<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <link>https://www.infosecurity-magazine.com/webinars/</link>
    <copyright>Copyright © 2026 Reed Exhibitions Ltd. All Rights Reserved.</copyright>
    <item>
      <title>Cyber Resilience Under Pressure: Can Your Organisation Prove Control When it Matters Most?</title>
      <date>Thu, 21 May 2026 - Thu, 21 May 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/cyber-resilience-under-pressure/</link>
      <description>When cyber incidents occur, leaders are left asking critical questions: what’s impacted, who owns it and what evidence can we show right now?

Join this webinar to learn how to build connected, defensible cyber resilience that stands up under pressure</description>
      <pubDate>Wed, 29 Apr 2026 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/cyber-resilience-under-pressure/</guid>
    </item>
    <item>
      <title>Financial Services Under Pressure: Supply Chain Risk, Regulation and Operational Resilience</title>
      <date>Thu, 30 Apr 2026 - Thu, 30 Apr 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/financial-services-under-pressure/</link>
      <description>Strengthening third‑party cybersecurity and operational resilience is no longer optional. It’s critical. Join this webinar to learn why this shift matters now, and what firms must do next</description>
      <pubDate>Wed, 01 Apr 2026 15:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/financial-services-under-pressure/</guid>
    </item>
    <item>
      <title>Behind the Curtain of Microsoft 365 Cybersecurity: Lessons from Overlooked Resilience Gaps
</title>
      <date>Thu, 23 Apr 2026 - Thu, 23 Apr 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/coreview-webinar-microsoft-365/</link>
      <description>In this session, a group of cybersecurity professionals will expose the hidden security and resilience gaps in Microsoft 365 that even leave well-defended enterprises facing existential risk</description>
      <pubDate>Wed, 25 Mar 2026 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/coreview-webinar-microsoft-365/</guid>
    </item>
    <item>
      <title>Why Resilience‑Focused Cloud Design Is Your Best Defense Against Modern Attacks</title>
      <date>Thu, 09 Apr 2026 - Thu, 09 Apr 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/resilience-focused-cloud-booz-allen/</link>
      <description>Whether you’re modernizing legacy systems or optimizing an existing cloud footprint, this session will help you rethink your approach and align cloud decisions with long‑term resilience and operational readiness</description>
      <pubDate>Thu, 19 Mar 2026 14:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/resilience-focused-cloud-booz-allen/</guid>
    </item>
    <item>
      <title>How to Recover From a Cyber-Attack: A Step-by-Step Playbook</title>
      <date>Tue, 24 Mar 2026 - Tue, 24 Mar 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/recover-from-cyberattack-playbook/</link>
      <description>Join Thibault Williams from TMW Resilience for a practical session on how you can effectively prepare for (and recover from) a cybersecurity breach</description>
      <pubDate>Wed, 04 Mar 2026 10:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/recover-from-cyberattack-playbook/</guid>
    </item>
    <item>
      <title>How to Harness Advanced Intelligence Capabilities to Strengthen Cyber Defence</title>
      <date>Thu, 12 Mar 2026 - Thu, 12 Mar 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/the-intelligence-edge-clarity-and/</link>
      <description>This session explores how leading organizations maintain their intelligence edge by combining advanced CTI capabilities, human expertise, and collaborative feedback loops with law enforcement partners</description>
      <pubDate>Wed, 18 Feb 2026 14:29:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/the-intelligence-edge-clarity-and/</guid>
    </item>
    <item>
      <title>How Trusted Time Strengthens Network Security</title>
      <date>Thu, 19 Feb 2026 - Thu, 19 Feb 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/securing-networks-trusted-time/</link>
      <description>This webinar will explore how secure, accurate and precise timekeeping using Stratum 1 network time servers can dramatically improve security posture, incident response, and regulatory compliance</description>
      <pubDate>Mon, 22 Dec 2025 16:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/securing-networks-trusted-time/</guid>
    </item>
    <item>
      <title>How To Enhance Security Operations with AI-Powered Defenses</title>
      <date>Thu, 26 Feb 2026 - Thu, 26 Feb 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/how-to-enhance-security-operations/</link>
      <description>Our panel of experts will discuss how defenders can leverage AI tools to reduce the mean time to recovery (MTTR) and substantially reduce the financial cost of incident response</description>
