The Ultimate Directory on Cybersecurity Webinars

Search our directory for upcoming webinars on Cybersecurity

Previous Webinars

Technology > Cybersecurity webinar by Barracuda Networks for Safeguarding risky data in SharePoint and OneDrive
Safeguarding risky data in SharePoint and OneDrive
Employees and other users are highly prone to leaving documents containing sensitive customer or other information stored insecurely in an ad hoc fashion within personal and other folders on SharePoint Online and OneDrive Online.Attend this webinar to gain a full understanding of the risks that this inappropriate data storage can create for your organization. In addition, see why it can be so difficult, time-consuming and unreliable to use manual processes to discover and secure all inappropriately stored documents and files.At the webinar, you'll also get a complete introduction to Barracuda Data Protection's invaluable Data Inspector capability. It monitors and scans files stored across your SharePoint and OneDrive deployments, detecting all files containing potentially sensitive information and enabling you to easily enforce data storage and protection policies to slash risk.Don't miss this opportunity. Reserve your spot at this webinar right now.Featuring: Stefan van der Wal, Principal Technical Marketing Engineer, Barracuda Networks; Jay Johnson, Sr. Product Manager, Barracuda Networks.
4/29/2025 4:00 PM
Technology > Cybersecurity webinar by Teleport for Secrets are Dead: Why Machine and Workload Identities are the Future of Cloud Security
Secrets are Dead: Why Machine and Workload Identities are the Future of Cloud Security
Static secrets like API keys, tokens, and passwords have become a major security liability in modern cloud environments. These credentials introduce significant security risks, are difficult to manage at scale, and create compliance headaches. The future of cloud security lies in dynamic, cryptographic machine and workload identities, eliminating static secrets and enforcing zero-trust authentication across your infrastructure.Join us for this webinar as we explore how machine and workload identities improve security, simplify access management, and ensure compliance. We’ll show how Teleport uses SPIFFE to achieve these things while showcasing real-world examples of how organizations are using short-lived certificates, automated identity issuance, and granular access controls to eliminate credential-based risks.In this webinar, we’ll break down why traditional secrets management is no longer enough and how organizations are adopting workload identities to secure applications and services at scale. You’ll see real-world examples of dynamic identity issuance in action and gain insights into how to strengthen security while reducing operational complexity. We’ll explore best practices for securing workloads across hybrid and multi-cloud environments.Who Should Attend?Security architects and engineers looking to modernize identity-based securityDevOps and platform teams managing cloud-native applications and servicesEngineering leaders and compliance professionals concerned with reducing credential-related risksKey Takeaways:Why secrets are obsolete – Understand the risks of traditional API keys and static credentialsThe power of workload identities – Learn how dynamic identity issuance strengthens security and simplifies managementReal-world implementation – See how organizations are leveraging workload identities to secure applications and servicesSpeakers: Eddie Glenn, Director, Product Marketing, Teleport; Dave Sudia, Senior Product Engineer, Teleport.Join us to learn how you can future-proof your cloud security with identity-first principles.
4/24/2025 5:00 PM
Technology > Cybersecurity webinar by Security Basecamp for Securing Your Azure, O365, or AWS Clouds - Best Practices for Regulated FinTech Firms
Securing Your Azure, O365, or AWS Clouds - Best Practices for Regulated FinTech Firms
Why Attend?The stakes are high for financial services firms operating in the cloud. Whether you’re a financial advisor, broker-dealer, or FinTech software firm, securing cloud environments like AWS, Azure, and Microsoft 365 is no longer optional—it’s essential to maintaining compliance, protecting sensitive data, and preventing costly breaches.Join us for Part 2 of our Cybersecurity Challenges in FinTech Series, where we go deep into:Key Takeaways:• Understand your risks: The most common and costly cloud misconfigurations we see in regulated FinTech environments.• Secure your deployments: Best practices for securing AWS and Azure environments, including identity access management (IAM), network topology, and security group configuration.• Build resilience with automation: How to use Infrastructure-as-Code (IaC), SIEM tools, and automated alerting for continuous protection and compliance.• Learn from real-world incidents: A live walk-through of a cloud misconfiguration incident that caused financial and reputational damage.• Stay audit-ready: How to meet or exceed cybersecurity expectations from the SEC, FINRA, and NYDFS.Who Should Attend?• CTOs, CISOs, and DevSecOps Leaders at Regulated Software Development Firms• Information Security Officers at Broker-Dealers and Investment Advisers• Compliance and Risk Officers navigating SEC, FINRA, and NYDFS rules• Cloud Engineers and Architects responsible for deployment security• Financial Advisors interested in protecting client informationSpeakers: Paul Osterberg, CEO & Managing Director, Security Basecamp; Vincent Guyaux, CISO & Chairman, Buckler; Leslie Ko, Senior Security Architect, Security Basecamp; Patrick Carra, Security Research / Ethical, Security Basecamp.
