Cybersecurity Webinars
Check out our upcoming and recent cybersecurity webinars and take the first step towards protecting your business from cyber threats.
Upcoming Webinars — Reserve Your Spot
 
      The Future of AI in GRC: Opportunities, Risks, and Practical Insights
      Join experts to uncover AI's impact on GRC — get case studies, risk flags, and a blueprint for responsible adoption."
    
   
      Dynamic Attack Surface Reduction (DASR): Staying One Step Ahead of Adversaries
      Tired of endless vulnerabilities? Discover how DASR and PHASR automate hardening to secure your attack surface—register now.
    
   
      Securing Cloud Workloads and Infrastructure: Balancing Innovation with Identity and Access Control
      Learn real-world strategies to limit credential risks, enforce identity controls, and maintain innovation in the cloud.
    
   
      Resilient Patching: Guardrails for Community Repos
      Speed vs. security: Learn how to trust, control, and secure community repos while keeping patch cycles on track. Register today.
    
   
      Winning the AI Arms Race: Defeating the AI-Powered Phishing Epidemic
      WormGPT, FraudGPT, SpamGPT: Inside the AI Phishing Factory
    
  Recent Webinars — Watch Now
 
      Turning Controls into Accelerators of AI Adoption: Solving the Practitioner's Dilemma
      Discover a practical framework for managing AI agents securely, avoiding credential sprawl, and enabling safe innovation.
    
   
      Cybersecurity Nightmares: Tales from the Password Graveyard
      Discover how password failures fuel breaches, see Specops in action, and walk away with a step-by-step plan to lock down credentials for good.
    
   
      Workflow Clarity: Where AI Fits in Modern Automation
      Learn how top security teams fuse AI + human workflows. Join our webinar to build secure, auditable automation with clarity & control.
    
   
      Building Trust and Resilience for the AI and Quantum 2.0 Era
      The Next Cybersecurity Crisis Won't Be Just AI — It'll Be Quantum-Enhanced
    
   
      Shadow AI Agents Exposed — and the Identities that Pull the Strings
      One Click, One Agent, Infinite Risk. Learn to Stop Shadow AI at the Source
    
   
      Code-to-Cloud Visibility: The New Foundation for Modern AppSec
      Uncover and Fix Every Risk from Code to Cloud—Before Threat Actors Find the Weak Link
    
   
      Shadow Agents and Silent Threats: Securing AI's New Identity Frontier
      When AI Acts Like an Insider Threat—And No One's Watching. Learn How to Regain Control
    
   
      AI's New Attack Surface: Why Identity Is the Last Line of Defense
      AI is reshaping cyber threats—and identity is the first target. Join us to explore how to defend trust and secure your CIAM stack with insights from Okta.
    
   
      Securing the Snake: Safeguarding the Python Supply Chain in 2025
      Stop Just 'Pip Install and Pray'—Secure Your Python Projects the Right Way
    
   
      2025 CIAM Trends Report - Navigating Customer Identity in the AI Era
      Trust is now a competitive edge. Learn how top teams use AI, privacy-first design, and seamless logins to build identity that scales.
    
   
      Building Real-Time Social Engineering Defense with AI That Learns From Every Threat
      They're Pretending to Be You: Stop AI-Powered Impersonation Before It Strikes
    
   
      Securing AI Agents and Preventing Data Exposure in GenAI Workflows
      Learn how AI agents and GenAI apps expose data — and how to secure them before breaches happen
    
   
      Threat Hunting Insights from the World's Largest Security Cloud
      Struggling to Spot Stealth Attacks? Learn How Threat Hunters Are Outsmarting LOTS Tactics
    
   
      Uncovering the Invisible Identities Behind AI Agents — and Securing Them
      Invisible Non-Human Identities power AI agents — learn how to secure them before attackers strike.
    
