Loading Webinars

Upcoming Webinars

Webinars – Where the Security World Learns

Below is a list of our upcoming webinars – a trove of valuable resources and information for the Security professionals.
You can also access past events and watch them on-demand. Registration is free. Enjoy!
Find Webinars

Event Views Navigation

Webinars List Navigation

Mobile Threats and Trends Changing Mobile App Security

Mobile Threats and Trends Changing Mobile App Security

| | AppSec, OneSpan
Deploying your high-value mobile app to untrusted environments such as consumer mobile devices can be a risky proposition. Are some of your customers’ devices compromised? Do your users also download apps from ...
Breaking Down the Zero Trust and SASE Relationship

Breaking Down the Zero Trust and SASE Relationship

|
Headline-grabbing data breaches are starting to become the norm, making security leaders second-guess the approaches they use to protect their organizations. These alarming increases in cyber threats are fueled by the COVID-19 ...
How to Harden EKS With Terraform and Snyk

How to Harden EKS With Terraform and Snyk

|
Misconfigurations in infrastructure-as-code (IaC) can be just as dangerous as vulnerabilities in code. Small mistakes in configuration can lead to the exposure of sensitive data on the internet, or private endpoints and ...
NOKIA Threat Intelligence Report 2021: Insights and Findings

NOKIA Threat Intelligence Report 2021: Insights and Findings

|
A threat-informed defense strategy is a key attribute for organizations that can effectively prevent and respond to cybersecurity incidents. The Nokia Threat Intelligence Center examines malware network communications to develop detection rules ...
What’s Next for DevSecOps: 'Shift Right' for Runtime Protection

What’s Next for DevSecOps: ‘Shift Right’ for Runtime Protection

|
Shifting left – embedding security processes and output into the development pipeline – has been the focus for integrating security into DevOps for some time. Now that enterprises are approaching critical mass ...
Defending Against Emerging Ransomware Threats

Defending Against Emerging Ransomware Threats

|
If you think ransomware is bad now, well, just wait—it’s going to get a whole lot worse. As ransomware attacks and attackers become more sophisticated, cybercriminal gangs will rely less on broad-based ...
Finding the Ransomware Threat INSIDE Your Backups

Finding the Ransomware Threat INSIDE Your Backups

|
During this livestream, cybersecurity expert and president and CEO at BetterCyber Luciana Obregon will break down how you can lower RTO and RPO and create a reliable data recovery workflow. Modern backup ...
Software Supply Chain Security

Software Supply Chain Security

|
In the wake of a series of high-profile breaches, it’s become apparent how vulnerable software supply chains really are. Cybercriminals have increased their efforts to compromise developer credentials so they can embed ...
The Ultimate Guide to Container Security: Tips and Tricks for Success

The Ultimate Guide to Container Security: Tips and Tricks for Success

As containers solidify their role in modern cloud-native IT development, the need for robust security measures is more crucial than ever. Containers’ popularity is growing due to their lightweight flexibility and speed, ...
+ Export Calendar