The Ultimate Directory on Cybersecurity Webinars

Search our directory for upcoming webinars on Cybersecurity

Previous Webinars

Technology > Cybersecurity webinar by Formation Tech for Webinar: Cybersecurity – Mind the Gap!
Webinar: Cybersecurity – Mind the Gap!
In today's rapidly evolving digital landscape, securing a hybrid workforce has become one of the most pressing challenges for IT and network security teams. The shift to remote and hybrid work models has opened new security gaps, rendering traditional solutions like VPNs inadequate. As shadow IT continues to grow and operational complexities increase, organisations face significant risks and inefficiencies.Join us for our learning webinar where -  accompanied by our partners and market leaders at Fortinet - we will explore how the modern threat landscape has evolved post-pandemic and delve into why a comprehensive, consolidated vendor solution is essential for addressing these challenges. Discover the key security gaps introduced by hybrid work, understand the limitations of current solutions, and learn how to achieve a secure, reliable, and consistent access to corporate resources, no matter where your team is located.Agenda:Webinar: Cybersecurity – Mind the Gap!Date: Thursday, 26th September | Time: 11am.Here's what to expect:11:00-11:05am: Setting the stage for understanding the modern cybersecurity landscape.11:05-11:15am: Recognising the 5 Key Challenges of Securing a Hybrid Workforce:Addressing Security GapsOvercoming VPN Performance IssuesManaging Shadow ITSimplifying Operational ComplexityReducing Vendor Sprawl 11:15-11:20am: Where to Start? Prioritising Your Security Needs: Practical advice on how to assess your current security posture and what to address first.11:20-11:25am: Case Studies: Real-world examples of how businesses have successfully navigated these challenges.11:25-11:30am: Interactive Q&A Session: Get your questions answered by our cybersecurity experts.Speakers: Mark Tyers - Co-Founder of Formation Tech, Mike Gilroy-Scott - Head of Technology, Stephen Jamieson - Fortinet’s Cyber Expert.
9/26/2024 10:00 AM
Technology > Cybersecurity webinar by Advisera for NIS 2: What is it and how to become compliant | Free Webinar
NIS 2: What is it and how to become compliant | Free Webinar
What is NIS 2 and how to Comply With it?Webinar designed for companies that need to comply with NIS 2, a European Union directive that specifies cybersecurity requirements. The webinar explains the key requirements of NIS 2 and gives direction for becoming compliant.This live, interactive online training (via webinar) is designed to enable you to walk away with knowledge of NIS 2 basics and key requirements. This course offers compelling content, a downloadable presentation deck, and live engagement with an expert consultant with whom you can discuss how to resolve your specific implementation issues. You will experience the training right from your desk, eliminating travel costs and minimizing lost time away from your office.Register for this webinar to learn:The basics of NIS 2Who needs to comply with NIS 2?What are the steps to comply with NIS 2?What you will receive:Training delivered by Dejan Kosutic, a leading expert on NIS 2 and ISO 27001Access to webinar recordingThis training is designed for professionals in mid-size and large companies from the 18 industries that need to comply with NIS 2, including:CISOs and other information security managersCybersecurity expertsIT managersCompliance managersInformation security consultantsPresenter: Dejan Kosutic - CEO & Lead Expert for ISO 27001 and NIS 2.
9/25/2024 3:00 PM
Technology > Cybersecurity webinar by Barracuda Networks for EDR, MDR, XDR: What they are, how they work, and how to choose
EDR, MDR, XDR: What they are, how they work, and how to choose
Today’s highly evolved, AI-enhanced cyberthreat landscape demands powerful new strategies for threat detection and response. But how do you decide which of many options is optimal for your organization?Join this webinar and get the whole story about the varieties of endpoint (EDR), managed (MDR), and detection and response (XDR). Discover the advantages and limitations of each approach, and see how to choose the best threat detection-and-response strategy for your organization.Find out:• How to automate and centralize threat-hunting and incident response• How to optimize in-house resources and the role of SOC-as-a-Service• When to use managed services instead of new cybersecurity staffingWhether your organization has a fully staffed SOC, one person who does IT in addition to another job, or anything in between, see how to harden, simplify, and automate your security by gaining a full understanding of today’s options for advanced detection and response.Reserve your spot now.Speakers: Adam Searcy - Product Marketing Manager, Managed XDR, Barracuda Networks; Chris Crellin - Sr. Director, Product Management, Barracuda Networks.
9/24/2024 2:00 AM
Technology > Cybersecurity webinar by OpenText Cybersecurity for Establish trusted AI with DSPM best practices
Establish trusted AI with DSPM best practices
