The Ultimate Directory on Cybersecurity Webinars

Search our directory for upcoming webinars on Cybersecurity

Upcoming Webinars

Technology > Cybersecurity webinar by Oracle for Oracle Go – Experience Oracle Trust Center: A Fresh Look At Our Security Practices
Oracle Go – Experience Oracle Trust Center: A Fresh Look At Our Security Practices
Oracle’s refreshed Trust Center (oracle.com/trust) is your ‘go-to’ source for understanding secure development and operational security practices. Learn how to download cloud security assessments, compare cloud services in the compliance dashboard and monitor availability of your cloud services.Presented by:• Nancy Kramer - Senior Director, Information Security and Regulatory Compliance, Oracle• Dr. Betina Tagle - Consulting Security Analyst, Oracle Webcast:Registration is required. This is a live webinar with an opportunity to get your questions answered.You MUST register using the email used for your CCC account login. Each registration link is unique to the email ID approved for the event and is valid on a single device only - DO NOT share the unique Zoom link received after registration is complete.The replay and slide deck will be available from this event posting within 24 hours following the live session.
by Oracle
6/24/2025 6:00 PM
Technology > Cybersecurity webinar by SpecterOps - Know Your Adversary for Tater Tokens: Intro to Windows Access Tokens and Their Role in PrivEsc
Tater Tokens: Intro to Windows Access Tokens and Their Role in PrivEsc
Welcome to the farm! Today's task: harvesting potatoes. The potato exploits have been a cornerstone of local priv esc on Windows system for years, but how and why do the inner starchy workings of the potatoes function? Plow into understanding Windows access tokens and their use in the Windows environment, followed by a technical walkthrough of how Rotten, Juicy, and Rogue potatoes work, and a wrap up that covers some defensive suggestions.Speakers:Max Andreacchi - Associate Consultant at SpecterOpsLuke Luckett - Product Marketing lead at SpecterOps
6/26/2025 6:00 PM

