The Ultimate Directory on Cybersecurity Webinars

Search our directory for upcoming webinars on Cybersecurity

Previous Webinars

Technology > Cybersecurity webinar by Claroty for Medical Device Cybersecurity: Lessons Learned and Best Practices for Canadian Healthcare
Medical Device Cybersecurity: Lessons Learned and Best Practices for Canadian Healthcare
Medical device cybersecurity is a critical challenge for healthcare organizations in Canada, where interconnected systems and evolving cyber threats demand a strategic and practical approach. Whether a health organization is in the early stages of developing a cybersecurity program or looking to enhance an existing one, understanding best practices and real-world implementation challenges is key to success.Join Ty Greenhalgh and Emil Sosnowski from Interior Health (Kelowna, British Columbia) as they explore the practical realities of securing medical devices within the Canadian Health System Ecosystem. This webinar will cover essential topics, including governance of intra-departmental workflows, efficient vulnerability management, and how improved asset management can drive ROI. Attendees will gain insights into optimizing cybersecurity programs, navigating operational constraints, and leveraging industry best practices to strengthen resilience against cyber threats.Don't miss this opportunity to hear from industry experts on how to move beyond theoretical frameworks and apply cybersecurity solutions that work in real healthcare environments.Speakers: Ty Greenhalgh, Industry Principle - Healthcare, Claroty; Emil Sosnowski, Clinical Engineer, Interior Health.
by Claroty
5/20/2025 3:00 PM
Technology > Cybersecurity webinar by EC-Council for Defending the Digital Perimeter with Effective Blue Teaming Tactics
Defending the Digital Perimeter with Effective Blue Teaming Tactics
bstract- In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. Blue teaming and cyber defense incorporate how organizations identify, detect, prevent, and mitigate cyber threats and vulnerabilities. While traditional approaches to security operations have been reactive to threats, the ever-changing nature of the threat landscape requires that organizations shift to more proactive methods. This webinar series is dedicated to understanding proactive cyber defense strategies and how to build an effective blue team program. In today’s session, we will understand the fundamental elements of a cyber defense program, learn the difference between detective and preventative controls and how they function together, learn how Governance, Risk, and Compliance (GRC) can guide program objectives, and learn how to gain critical buy-in and support from senior leadership when establishing a security program.Speaker: Andrew "AJ"​ Jarrett, Director, Cyber Monitoring & Incident Response, Depository Trust & Clearing Corporation (DTCC)  
5/16/2025 1:30 PM
Technology > Cybersecurity webinar by Barracuda Networks for Cyber insurance: strengthening backup strategies based on 2024 claims data
Cyber insurance: strengthening backup strategies based on 2024 claims data
A lot can be understood about cyber-risk and its probabilities from an often-overlooked source: cyber insurance data. This data offers visibility into the frequency and types of cyberattacks that organisations face, as well as the financial implications of those incidents.Analysing 2024’s claims data highlights the importance of implementing an effective backup solution, not only to mitigate threats such as ransomware, human error, and natural disasters - but also to meet the expectations and requirements set forth by insurers.Join our webinar on Wednesday 14th May at 10am BST to discover:• An analysis of 2024 cyber insurance claims data.• Overview of the most prominent threats facing organisations today.• How insurers are changing their requirements in response to today’s threat landscape.• Best practices to meet insurer requirements.• How Barracuda can help.Equip your organisation with the knowledge needed to navigate the complexities of cyber insurance and backup requirements effectively.We look forward to welcoming you to the webinar.Speaker: Charlie Smith, Consulting Solution Architect, Data & Email Protection at Barracuda
5/14/2025 9:00 AM
Technology > Cybersecurity webinar by Veeam for Data Backup Recovery Metrics That Matter
Data Backup Recovery Metrics That Matter
Ransomware attacks have made data backup and recovery a critical business continuity concern. Boards of directors are now recognizing that security extends beyond preventing data breaches to include swift and effective data recovery.This webinar will explore the key questions and metrics IT leaders need to address to build a robust data resilience strategy that ensures compliance with global regulations and minimizes business disruptions.• Building a Resilient Data Recovery Strategy: Key Metrics for IT and the Board• Data Recovery Beyond the Technical: What IT Managers Need to Report to the Board• Why Cyber Recovery Differs from Other Types of Data Recovery• Critical Data Recovery Questions and Metrics for the Board• Moving Beyond Metrics to Data ResilienceSpeakers: Heather Peyton, Director, Product Marketing, Enterprise; Brad Linch, Director of Enterprise Strategy.
by Veeam
5/13/2025 5:00 PM
