduction takes effect—marking the beginning of a multi-year shift that will fundamentally change how organizations manage certificates. Over the next three years, (...)
As GenAI reshapes how enterprises approach automation, data, and user experience, many are realizing that network performance and observability are the prerequisites—not the afterthoughts.
In this candid discussion, Ryan Livesay, SVP Global Sales and Solutions Engineering from Aryaka is joined (...)
Join PRI and the Asian Corporate Governance Association (ACGA) for this joint webinar, launching ACGA’s new report “Stewardship in Asia: Frameworks, codes and practices.”
This session will explore the rapidly evolving stewardship landscape across the region, spotlighting landmark regulatory developments in (...)
Google Threat Intelligence Group (GTIG) and Google Threat Analysis Group (TAG) are committed to tracking and protecting against cyber threat activity. We relentlessly defend Google, our users, and our customers by building the most complete threat picture to disrupt adversaries. (...)
Teams building autonomy platforms often default to gRPC because it’s the go-to stack for microservices and platform stacks. gRPC excels at service APIs-commands, configuration, authentication, and workflow orchestration. But autonomy platforms also require a data plane: real-time state distribution, high-rate (...)
Today, many AI assistants work by retrieving small fragments of documents and using those pieces to generate an answer. This approach can be very effective, but it can also make it difficult to see exactly where the information came from (...)
Enterprise remediation still assumes that faster patching can outpace attackers. New research from the Qualys Threat Research Unit (TRU), based on more than one billion CISA KEV remediation records across 10,000 organizations from 2022–2025, shows the opposite: the average Time-to-Exploit (...)
AI agents aren't arriving through procurement. They're being built and deployed by your own marketing, engineering, and finance teams, acting on behalf of the humans who launched them. By the time security learns they exist, they've already been live for (...)
New EMA research surveyed 458 IT professionals on AI-driven network management — and the results are a wake-up call for NetOps leaders.
Only 44 percent are fully confident their network data quality can support AI initiatives. Only 31 percent completely (...)
Join us for an exclusive deep dive into the key insights from Kaspersky’s 2024 Incident Response Analyst Report! This webinar will unpack the most pressing cyber threats of the past year, drawing from real-world investigations and expert analysis.
You’ll gain a (...)
In an evolving European real estate environment, generating resilient income and preserving capital requires a disciplined, relative value approach to lending rather than reliance on market cycles.
This webinar will explore the benefits of a relative value investment approach to European (...)
New EMA research surveyed 458 IT professionals on AI-driven network management — and the results are a wake-up call for NetOps leaders.
Only 44 percent are fully confident their network data quality can support AI initiatives. Only 31 percent completely (...)
¿Sabes realmente cuánto te cuesta fabricar cada unidad o dónde se está "evaporando" tu margen de beneficio?
En este webinar práctico, Juanma Javaloyes desglosa las herramientas definitivas para que tu planta no solo produzca, sino que gane.
En este webinar explicaremos los (...)
Wenn Sie Hersteller, Softwareanbieter sind oder für Produktsicherheit, Incident Response oder Compliance verantwortlich sind, bringt der Cyber Resilience Act (CRA) strenge, zeitgebundene Anforderungen für das Schwachstellenmanagement und die Meldung mit sich – und viele Unternehmen sind noch nicht ausreichend vorbereitet.
Mit (...)
Join us for the launch of the inaugural progress report for Spring — the PRI’s collaborative stewardship initiative on nature. Marking the first 18 months of the initiative, this webinar will present key insights on engagement progress, successes, challenges and (...)
Cybercrime continues to evolve into a faster, more scalable, and increasingly service-driven ecosystem. In 2025, this shift became unmistakable as malware activity rebounded after years of decline and attackers leaned heavily on automation, commoditized tooling, and AI-assisted techniques to increase (...)
