BrightTALK Homepage Banner

Discover and learn with the world's brightest B2B professionals

Access expertise from thousands of leading companies and millions of registered users

See latest talks

Stay current with free webinars, videos and trainings from industry experts.See all talks

The CTEM Revolution: Redefining Cybersecurity Beyond Vulnerability Management
Channel Logo

The CTEM Revolution: Redefining Cybersecurity Beyond Vulnerability Management

Explore the shift from traditional vulnerability management to the innovative CTEM approach in this exclusive BlackHat presentation. Join Jason Fruge and
Harold Rivas as they delve into the people, processes, and technology behind a resilient cybersecurity posture. Learn how to build a successful CTEM
program and discover key takeaways that can transform your security strategy. Watch now to see how XM Cyber is leading the cybersecurity revolution.

Is NGFW Dead? The Rise of FWaaS and Why
Channel Logo

Is NGFW Dead? The Rise of FWaaS and Why

Webinar Overview Legacy next-gen firewall (NGFW) appliances were built for a different era—one with static perimeters and on-prem networks. But today’s
enterprises operate in a perimeterless world, where cloud adoption is accelerating, hybrid work is the norm, and IT complexity keeps growing. These
physical NGFWs create constraints, driving up operational overhead while limiting flexibility and scalability. To keep pace with evolving business demands an…

How To Effectively Manage and Automate the Evolving Landscape of Patch Management
Channel Logo

How To Effectively Manage and Automate the Evolving Landscape of Patch Management

In today’s digitally interconnected world, patch management is no longer a routine IT task—it’s a critical business imperative. The complexity of modern IT
environments, including hybrid clouds, diverse operating systems, and a multitude of third-party apps, has made patch management increasingly
challenging. In this webinar, Automox and GigaOM will share insights from the “GigaOM Radar Report for Patch Management v3.0” and discuss how organiz…

Securing APIs: How Radware Protects Against the OWASP API Top 10
Channel Logo

Securing APIs: How Radware Protects Against the OWASP API Top 10

APIs are the backbone of modern applications, but they also present significant security risks. In this webinar, we’ll explore how Radware’s API protection
safeguards against the most critical API threats, as defined by the OWASP API Top 10. You’ll gain insights into Radware’s advanced security mechanisms,
including AI-based Business Logic Attack Protection, API Gateway integration, and automatic runtime mitigation techniques. Join us to learn how to enhance…

Ep. 1 - Understanding Cyber Resilience: Why It’s Crucial for Your Business Now
Channel Logo

Ep. 1 - Understanding Cyber Resilience: Why It’s Crucial for Your Business Now

With ransomware attacks crippling businesses and data breaches exposing sensitive information on the rise, the question is no longer if an attack will happen,
but when— and how prepared you are. That’s why maintaining business continuity and security has never been more critical. This webinar will break down
cyber resilience—What it means and why it’s crucial for businesses of all sizes.In short, cyber resilience is about staying operational and recovering quickly f…

Immersion Day: Prisma Cloud
Channel Logo

Immersion Day: Prisma Cloud

Join industry experts from Palo Alto Networks (PANW) and Amazon Web Services (AWS) for a 2 hour immersive hands-on lab experience focused on modern
cloud native security principles and securing AWS cloud environments with Prisma Cloud. In this workshop you will learn how the Prisma Cloud platform
makes it easier for you to reduce risk with a code-to-cloud security strategy that continuously addresses vulnerabilities across the full application lifecycle. T…

Enhancing Operational Resilience in Financial Services
Channel Logo

Enhancing Operational Resilience in Financial Services

Financial services organisations worldwide are being pushed to enhance Operational Resilience due to evolving regulations. The EU’s DORA and the UK’s
regulatory frameworks have set the foundation and similar regulations are now being implemented globally. To remain compliant and resilient, FSI
organisations must: ● Identify and monitor critical business services from both an operational and cyber resilience perspective. ● Provide data-driven repo…

SD-WAN or Secure SD-WAN- Which is the Right Option for Your Organization?
Channel Logo

SD-WAN or Secure SD-WAN- Which is the Right Option for Your Organization?

There is a philosophical difference of opinion in the market regarding where security should be located - on-premises or in the cloud? Regardless of your
organization’s point of view, the choice of SD-WAN should be able to accommodate both options. This session from Fortinet’s Convergence 2024 event
focuses on the evolution of functionality of Fortinet’s SD-WAN and how it supports both environments equally.

