The Hacker News Webinars
Our webinars cover a wide range of cybersecurity topics, including cloud security, network security, incident response, compliance, and more. Each webinar is led by a cybersecurity expert with years of experience in the field, ensuring that you receive top-quality, up-to-date information and insights.
Check out our upcoming and recent cybersecurity webinars and take the first step towards protecting your business from cyber threats.
Upcoming Webinars — Reserve Your Spot
CISO Perspective: Why Great Companies with Great Solutions Still Get Breached
Are you missing the vulnerabilities right under your nose? Find out what they are
Preparing for Ransomware and Encrypted Attacks in 2025
Ransomware is evolving, but your defenses can too—learn how to stay ahead
DigiCertOne Demo: Managing Digital Trust in the Modern Enterprise
Streamline Trust: Learn Certificate Management, Automation, and Compliance Strategies
Recent Webinars — Watch Now
Preventing Privilege Escalation: Effective PAS Practices for Today's Threat Landscape
From Blind Spots to Complete Visibility: Learn How to Secure Your Privileged Accounts
Building Tomorrow, Securely: Securing the Use of AI in App Development
Building AI-powered applications with robust security foundations in place
When Shift Happens: Are You Ready for Rapid Certificate Replacement?
Revocations can disrupt your business, but automation saves the day. Discover how.
Storytime with Huntress Managed Security Awareness Training
Tired of traditional security training? Supercharge your security culture with Huntress SAT.
How LUCR-3 (Scattered Spider) Orchestrates Identity-Based Attacks Across Multiple Environments
Uncovering the Tactics Advanced Attackers Use to Exploit SaaS and Cloud Vulnerabilities
Building a Successful Data Security Posture Management Program
Learn From the Leaders: Early DSPM Adopters Reveal Their Data Security Success Secrets
Modernization of Authentication: Passwords vs Passwordless and MFA
Discover the Future of Cybersecurity: Understand the Role of MFA and Passwords in a Passwordless Organization
Unpacking the 2024 Ransomware Landscape: Insights and Strategies from ThreatLabz
Learn How to Combat Ransomware with Zero Trust Strategies and the Latest Threat Intelligence
Solving the SIEM Problem: A Hard Reset on Legacy Solutions
From Overload to Oversight: How Modern SIEM Solutions Can Simplify Security Without Sacrificing Performance
From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Learn how identity-focused incident response can be your strongest defense against today's advanced threats
Stopping GenAI Data Leakage: Practical Techniques for Modern Enterprises
Get actionable steps and tools to harness the full potential of GenAI while protecting your sensitive data.
The AI Revolution in Vulnerability Management: 2025 Trends for Security Leaders
Transform Your Team: Learn How Security Champions Turn Developers into Security Advocates
Step by Step: How to Achieve Total Protection with an All-in-One Platform
Watch as experts simulate real-world threats to demonstrate compelling advantages.
Why All-in-One Solutions are the Future of Cybersecurity
Discover How an All-in-One Solution are the Key to Simple, Fast, and Scalable Protection for MSPs and SMBs.
Turn Developers into Allies: The Power of Security Champion Programs
Transform Your Team: Learn How Security Champions Turn Developers into Security Advocates
Keys to Your Kingdom: Why Compromised Credentials Are the #1 Attack Vector in 2024
From Data Breaches to Identity Theft: The Ripple Effects of Compromised Credentials and How to Stop Them.
Secure Your Digital Identity: Top 5 Criteria for ITDR Solutions
Discover the key capabilities of ITDR solutions in our upcoming webinar.
Data Security is Different at the Petabyte Scale
Discover the secrets to securing fast-moving, massive data sets with insights from industry titans.
Better Basics Win the Cybersecurity Threat War
Defend, Deter, and Save: Learn How to Optimize Cyber Hygiene and Compliance Costs
Navigating the SMB Threat Landscape: Key Insights from Huntress' Threat Report
Analyzing the Post-Qakbot Era and Emerging Threats with Cybersecurity Expert Jamie Levy.
The Future of Threat Hunting Is Powered by Generative AI
From Data to Defense: Step Into the Next Era of Cybersecurity with CensysGPT.
Uncovering Contemporary DDoS Attack Tactics — and How to Fight Back
Stop DDoS Attacks Before They Stop Your Business... and Make You Headline News.
Decoding Hidden Supply Chain Threats: Expert Insights for Proactive Defense
Stop playing defense—start hunting threats. Protect your software supply chain with proactive strategies.
Today's Top 4 Identity Security Threat Exposures: Are You Vulnerable?
Don't let what you can't see compromise your security. Learn how to spot and squash identity threats before they strike.
From Blind Spots to Bulletproof: Secure Your Applications with OPSWAT and F5
Industry security leaders share their insights and battle-tested strategies for robust application security.