In 2025, Google Threat Intelligence Group tracked 90 zero-day vulnerabilities, signaling a stabilization in overall volume of zero-day exploitation but revealing a critical shift in what adversaries are targeting. Nearly half of all observed zero-days impacted enterprise technologies, underscoring the (...)
Join us for the Cyber Defenders: Threat Round-Up – Episode 12 Livestream, where we dive deep into the most pressing challenges facing global enterprise security teams.
This session brings together current threat intelligence and actionable strategies to address risks ranging (...)
Open source is widely used in software development because it allows you to create high-quality software quickly. But, if left unmanaged, open source can lead to license compliance issues plus security and code quality risks. Whether you’re on the buy (...)
Most organizations define patch SLAs — 7, 14, or 30 days — to manage vulnerability remediation. But those timelines were designed for operational predictability, not for how attackers actually exploit vulnerabilities.
In many recent incidents, vulnerabilities were weaponized within hours or (...)
You can see privileged accounts. But can you see how they get exploited?
Identity risk prioritization is becoming critical as Active Directory environments grow more complex - where hidden connections, privileges, trust relationships, and misconfigurations combine into real, exploitable attack (...)
Earn 1.5 CPE credits on this webinar.
Third-party risk management is reaching a breaking point. Vendor ecosystems are expanding faster than risk teams can keep up, risk signals are fragmented, and traditional approaches struggle to deliver the speed, coverage, and defensibility (...)
New EMA research surveyed 458 IT professionals on AI-driven network management — and the results are a wake-up call for NetOps leaders.
Only 44 percent are fully confident their network data quality can support AI initiatives. Only 31 percent completely (...)
Join us for an exclusive webinar and discover how a preclinical laboratory transforms everyday handling into reliable, fully traceable, real‑time data with our LIMS, WebLab.
Featuring a live demonstration from genOway, we’ll showcase:
Automatic animal identification via NFC
Direct integration of measurements (temperature, (...)
In an era of increasing digital complexity, responding to security threats requires more than just a simple alert. It demands a sophisticated, end-to-end strategy that spans from initial detection to deep forensic analysis. This session offers an exclusive look into (...)
This panel will look at some of the key cybersecurity issues affecting OT and CPS environments from three different – vendor, partner, and control system vendor - and sometimes conflicting perspectives.
Join Gabriel from Schibsted, alongside Matthias from Bugcrowd, as they answer your questions on the impact of bug bounties on company security.
From understanding the enormous benefits of bug bounty programs to exploring the best practices for scaling these programs (...)
ThirdYear Capital: Die Welt im Umbruch: Wo die nächsten großen Macro-Chancen entstehen
- Die globale Ordnung ist in Bewegung und damit stehen herkömmliche Anlagestrategien vor neuen Belastungsproben. Martin Roßner beleuchtet die Schnittstellen zwischen geopolitischen Risiken und makroökonomischen Trends, um fundierte Impulse (...)
The modern phenomenon of clinician burnout is a material risk to healthcare organizations. It creates turnover, increases costs, and negatively impacts patient outcomes. New research from Presidio shows that outdated technology and fragmented data environments are a leading contributor to (...)
AI is rapidly entering enterprise environments, but attackers are already discovering how to manipulate and weaponize it.
In this webinar, we’ll explore real-world AI security incidents that show what happens when AI systems are pushed beyond their intended boundaries. From manipulated (...)
The modern phenomenon of clinician burnout is a material risk to healthcare organizations. It creates turnover, increases costs, and negatively impacts patient outcomes. New research from Presidio shows that outdated technology and fragmented data environments are a leading contributor to (...)
AI performance depends on context. The broader and more relevant the data it can safely access, the more accurate and useful it becomes.
Yet in many enterprises, security controls designed for static systems are now being applied to AI systems (...)
AI performance depends on context. The broader and more relevant the data it can safely access, the more accurate and useful it becomes.
Yet in many enterprises, security controls designed for static systems are now being applied to AI systems (...)