      <pubDate>Mon, 22 Dec 2025 15:34:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/how-to-enhance-security-operations/</guid>
    </item>
    <item>
      <title>Securing M365 Data and Identity Systems Against Modern Adversaries</title>
      <date>Thu, 22 Jan 2026 - Thu, 22 Jan 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/securing-m365-data-and-identity/</link>
      <description>In this session, we will dissect how threat actors, such as Scattered Spider, exploit gaps between identity and access management (IAM) and data storage to paralyze organizations</description>
      <pubDate>Mon, 22 Dec 2025 15:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/securing-m365-data-and-identity/</guid>
    </item>
    <item>
      <title>Five Non-Negotiable Strategies to Get Identity Security Right in 2026</title>
      <date>Thu, 22 Jan 2026 - Thu, 22 Jan 2026</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/five-strategies-identity-security/</link>
      <description>Join our webinar to understand the key highlights of the report that will help guide your 2026 identity security strategy</description>
      <pubDate>Thu, 18 Dec 2025 16:21:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/five-strategies-identity-security/</guid>
    </item>
    <item>
      <title>Audit &amp; Compliance in the Era of AI and Emerging Technology</title>
      <date>Thu, 13 Nov 2025 - Thu, 13 Nov 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/audit-compliance-in-the-era-of-ai/</link>
      <description>This session explores the transformative potential of emerging technologies, including AI, automated workflows and advanced data analytics</description>
      <pubDate>Thu, 13 Nov 2025 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/audit-compliance-in-the-era-of-ai/</guid>
    </item>
    <item>
      <title>Modernizing GRC: From Checkbox to Strategic Advantage 
</title>
      <date>Thu, 13 Nov 2025 - Thu, 13 Nov 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/modernizing-grc-tines-summit/</link>
      <description>Explore what the path forward looks like for proactively managing risk and compliance in high-regulation environments</description>
      <pubDate>Thu, 13 Nov 2025 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/modernizing-grc-tines-summit/</guid>
    </item>
    <item>
      <title>Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality</title>
      <date>Thu, 11 Dec 2025 - Thu, 11 Dec 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/security-strategy-saas-shared/</link>
      <description>Discover how the classic Confidentiality, Integrity and Availability (CIA) Triad is evolving within modern SaaS environments</description>
      <pubDate>Tue, 11 Nov 2025 15:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/security-strategy-saas-shared/</guid>
    </item>
    <item>
      <title>Mastering AI Security With ISACA’s New AAISM Certification</title>
      <date>Wed, 19 Nov 2025 - Wed, 19 Nov 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/mastering-ai-security-isaca-aaism/</link>
      <description>In this 30-minute session, ISACA's Kirsten Lora and Infosec Institute's Keatron Evans will unpack the new AAISM certification and share insights into mastering AI security</description>
      <pubDate>Tue, 14 Oct 2025 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/mastering-ai-security-isaca-aaism/</guid>
    </item>
    <item>
      <title>How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses</title>
      <date>Thu, 06 Nov 2025 - Thu, 06 Nov 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/how-midmarket-can-leverage/</link>
      <description>Learn how to unlock the full value of your existing Microsoft Security stack, harness AI for both defence and efficiency and build a culture of resilience through people and process</description>
      <pubDate>Wed, 24 Sep 2025 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/how-midmarket-can-leverage/</guid>
    </item>
    <item>
      <title>OT Security Ecosystem for Targeted Risk Reduction and Reporting</title>
      <date>Thu, 16 Oct 2025 - Thu, 16 Oct 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/ot-security-risk-reduction/</link>
      <description>Join this webinar to learn how to build a multi-dimensional, real-time view of your OT environment. Rockwell Automation will share strategies for proactive risk reduction and regulatory readiness across industries</description>
      <pubDate>Mon, 15 Sep 2025 16:38:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/ot-security-risk-reduction/</guid>
    </item>
    <item>
      <title>Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification</title>
      <date>Thu, 23 Oct 2025 - Thu, 23 Oct 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/businessdriven-cyber-risk/</link>