Previous Webinars

Technology > Cybersecurity webinar by Menlo Security for [Live Webinar]  Safeguarding BYOD and Unmanaged Devices: Secure Access Strategies
[Live Webinar] Safeguarding BYOD and Unmanaged Devices: Secure Access Strategies
Enhance user productivity AND enterprise securityOver 80% of organizations have a Bring Your Own Device (BYOD) policy in place. And it’s no surprise because it can significantly reduce costs, lead to increased productivity, and boost satisfaction. But there are challenges, as well.BYOD, or any unmanaged endpoint, cannot be expected to have the same security stance as those managed by the enterprise, and are sometimes shared with others. These endpoints can be an entry point for attackers. The organization must ensure that appropriate access is enabled while data and applications remain protected.Menlo Security has helped organizations to make unmanaged devices as secure as managed ones, without the overhead of typical approaches. In this webinar, we’ll walk through: • The challenges of balancing security with user experience• How to understand zero trust architecture in the context of BYOD• The 5 key capabilities for BYOD security• Real world application of Menlo Security in a BYOD environmentSpeakers: Negin Aminian, Cybersecurity Strategist, Menlo Security; BP Lau, AVP, Sales Engineering, Menlo Security.
6/5/2025 3:00 AM
Technology > Cybersecurity webinar by Claroty for Medical Device Cybersecurity: Lessons Learned and Best Practices for Canadian Healthcare
Medical Device Cybersecurity: Lessons Learned and Best Practices for Canadian Healthcare
Medical device cybersecurity is a critical challenge for healthcare organizations in Canada, where interconnected systems and evolving cyber threats demand a strategic and practical approach. Whether a health organization is in the early stages of developing a cybersecurity program or looking to enhance an existing one, understanding best practices and real-world implementation challenges is key to success.Join Ty Greenhalgh and Emil Sosnowski from Interior Health (Kelowna, British Columbia) as they explore the practical realities of securing medical devices within the Canadian Health System Ecosystem. This webinar will cover essential topics, including governance of intra-departmental workflows, efficient vulnerability management, and how improved asset management can drive ROI. Attendees will gain insights into optimizing cybersecurity programs, navigating operational constraints, and leveraging industry best practices to strengthen resilience against cyber threats.Don't miss this opportunity to hear from industry experts on how to move beyond theoretical frameworks and apply cybersecurity solutions that work in real healthcare environments.Speakers: Ty Greenhalgh, Industry Principle - Healthcare, Claroty; Emil Sosnowski, Clinical Engineer, Interior Health.
by Claroty
5/20/2025 3:00 PM
Technology > Cybersecurity webinar by EC-Council for Defending the Digital Perimeter with Effective Blue Teaming Tactics
Defending the Digital Perimeter with Effective Blue Teaming Tactics
bstract- In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. Blue teaming and cyber defense incorporate how organizations identify, detect, prevent, and mitigate cyber threats and vulnerabilities. While traditional approaches to security operations have been reactive to threats, the ever-changing nature of the threat landscape requires that organizations shift to more proactive methods. This webinar series is dedicated to understanding proactive cyber defense strategies and how to build an effective blue team program. In today’s session, we will understand the fundamental elements of a cyber defense program, learn the difference between detective and preventative controls and how they function together, learn how Governance, Risk, and Compliance (GRC) can guide program objectives, and learn how to gain critical buy-in and support from senior leadership when establishing a security program.Speaker: Andrew "AJ"​ Jarrett, Director, Cyber Monitoring & Incident Response, Depository Trust & Clearing Corporation (DTCC)  
5/16/2025 1:30 PM
Technology > Cybersecurity webinar by Barracuda Networks for Cyber insurance: strengthening backup strategies based on 2024 claims data
Cyber insurance: strengthening backup strategies based on 2024 claims data
A lot can be understood about cyber-risk and its probabilities from an often-overlooked source: cyber insurance data. This data offers visibility into the frequency and types of cyberattacks that organisations face, as well as the financial implications of those incidents.Analysing 2024’s claims data highlights the importance of implementing an effective backup solution, not only to mitigate threats such as ransomware, human error, and natural disasters - but also to meet the expectations and requirements set forth by insurers.Join our webinar on Wednesday 14th May at 10am BST to discover:• An analysis of 2024 cyber insurance claims data.• Overview of the most prominent threats facing organisations today.• How insurers are changing their requirements in response to today’s threat landscape.• Best practices to meet insurer requirements.• How Barracuda can help.Equip your organisation with the knowledge needed to navigate the complexities of cyber insurance and backup requirements effectively.We look forward to welcoming you to the webinar.Speaker: Charlie Smith, Consulting Solution Architect, Data & Email Protection at Barracuda
5/14/2025 9:00 AM
Technology > Cybersecurity webinar by Veeam for Data Backup Recovery Metrics That Matter
Data Backup Recovery Metrics That Matter