Technology > Cybersecurity webinar by Cyber Instincts AB for Cyber Challenges of Tomorrow: Future-proof your entire organization
Cyber Challenges of Tomorrow: Future-proof your entire organization
Date: May 9Time: 10:00 AM – 11:00 AMWhere: Zoom – a link will be sent via email.​Cybersecurity is a constant challenge – the threat landscape evolves rapidly, and new risks are emerging all the time. Protecting your organization requires more than just technology; it demands a comprehensive strategy involving the right knowledge, planning, and proactive measures.​What can you expect?In our webinar, we’ll go through the biggest cybersecurity challenges organizations face today and in the future, together with our partner KnowBe4. We’ll share practical tips and strategies for building a robust cybersecurity strategy and how to effectively manage risks in your organization.​Register below – don’t wait, spots are limited!
5/9/2025 8:00 AM
Technology > Cybersecurity webinar by RSM Australia for Building Cyber Resilient Businesses
Building Cyber Resilient Businesses
Practical strategies for continuity & recovery in AustraliaIs your business ready for a cyberattack?Cyber threats are rising fast in Australia - fuelled by AI, ransomware, supply chain breaches, and nation-state actors. The question isn't if your business will be targeted, but when - and how prepared you’ll be to bounce back.Join our free webinar to learn how to build cyber resilience, recover from incidents, and keep your business running.WHAT YOU’LL LEARN:The cyber threat landscape in AustraliaGet up to speed on today’s most pressing risks: ransomware, Business Email Compromise (BEC), supply chain vulnerabilities, and attacks linked to foreign actors.Australian regulations & frameworksLearn how to align with Australia’s national standards and key cyber risk frameworks such as ISM, VPDSS, NSW RFFR Cyber Security Accreditation, ISO 27001, and APRA CPS 230 (for regulated entities).Recovery planning that worksGet practical tips on how to recover when the worst has happened. Learn how to build and test Business Continuity Plans (BCP), Disaster Recovery Plans (DRP), and Cyber Security Incident Response Plans (CSIRP) that actually work when it counts.Using cloud and AI in recoveryExplore how cloud technology and AI tools can speed up recovery and reduce the impact of cyber incidents.Incident response & crisis managementWant to respond confidently under pressure? We will help you master best practices for managing cyber incidents, minimise downtime and protect your company’s reputation.Lessons from recent eventsWe will break down real-world examples of cyber incidents and data breach cases in Australia, to discuss what went wrong, the impact on business operations and how to apply the lessons learned to your own business.Prepare your business before a breach – not after.We hope you can join us!Facilitator: Kaustubh Vazalwar, Director, RSM Australia.
5/8/2025 3:00 AM
Technology > Cybersecurity webinar by PKWARE for Best Practices for Quantum Readiness – It’s Time to Prepare
Best Practices for Quantum Readiness – It’s Time to Prepare
Quantum computing isn’t a threat—until it is and it’s happening rapidly. The race toward quantum supremacy means today’s encryption could be obsolete tomorrow, leaving organizations exposed to unprecedented risks. In this webinar, cybersecurity experts will break down what quantum readiness really means, why "store now, decrypt later" attacks are already a concern, and how to implement best practices to future-proof your data security.Join us to explore practical steps for adopting quantum-resistant encryption, mitigating emerging threats, and ensuring your organization stays ahead of the inevitable shift. Don’t wait until it’s a thing—prepare now.Added bonus…get a sneak peek into PKWARE’s Quantum safe encryption roadmap and what that means for you today.Speakers: Jason Dobbs, CTO; Chris Miller, Sr. Solutions Architect.
by PKWARE
4/30/2025 4:00 PM
Technology > Cybersecurity webinar by Barracuda Networks for Safeguarding risky data in SharePoint and OneDrive
Safeguarding risky data in SharePoint and OneDrive
Employees and other users are highly prone to leaving documents containing sensitive customer or other information stored insecurely in an ad hoc fashion within personal and other folders on SharePoint Online and OneDrive Online.Attend this webinar to gain a full understanding of the risks that this inappropriate data storage can create for your organization. In addition, see why it can be so difficult, time-consuming and unreliable to use manual processes to discover and secure all inappropriately stored documents and files.At the webinar, you'll also get a complete introduction to Barracuda Data Protection's invaluable Data Inspector capability. It monitors and scans files stored across your SharePoint and OneDrive deployments, detecting all files containing potentially sensitive information and enabling you to easily enforce data storage and protection policies to slash risk.Don't miss this opportunity. Reserve your spot at this webinar right now.Featuring: Stefan van der Wal, Principal Technical Marketing Engineer, Barracuda Networks; Jay Johnson, Sr. Product Manager, Barracuda Networks.
4/29/2025 4:00 PM
Technology > Cybersecurity webinar by Teleport for Secrets are Dead: Why Machine and Workload Identities are the Future of Cloud Security