      <description>While the importance of cyber risk quantification is apparent, many organizations struggle to get these projects funded</description>
      <pubDate>Mon, 18 Aug 2025 16:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/businessdriven-cyber-risk/</guid>
    </item>
    <item>
      <title>The Invisible Frontline: Proactive Approaches to Browser Defense</title>
      <date>Thu, 02 Oct 2025 - Thu, 02 Oct 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/proactive-approaches-browser/</link>
      <description>This webinar will explore the evolving landscape of browser-based attacks, drawing insights from real-world incidents and threat intelligence</description>
      <pubDate>Mon, 04 Aug 2025 08:58:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/proactive-approaches-browser/</guid>
    </item>
    <item>
      <title>Discover the Best Strategies to
Scale &amp; Optimize AI Applications</title>
      <date>Wed, 23 Jul 2025 - Wed, 23 Jul 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/prepare-for-enterprise-ai/</link>
      <description>Explore the foundational elements for securing, scaling and optimising AI applications</description>
      <pubDate>Fri, 20 Jun 2025 14:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/prepare-for-enterprise-ai/</guid>
    </item>
    <item>
      <title>How to Tame API Risks and Secure Your Digital Domain</title>
      <date>Tue, 22 Jul 2025 - Tue, 22 Jul 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/uncover-the-growing-threats-to/</link>
      <description>Learn what attackers see by scanning your public-facing digital properties so you can act before they do</description>
      <pubDate>Fri, 20 Jun 2025 14:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/uncover-the-growing-threats-to/</guid>
    </item>
    <item>
      <title>Modernise Application Delivery for the New Era</title>
      <date>Thu, 24 Jul 2025 - Thu, 24 Jul 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/modernise-application-delivery/</link>
      <description>Explore how F5 is actively transforming application delivery for the next era of apps and IT operations</description>
      <pubDate>Thu, 19 Jun 2025 14:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/modernise-application-delivery/</guid>
    </item>
    <item>
      <title>Enhance Your Business Resilience by Securing Your Mainframe</title>
      <date>Wed, 18 Jun 2025 - Wed, 18 Jun 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/mainframe-security-threats/</link>
      <description>Mainframes remain the backbone of critical industries, processing 75% of enterprise data and supporting $3 trillion in daily commerce</description>
      <pubDate>Tue, 27 May 2025 14:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/mainframe-security-threats/</guid>
    </item>
    <item>
      <title>Predicting and Prioritizing Cyber Attacks Using Threat Intelligence</title>
      <date>Thu, 26 Jun 2025 - Thu, 26 Jun 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/predicting-cyber-attacks-threat/</link>
      <description>Learn how AI-powered threat intelligence can pinpoint the most relevant threats to an organization</description>
      <pubDate>Tue, 27 May 2025 14:37:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/predicting-cyber-attacks-threat/</guid>
    </item>
    <item>
      <title>Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety</title>
      <date>Thu, 24 Jul 2025 - Thu, 24 Jul 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/how-ai-is-weaponizing-the-cyber/</link>
      <description>In this webinar, we’ll explore how AI is being weaponized across the cyber battlefield, not in the distant future, but now</description>
      <pubDate>Thu, 22 May 2025 12:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/how-ai-is-weaponizing-the-cyber/</guid>
    </item>
    <item>
      <title>Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance 
</title>
      <date>Thu, 17 Jul 2025 - Thu, 17 Jul 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/mastering-emerging-regulations/</link>
      <description>Understand how you can harness technology to advance compliance and set your organization apart from the rest</description>
      <pubDate>Wed, 21 May 2025 13:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/mastering-emerging-regulations/</guid>
    </item>
    <item>
      <title>Reimagining the SOC: From Reactive to Resilient</title>
      <date>Tue, 17 Jun 2025 - Tue, 17 Jun 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/reimaging-soc-reactive-resilient/</link>
      <description>A panel of experts will discuss how the SOC model needs to be reimagined in the context of the current threat landscape and advanced technologies</description>
      <pubDate>Tue, 06 May 2025 18:06:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/reimaging-soc-reactive-resilient/</guid>
    </item>
    <item>