4/22/2025 6:00 PM
Technology > Cybersecurity webinar by Eric Reed Cybersecurity Training for The ROI of CompTIA Security+: A Industry Recognition Investment in Your Cybersecurity Career
The ROI of CompTIA Security+: A Industry Recognition Investment in Your Cybersecurity Career
Join Eric Reed Live for a FREE CEH Webinar!April 17th at 1 PM EST on Zoom!Join industry veteran Eric Reed—with 25 years of IT training experience and 20 years focused on CEH—as he breaks down everything you need to know about the new CEH v13 AI-Powered Edition.This FREE 60-minute live webinar is your inside track to mastering one of the world’s most respected cybersecurity certifications.What You'll Learn:• Why CEH v13 is a top ROI investment in your career• What’s new in the AI-powered edition• How CEH v13 gives you three certifications in one course• What to expect on the MCQ, Practical, and Master exams• Career paths and salaries for CEH-certified professionals• Eric’s proven, proprietary strategy for passing all three levels• Live Q&A with a 20-year CEH training expertInstructor: Eric Reed Eric Reed is a highly experienced IT professional with over 35 years in the industry. He is an expert in delivering networking and cybersecurity courses and has over 25 years of certification training experience. He is particularly renowned for his success in preparing students for certification exams, with pass rates of 100% consistently.Eric’s expertise lies in DOD Directive 8140/8750 compliance training, and he has extensive experience working with the US Department of Defense and all branches of the US military. He is a regular instructor for EC-Council’s iClass live online training and is the instructor on the official EC-Council iLearn self-study training videos for various certifications like CEH, CHFI, ECSA, CND, CCT, and ECIH.Eric has won several awards for his teaching excellence, including 10 EC-Council Instructor of the Year and 7 Circle of Excellence awards. He has trained more than 60,000 students over the last quarter centuryEric’s unique teaching style and highly effective training methods have made him a favorite among his students, as well as their managers and commanding officers. His track record speaks for itself, with candidates almost invariably passing their exams on the first attempt.
4/17/2025 5:00 PM
Technology > Cybersecurity webinar by Barracuda Networks for Ransomware Protection Strategy: Backup & Archiving
Ransomware Protection Strategy: Backup & Archiving
Implementing a comprehensive backup and archiving strategy is crucial for protecting against ransomware. By ensuring regular backups, secure storage solutions, and thorough testing, organizations can significantly reduce the risk of data loss and downtime in the event of an attack.Come and see how Barracuda can help you protect your data against ransomware.Reserve your seat today!Speaker: KC Ng, Regional Solution Architect – SEA, Barracuda Networks.
4/16/2025 3:00 AM
Technology > Cybersecurity webinar by BeyondTrust for How to Enforce Least Privilege Across Every Endpoint
How to Enforce Least Privilege Across Every Endpoint
Give just enough access, at just the right time to protect your organizationEndpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, and more. By securing these endpoints, organizations can prevent unauthorized access and ensure the integrity and availability of their IT systems.Join us March 25 at 1PM ET for a demo of BeyondTrust’s Endpoint Privilege Management solution. Attendees will see first-hand the solution’s capabilities and learn:• True Least Privilege. Give just enough access, at just the right time, to only the appropriate application or process.• Application Control. Gain control over what users can install or run—without impacting productivity or creating management overhead.• Trusted Application Protection. Stop attacks from taking advantage of email attachments, bad scripts, and malicious websites, with built-in, context-based security controls.• Enterprise Auditing & Reporting. Simplify compliance with a single audit trail of all user activity, and quick access through graphical dashboards and reports.Speaker: Brian Roy, Sr Solutions Engineer.
3/25/2025 5:00 PM
Technology > Cybersecurity webinar by PKWARE for Automating Data Discovery and Protection: Streamlining Compliance in an Evolving Regulatory Landscape
Automating Data Discovery and Protection: Streamlining Compliance in an Evolving Regulatory Landscape
