BrightTALK Homepage Banner

Discover and learn with the world's brightest B2B professionals

Access expertise from thousands of leading companies and millions of registered users

See latest talks

Stay current with free webinars, videos and trainings from industry experts.See all talks

The CTEM Revolution: Redefining Cybersecurity Beyond Vulnerability Management
Channel Logo

The CTEM Revolution: Redefining Cybersecurity Beyond Vulnerability Management

Explore the shift from traditional vulnerability management to the innovative CTEM approach in this exclusive BlackHat presentation. Join Jason Fruge and
Harold Rivas as they delve into the people, processes, and technology behind a resilient cybersecurity posture. Learn how to build a successful CTEM
program and discover key takeaways that can transform your security strategy. Watch now to see how XM Cyber is leading the cybersecurity revolution.

How To Effectively Manage and Automate the Evolving Landscape of Patch Management
Channel Logo

How To Effectively Manage and Automate the Evolving Landscape of Patch Management

In today’s digitally interconnected world, patch management is no longer a routine IT task—it’s a critical business imperative. The complexity of modern IT
environments, including hybrid clouds, diverse operating systems, and a multitude of third-party apps, has made patch management increasingly
challenging. In this webinar, Automox and GigaOM will share insights from the “GigaOM Radar Report for Patch Management v3.0” and discuss how organiz…

Is NGFW Dead? The Rise of FWaaS and Why
Channel Logo

Is NGFW Dead? The Rise of FWaaS and Why

Webinar Overview Legacy next-gen firewall (NGFW) appliances were built for a different era—one with static perimeters and on-prem networks. But today’s
enterprises operate in a perimeterless world, where cloud adoption is accelerating, hybrid work is the norm, and IT complexity keeps growing. These
physical NGFWs create constraints, driving up operational overhead while limiting flexibility and scalability. To keep pace with evolving business demands an…

Securing APIs: How Radware Protects Against the OWASP API Top 10
Channel Logo

Securing APIs: How Radware Protects Against the OWASP API Top 10

APIs are the backbone of modern applications, but they also present significant security risks. In this webinar, we’ll explore how Radware’s API protection
safeguards against the most critical API threats, as defined by the OWASP API Top 10. You’ll gain insights into Radware’s advanced security mechanisms,
including AI-based Business Logic Attack Protection, API Gateway integration, and automatic runtime mitigation techniques. Join us to learn how to enhance…

Ep. 1 - Understanding Cyber Resilience: Why It’s Crucial for Your Business Now
Channel Logo

Ep. 1 - Understanding Cyber Resilience: Why It’s Crucial for Your Business Now

With ransomware attacks crippling businesses and data breaches exposing sensitive information on the rise, the question is no longer if an attack will happen,
but when— and how prepared you are. That’s why maintaining business continuity and security has never been more critical. This webinar will break down
cyber resilience—What it means and why it’s crucial for businesses of all sizes.In short, cyber resilience is about staying operational and recovering quickly f…

What Is Software Composition Analysis?
Channel Logo

What Is Software Composition Analysis?

Modern applications are no longer created from scratch; instead they are constructed of various components, including open source code that is often
developed by individuals outside the organization. Our research reveals that open source code makes up 76% of the average application. Although
leveraging open source software provides access to external expertise, it also entails responsibilities for organizations. Ensuring the security, compliance, a…

Best Practices for Using AI in Software Development
Channel Logo

Best Practices for Using AI in Software Development

There is no shortage of buzz around generative artificial intelligence (GAI). GAI can be used in software development to generate and augment code which
saves times and reduces development cycles. But using AI in software development comes with its own set of risks. Join this webinar to get an introduction to
GAI and how you can minimize risk when using it in your organization. We’ll cover: • What GAI is and how machines learn • Legal issues with AI including co…

Immersion Day: Prisma Cloud
Channel Logo

Immersion Day: Prisma Cloud

Join industry experts from Palo Alto Networks (PANW) and Amazon Web Services (AWS) for a 2 hour immersive hands-on lab experience focused on modern
cloud native security principles and securing AWS cloud environments with Prisma Cloud. In this workshop you will learn how the Prisma Cloud platform
makes it easier for you to reduce risk with a code-to-cloud security strategy that continuously addresses vulnerabilities across the full application lifecycle. T…

Attend BrightTALK Summits

Virtual events showcasing talks from experts in your industry.See all summits

Driving Efficiency with ITSM

Driving Efficiency with ITSM

As organizations navigate the complexities of hybrid environments, AI integration, and evolving cybersecurity landscapes, ITSM needs to adapt to meet these
challenges while consistently delivering tangible business value. Join this two-day Summit to explore innovative strategies that seamlessly blend technologi…

|6 sessions
Strengthening Cyber Security with AI

Strengthening Cyber Security with AI

AI is gradually integrating itself into organization’s cyber security strategy. Companies are increasingly using AI to automate capabilities like threat detection,
predictive analytics, incident response and more. AI even supports machine learning- algorithms to detect unusual behavior that may indicate a coming att…

|10 sessions
Transformative Strategies for Storage Management and Data Backup

Transformative Strategies for Storage Management and Data Backup

With exponential data growth, ever-evolving cyber threats, and increasingly complex regulations, traditional ways of managing storage and backing up data
have become redundant. Among all this change, organizations need to adapt by optimizing and securing their data infrastructure while maintaining complia…

|8 sessions
Activating Intent: Improving Strategy. Driving Growth.

Activating Intent: Improving Strategy. Driving Growth.

Brought to you by Informa TechTarget, Activating Intent is a one-day virtual event dedicated to helping product, marketing, sales and revenue operations
leaders get maximum value out of intent data across their go-to-market. Featuring insights from some of B2B’s best experts and practitioners, you’ll walk a…

|8 sessions
Securing the Cloud Ecosystem

Securing the Cloud Ecosystem

The use of the cloud is becoming omnipresent, with 85% of organizations planning to embrace the cloud-first principle, according to Gartner. However, cyber
attackers are exploiting this trend. They leverage the cloud’s wide attack surface and low visibility as gateways to breach IT infrastructure. The good news …

|8 sessions
Emerging IT Network Trends

Emerging IT Network Trends

As organizations grapple with hybrid work models, edge computing, and the explosion of IoT devices, IT leaders must reimagine their network strategies to
drive innovation and deliver seamless experiences. Discover how emerging technologies like 5G, SD-WAN, and SASE can help create agile, resilient, and int…

|6 sessions

Browse content by topics

Discover the most popular and trending topics on BrightTALK.See all topics

Most popular

Current positionTopic TitleTrending position

Most popular

Current positionTopic TitleTrending position