   
      How To Develop A Reasonable Cyber Defense Program
      Develop a cybersecurity program that's defensible, compliant, and built on proven standards
    
   
      Breaking Down Security Silos: Why Application Security Must Span from Code to Cloud to SOC
      Secure the Entire Ecosystem: Learn How Bridging Code, Cloud and SOC Stops Fast-Moving Attacks
    
   
      Building AI Agents Securely with Auth0
      Secure your AI-powered business! Join our free webinar covering AI threats, best practices, and essential security measures.
    
   
      Preventing Cyberattacks: Securing the Entire Identity Lifecycle
      Securing the Identity Lifecycle with Phishing-Resistant MFA, Device Trust and Deepfake Defense
    
   
      Your AI is Outrunning Your Security. Here's How to Keep Up, with Reco
      Don't let hidden AI threats derail your success—learn how to empower your defenses
    
   
      AI Uncovered: Re-Shaping Security Strategies for Resilience in the Era of AI
      AI Is Changing the Cybersecurity Game — Learn the Secrets to Outsmart Modern Hackers
    
   
      How to Eliminate Identity-Based Threats
      From Phishing to Device Risks: Learn to Remove Entire Threat Classes Effortlessly
    
   
      The Anatomy of a Ransomware Attack
      Watch a Live Ransomware Attack Demo, Uncover Hacker Tactics and Learn to Defend
    
   
      ASPM: The Future of AppSec — Boom or Bust?
      Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions.
    
   
      Building Resilient Identity: Reducing Security Debt in 2025
      Attacks Evolve, So Can Your Defenses—Learn How to Mitigate Risk and Optimize Identity Security with Okta
    
   
      Opening the Fast Lane for Secure Deployments
      Learn How to Align Dev and Sec Teams Without Compromising Speed and Security
    
   
      AI in Cybersecurity: Balancing Hype with Real Impact Abstract
      Discover How Leaders Harness AI for Effective Vulnerability Management and Beyond
    
   
      DigiCertOne Demo: Managing Digital Trust in the Modern Enterprise
      Streamline Trust: Learn Certificate Management, Automation, and Compliance Strategies
    
   
      Preparing for Ransomware and Encrypted Attacks in 2025
      Ransomware is evolving, but your defenses can too—learn how to stay ahead
    
   
      CISO Perspective: Why Great Companies with Great Solutions Still Get Breached
      Are you missing the vulnerabilities right under your nose? Find out what they are
    
   
      Preventing Privilege Escalation: Effective PAS Practices for Today's Threat Landscape
      From Blind Spots to Complete Visibility: Learn How to Secure Your Privileged Accounts
    
   
      Building Tomorrow, Securely: Securing the Use of AI in App Development
      Building AI-powered applications with robust security foundations in place
    
   
      When Shift Happens: Are You Ready for Rapid Certificate Replacement?
      Revocations can disrupt your business, but automation saves the day. Discover how.
    
   
      Storytime with Huntress Managed Security Awareness Training
      Tired of traditional security training? Supercharge your security culture with Huntress SAT.
    
   
      How LUCR-3 (Scattered Spider) Orchestrates Identity-Based Attacks Across Multiple Environments
      Uncovering the Tactics Advanced Attackers Use to Exploit SaaS and Cloud Vulnerabilities
    
   
      Building a Successful Data Security Posture Management Program
      Learn From the Leaders: Early DSPM Adopters Reveal Their Data Security Success Secrets
    
   
      Modernization of Authentication: Passwords vs Passwordless and MFA
      Discover the Future of Cybersecurity: Understand the Role of MFA and Passwords in a Passwordless Organization
    
   
      Unpacking the 2024 Ransomware Landscape: Insights and Strategies from ThreatLabz
      Learn How to Combat Ransomware with Zero Trust Strategies and the Latest Threat Intelligence
    
   
      Solving the SIEM Problem: A Hard Reset on Legacy Solutions
      From Overload to Oversight: How Modern SIEM Solutions Can Simplify Security Without Sacrificing Performance
    
   
      From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
      Learn how identity-focused incident response can be your strongest defense against today's advanced threats
    
   
      Stopping GenAI Data Leakage: Practical Techniques for Modern Enterprises
      Get actionable steps and tools to harness the full potential of GenAI while protecting your sensitive data.
    
