The Ultimate Directory on Cybersecurity Webinars

Search our directory for upcoming webinars on Cybersecurity

Previous Webinars

Technology > Cybersecurity webinar by Acronis for Discover how to close vulnerabilities and protect your data — even from zero-day attacks
Discover how to close vulnerabilities and protect your data — even from zero-day attacks
Did you know that a startling 80% of breaches are new or unknown zero-day attacks? Or that antiviruses alone miss 57% of attacks? These statistics are alarming and probably leave you wondering what to do to protect your organization’s data, applications and systems, and keep your business running. Join our webinar to see Acronis Cyber Protect in action. Explore how the integration of next-generation cybersecurity, reliable backup, and recovery and enterprise protection management can increase the security of your data, improve team productivity and decrease your operating costs. By attending, you will discover how to: · Prevent attacks from happening in the first place · Protect as many applications as possible · Identify outdated software that is known to have vulnerabilities · Automatically update software to recent versions · Quickly revert to a healthy system version when patches go wrong
by Acronis
12/5/2023 6:00 PM
Technology > Cybersecurity webinar by Arrow Electronics for Unveiling Key Strategies for Ensuring Robust IT & OT Security
Unveiling Key Strategies for Ensuring Robust IT & OT Security
In the dynamic landscape of cybersecurity, your vigilance is paramount. Arrow ECS and Keysight cordially invite you to a groundbreaking webinar where industry luminary Roxana Magdo, EMEA Business Development Director at Keysight, will unravel the critical factors shaping IT & OT security. Why Attend? 🚀 Expert Insights: Roxana brings over 25 years of experience in telecommunications, offering a unique perspective on security challenges. 🌐 Global Perspective: Delve into real-world use cases and preventive measures tailored for OT / SCADA networks. 💬 Engage Directly: Cap off the session with a live Q&A, your chance to interact with Roxana and gain personalized insights. Registration is Open! Secure your spot now to elevate your security strategy.
12/5/2023 10:30 AM
Technology > Cybersecurity webinar by Adaptive Shield for SaaS Security Trends and Your 2024 Strategy – Stay Ahead of the Game
SaaS Security Trends and Your 2024 Strategy – Stay Ahead of the Game
The democratization of IT is in full swing, being led by business units purchasing and securing cloud-based SaaS apps. With this joint responsibility, security teams are being relegated to the role of governors instead of controllers, guiding the SaaS application business owners on how to practice security. Join us for a conversation between Maor Bin, CEO of Adaptive Shield, and Ed Amoroso, CEO of Tag Infosphere, as they discuss the implications of this transition and the new trends in SaaS Security. In this webinar, Maor and Ed will explore: Emerging SaaS Security threats and the new access vectors, Security team’s role as a partner in securing SaaS applications in 2024 – using tools like SSPM to gain visibility into SaaS misconfigurations, users, user devices, and interconnected apps, The growing need for SaaS Identity-centric Threat Detection & Response mechanisms
11/30/2023 5:00 PM
Technology > Cybersecurity webinar by Infotechtion for Can Microsoft Purview provide a unified security and governance solution for all of your information?
Can Microsoft Purview provide a unified security and governance solution for all of your information?
Most organizations have information on file servers, SharePoint Online, OneDrive, ServiceNow, JIRA, and many more. Infotechtion embrace and extend Microsoft Purview to manage content across IT systems with our i-ARM solutions. To ensure you keep what you need and delete the rest, we connect Purview with legal retention software like Iron Mountain Policy Center and Access Corp Virgo. Join this webinar to learn how to best manage all your content with Microsoft Purview with automatic identification of records, ROT, and sensitive information.Speakers:vivek bhattCTO, InfotechtionVivek is a leading expert in Microsoft cloud, recognized as an early influencer together with Microsoft led information governance and records management journey. He has led several strategic Microsoft O365 and Azure cloud transitions for global enterprises across energy and utilities, financial services and UK public sector.Atle SkjekkelandCEO, InfotechtionAtle is an information innovator and educator. His interest in the impact of cloud, social, mobile, IoT, and artificial intelligence has made him a frequent keynote speaker and workshop facilitator at information management events across the world.