Getting started with AI in the enterprise is less about training a large language model from scratch and more about selecting a model and fine-tuning it to do what you actually need. The massive compute runs that cost hundreds of (...)
Getting started with AI in the enterprise is less about training a large language model from scratch and more about selecting a model and fine-tuning it to do what you actually need. The massive compute runs that cost hundreds of (...)
Getting started with AI in the enterprise is less about training a large language model from scratch and more about selecting a model and fine-tuning it to do what you actually need. The massive compute runs that cost hundreds of (...)
Getting started with AI in the enterprise is less about training a large language model from scratch and more about selecting a model and fine-tuning it to do what you actually need. The massive compute runs that cost hundreds of (...)
Getting started with AI in the enterprise is less about training a large language model from scratch and more about selecting a model and fine-tuning it to do what you actually need. The massive compute runs that cost hundreds of (...)
If you're running infrastructure automation at scale, you've already felt the cracks such as configuration drift, YAML sprawl, compliance bolted on as an afterthought, or a push-based architecture that buckles under load.
This isn't about switching tools. It's about knowing (...)
"Friday Forward" is a 30-minute conversation that takes place every 2 weeks and covers the Public Sector digital transformation topics that are driving conversations in the federal government, state and local governments, public safety, education and health care.
Michael Hackmer will (...)
AI is evolving at breakneck speed, driving a surge in workloads and sending cloud GPU costs through the roof. Businesses are seeking smarter, faster, and more cost‑effective ways to power their models. In this expert-led webinar, hear directly from a (...)
In the modern threat landscape, a passive defense is a losing strategy. The most secure organizations are those that learn to think and act like their adversaries. Join us for an in-depth look at three pillars of Google's proactive security (...)
When security architectures force all traffic through centralized cloud inspection points, performance suffers, especially for branch users, on-net employees, and latency-sensitive applications.
In this session, Fortinet experts show how Unified SASE combines Secure SD-WAN and Security Service Edge into a single, (...)
Join our upcoming Google Threat Intel Webinar to discover how to leverage simple, yet powerful, Google Threat Intel use cases to significantly enhance your security posture. This session is designed for security analysts, incident responders, and threat hunters who want (...)
EM portfolios today often lean heavily on a small group of large, AI‑linked markets and mega‑cap stocks, despite the apparent index breadth. Yet many of the most compelling structural and reform‑driven opportunities now sit in smaller emerging markets, making a (...)
In today's digital landscape, phishing and social engineering attacks have become increasingly sophisticated, posing significant threats to organizations worldwide. According to Kaspersky's 2023 report, spam accounted for an alarming 45.60% of global email traffic. Furthermore, a staggering 77% of companies (...)
Distilling insights from over 500k hours of Mandiant incident investigations in 2025, and Google Threat Intelligence Group (GTIG) research, the M-Trends 2026 Report reveals the critical shifts defining today's threat landscape.
Based on Mandiant's frontline incident response and threat intelligence from (...)
Energy brokers are under more pressure than ever to deliver transparency, accuracy and proactive insight in a volatile market. On 29 April, join MRI Software and Energy Live News for an exclusive, insight led session designed to help brokers elevate (...)
Join us for a deep dive into Certified Information Systems Security Professional (CISSP), the cybersecurity leadership credential from ISC2.
Earning the CISSP is an investment in your future and an important next step in your career. Consistently recognized globally as the (...)
Join us for a deep dive into Certified Information Systems Security Professional (CISSP), the cybersecurity leadership credential from ISC2.
Earning the CISSP is an investment in your future and an important next step in your career. Consistently recognized globally as the (...)
As organizations scale their AI initiatives, many encounter persistent challenges with cloud GPUs: unpredictable costs, limited availability where capacity is needed, and underutilized resources. At the same time, modern AI applications,from real-time analytics to generative AI,require inference closer to users, (...)