   
      The AI Revolution in Vulnerability Management: 2025 Trends for Security Leaders
      Transform Your Team: Learn How Security Champions Turn Developers into Security Advocates
    
   
      Step by Step: How to Achieve Total Protection with an All-in-One Platform
      Watch as experts simulate real-world threats to demonstrate compelling advantages.
    
   
      Why All-in-One Solutions are the Future of Cybersecurity
      Discover How an All-in-One Solution are the Key to Simple, Fast, and Scalable Protection for MSPs and SMBs.
    
   
      Turn Developers into Allies: The Power of Security Champion Programs
      Transform Your Team: Learn How Security Champions Turn Developers into Security Advocates
    
   
      Keys to Your Kingdom: Why Compromised Credentials Are the #1 Attack Vector in 2024
      From Data Breaches to Identity Theft: The Ripple Effects of Compromised Credentials and How to Stop Them.
    
   
      Secure Your Digital Identity: Top 5 Criteria for ITDR Solutions
      Discover the key capabilities of ITDR solutions in our upcoming webinar.
    
   
      Data Security is Different at the Petabyte Scale
      Discover the secrets to securing fast-moving, massive data sets with insights from industry titans.
    
   
      Better Basics Win the Cybersecurity Threat War
      Defend, Deter, and Save: Learn How to Optimize Cyber Hygiene and Compliance Costs
    
   
      Navigating the SMB Threat Landscape: Key Insights from Huntress' Threat Report
      Analyzing the Post-Qakbot Era and Emerging Threats with Cybersecurity Expert Jamie Levy.
    
   
      The Future of Threat Hunting Is Powered by Generative AI
      From Data to Defense: Step Into the Next Era of Cybersecurity with CensysGPT.
    
   
      Uncovering Contemporary DDoS Attack Tactics — and How to Fight Back
      Stop DDoS Attacks Before They Stop Your Business... and Make You Headline News.
    
   
      Decoding Hidden Supply Chain Threats: Expert Insights for Proactive Defense
      Stop playing defense—start hunting threats. Protect your software supply chain with proactive strategies.
    
   
      Today's Top 4 Identity Security Threat Exposures: Are You Vulnerable?
      Don't let what you can't see compromise your security. Learn how to spot and squash identity threats before they strike.
    
   
      From Blind Spots to Bulletproof: Secure Your Applications with OPSWAT and F5
      Industry security leaders share their insights and battle-tested strategies for robust application security.
    
   
      Harmony in Innovation: Navigating the Interplay of Generative AI and Security
      Join the conversation with industry leaders to explore how GenAI and LLMs are reshaping business operations.
    
   
      Reality Check: Identity Security for Human and Non-Human Identities
      Cyber threats are eyeing your SaaS application's identity fabric. Learn proactive defense strategies.
    
   
      Building Your Privacy-Compliant Customer Data Platform (CDP) with First-Party Data
      Struggling with GDPR and privacy-focused browsers? Harness first-party data to transform customer engagement.
    
   
      Building an Incident Response Playbook Against Scattered Spider in Real-Time
      Want to see how experts stop a ransomware attack in its tracks? Explore the analysis and response tactics in our upcoming webinar.
    
   
      Critical SaaS Security Do's and Don'ts: Insights from 493 Companies
      Get a sneak peek at 2024's threat landscape and lessons learned from an extensive study of 493 companies.
    
   
      The Art of Privilege Escalation - How Hackers Become Admins
      Understand how attackers skillfully elevate privileges from standard user accounts to top-level administrative control.
    
   
      Leverage Zero Trust Security to Minimize your Attack Surface
      Firewalls and VPNs are no longer enough. Explore Zero Trust Security to protect your data.
    