      <title>Cybersecurity Employment: Making Sense of Conflicting Messaging</title>
      <date>Mon, 19 May 2025 - Mon, 19 May 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/cybersecurity-employment-isaca/</link>
      <description>In this interactive session, we explore the current state of the cybersecurity workforce, discuss barriers to entry, and delve into actionable recommendations for job seekers of any level.</description>
      <pubDate>Tue, 15 Apr 2025 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/cybersecurity-employment-isaca/</guid>
    </item>
    <item>
      <title>Closing the Browser Security Gap: Defending Against Modern Web-Based Threats</title>
      <date>Thu, 22 May 2025 - Thu, 22 May 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/browser-security-gap-google-chrome/</link>
      <description>Gain exclusive insights from Mandiant security experts as they share first-hand experiences investigating real-world cyberattacks originating from browser vulnerabilities.</description>
      <pubDate>Tue, 15 Apr 2025 09:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/browser-security-gap-google-chrome/</guid>
    </item>
    <item>
      <title>Safeguarding Critical Supply Chain Data Through Effective Risk Assessment</title>
      <date>Thu, 10 Apr 2025 - Thu, 10 Apr 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/supply-chain-data-risk-assessment/</link>
      <description>Through this expert-led discussion, participants will gain valuable perspectives and practical guidance to inform their approach to managing critical supply chain data</description>
      <pubDate>Tue, 18 Mar 2025 15:27:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/supply-chain-data-risk-assessment/</guid>
    </item>
    <item>
      <title>How AI and Verifiable Credentials Are Redefining Digital Identities</title>
      <date>Thu, 27 Mar 2025 - Thu, 27 Mar 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/ai-agents-evolving-landscape/</link>
      <description>Gain a deeper understanding of how AI agents interact with user identities, the evolving regulatory landscape, and the future of identity management in an AI-driven world</description>
      <pubDate>Fri, 07 Mar 2025 09:58:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/ai-agents-evolving-landscape/</guid>
    </item>
    <item>
      <title>Cyber Resilience in the AI Era: New Challenges and Opportunities</title>
      <date>Tue, 25 Mar 2025 - Tue, 25 Mar 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/cyber-resilience-ai-era/</link>
      <description>Join our expert-led webinar as we delve into the latest developments in AI-driven threats and explore practical strategies for safely integrating AI into your organization and build cyber resilience</description>
      <pubDate>Wed, 05 Mar 2025 13:02:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/cyber-resilience-ai-era/</guid>
    </item>
    <item>
      <title>How to Implement Attack Surface Management in the AI and Cloud Age</title>
      <date>Thu, 03 Apr 2025 - Thu, 03 Apr 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/attack-surface-ai-cloud-age/</link>
      <description>In this webinar, a panel of experts will examine the latest attack surface trends and discuss the future of attack surface management</description>
      <pubDate>Tue, 25 Feb 2025 13:46:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/attack-surface-ai-cloud-age/</guid>
    </item>
    <item>
      <title>The Threat Intelligence Imperative: Transforming Risk into Cyber Resilience</title>
      <date>Thu, 13 Mar 2025 - Thu, 13 Mar 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/threat-intelligence-cyber/</link>
      <description>Expert speakers will discuss how to implement real-time threat intelligence capabilities into your organization </description>
      <pubDate>Wed, 12 Feb 2025 15:12:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/threat-intelligence-cyber/</guid>
    </item>
    <item>
      <title>How to Tackle Rising Cloud Identity Attacks</title>
      <date>Thu, 27 Mar 2025 - Thu, 27 Mar 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/pam-protect-cloud-infrastructures/</link>
      <description>Privileged access management strategies must evolve to combat rising attacks on cloud platforms</description>
      <pubDate>Fri, 07 Feb 2025 11:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/pam-protect-cloud-infrastructures/</guid>
    </item>
    <item>
      <title>Enhancing Software Supply Chain Management: A DORA-Focused Approach</title>
      <date>Thu, 30 Jan 2025 - Thu, 30 Jan 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/software-supply-chain-management/</link>
      <description>This webinar will provide senior decision-makers with practical guidance to address post-compliance challenges, secure software supply chains and enhance business outcomes.