Attend BrightTALK Summits

Virtual events showcasing talks from experts in your industry.See all summits

Driving Efficiency with ITSM

Driving Efficiency with ITSM

As organizations navigate the complexities of hybrid environments, AI integration, and evolving cybersecurity landscapes, ITSM needs to adapt to meet these
challenges while consistently delivering tangible business value. Join this two-day Summit to explore innovative strategies that seamlessly blend technologi…

|6 sessions
Strengthening Cyber Security with AI

Strengthening Cyber Security with AI

AI is gradually integrating itself into organization’s cyber security strategy. Companies are increasingly using AI to automate capabilities like threat detection,
predictive analytics, incident response and more. AI even supports machine learning- algorithms to detect unusual behavior that may indicate a coming att…

|10 sessions
Transformative Strategies for Storage Management and Data Backup

Transformative Strategies for Storage Management and Data Backup

With exponential data growth, ever-evolving cyber threats, and increasingly complex regulations, traditional ways of managing storage and backing up data
have become redundant. Among all this change, organizations need to adapt by optimizing and securing their data infrastructure while maintaining complia…

|8 sessions
Activating Intent: Improving Strategy. Driving Growth.

Activating Intent: Improving Strategy. Driving Growth.

Brought to you by Informa TechTarget, Activating Intent is a one-day virtual event dedicated to helping product, marketing, sales and revenue operations
leaders get maximum value out of intent data across their go-to-market. Featuring insights from some of B2B’s best experts and practitioners, you’ll walk a…

|8 sessions
Securing the Cloud Ecosystem

Securing the Cloud Ecosystem

The use of the cloud is becoming omnipresent, with 85% of organizations planning to embrace the cloud-first principle, according to Gartner. However, cyber
attackers are exploiting this trend. They leverage the cloud’s wide attack surface and low visibility as gateways to breach IT infrastructure. The good news …

|8 sessions
Emerging IT Network Trends

Emerging IT Network Trends

As organizations grapple with hybrid work models, edge computing, and the explosion of IoT devices, IT leaders must reimagine their network strategies to
drive innovation and deliver seamless experiences. Discover how emerging technologies like 5G, SD-WAN, and SASE can help create agile, resilient, and int…

|6 sessions

Watch episodic series

Don’t miss the latest episodes.See all series

How to Integrate GenAI into Coder CDEs (Without Losing Control)
6 episodes
Series Company Logo

How to Integrate GenAI into Coder CDEs (Without Losing Control)

This multi-part series dives into how organizations can safely and efficiently bring generative AI into their Coder Cloud Development Environments (CDEs).
We’ll explore real-world strategies for deploying tools like GitHub Copilot and Gemini, maintaining compliance, and managing AI/ML infrastructure at scale. …

Watch series

The Road to CSA Summit
8 episodes
Series Company Logo

The Road to CSA Summit

The Road to CSA Summit is a free webinar series that delivers the latest tools and guidance for the most critical topics in cloud computing today. Driven by
CSA’s Research working groups, this thought leadership webinar series is designed to help organizations address today’s cloud security priorities, one crucia…

Watch series

Kintone Training Webinar Series
5 episodes
Series Company Logo

Kintone Training Webinar Series

Welcome! Kintone has prepared some great training webinars for you and your whole team. What is my user type? ・Admin: I am a Kintone Administrator
looking to set up and/or manage our system. ・App Builder: I am building out our Kintone Apps & Spaces. ・End User: I will be interacting with data and apps …

Watch series

The Inevitable Boom: Preparing, Responding & Recovering from a Cybersecurity Breach
3 episodes
Series Company Logo

The Inevitable Boom: Preparing, Responding & Recovering from a Cybersecurity Breach

The Inevitable Boom – Preparing, Responding & Recovering from a Cybersecurity Breach In today’s digital landscape, cyber incidents aren’t a question of
if—they’re a question of when. Organizations must be prepared to defend against threats, respond effectively when an attack occurs, and recover swiftly to…

Watch series

Federal Civilian Sector - Data Modernization Series
1 episodes
Series Company Logo

Federal Civilian Sector - Data Modernization Series

Welcome to our Data Modernization series focused on the federal civilian sector. This series will feature monthly office hour call recordings and other videos
relevant to modernizing and securing our civilian infrastructure. As the federal civilian sector faces significant technological challenges, including the need f…

Watch series

AI-powered solutions for complex FSI & Fintech applications
2 episodes
Series Company Logo

AI-powered solutions for complex FSI & Fintech applications

AWS and NVIDIA are working together to deliver purpose-built, innovative AI solutions for complex use cases in the financial services sector. This series takes
an in-depth look at how advanced, efficient AI models are being used to mitigate fraud, reduce risk, and meet strict compliance policies to increase custom…

Watch series

Discover trending channels

Check out top content creators on BrightTALK.See all channels

Channel Logo

ISC2 Security Briefings

165117 subscribers|484 talks

ISC2 Security Briefings - In-depth examination of infosec topics.

View channel

Channel Logo

ISC2 Think Tank

154920 subscribers|197 talks

Moderated roundtable discussions on a variety of infosecurity topics.

View channel

Channel Logo

ISC2 APAC Secure Webinars

84434 subscribers|491 talks

ISC2 Live Webinars for InfoSec Professionals in APAC Region

View channel

Channel Logo

ISC2 Knowledge Vault

138604 subscribers|159 talks

Information Security Certification

View channel

Browse content by topics

Discover the most popular and trending topics on BrightTALK.See all topics