Harmony in Innovation: Navigating the Interplay of Generative AI and Security
Join the conversation with industry leaders to explore how GenAI and LLMs are reshaping business operations.
Reality Check: Identity Security for Human and Non-Human Identities
Cyber threats are eyeing your SaaS application's identity fabric. Learn proactive defense strategies.
Building Your Privacy-Compliant Customer Data Platform (CDP) with First-Party Data
Struggling with GDPR and privacy-focused browsers? Harness first-party data to transform customer engagement.
Building an Incident Response Playbook Against Scattered Spider in Real-Time
Want to see how experts stop a ransomware attack in its tracks? Explore the analysis and response tactics in our upcoming webinar.
Critical SaaS Security Do's and Don'ts: Insights from 493 Companies
Get a sneak peek at 2024's threat landscape and lessons learned from an extensive study of 493 companies.
The Art of Privilege Escalation - How Hackers Become Admins
Understand how attackers skillfully elevate privileges from standard user accounts to top-level administrative control.
Leverage Zero Trust Security to Minimize your Attack Surface
Firewalls and VPNs are no longer enough. Explore Zero Trust Security to protect your data.
Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker
Ever wondered why social engineering works so well? Think Like a Hacker, Defend Like a Pro.
Beyond Identity and Access Management: Stop Insider Threats with Application Detection and Response
Discover how application detection, response, and automated behavior modeling can revolutionize your defense against insider threats.
Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics
From Zenbleed to Kubernetes attacks - 2023 is proving a challenging year for cloud security. Get equipped with with strategies to combat these threats
Kickstarting Your SaaS Security Strategy
From Start to Secure: A detailed guide that covers programs, people, processes and tech.
State of Web Application Security: Top 5 Trends and Insights
Industry experts from EY Technology Solutions and OPSWAT dive deep into current security challenges and solutions.
Locking Down Financial and Accounting Data — Best Data Security Strategies
Financial data is a goldmine for cyber attackers. Learn the best practices to safeguard your accounting data.
How vCISOs and MSSPs Can Protect their Clients from AI and LLM Related Risks
Join us to discover the tools and policies that can safeguard your business from the evolving threats of AI
AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks
Leveraging the power of AI in cybersecurity to outsmart ever-evolving threats. Discover how it can be your ultimate ally.
Identity Threat Detection and Response (ITDR) – Rips in Your Identity Fabric
Tactics, Techniques, Protocols... Learn how ITDR identifies and mitigates threats with the help of SSPM
Way Too Vulnerable: Uncovering the State of the Identity Attack Surface
Achieved MFA? PAM? Service account protection? Find out how well-equipped your organization truly is against identity threats.
Clean Data, Better Detections: Using Your Business Data for AI/ML Detections
Your business data is the secret weapon! Learn how to use it to supercharge your AI/ML threat detection capabilities.
Catching the Catphish: Graham Cluley on the Impact of Credential Phishing
Are your employees putting your business at risk? Learn how to outsmart cybercriminals with Graham Cluley and Mike Britton.
PAM Security – Expert Solutions to Secure Your Sensitive Accounts
This expert-led webinar will equip you with the knowledge and strategies you need to transform your privileged access security strategy.
Rethinking Insider Threats - a Tale of SaaS Security Posture Management
Learn how to proactively prevent security breaches and ensure compliance with SaaS Security Posture Management.
CSPM Meets API Security: Understand Your True Attack Surface
Discover the untapped vulnerabilities in your API ecosystem and take proactive steps towards ironclad security.
Extend Zero Trust with Deception-based Active Defense
Join us for an insightful session on using deception to outsmart adversaries in your Zero Trust environment!
Real-Time MFA and Service Account Protection Can Defeat Ransomware Attacks
Learn how real-time MFA and service account protection can defeat ransomware attacks in our upcoming webinar. Don't miss out!
Master the Art of Dark Web Intelligence Gathering
Learn the art of extracting threat intelligence from the dark web – Join this expert-led webinar!
3 Research-Backed Ways to Secure Your Identity Perimeter
Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions!
Master the Six Phases of Incident Response
React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!
Inside the High Risk of 3rd-Party SaaS Apps
Learn more about the risks of third-party app access and take a deep dive into the SaaS-to-SaaS Access report.
A MythBusting Special — 9 Myths about File-based Threats
Say goodbye to the myths and hello to the facts - Register for our webinar on file-based threats now!
How to Tackle the Top SaaS Security Challenges of 2023
Learn about the core of SaaS security and biggest challenges SaaS users will encounter in 2023.
Understanding Cyber Insurance Identity Security Requirements for 2023
A must-attend webinar on the crucial topic of identity protection in the age of cyber insurance.