</description>
      <pubDate>Mon, 06 Jan 2025 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/software-supply-chain-management/</guid>
    </item>
    <item>
      <title>Auditing AI Risk: Essential Strategies for IT &amp; Compliance Leaders</title>
      <date>Thu, 23 Jan 2025 - Thu, 23 Jan 2025</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/auditing-ai-risk-strategies/</link>
      <description>Led by industry experts, this session will provide strategies for evaluating AI-driven risks and implementing robust governance practices</description>
      <pubDate>Mon, 25 Nov 2024 14:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/auditing-ai-risk-strategies/</guid>
    </item>
    <item>
      <title>Dispelling the Myths of Defense-Grade Cybersecurity</title>
      <date>Wed, 04 Dec 2024 - Wed, 04 Dec 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/myths-of-defensegrade-cybersecurity/</link>
      <description>In this webinar, we uncover the truth behind common misconceptions about defense-grade cybersecurity</description>
      <pubDate>Mon, 11 Nov 2024 09:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/myths-of-defensegrade-cybersecurity/</guid>
    </item>
    <item>
      <title>Alert Fatigue: What Are You and Your Security Teams Missing? </title>
      <date>Thu, 05 Dec 2024 - Thu, 05 Dec 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/alert-fatigue-what-your-security/</link>
      <description>Join this webinar to find out why the volume of alerts is crippling your security teams and how they can address these challenges</description>
      <pubDate>Thu, 07 Nov 2024 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/alert-fatigue-what-your-security/</guid>
    </item>
    <item>
      <title>Navigating Exposures in Energy ICS Environments</title>
      <date>Thu, 19 Dec 2024 - Thu, 19 Dec 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/exposures-energy-ics-environments/</link>
      <description>This webinar will share new energy ICS exposure and trends as well as provide actionable defensive strategies </description>
      <pubDate>Thu, 07 Nov 2024 10:48:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/exposures-energy-ics-environments/</guid>
    </item>
    <item>
      <title>Mastering Australian Privacy Act and Essential Eight While Improving Cybersecurity Posture
</title>
      <date>Tue, 12 Nov 2024 - Tue, 12 Nov 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/mastering-australian-privacy-act/</link>
      <description>As cyber security laws, like the Australian Privacy Act, continue to evolve, maintaining a sustainable, fit-for-purpose cybersecurity programme is critical</description>
      <pubDate>Wed, 23 Oct 2024 09:25:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/mastering-australian-privacy-act/</guid>
    </item>
    <item>
      <title>How to Manage Your Risks and Protect Your Financial Data</title>
      <date>Wed, 30 Oct 2024 - Wed, 30 Oct 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/how-to-manage-your-risks-protect/</link>
      <description>Learn about proven strategies for protecting financial infrastructure, sensitive data and business continuity</description>
      <pubDate>Mon, 14 Oct 2024 10:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/how-to-manage-your-risks-protect/</guid>
    </item>
    <item>
      <title>Identifying Concentration Risk and Securing the Supply Chain  
</title>
      <date>Thu, 07 Nov 2024 - Thu, 07 Nov 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/concentration-risk-securing-supply/</link>
      <description>This session will guide you through practical steps to identify critical supplier dependencies, mitigate risks, and strengthen your supply chain's operational resilience</description>
      <pubDate>Mon, 07 Oct 2024 15:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/concentration-risk-securing-supply/</guid>
    </item>
    <item>
      <title>Reinforcing Firewall Security: The Need to Adapt to Persistent Cyber Threats</title>
      <date>Thu, 03 Oct 2024 - Thu, 03 Oct 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/reinforcing-firewall-security/</link>
      <description>Experts from Centripetal discuss firewall effectiveness, identify fundamental failings and present innovative approaches to safeguarding networks against evolving cyber threats</description>
      <pubDate>Wed, 11 Sep 2024 14:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/reinforcing-firewall-security/</guid>
    </item>
    <item>
      <title>New Cyber Regulations: What it Means for UK and EU Businesses</title>
      <date>Thu, 10 Oct 2024 - Thu, 10 Oct 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/cyber-regulations-uk-eu-businesses/</link>
      <description>Organizations must be prepared for a raft of new and planned cyber regulations across the UK and EU</description>
      <pubDate>Fri, 06 Sep 2024 10:37:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/cyber-regulations-uk-eu-businesses/</guid>
    </item>
    <item>
      <title>Securing Your Move to Hybrid Cloud Infrastructure</title>
      <date>Thu, 26 Sep 2024 - Thu, 26 Sep 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/securing-your-move-to-hybrid-cloud/</link>
      <description>Explore how organizations can empower their DevSecOps teams to meet hybrid cloud security challenges head-on
</description>
      <pubDate>Thu, 22 Aug 2024 10:45:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/securing-your-move-to-hybrid-cloud/</guid>