Generative AI is a powerful tool, carrying inherent risks like any new technology. To effectively harness its potential, organizations must prioritize curating high-quality data—great AI requires great data. In this webinar, we’ll delve into strategies that empower security professionals to harness AI effectively while maintaining data safety and ethical practices. Specifically, we’ll dive into:• Complex Challenges: Gain a deep understanding of the interplay between data security and AI, including the specific risks associated with generative models, while proactively tackling challenges and emphasizing the importance of human oversight for data quality and optimal outcomes.• Establishing Data Trust for AI: Adopt a holistic approach to data and identity management, tackling challenges like ROT data, mismanaged corporate data (including intellectual property and employee data), and privacy considerations.• Proven DSPM Approach: Discover a reliable Data Security Posture Management (DSPM) approach for safeguarding data throughout its lifecycle, especially in the context of data for AI.• Access Control: Learn how to manage access to data by utilizing role-based controls (RBAC), principle of least privilege and other key components in Identity and Access Management (IAM).Join us as we navigate how to empower organizations to adopt AI responsibly. September 17, 2024| 11:00 a.m. ET | 5:00 p.m. CESTPlease use business emails only, all personal emails will not be eligible. Please fill in all form fields in full, any incomplete forms will not be eligible. Please attend via video to ensure your attendance is recorded.Speakers: Greg Clark, Director Product Management - OpenText; Rob Aragao, Chief Security Strategist - OpenText; Valerie Mayer, Senior Product Marketing Manager - OpenText.
9/17/2024 3:00 PM
Technology > Cybersecurity webinar by Nokia Corporation for Demystifying Telecom SaaS Security
Demystifying Telecom SaaS Security
Data security and data privacy are the top concerns for communications service providers. As a result, they allocate substantial resources to safeguard their customers and operations against unauthorized data access and disclosure. Historically, these concerns have made many providers hesitant to shift their network operations and management to software-as-a-service (SaaS) models that utilize the public cloud. In this fireside chat, Vivek Gupta, Director, Telco Industry at Google, and Philip Blanchar, Senior Director, SaaS Delivery and operations at Nokia, will address the main security myths and misconceptions related to Telecom SaaS adoption.Speakers:Vivek Gupta, Director, Telco Industry at GooglePhilip Blanchar, Senior Director, SaaS Delivery and operations at Nokia
9/17/2024 2:00 PM
Technology > Cybersecurity webinar by Claroty for Webinar | Streamlining OT Vulnerability Management
Webinar | Streamlining OT Vulnerability Management
Amid today's rapidly evolving digital landscape for cyber-physical systems (CPS), security teams are grappling with an overwhelming array of vulnerabilities within operational technology (OT) environments. The conventional industry approach of utilizing standard CVSS scores to prioritize vulnerabilities is becoming increasingly insufficient. Effective vulnerability prioritization workflows and dependable validation tools are critical for understanding which exposures are most likely to be exploited.In this webinar session, Gregory Thomas, Solution Engineer at Claroty will offer insights and guidance on streamlining the vulnerability management process in the context of a dynamic exposure management framework.After this session, you’ll be able to:• Prioritize vulnerabilities based on their relevance to your unique environment• Understand which tools can help validate a vulnerability’s exploitability• Discover how to rank assets higher in criticality based on their operational context Speaker: Greg Thomas, Solution Engineer, Claroty.
by Claroty
9/12/2024 3:00 PM
Technology > Cybersecurity webinar by OpenText Cybersecurity for Unmasking the Threat: Deepfakes and the Future of Cybersecurity
Unmasking the Threat: Deepfakes and the Future of Cybersecurity
Join us for an insightful webinar where we delve into the emerging threat of deepfake technology and its implications for the security landscape. This session is designed for cybersecurity professionals, IT managers, and anyone interested in understanding how deepfake technology is reshaping the threat environment. Gain a comprehensive understanding of the deepfake phenomenon and learn how to protect your organization from this growing threat. Equip yourself with the knowledge and tools necessary to stay ahead in the ever-evolving field of cybersecurity.Presented by Matt Aldridge, Principal Solutions Consultant, and Tyler Moffitt, Senior Security Analyst.
9/4/2024 2:00 PM
Technology > Cybersecurity webinar by Mimecast for APAC Threat Intelligence Webinar
APAC Threat Intelligence Webinar
