Webinars, videos and virtual events
Stay current with the latest webinars on IT Security. To continue your learning, browse more than 100,000 webinars, videos and virtual events covering hundreds of focused tech and business topics available on TechTarget's BrightTALK.com platform.
Featured IT Security Webinars
-
Unseen and Unchecked: The Hidden Risks Lurking in Your APIs
APIs have become the new digital supply chain, connecting users, applications, and data across cloud and AI ecosystems. But this interconnectedness ...more
Play March 11 2026| 58 mins More on: APIs, API attack, Cyber Security -
Digital Sovereignty in a Multicloud World
Digital sovereignty has become a critical priority for governments and enterprises amid rising geopolitical tensions and growing dependence on ...more
Play March 03 2026| 46 mins More on: Multi Cloud, Application Management, Data Sovereignty
-
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations
There are three regulations that every software development team should be aware of: NIST Secure Software Development Framework (SSDF), the EU Cyber ...more
Remind Me March 12 2026| 59 mins More on: Open Source, software supply chain, swsc -
5 Steps to Achieving Developer-First Security
Securing software takes teamwork—a unified approach from development through testing and into production. But each team has a distinct set of ...more
Remind Me March 12 2026| 57 mins More on: DevSecOps, CICD, Application Security -
Threat Hunting with Google Threat Intelligence - Episode 6 (APAC Timezone)
In this new episode of Threat Hunting with Google Threat Intelligence, we go beyond basic detection to explore how to proactively unmask ...more
Play March 12 2026| 61 mins More on: Threat Intelligence, Threat Hunting, Threat Analysis -
NIS2-Readiness: Was Security-Verantwortliche jetzt wissen müssen
Die NIS2-Richtlinie markiert einen grundlegenden Wandel im Umgang mit Cybersicherheitsrisiken in der EU. Sie geht über reine Richtlinien und ...more
Remind Me March 12 2026| 60 mins More on: NIS2, Compliance, Regulatory compliance -
An OT CPS Platform-Based Operating Model
Considering today’s threat landscape, current OT and CPS cybersecurity struggle to keep pace. Effective OT CPS security must be operational: fewer ...more
Remind Me March 12 2026| 20 mins More on: OT Cybersecurity, Operational Technology, Industrial Control Systems -
From Detection to Remediation: Rethinking Vulnerability Management for Modern Enterprises
Traditional vulnerability management programs are built around detection — scanning, identifying, and reporting vulnerabilities. Yet for most ...more
Remind Me March 12 2026| 60 mins More on: Vulnerability Management, Patch Management, -
When I grow up, I want to be a Threat Hunter
Security analysts understand the importance of working with an evidence-based toolset. The ability to investigate alerts, uncover relevant context, ...more
Play March 12 2026| 55 mins More on: Cybersecurity, Network Detection, NDR -
Préparation à NIS2 : ce que les responsables de la sécurité doivent savoir
La directive NIS2 change radicalement la façon dont les entreprises européennes doivent aborder la cybersécurité. On ne parle plus de simples ...more
Remind Me March 12 2026| 60 mins More on: Identity Management, Data access, Access Management -
Does your Pen Testing reflect how modern systems are actually monitored and defended?
Today’s cybersecurity dilemma: analyzing over 100,000 security incidents a day from 150+ threat actors, then executing an ongoing pen testing program...more
Remind Me March 12 2026| 60 mins More on: Penetration Testing, Cyber Security, Threat Intelligence