    </item>
    <item>
      <title>Supply Chain Risk and Mitigation in Operational Technology</title>
      <date>Wed, 04 Sep 2024 - Wed, 04 Sep 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/supply-chain-risk-mitigation-ot/</link>
      <description>Join experts from Imprivata to discuss the unique security challenges in OT environments and the increased importance of security vendor access in OT sectors</description>
      <pubDate>Wed, 24 Jul 2024 10:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/supply-chain-risk-mitigation-ot/</guid>
    </item>
    <item>
      <title>Supercharge Your Security With Intelligence-Driven Threat Hunting</title>
      <date>Thu, 25 Jul 2024 - Thu, 25 Jul 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/security-intelligence-behavioral/</link>
      <description>Join us to learn more about how to use CTI-powered behavioral threat hunt packages to identify stealthy, malicious activity</description>
      <pubDate>Mon, 15 Jul 2024 11:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/security-intelligence-behavioral/</guid>
    </item>
    <item>
      <title>Going Beyond Traditional Attack Surface Management with Cyber Threat Intelligence</title>
      <date>Thu, 11 Jul 2024 - Thu, 11 Jul 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/cyber-intelligence-attack-surface/</link>
      <description>Amid an expanding external attack surface, cyber threat intelligence offers a more efficient approach to attack surface management</description>
      <pubDate>Tue, 18 Jun 2024 12:08:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/cyber-intelligence-attack-surface/</guid>
    </item>
    <item>
      <title>The Future of Fraud: Defending Against Advanced Account Attacks</title>
      <date>Thu, 18 Jul 2024 - Thu, 18 Jul 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/fraud-defending-account-attacks/</link>
      <description>This session will provide best practice advice on how to combat account fraud, including fake account creations and account takeovers </description>
      <pubDate>Fri, 14 Jun 2024 14:02:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/fraud-defending-account-attacks/</guid>
    </item>
    <item>
      <title>Learn Key Strategies for Industrial Data Security</title>
      <date>Thu, 27 Jun 2024 - Thu, 27 Jun 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/secure-industrial-ip-dlp/</link>
      <description>Join us for an informative webinar tailored to professionals in the industrial sector, where we’ll cover critical strategies for securing intellectual property (IP) and CAD files</description>
      <pubDate>Tue, 28 May 2024 13:10:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/secure-industrial-ip-dlp/</guid>
    </item>
    <item>
      <title>Unpacking the Top Vulnerabilities Exploited by Sophisticated Attackers</title>
      <date>Wed, 26 Jun 2024 - Wed, 26 Jun 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/top-vulnerabilities-sophisticated/</link>
      <description>During the session, our expert speakers will delve into real-world examples and case studies to illustrate the methods employed by sophisticated attackers</description>
      <pubDate>Tue, 14 May 2024 17:13:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/top-vulnerabilities-sophisticated/</guid>
    </item>
    <item>
      <title>How to Proactively Remediate Rising Web Application Threats</title>
      <date>Thu, 30 May 2024 - Thu, 30 May 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/remediate-web-application-threats/</link>
      <description>This webinar will highlight how security teams can take a proactive approach to securing web applications, rapidly locating and remediating vulnerabilities </description>
      <pubDate>Thu, 25 Apr 2024 12:13:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/remediate-web-application-threats/</guid>
    </item>
    <item>
      <title>Learn from the NHS - Proactive Password Security for Improved Cybersecurity 
</title>
      <date>Thu, 16 May 2024 - Thu, 16 May 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/proactive-password-security-specops/</link>
      <description>Join us to explore real-world case studies where the NHS has successfully enforced robust password policies</description>
      <pubDate>Wed, 24 Apr 2024 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/proactive-password-security-specops/</guid>
    </item>
    <item>
      <title>How to Secure Remote Connectivity within Operational Technology Environments</title>
      <date>Thu, 25 Apr 2024 - Thu, 25 Apr 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/how-to-secure-remote-connectivity/</link>
      <description>This webinar is aimed towards offering suggestions to effectively secure remote management between operational and corporate networks</description>
      <pubDate>Wed, 03 Apr 2024 16:20:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/how-to-secure-remote-connectivity/</guid>
    </item>
    <item>
      <title>How to Optimize Third-Party Risk Management Programs Through NIST CSF 2.0 </title>
      <date>Thu, 16 May 2024 - Thu, 16 May 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/third-party-risk-nist-csf/</link>
      <description>This session will offer practical steps on how to integrate the CSF 2.0 framework into third-party risk management programs</description>