11/30/2023 5:00 PM
Technology > Cybersecurity webinar by ManageEngine for Remote Work Security: Protect Your Organization from Cyber Threats
Remote Work Security: Protect Your Organization from Cyber Threats
This webinar will cover best practices and strategies for remote workforce security, presented by Sharon, a product expert. Learn how to face the challenges of a remote work model, why your workforce identities are easy targets, what strategies can secure your remote workforce from cyberattacks, and how to implement these strategies with ADSelfService Plus across your IT environment.
11/30/2023 3:00 AM
Technology > Cybersecurity webinar by Indusface for Live API Attack Simulation
Live API Attack Simulation
I have an API gateway and the strong authentication and authorization keeps me secure. This notion could cost you a data breach, a compliance fine or even application downtime that leads to erosion of customer trust. In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: An exploit of OWASP API Top 10 vulnerability, A brute force account take-over (ATO) attack on API, A DDoS attack on an API, How a WAAP could bolster security over an API gateway
11/29/2023 10:00 AM
Technology > Cybersecurity webinar by Bitdefender for Exclusive Researcher Insights: New Methods for Extending Local Breaches in Google Workspace
Exclusive Researcher Insights: New Methods for Extending Local Breaches in Google Workspace
During the development of our XDR sensor for Google Workspace and Google Cloud Platform, we uncovered previously unknown attack methods for escalating a compromise from a single endpoint to a network-wide breach, potentially leading to ransomware attacks or data exfiltration. Starting from a single compromised machine, threat actors could progress in several ways: they could move to other cloned machines with GCPW installed, gain access to the cloud platform with custom permissions, or decrypt locally stored passwords to continue their attack beyond the Google ecosystem. We will be joined by the security researcher who originally discovered these novel attack pathways to discuss: Exploring New Attack Methods, Mitigating Security Risks, and Technical Best Practices.
11/29/2023 10:00 AM
Technology > Cybersecurity webinar by National Institute of Building Sciences for Cyber-Physical Impact Modeling Webinar
Cyber-Physical Impact Modeling Webinar
Join us for a webinar on Cyber-Physical Impact Modeling. This webinar will discuss the impact of cyber attacks on physical systems and how to model and analyze these impacts. We will explore case studies and best practices for protecting critical infrastructure from cyber threats.
11/28/2023 6:00 PM
Technology > Cybersecurity webinar by Atos for Cyber Recovery
Cyber Recovery
How simple infrastructure modifications can meet complex cyberthreats! Cyberattacks are becoming increasingly prevalent, and this webinar aims to shed light on potential attacks and provide simple infrastructure answers to recover business-critical data quickly after a cyberattack.
by Atos
11/28/2023 2:00 PM
Technology > Cybersecurity webinar by VirusTotal for Stay ahead with YARA: Exploring the latest rule writing innovations
Stay ahead with YARA: Exploring the latest rule writing innovations
YARA is one of the most powerful tools for detecting and monitoring malware, but it can be intimidating to master. However it evolves fast! New YARA editors, creation of YARAs by clicking on desired features from a given observable and Netloc rules, open a full universe for YARA creators. This webinar is for anyone who wants to learn more about YARA, latest innovations and how to use it effectively.
11/22/2023 4:00 PM

Why Cybersecurity webinars?

Cybersecurity webinars are transforming the landscape of digital safety education, providing an accessible platform for professionals and enthusiasts alike to deepen their understanding of protecting digital assets. Have you explored this dynamic learning avenue yet? By integrating cybersecurity webinars into your professional growth plan, you access a vast repository of knowledge covering everything from basic cyber hygiene practices to advanced threat intelligence strategies, all without stepping out of your home or office.

These webinars are more than just educational tools; they offer a unique opportunity to connect with leading experts and fellow participants globally, fostering a community of shared learning and networking. Whether you're aiming to enhance your cybersecurity skills, keep up with the rapidly changing technology landscape, or expand your professional network, cybersecurity webinars stand out as an essential resource.

Explore our other webinars and start your journey to success. For instance, check educational webinars today.

;