Ransomware attacks have made data backup and recovery a critical business continuity concern. Boards of directors are now recognizing that security extends beyond preventing data breaches to include swift and effective data recovery.This webinar will explore the key questions and metrics IT leaders need to address to build a robust data resilience strategy that ensures compliance with global regulations and minimizes business disruptions.• Building a Resilient Data Recovery Strategy: Key Metrics for IT and the Board• Data Recovery Beyond the Technical: What IT Managers Need to Report to the Board• Why Cyber Recovery Differs from Other Types of Data Recovery• Critical Data Recovery Questions and Metrics for the Board• Moving Beyond Metrics to Data ResilienceSpeakers: Heather Peyton, Director, Product Marketing, Enterprise; Brad Linch, Director of Enterprise Strategy.
by Veeam
5/13/2025 5:00 PM
Technology > Cybersecurity webinar by Cyber Instincts AB for Cyber Challenges of Tomorrow: Future-proof your entire organization
Cyber Challenges of Tomorrow: Future-proof your entire organization
Date: May 9Time: 10:00 AM – 11:00 AMWhere: Zoom – a link will be sent via email.​Cybersecurity is a constant challenge – the threat landscape evolves rapidly, and new risks are emerging all the time. Protecting your organization requires more than just technology; it demands a comprehensive strategy involving the right knowledge, planning, and proactive measures.​What can you expect?In our webinar, we’ll go through the biggest cybersecurity challenges organizations face today and in the future, together with our partner KnowBe4. We’ll share practical tips and strategies for building a robust cybersecurity strategy and how to effectively manage risks in your organization.​Register below – don’t wait, spots are limited!
5/9/2025 8:00 AM
Technology > Cybersecurity webinar by RSM Australia for Building Cyber Resilient Businesses
Building Cyber Resilient Businesses
Practical strategies for continuity & recovery in AustraliaIs your business ready for a cyberattack?Cyber threats are rising fast in Australia - fuelled by AI, ransomware, supply chain breaches, and nation-state actors. The question isn't if your business will be targeted, but when - and how prepared you’ll be to bounce back.Join our free webinar to learn how to build cyber resilience, recover from incidents, and keep your business running.WHAT YOU’LL LEARN:The cyber threat landscape in AustraliaGet up to speed on today’s most pressing risks: ransomware, Business Email Compromise (BEC), supply chain vulnerabilities, and attacks linked to foreign actors.Australian regulations & frameworksLearn how to align with Australia’s national standards and key cyber risk frameworks such as ISM, VPDSS, NSW RFFR Cyber Security Accreditation, ISO 27001, and APRA CPS 230 (for regulated entities).Recovery planning that worksGet practical tips on how to recover when the worst has happened. Learn how to build and test Business Continuity Plans (BCP), Disaster Recovery Plans (DRP), and Cyber Security Incident Response Plans (CSIRP) that actually work when it counts.Using cloud and AI in recoveryExplore how cloud technology and AI tools can speed up recovery and reduce the impact of cyber incidents.Incident response & crisis managementWant to respond confidently under pressure? We will help you master best practices for managing cyber incidents, minimise downtime and protect your company’s reputation.Lessons from recent eventsWe will break down real-world examples of cyber incidents and data breach cases in Australia, to discuss what went wrong, the impact on business operations and how to apply the lessons learned to your own business.Prepare your business before a breach – not after.We hope you can join us!Facilitator: Kaustubh Vazalwar, Director, RSM Australia.
5/8/2025 3:00 AM
Technology > Cybersecurity webinar by PKWARE for Best Practices for Quantum Readiness – It’s Time to Prepare
Best Practices for Quantum Readiness – It’s Time to Prepare
Quantum computing isn’t a threat—until it is and it’s happening rapidly. The race toward quantum supremacy means today’s encryption could be obsolete tomorrow, leaving organizations exposed to unprecedented risks. In this webinar, cybersecurity experts will break down what quantum readiness really means, why "store now, decrypt later" attacks are already a concern, and how to implement best practices to future-proof your data security.Join us to explore practical steps for adopting quantum-resistant encryption, mitigating emerging threats, and ensuring your organization stays ahead of the inevitable shift. Don’t wait until it’s a thing—prepare now.Added bonus…get a sneak peek into PKWARE’s Quantum safe encryption roadmap and what that means for you today.Speakers: Jason Dobbs, CTO; Chris Miller, Sr. Solutions Architect.
by PKWARE
4/30/2025 4:00 PM

Why Cybersecurity webinars?

Cybersecurity webinars are transforming the landscape of digital safety education, providing an accessible platform for professionals and enthusiasts alike to deepen their understanding of protecting digital assets. Have you explored this dynamic learning avenue yet? By integrating cybersecurity webinars into your professional growth plan, you access a vast repository of knowledge covering everything from basic cyber hygiene practices to advanced threat intelligence strategies, all without stepping out of your home or office.

These webinars are more than just educational tools; they offer a unique opportunity to connect with leading experts and fellow participants globally, fostering a community of shared learning and networking. Whether you're aiming to enhance your cybersecurity skills, keep up with the rapidly changing technology landscape, or expand your professional network, cybersecurity webinars stand out as an essential resource.

Explore our other webinars and start your journey to success. For instance, check educational webinars today.

 

page 1 of 11

;