Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Observability and Security for the AI Era

Datadog has always been driven by a broader vision of helping teams understand and operate complex systems. In this session, you’ll hear from Yanbing Li, Chief Product Officer, and Shri Subramanian, Group Product Manager, as they share the latest updates across the Datadog product suite and discuss how that vision continues to shape the platform’s evolution and support the next generation of AI-driven applications.

Detecting Adversary Intent: Analyzing Behavioral Tells in Admin Logs with Allison Wikoff

Adversaries are already logging into your network using your own admin credentials. In this episode, Caleb Tolin sits down with Allison Wikoff to move past the identity clichés and analyze the specific behavioral signals that separate routine IT maintenance from state-sponsored sabotage. They dissect why resilience is not a flash of genius during a crisis, but a mindset that organizations can adopt to stay ahead of dynamic threat actors.

Charlotte Agentic SOAR: The next evolution of intelligent and adaptive security automation

At Fal.Con 2025, CrowdStrike introduced Agentic SOAR, uniting automation and intelligent agents to deliver the next evolution of fast, adaptive security operations. This innovation sets a new standard for enterprise protection, enabling SOCs to stay ahead of threats and operate with greater confidence and agility. Subscribe and stay updated!

Why Threat Hunting Isn't Optional

27 seconds That is the fastest breakout time recorded last year. In less time than it takes to read this sentence, an adversary can gain access and begin moving through your network. Join us as we explore why proactive threat hunting is no longer optional in a world where 82% of attacks are malware-free. From AI-amplified reconnaissance to adversaries "living off the land" with your own IT tools, we break down how to stop intrusions before they become breaches.

What's Actually Changing in HIPAA (and What IT Teams Need to Fix Now)

Hosted by CalCom — helping healthcare and financial organizations secure and harden server environments for compliance frameworks like HIPAA, CIS, and NIST. Trusted by organizations managing regulated environments where configuration security and audit readiness matter. A HIPAA Auditor won't tell your servers to turn their head an cough, but your configurations may still not be healthy. Some security practices that used to be “recommended” are quickly becoming expected controls. This session breaks down what’s changing, what auditors will look for, and what you should address now.

How to Configure Jira OAuth SSO Integration with Google Workspace (Apps) | Step-by-Step Guide

Streamline user authentication in Jira by enabling secure Single Sign-On (SSO) with Google Workspace (Apps) as your Identity Provider (IdP). Using the miniOrange OAuth/OIDC SSO app, you can provide seamless one-click login while keeping user identity centralized and secure. In this video, we guide you through the complete setup process, from creating OAuth credentials in the Google Cloud Console to configuring Jira for SSO. You’ll learn how to set up authorized redirect URIs, obtain client credentials, and map user attributes for a smooth authentication experience.

Jira User Management Automation: Auto-Deactivate, Suspend & Delete Inactive Users | miniOrange

Is your Jira user directory cluttered with inactive accounts? Paying for licenses that no one is using? In this video, we walk you through the complete user lifecycle management workflow using the miniOrange Automated User Management app for Jira Cloud, from detecting inactivity to auto-removing access, suspending long-term idle users, and deleting accounts that never returns.