See latest talks
Stay current with free webinars, videos and trainings from industry experts.See all talks


Elevating API Security
APIs have become central to the daily operations of most businesses. Their rapid proliferation has exposed significant vulnerabilities that need immediate
attention. This presentation provides an in-depth assessment of the current state of API security. We discuss the growth of API-related incidents and provide a
framework for improving API security within organizations. Join this webinar to learn about • API security challenges due to the increase in API usage, and t…


Wake Up From The IngressNightmare: SUSE Security’s Zero-Day Defense
The IngressNightmare vulnerability has exposed a critical reality: Kubernetes environments are vulnerable to sophisticated attacks. In this session, we will
delve into the dangers of IngressNightmare and demonstrate how attackers can exploit this CVE to gain shell access and potentially compromise your entire
cluster in mere moments. Key takeaways from this virtual session include: - Deeper understanding of the IngressNightmare vulnerability and its implicatio…


How Technology Leaders Use Data to Improve the Efficiency of End-to-End Digital Value Delivery
Join us for a webinar on transformational leadership featuring Jenny Phillips, a transformation leader who has driven enterprise-wide DevOps transformations
most recently at T-Mobile and lululemon. Together with contributors from the 2024 DORA Report, we’ll explore how years of research and data can guide
organizations to adopt impactful strategies for solving sociotechnical challenges that maximize efficiency and enable cultural change. Jenny’s experiences c…


Convergencia Tecnológica: El Futuro de la Conectividad Satelital en el Ecosistema Digital
Latinoamericano
En esta presentación con Telesemana.com, Victor Ariza de SES explora cómo la integración de tecnologías satelitales multi-orbitales está transformando el
panorama de conectividad en Latinoamérica, habilitando nuevos casos de uso en sectores clave como minería, agroindustria y servicios gubernamentales.
Se analizan las tendencias observadas en MWC 2025 y su impacto en la región. Se cubren los siguientes temas: 1. La convergencia de tecnologías terrestre…


Cloud-native and Generative AI Implications in DevSecOps
Security remains a leading concern for businesses in this multi-cloud era. With the increasing cloud-native deployment and use of generative AI in application
software development, along with proliferation of tools, data and applications distributed across various cloud platforms, ensuring a consistent and robust
security posture and at the same time, keep pace with the fast DevOps CI/CD pipeline can be daunting. The webinar will explore some of the challenges or…

Setting Permissions for Kintone Apps
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll
have all you need to be able to determine how your end users view and interact with the data in your apps. During this session, we'll review an Overview of
Permissions, Setting Permissions for Individual Apps and Restricting access to Apps with a Private Space.


The Future of Carbon in the Trump Era
In just the first few weeks of the Trump administration, we have already seen a number of influential developments with the potential to shape the future of
carbon markets—from the ongoing peace talks with Russia and a shifting global energy landscape to the US exit from the Paris Agreement and the easing of
environmental regulations. At the same time, some of the world’s largest carbon markets, such as California’s cap-and-trade program, are closing in on a p…


