Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building a Zero-Compromise Backup and Disaster Recovery Strategy for 2026 | Webinar

As cyber threats evolve and hybrid IT environments become the norm, traditional backup strategies are no longer enough. In this practical and forward-looking webinar, learn how IT teams and MSPs can build a zero-compromise Backup & Disaster Recovery (DR) strategy for 2026—designed to withstand failures, ransomware attacks, and operational complexity. What you’ll learn: How to design a failure-proof Backup & DR architecture.

Episode 7 - Practical AI for Zeek, MITRE, and Security Docs

In Episode 7 of Corelight DefeNDRs, join me, Richard Bejtlich, as I sit down with Dr. Keith Jones, Corelight's principal security researcher, to discuss the practical applications of AI in enhancing network security. We delve into how large language models (LLMs) can assist in cleaning up documentation and generating Zeek scripts, sharing insights from our extensive experience in incident response and coding. Keith reveals the challenges and successes he has encountered using LLMs to streamline processes, including their role in analyzing MITRE techniques.

Sophos Firewall: Back up and restore firewalls

A step-by-step tutorial showing you how to back up and restore your Sophos Firewall. You'll learn about the different backup modes, secure storage master key (SSMK), and best practices for firewall backups. Next, you'll learn the steps to create a firewall backup, back up your configuration to Sophos Central, and restore backups to the same or different firewall model. Ask questions and get expert answers in the Sophos Community.

AI-Powered Data Detection That Actually Works: 95% Precision, Zero Regex | Nightfall Product Launch

Tired of drowning in false positives? See how Nightfall's AI-powered detection achieves human-level accuracy and makes DLP automation possible. See three breakthrough capabilities from Nightfall: Prompt-based entity detectors - Protect custom IDs with natural language (no regex!) 23+ AI file classifiers - Detect source code, HR files, customer lists automatically Custom classifiers - Build your own in minutes with one sample file.

Agentic SecOps Workspace (ASW) office hours with LimaCharlie

Join us for a special Defender Fridays Office Hours session where the LimaCharlie team demonstrates the new Agentic SecOps Workspace (ASW) and explores what's possible when AI agents operate security infrastructure directly. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

What's Making 2026 the Toughest Year Yet for CISOs

What threats should CISOs prioritise as we move into 2026? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, we’re looking ahead to the challenges facing security leaders in 2026. I’m joined by Richard Cassidy, EMEA CISO at Rubrik, and together, we discuss the three themes dominating CISO conversations.

Semantic Guardrails for AI/ML - Protegrity AI Developer Edition

In this installment of our AI Developer Edition Set-up series, Dan Johnson, a software engineer at Protegrity, introduces semantic guardrails. Learn how to protect your LLM and chatbot workflows from malicious prompts and insecure AI responses. As AI becomes central to enterprise operations, controlling the context of conversations is a major challenge. Semantic guardrails provide a safety layer that ensures your AI stays on topic and never leaks sensitive PII.

First 72 Hours of a Cyber Incident: How GRC & Security Teams Must Respond Together

When a critical vulnerability is exploited, the first 72 hours of a cyber incident can determine the outcome. In this scenario-driven webinar, Bitsight experts break down how security, GRC, and threat intelligence teams must work together—fast—to detect risk, prioritize action, and communicate clearly under pressure.