The Hacker News | Cybersecurity Webinars
Our webinars cover a wide range of cybersecurity topics, including cloud security, network security, incident response, compliance, and more. Each webinar is led by a cybersecurity expert with years of experience in the field, ensuring that you receive top-quality, up-to-date information and insights.
Check out our upcoming and recent cybersecurity webinars and take the first step towards protecting your business from cyber threats.
Upcoming Webinars — Reserve Your Spot

State of Web Application Security: Top 5 Trends and Insights
Industry experts from EY Technology Solutions and OPSWAT dive deep into current security challenges and solutions.

Locking Down Financial and Accounting Data — Best Data Security Strategies
Financial data is a goldmine for cyber attackers. Learn the best practices to safeguard your accounting data.

Kickstarting Your SaaS Security Strategy
From Start to Secure: A detailed guide that covers programs, people, processes and tech.

Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics
From Zenbleed to Kubernetes attacks - 2023 is proving a challenging year for cloud security. Get equipped with with strategies to combat these threats

Beyond Identity and Access Management: Stop Insider Threats with Application Detection and Response
Discover how application detection, response, and automated behavior modeling can revolutionize your defense against insider threats.
Recent Webinars — Watch Now

How vCISOs and MSSPs Can Protect their Clients from AI and LLM Related Risks
Join us to discover the tools and policies that can safeguard your business from the evolving threats of AI

AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks
Leveraging the power of AI in cybersecurity to outsmart ever-evolving threats. Discover how it can be your ultimate ally.

Identity Threat Detection and Response (ITDR) – Rips in Your Identity Fabric
Tactics, Techniques, Protocols... Learn how ITDR identifies and mitigates threats with the help of SSPM

Way Too Vulnerable: Uncovering the State of the Identity Attack Surface
Achieved MFA? PAM? Service account protection? Find out how well-equipped your organization truly is against identity threats.

Clean Data, Better Detections: Using Your Business Data for AI/ML Detections
Your business data is the secret weapon! Learn how to use it to supercharge your AI/ML threat detection capabilities.

Catching the Catphish: Graham Cluley on the Impact of Credential Phishing
Are your employees putting your business at risk? Learn how to outsmart cybercriminals with Graham Cluley and Mike Britton.

PAM Security – Expert Solutions to Secure Your Sensitive Accounts
This expert-led webinar will equip you with the knowledge and strategies you need to transform your privileged access security strategy.

Rethinking Insider Threats - a Tale of SaaS Security Posture Management
Learn how to proactively prevent security breaches and ensure compliance with SaaS Security Posture Management.

CSPM Meets API Security: Understand Your True Attack Surface
Discover the untapped vulnerabilities in your API ecosystem and take proactive steps towards ironclad security.

Extend Zero Trust with Deception-based Active Defense
Join us for an insightful session on using deception to outsmart adversaries in your Zero Trust environment!

Real-Time MFA and Service Account Protection Can Defeat Ransomware Attacks
Learn how real-time MFA and service account protection can defeat ransomware attacks in our upcoming webinar. Don't miss out!

Master the Art of Dark Web Intelligence Gathering
Learn the art of extracting threat intelligence from the dark web – Join this expert-led webinar!

3 Research-Backed Ways to Secure Your Identity Perimeter
Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions!

Master the Six Phases of Incident Response
React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Inside the High Risk of 3rd-Party SaaS Apps
Learn more about the risks of third-party app access and take a deep dive into the SaaS-to-SaaS Access report.

A MythBusting Special — 9 Myths about File-based Threats
Say goodbye to the myths and hello to the facts - Register for our webinar on file-based threats now!

How to Tackle the Top SaaS Security Challenges of 2023
Learn about the core of SaaS security and biggest challenges SaaS users will encounter in 2023.

Understanding Cyber Insurance Identity Security Requirements for 2023
A must-attend webinar on the crucial topic of identity protection in the age of cyber insurance.