How today’s SOC challenges and emerging trends are reshaping security operations — and what organizations can do now to build a modern, resilient SOC for the future.
Key discussion points:
- The reality today. SOC teams face alert overload, limited context and (...)
Financial markets have been highly volatile in recent months, reinforcing our view that disruption – geopolitical and economic – is the new normal. Against an unpredictable market backdrop, absolute return strategies play a crucial role in navigating uncertainty through genuine (...)
During this episode of Coffee and Content, discover the hidden layers of digital music and how metadata shapes your listening experience. Jerry Bartlett, Content Operations Consultant at Content Pro Tech Ltd., will reveal why even simple questions (like when the (...)
Since Post Quantum Cryptography (PQC) algorithms (ML-KEM, ML-DSA, SLH-DSA) are standardized by NIST, many standard organizations have started incorporating PQC into their specifications. NSA and NIST published the PQC transition timeline (CNSA 2.0 and NIST IR 8547). US and Europe (...)
Elegir un ERP es una decisión estratégica para la próxima década. En este webinar, ponemos frente a frente a los tres líderes del mercado para analizar cómo están abordando la integración de la IA y cuál ofrece el mejor retorno (...)
El verdadero riesgo ya no está solo en si alguien entra o no en la red, sino en quién accede, a qué recursos accede, con qué privilegios, durante cuánto tiempo y con qué nivel de visibilidad y control.
Ese enfoque encaja (...)
AI is already reshaping every stage of the cyberattack chain. IBM reports that 97% of organizations affected by an AI‑related breach lacked proper AI access controls, revealing a significant oversight gap. And with AI accelerating breach impact, automating reconnaissance, and (...)
오늘날 빠르게 변화하는 위협 환경 속에서, 지능형 지속 위협(APT)은 여전히 산업과 지역을 막론하고 많은 조직에 큰 도전 과제가 되고 있습니다.
정교해지는 사이버 공격에 앞서 나갈 수 있도록, 최신 동향과 기법, 기술을 함께 살펴보는 인사이트 웨비나에 여러분을 초대합니다.
이 세션은 위협 인텔리전스 역량을 강화하고, 견고한 탐지 및 대응 전략을 구축하고자 하는 보안 전문가분들을 위해 마련되었습니다.
As cyber threats continue to evolve, mastering the art of digital forensics investigation is an essential for investigating security incidents and safeguarding critical systems. This webinar will focus on Windows digital forensics, offering an overview of the tools and techniques (...)
Discover Dell's AI PC portfolio and see how it's redefining the modern workplace. Learn about our updated branding, uncover the "Why Dell for AI PCs" story, and dive deep into the power of Intel, AMD and NVIDIA-powered systems. Plus, explore (...)
Identity is the new attack surface. Credential theft, privilege abuse, and orphaned accounts are letting attackers slip past traditional defences. Join us to learn how to turn identity from a soft spot into your strongest control plane, grounded in Zero (...)
Join our two-part SAP LeanIX webinar. In “LeanIX for Beginners,” get a deep dive into Application Portfolio Management (APM), the LeanIX meta-model, and data structuring. See a high-level demo, learn to maintain a high-fidelity inventory with Fact Sheets, and streamline (...)
Presented by Akamai Senior Solutions Engineer Douglas Holland, this session explores how web application architecture behind the firewall drives resiliency across DNS, network, application, and infrastructure layers. Douglas will break down practical strategies for DNS redundancy, intelligent edge self-healing, Layer (...)
Join us for an in-depth look at Red Hat tools designed to simplify and accelerate your virtualization migration.
We’ll introduce the OpenShift Migration Advisor (OMA) and explore how it assesses your existing landscape, identifies risks, and generates actionable insights for a (...)
Identity Management Day 2026 is coming at you! Mark your calendars for April 14th and prepare yourself for an exciting event packed with 21 hours of identity goodness from around the world. This session will provide you with a preview (...)