Secrets are Dead: Why Machine and Workload Identities are the Future of Cloud Security
Static secrets like API keys, tokens, and passwords have become a major security liability in modern cloud environments. These credentials introduce significant security risks, are difficult to manage at scale, and create compliance headaches. The future of cloud security lies in dynamic, cryptographic machine and workload identities, eliminating static secrets and enforcing zero-trust authentication across your infrastructure.Join us for this webinar as we explore how machine and workload identities improve security, simplify access management, and ensure compliance. We’ll show how Teleport uses SPIFFE to achieve these things while showcasing real-world examples of how organizations are using short-lived certificates, automated identity issuance, and granular access controls to eliminate credential-based risks.In this webinar, we’ll break down why traditional secrets management is no longer enough and how organizations are adopting workload identities to secure applications and services at scale. You’ll see real-world examples of dynamic identity issuance in action and gain insights into how to strengthen security while reducing operational complexity. We’ll explore best practices for securing workloads across hybrid and multi-cloud environments.Who Should Attend?Security architects and engineers looking to modernize identity-based securityDevOps and platform teams managing cloud-native applications and servicesEngineering leaders and compliance professionals concerned with reducing credential-related risksKey Takeaways:Why secrets are obsolete – Understand the risks of traditional API keys and static credentialsThe power of workload identities – Learn how dynamic identity issuance strengthens security and simplifies managementReal-world implementation – See how organizations are leveraging workload identities to secure applications and servicesSpeakers: Eddie Glenn, Director, Product Marketing, Teleport; Dave Sudia, Senior Product Engineer, Teleport.Join us to learn how you can future-proof your cloud security with identity-first principles.
4/24/2025 5:00 PM
Technology > Cybersecurity webinar by Security Basecamp for Securing Your Azure, O365, or AWS Clouds - Best Practices for Regulated FinTech Firms
Securing Your Azure, O365, or AWS Clouds - Best Practices for Regulated FinTech Firms
Why Attend?The stakes are high for financial services firms operating in the cloud. Whether you’re a financial advisor, broker-dealer, or FinTech software firm, securing cloud environments like AWS, Azure, and Microsoft 365 is no longer optional—it’s essential to maintaining compliance, protecting sensitive data, and preventing costly breaches.Join us for Part 2 of our Cybersecurity Challenges in FinTech Series, where we go deep into:Key Takeaways:• Understand your risks: The most common and costly cloud misconfigurations we see in regulated FinTech environments.• Secure your deployments: Best practices for securing AWS and Azure environments, including identity access management (IAM), network topology, and security group configuration.• Build resilience with automation: How to use Infrastructure-as-Code (IaC), SIEM tools, and automated alerting for continuous protection and compliance.• Learn from real-world incidents: A live walk-through of a cloud misconfiguration incident that caused financial and reputational damage.• Stay audit-ready: How to meet or exceed cybersecurity expectations from the SEC, FINRA, and NYDFS.Who Should Attend?• CTOs, CISOs, and DevSecOps Leaders at Regulated Software Development Firms• Information Security Officers at Broker-Dealers and Investment Advisers• Compliance and Risk Officers navigating SEC, FINRA, and NYDFS rules• Cloud Engineers and Architects responsible for deployment security• Financial Advisors interested in protecting client informationSpeakers: Paul Osterberg, CEO & Managing Director, Security Basecamp; Vincent Guyaux, CISO & Chairman, Buckler; Leslie Ko, Senior Security Architect, Security Basecamp; Patrick Carra, Security Research / Ethical, Security Basecamp.
4/22/2025 6:00 PM

Why Cybersecurity webinars?

Cybersecurity webinars are transforming the landscape of digital safety education, providing an accessible platform for professionals and enthusiasts alike to deepen their understanding of protecting digital assets. Have you explored this dynamic learning avenue yet? By integrating cybersecurity webinars into your professional growth plan, you access a vast repository of knowledge covering everything from basic cyber hygiene practices to advanced threat intelligence strategies, all without stepping out of your home or office.

These webinars are more than just educational tools; they offer a unique opportunity to connect with leading experts and fellow participants globally, fostering a community of shared learning and networking. Whether you're aiming to enhance your cybersecurity skills, keep up with the rapidly changing technology landscape, or expand your professional network, cybersecurity webinars stand out as an essential resource.

Explore our other webinars and start your journey to success. For instance, check educational webinars today.

 

page 1 of 11

;