How IoT applications create ROI through cellular connectivity
In the rapidly evolving landscape of IoT, reliable and scalable connectivity is the backbone of successful deployments. Cellular connectivity has emerged as a
key enabler for IoT applications, delivering unmatched advantages such as broad coverage, robust security, and real-time data transmission. With more
than 1,000 fast-charging stations across the U.S., EVgo is a premier example of how investing in cellular IoT routers can drive substantial ROI, reduce opera…
Attend BrightTALK Summits
Virtual events showcasing talks from experts in your industry.See all summits
IA et CX : Comment l’IA va améliorer l’expérience client
L'intelligence artificielle (IA) transforme l’expérience client (CX) en permettant des interactions plus personnalisées, efficaces et réactives. Des chatbots qui
répondent instantanément aux questions jusqu’aux analyses prédictives qui anticipent les besoins des clients, les entreprises exploitent l’IA pour offrir des e…
Driving Efficiency with ITSM
As organizations navigate the complexities of hybrid environments, AI integration, and evolving cybersecurity landscapes, ITSM needs to adapt to meet these
challenges while consistently delivering tangible business value. Join this two-day Summit to explore innovative strategies that seamlessly blend technologi…
Activating Intent: Improving Strategy. Driving Growth.
Brought to you by Informa TechTarget, Activating Intent is a one-day virtual event dedicated to helping product, marketing, sales and revenue operations
leaders get maximum value out of intent data across their go-to-market. Featuring insights from some of B2B’s best experts and practitioners, you’ll walk a…
Strengthening Cyber Security with AI
AI is gradually integrating itself into organization’s cyber security strategy. Companies are increasingly using AI to automate capabilities like threat detection,
predictive analytics, incident response and more. AI even supports machine learning- algorithms to detect unusual behavior that may indicate a coming att…
Securing the Cloud Ecosystem
The use of the cloud is becoming omnipresent, with 85% of organizations planning to embrace the cloud-first principle, according to Gartner. However, cyber
attackers are exploiting this trend. They leverage the cloud’s wide attack surface and low visibility as gateways to breach IT infrastructure. The good news …
Transformative Strategies for Storage Management and Data Backup
With exponential data growth, ever-evolving cyber threats, and increasingly complex regulations, traditional ways of managing storage and backing up data
have become redundant. Among all this change, organizations need to adapt by optimizing and securing their data infrastructure while maintaining complia…
Watch episodic series
Don’t miss the latest episodes.See all series

DevOps Download Webinar Series
Sonatype’s ‘DevOps Download’ is a DevOps webinar series by industry leaders, covering software development topics to maximize your software's potential.
Gain insights on binary repositories, open-source supply chain, and dependency management. Watch the series to mitigate vulnerabilities, secure your ecos…

Cómo se benefician las Telcos e industrias de Latinoamérica de los avances en conectividad satelital?
Esta serie presenta las 5 charlas en vivo de Telesemana.com relacionadas con el MWC 2025, donde participaron expertos de SES exponiendo el papel de los
satelites en: 1. Mercado B2B e Industria 4.0 2. Monetización: consumidores y el sector empresarial 3. La llegada de la IA y la Automatización 4. Conectivida…

Mastering AI-Driven Endpoint Protection: Your Journey Begins here
Palo Alto Networks Cortex XDR delivers industry-leading endpoint protection, giving organizations the most effective prevention, detection, and response
capabilities to stop endpoint threats, no matter where they come from. With Cortex XDR, Security Operations teams gain the capabilities they need to outp…

Kubernetes management essentials - 2025
From edge to cloud, enterprise to public sector, get the lowdown on managing your cloud-native infrastructure. In this short series of handpicked webinars,
we're joined by expert speakers from Spectro Cloud and our partners to explore key use cases, innovative technologies, and real-world best practices.

Cybersecurity Roundtable Series: Navigating Today's Biggest Threats
Join us for an exclusive series of virtual roundtables where top security leaders come together to discuss the most pressing cybersecurity concerns of our
time. Each webinar will feature a panel of industry experts who will share their insights on the current risks they are encountering and provide actionable st…

Keyfactor Tech Days: Post-Quantum Cryptography
As quantum computing advances, organizations must prepare for the inevitable impact on traditional cryptographic systems. But what does quantum
readiness really mean, and how can you take actionable steps today? Join our Post-Quantum Cryptography Webinar Series, where industry experts, securit…
Discover trending channels
Check out top content creators on BrightTALK.See all channels
ISC2 Security Briefings
164814 subscribers|483 talks
ISC2 Security Briefings - In-depth examination of infosec topics.
ISC2 APAC Secure Webinars
84245 subscribers|491 talks
ISC2 Live Webinars for InfoSec Professionals in APAC Region
Browse content by topics
Discover the most popular and trending topics on BrightTALK.See all topics
Most popular
Trending
Learn about our business products
Create content and build demand with our all-in-one platform.Why BrightTALK