In this talk, Sybil will discuss expectations she holds as a TEDx organizer, what other organizers are doing and how to understand the TEDx process as an applicant.
By the end of this presentation, audience members will understand what it takes (...)
Many enterprises are juggling multiple regulatory mandates, whether it's to sustain existing business, to enter new markets, or to stay competitive. As organization grows so do their regulatory requirements.
Join us for “From Checkbox to Catalyst: How Continuous Audit (...)
You vet your core SaaS apps, but what about the 100+ third-party apps, OAuth tokens, and API integrations they connect to? This is the new, undefended shadow supply chain where trust has shifted from the app to the connection, and (...)
Artificial intelligence has rapidly moved from experimental promise to operational reality in software development. AI is no longer just a tool in the application security stack—it’s becoming an active participant—but not without tradeoffs, blind spots, and growing expectations. This (...)
Developers have utilized source code management (SCM) tools since the 1980s to track, control, and manage changes across the software development life cycle. But the use of SCM tools is even more widespread now due to the emergence of distributed (...)
The Cyber Resilience Act requires that manufacturers and software suppliers integrate continuous vulnerability monitoring, SBOM accuracy, vulnerability reporting capabilities, and secure development practices throughout the product life cycle. But translating regulatory text into executable engineering processes is challenging.
(...)
Simmering geopolitical tensions, the proliferation of AI-powered threats, tightening regulations, fragile supply chains, and shrinking budgets are exerting untenable pressure on cyber security teams. Predictably, stress levels are soaring, CISO tenure is shortening, and the gap between attackers and defenders (...)
On a typical work day, a finance manager receives what looks like a routine email: a shared file link from a trusted service and a short note asking them to “review and approve.” A few clicks later, their credentials are (...)
The 2026 Thales Data Threat Report examines the complex calculus that organizations must undertake to enable innovation while securing their most valuable asset — their data. The proliferation of AI and agentic operations is compounding stress on data management (...)
Reimagine your writing process by building an AI-powered workflow that accelerates publishing while preserving what makes your voice unique. Join Claudia Faith, startup entrepreneur and SubStack consultant, as she reveals a practical system for transforming a single idea into a (...)
In this fireside chat, LogicMonitor’s CMO, Brooke Cunningham, and CPO, Garth Fort, unpack findings from the 2026 Observability and AI Outlook—exploring how five forces accelerate autonomous IT. Learn what’s driving the shift, what it means for your organization, and why (...)
6.8x higher likelihood of attack. That’s the correlation cyber insurers report for organizations with certain on prem VPNs and firewalls. Attackers are taking their toolkits where EDR can’t go. Vulnerable Firewalls, VPNs, and routers are exploited more than ever.
And what (...)
Financial services organizations use diverse and complex IT infrastructure that often changes at an accelerated pace. Protecting that infrastructure requires dynamic, resilient cybersecurity strategies. Research further shows that FinServ organizations often have a higher bar when it comes to cybersecurity, (...)
Join us to see how Black Duck Polaris helps you automatically keep your applications secure without slowing down your teams. We’ll show how you can quickly bring in all your GitHub projects and scan them in minutes, using built‑in tools (...)
Join us for a weekly session to see ESET's latest offerings in an in depth demo of ESET Protect
Complete. This software bundle is full of our secure components such as Vulnerability & Patch
Management, Ransomware Remediation and Full Disc Encryption. Following (...)
La Autoridad Portuaria de la Bahía de Algeciras (APBA) ha instalado cámaras térmicas en las zonas de mayor tránsito de pasajeros del puerto para controlar la temperatura corporal de los pasajeros sin necesidad de pararles. ... Leer más ►
Publicamos grabación de webinar que tuvo lugar el pasado 28/03/2019 por el CIO del Grupo de Medios de Comunicación español Vocento Jorge Oteo en el que explica su visión de la Ciberseguridad hoy.
... Leer más ►