Our panel of cybersecurity experts will unpack the latest Global Threat Intelligence Report, focusing on key insights from the first half of 2024 and what it means for APAC including in-depth analysis of threat activities, attack trends, and recommendations to mitigate cyber risks.We'll also explore the growing threat of Business Email Compromise (BEC), historically the most financially damaging attack — the FBI reporting it as 64x more costly than ransomware – and how to defend your organisation from it!  Join our security experts in this webinar as they discuss:Key findings from the latest Mimecast Global Threat Intelligence Report from the first half of 2024Actionable recommendations for APAC businesses to stay ahead of cyber threatsRecent BEC attacks, and why traditional solutions struggle to detect themHow and where to deploy the latest advancements in AI/ML in the fight against BEC Speakers: Garrett O'Hara - Senior Director, Solutions Engineering APAC; Ryan Economos - Mimecast’s Field CTO; Dr Kiri Addison - Senior Manager, Product Management.
9/4/2024 6:00 AM
Technology > Cybersecurity webinar by Menlo Security for [Live Webinar] The Crowdstrike Wake-Up Call: Strengthening Your Security Posture
[Live Webinar] The Crowdstrike Wake-Up Call: Strengthening Your Security Posture
Is Your Organization Ready for the Next Cyber Threat?In today's rapidly evolving digital landscape, the question isn't if you'll face a cyberattack—it's when. With cyber threats growing more sophisticated every day, ensuring your organization’s security posture is robust and adaptive is more critical than ever.Welcome to Menlo Security Webinar, where we dive deep into the essentials of fortifying your cybersecurity defenses. This is not just another checklist—it's a comprehensive guide to transforming your security strategy with actionable insights and expert guidance.You’ll learn how to:• Understand Emerging Threats: Gain critical insights into the latest cybersecurity threats and how they could impact your organization.• Evaluate Your Current Posture: Learn to assess your existing security measures and identify any gaps or vulnerabilities.• Actionable Strategies: Discover practical, real-world strategies to enhance your security posture and safeguard your digital assets.This is your chance to gain actionable insights and discover how to strengthen your security posture against modern cyber threats. Secure your spot now and join us in transforming your approach to security!Reserve your seat now.We are looking forward to meeting you there!
8/28/2024 5:00 AM
Technology > Cybersecurity webinar by IDC - Asia/Pacific for Steering through the AI Era: Fortifying Cybersecurity to Foster Innovation
Steering through the AI Era: Fortifying Cybersecurity to Foster Innovation
In today's rapidly evolving digital landscape, AI models are at the forefront of innovation, driving unprecedented advancements across various industries. According to IDC's August 2023 GenAI ARC Survey, 83% of IT leaders believe leveraging GenAI models with their own business data will provide a significant competitive advantage. However, this surge in innovation also brings heightened security concerns.Nearly 31% of enterprises in Asia/Pacific in 2024, report that security is a major concern when deploying automation technologies. Tech buyers are wary of the dual-edged nature of AI; while it offers unparalleled efficiency and problem-solving capabilities, it also introduces new vulnerabilities. The integration of AI into business operations necessitates robust security measures to protect against sophisticated cyber threats targeting critical infrastructure, personal data, and AI systems themselves.Key discussion points​:• Understand Asia/Pacific’s outlook on security and AI investments, including CISO challenges, priorities, and investment strategies, supported by case studies from around the region.​• Discover key AI use cases and learn how tech vendors can support enterprises in an open, complex, and interconnected world of AI.​• Discuss infrastructure strategies to support innovation through GenAI while maintaining security, and how cybersecurity vendors can assist organizations in integrating GenAI into their processes.Speakers: Sakshi Grover, Senior Research Manager - IDC; Christian Fam, Senior Research Manager - IDC.Register now.
8/13/2024 6:00 AM

Why Cybersecurity webinars?

Cybersecurity webinars are transforming the landscape of digital safety education, providing an accessible platform for professionals and enthusiasts alike to deepen their understanding of protecting digital assets. Have you explored this dynamic learning avenue yet? By integrating cybersecurity webinars into your professional growth plan, you access a vast repository of knowledge covering everything from basic cyber hygiene practices to advanced threat intelligence strategies, all without stepping out of your home or office.

These webinars are more than just educational tools; they offer a unique opportunity to connect with leading experts and fellow participants globally, fostering a community of shared learning and networking. Whether you're aiming to enhance your cybersecurity skills, keep up with the rapidly changing technology landscape, or expand your professional network, cybersecurity webinars stand out as an essential resource.

Explore our other webinars and start your journey to success. For instance, check educational webinars today.

;