      <pubDate>Fri, 15 Mar 2024 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/third-party-risk-nist-csf/</guid>
    </item>
    <item>
      <title>How to Unlock Frictionless Security with Device Identity &amp; MFA</title>
      <date>Thu, 11 Apr 2024 - Thu, 11 Apr 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/strong-identity-security-webinar/</link>
      <description>Join this webinar to learn how organizations can strengthen identity security to frustrate the attackers instead of their users</description>
      <pubDate>Thu, 07 Mar 2024 12:15:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/strong-identity-security-webinar/</guid>
    </item>
    <item>
      <title>Experiencing a DDoS Simulation to Enhance Defenses</title>
      <date>Thu, 02 May 2024 - Thu, 02 May 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/uncovering-ddos-vulnerabilities/</link>
      <description>Taking an inside look at a DDoS simulation case study, this session will highlight how companies can prepare in advance, identify vulnerabilities, and mitigate DDoS attacks</description>
      <pubDate>Tue, 05 Mar 2024 16:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/uncovering-ddos-vulnerabilities/</guid>
    </item>
    <item>
      <title>Navigating the Evolving Cybersecurity Compliance Landscape in 2024 </title>
      <date>Thu, 18 Apr 2024 - Thu, 18 Apr 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/evolving-cybersecurity-compliance/</link>
      <description>This session will highlight how organizations can stay compliant amid continuous regulatory evolution in cybersecurity and data protection</description>
      <pubDate>Mon, 26 Feb 2024 11:40:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/evolving-cybersecurity-compliance/</guid>
    </item>
    <item>
      <title>Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024</title>
      <date>Thu, 28 Mar 2024 - Thu, 28 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/ai-role-cybersecurity-security-ops/</link>
      <description>Delve into the transformative impact of AI on cybersecurity and security operations and understand strategies to proactively counter emerging threats in 2024 and beyond</description>
      <pubDate>Wed, 21 Feb 2024 16:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/ai-role-cybersecurity-security-ops/</guid>
    </item>
    <item>
      <title>How to Navigate the Evolving DDoS Attack Landscape</title>
      <date>Thu, 14 Mar 2024 - Thu, 14 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/navigate-evolving-ddos-attack/</link>
      <description>This session will highlight new trends in DDoS attacks and how your organization can counter this increasingly sophisticated vector</description>
      <pubDate>Wed, 14 Feb 2024 14:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/navigate-evolving-ddos-attack/</guid>
    </item>
    <item>
      <title>Fireside Chat: The State of Ransomware Today with the Ransomware Sommelier
</title>
      <date>Wed, 20 Mar 2024 - Wed, 20 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/fireside-chat-ransomware-2024/</link>
      <description>This 30-minute keynote session offers one sponsor the opportunity to present to the Infosecurity Magazine Online Summit audience.</description>
      <pubDate>Fri, 02 Feb 2024 11:58:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/fireside-chat-ransomware-2024/</guid>
    </item>
    <item>
      <title>Bouncing Back: Building Organizational Resilience in the Face of Cyber-Attack</title>
      <date>Wed, 20 Mar 2024 - Wed, 20 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/bouncing-back-building/</link>
      <description>This panel discussion will delve into the concept of organizational resilience, exploring how to prepare for, respond to, and recover from cyber incidents with minimal disruption and lasting impact.</description>
      <pubDate>Fri, 02 Feb 2024 11:39:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/bouncing-back-building/</guid>
    </item>
    <item>
      <title>Untangling the Web: Navigating Third-Party Risk in a Hyperconnected World</title>
      <date>Tue, 19 Mar 2024 - Tue, 19 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/navigating-thirdparty-risk/</link>
      <description>This panel discussion will dissect the challenges and best practices for managing third-party risk in today's complex cybersecurity landscape, from small local firms to global software providers.</description>
      <pubDate>Fri, 02 Feb 2024 11:37:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/navigating-thirdparty-risk/</guid>
    </item>
    <item>
      <title>Disinformation Defense: Protecting Businesses from the New Wave of AI-Powered Cyber Threats</title>
      <date>Wed, 20 Mar 2024 - Wed, 20 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/disinformation-defense/</link>
      <description>This panel discussion will arm cybersecurity professionals with the knowledge and strategies to combat these evolving threats.</description>
      <pubDate>Fri, 02 Feb 2024 11:05:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/disinformation-defense/</guid>
    </item>
    <item>
      <title>Securing APIs in the Cloud Frontier</title>
      <date>Wed, 20 Mar 2024 - Wed, 20 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/securing-apis-in-the-cloud-frontier/</link>
      <description>This panel discussion will delve into the unique security challenges of cloud APIs, offering practical strategies and insights to mitigate risk and build a robust defense.</description>