In today’s rapidly changing data security ecosystem, organizations face increasing challenges in maintaining data and regulatory compliance without disrupting their user’s day. This webinar explores how automating data discovery and purpose-built security, that follows your policies, can revolutionize compliance efforts, making them more efficient and effective.Key topics covered:• Evolution of compliance requirements and emerging global standards.• Automated data discovery techniques across cloud, on-premises, and hybrid environments.• Machine learning and AI in data classification and policy enforcement.• Balancing automation with human oversight in compliance processes.• Challenges and solutions in multi-regulatory compliance.• Future-proofing your compliance strategy in a changing regulatory landscape.This webinar will provide insights into how organizations can leverage automation to transform their approach to data protection and compliance, saving time and resources while improving their security posture in an increasingly regulated future.Presented by: EJ Pappas, Field Chief Technology Officer, PKWARE; Alan Rodger, Senior Analyst, Security & Cloud, Bloor Research.
by PKWARE
11/19/2024 4:00 PM
Technology > Cybersecurity webinar by Horizon3.ai for Maximizing Offensive Security: Addressing Shortcomings and Improving Effectiveness
Maximizing Offensive Security: Addressing Shortcomings and Improving Effectiveness
Offensive security is essential for identifying and exploiting system vulnerabilities, but current practices often have gaps that reduce their effectiveness. This presentation will explore these deficiencies and offer practical strategies to enhance the accuracy and impact of offensive security assessments, ultimately improving the overall effectiveness of security programs.In this session you will learn:1. Introduction to Offensive Security2. Types of Offensive Security Approaches3. Identifying Gaps in Offensive Security Programs4. Strategies for Optimizing and Overcoming Gaps in Offensive SecurityYou can also participate in the live Q & A with our expert panel.Speaker: Phil Wylie, Offensive Security Expert, Horizon3.ai.
11/12/2024 8:30 AM
Technology > Cybersecurity webinar by ReversingLabs for The MLephant in the Room: Detecting ML Malware
The MLephant in the Room: Detecting ML Malware
As the demand for AI capabilities grows, LLMs and other ML models are increasingly included in the software that we develop and consume.Of particular note are Pickle files, which represent 83.5% of all ML models. Their popularity has attracted the eye of threat actors and has become a new attack vector of choice.To help businesses stay ahead of the threat, ReversingLabs has developed the ability to detect malicious machine learning models and identify unsafe function calls during deserialization, flag unusual behaviors, and automatically classify models exhibiting these behaviors as suspicious or malicious.Join this webinar to learn:✓ What exactly ML models are and why they’re important ✓ The distinction between API and ML models and the role of each✓ Why ML models are so frequently shared and, unfortunately, abused✓ The serialization and deserialization process and how it’s used to spread malware✓ How ReversingLabs has developed the capability to detect ML malware before it can cause harmRegister Now
11/6/2024 5:00 PM
Technology > Cybersecurity webinar by McDonald Hopkins for Top Protection Strategies Against Financial Cyber Fraud: Are you Ready to Respond?
Top Protection Strategies Against Financial Cyber Fraud: Are you Ready to Respond?
Cybersecurity is essential for reducing the risks linked to Business Email Compromise (BEC), wire fraud, and electronic funds transfer (ETF) threats. It involves a comprehensive set of strategies that focus on mitigating supply chain vulnerabilities, combating the effects of AI-generated deep fakes, and gaining insight into the tactics, techniques, and procedures (TTPs) used by malicious actors.In this webinar presented by the McDonald Hopkins’ Data Privacy and Cybersecurity Practice Group, Kevin Baker (Chief Information Security Officer at Fortress Security Risk Management) will join attorneys Robert Cohen and Kate Furstenau to discuss effective protection strategies, what constitutes a data breach and understanding the recovery process.Topics include:• Cybersecurity's role in preventing BEC/wire fraud/ETF• Threat Actor TTP's• Breach, privacy and reporting• Notice requirements• Recovery of electronically transferred funds• Best practices for preventionSpeakers: Robert Cohen, Member; Kate Furstenau, Associate; Kevin Baker, Chief Information Security Officer, Fortress Security.
11/6/2024 4:00 PM

Why Cybersecurity webinars?

Cybersecurity webinars are transforming the landscape of digital safety education, providing an accessible platform for professionals and enthusiasts alike to deepen their understanding of protecting digital assets. Have you explored this dynamic learning avenue yet? By integrating cybersecurity webinars into your professional growth plan, you access a vast repository of knowledge covering everything from basic cyber hygiene practices to advanced threat intelligence strategies, all without stepping out of your home or office.

These webinars are more than just educational tools; they offer a unique opportunity to connect with leading experts and fellow participants globally, fostering a community of shared learning and networking. Whether you're aiming to enhance your cybersecurity skills, keep up with the rapidly changing technology landscape, or expand your professional network, cybersecurity webinars stand out as an essential resource.

Explore our other webinars and start your journey to success. For instance, check educational webinars today.

;