   
      Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker
      Ever wondered why social engineering works so well? Think Like a Hacker, Defend Like a Pro.
    
   
      Beyond Identity and Access Management: Stop Insider Threats with Application Detection and Response
      Discover how application detection, response, and automated behavior modeling can revolutionize your defense against insider threats.
    
   
      Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics
      From Zenbleed to Kubernetes attacks - 2023 is proving a challenging year for cloud security. Get equipped with with strategies to combat these threats
    
   
      Kickstarting Your SaaS Security Strategy
      From Start to Secure: A detailed guide that covers programs, people, processes and tech.
    
   
      State of Web Application Security: Top 5 Trends and Insights
      Industry experts from EY Technology Solutions and OPSWAT dive deep into current security challenges and solutions.
    
   
      Locking Down Financial and Accounting Data — Best Data Security Strategies
      Financial data is a goldmine for cyber attackers. Learn the best practices to safeguard your accounting data.
    
   
      How vCISOs and MSSPs Can Protect their Clients from AI and LLM Related Risks
      Join us to discover the tools and policies that can safeguard your business from the evolving threats of AI
    
   
      AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks
      Leveraging the power of AI in cybersecurity to outsmart ever-evolving threats. Discover how it can be your ultimate ally.
    
   
      Identity Threat Detection and Response (ITDR) – Rips in Your Identity Fabric
      Tactics, Techniques, Protocols... Learn how ITDR identifies and mitigates threats with the help of SSPM
    
   
      Way Too Vulnerable: Uncovering the State of the Identity Attack Surface
      Achieved MFA? PAM? Service account protection? Find out how well-equipped your organization truly is against identity threats.
    
   
      Clean Data, Better Detections: Using Your Business Data for AI/ML Detections
      Your business data is the secret weapon! Learn how to use it to supercharge your AI/ML threat detection capabilities.
    
   
      Catching the Catphish: Graham Cluley on the Impact of Credential Phishing
      Are your employees putting your business at risk? Learn how to outsmart cybercriminals with Graham Cluley and Mike Britton.
    
   
      PAM Security – Expert Solutions to Secure Your Sensitive Accounts
      This expert-led webinar will equip you with the knowledge and strategies you need to transform your privileged access security strategy.
    
   
      Rethinking Insider Threats - a Tale of SaaS Security Posture Management
      Learn how to proactively prevent security breaches and ensure compliance with SaaS Security Posture Management.
    
   
      CSPM Meets API Security: Understand Your True Attack Surface
      Discover the untapped vulnerabilities in your API ecosystem and take proactive steps towards ironclad security.
    
   
      Extend Zero Trust with Deception-based Active Defense
      Join us for an insightful session on using deception to outsmart adversaries in your Zero Trust environment!
    
   
      Real-Time MFA and Service Account Protection Can Defeat Ransomware Attacks
      Learn how real-time MFA and service account protection can defeat ransomware attacks in our upcoming webinar. Don't miss out!
    
   
      Master the Art of Dark Web Intelligence Gathering
      Learn the art of extracting threat intelligence from the dark web – Join this expert-led webinar!
    
   
      3 Research-Backed Ways to Secure Your Identity Perimeter
      Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions!
    
   
      Master the Six Phases of Incident Response
      React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!
    
   
      Inside the High Risk of 3rd-Party SaaS Apps
      Learn more about the risks of third-party app access and take a deep dive into the SaaS-to-SaaS Access report.
    
   
      A MythBusting Special — 9 Myths about File-based Threats
      Say goodbye to the myths and hello to the facts - Register for our webinar on file-based threats now!
    
   
      How to Tackle the Top SaaS Security Challenges of 2023
      Learn about the core of SaaS security and biggest challenges SaaS users will encounter in 2023.
    
   
      Understanding Cyber Insurance Identity Security Requirements for 2023
      A must-attend webinar on the crucial topic of identity protection in the age of cyber insurance.