      <pubDate>Fri, 02 Feb 2024 11:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/securing-apis-in-the-cloud-frontier/</guid>
    </item>
    <item>
      <title>The Role of Leadership in Security and Privacy Governance</title>
      <date>Wed, 20 Mar 2024 - Wed, 20 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/leadership-security-privacy-gov/</link>
      <description>Talya C. Parker, Privacy and Security Expert, Founder of the BGiC Foundation, sets out the principles security and privacy leaders must adopt to integrate privacy governance into corporate governance</description>
      <pubDate>Fri, 02 Feb 2024 10:53:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/leadership-security-privacy-gov/</guid>
    </item>
    <item>
      <title>Beyond Passwords: Securing the Digital Age with MFA, 2FA, and Passwordless Authentication</title>
      <date>Tue, 19 Mar 2024 - Tue, 19 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/beyond-passwords-securing-the/</link>
      <description>This panel discussion will delve into the intricacies of these technologies, exploring their strengths, weaknesses, and potential to revolutionize the way organizations approach the first line of security. </description>
      <pubDate>Fri, 02 Feb 2024 10:42:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/beyond-passwords-securing-the/</guid>
    </item>
    <item>
      <title>Cracking the Culture Code: Building a Cybersecurity-Aware Workforce</title>
      <date>Tue, 19 Mar 2024 - Tue, 19 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/cracking-the-culture-code/</link>
      <description>Fostering a culture of security awareness empowers employees to become active participants in protecting the organization's digital assets. </description>
      <pubDate>Fri, 02 Feb 2024 10:38:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/cracking-the-culture-code/</guid>
    </item>
    <item>
      <title>Browser Security: The Missing Layer in Security Strategies </title>
      <date>Tue, 19 Mar 2024 - Tue, 19 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/browser-keynote-online-summit/</link>
      <description>This 30-minute keynote session offers one sponsor the opportunity to present to the Infosecurity Magazine Online Summit audience.</description>
      <pubDate>Fri, 02 Feb 2024 09:44:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/browser-keynote-online-summit/</guid>
    </item>
    <item>
      <title>Understand and Combat the Top Healthcare Cloud Threats Today</title>
      <date>Thu, 21 Mar 2024 - Thu, 21 Mar 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/understanding-healthcare-cloud/</link>
      <description>Join our webinar for an overview of the 2023 ClearDATA Healthcare Threat Report and an industry expert panel discussion. </description>
      <pubDate>Wed, 31 Jan 2024 15:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/understanding-healthcare-cloud/</guid>
    </item>
    <item>
      <title>How to Pair Threat Hunting and Exploit Intelligence for Better Cybersecurity</title>
      <date>Wed, 21 Feb 2024 - Wed, 21 Feb 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/reduce-risk-exposures-internet/</link>
      <description>Join this session to discover how threat hunting and exploit intelligence can help you secure your organization</description>
      <pubDate>Fri, 26 Jan 2024 13:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/reduce-risk-exposures-internet/</guid>
    </item>
    <item>
      <title>CISOs Redefined: External Threats, A Catalyst for Holistic Cybersecurity in 2024</title>
      <date>Thu, 22 Feb 2024 - Thu, 22 Feb 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/ciso-redefined-external-threats/</link>
      <description>Uncover insights from a comprehensive CISO survey, focusing on prevalent challenges such as phishing, impersonation, and other online scams experienced in 2023.</description>
      <pubDate>Thu, 25 Jan 2024 12:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/ciso-redefined-external-threats/</guid>
    </item>
    <item>
      <title>Phishing, Impersonation, and Beyond: CISO Insights on 2023-2024 External Threats</title>
      <date>Thu, 15 Feb 2024 - Thu, 15 Feb 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/phishing-impersonation-ciso/</link>
      <description>CISOs are the gatekeepers of our organizations. Find out about some of the most prevalent threats they have been facing over the past year, such as phishing, impersonation, and other online scams, and how they can inform your cyber defense strategy for the year to come.</description>
      <pubDate>Fri, 19 Jan 2024 11:50:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/phishing-impersonation-ciso/</guid>
    </item>
    <item>
      <title>How Can the Boardroom Boost Cyber Resilience?</title>
      <date>Thu, 29 Feb 2024 - Thu, 29 Feb 2024</date>
      <link>https://www.infosecurity-magazine.com/webinars/prm/boardroom-boost-cyber-resilience/</link>
      <description>This session will highlight the importance of boardroom oversight of cyber-risk and how to foster effective collaboration between the c-suite and security teams</description>
      <pubDate>Thu, 18 Jan 2024 16:55:00 GMT</pubDate>
      <guid isPermaLink="true">https://www.infosecurity-magazine.com/webinars/prm/boardroom-boost-cyber-resilience/</guid>
    </item>
  </channel>
</rss>