- Inside the Club: How Modern GRC Leaders Engineer for Speed and Scaleby admin on February 13, 2026 at 8:36 pm
As engineering velocity accelerates, traditional GRC models are failing. Manual controls, point-in-time audits, and reactive evidence collection canât keep up with modern cloud and CI/CD environments. In this expert panel discussion, leaders from RegScale, Tines, and GitLab share how high-performing organizations are engineering compliance directly into workflows. Rather than slowing teams down, modern GRC programs… The post Inside the Club: How Modern GRC Leaders Engineer for Speed and Scale appeared first on Cyber Defense Webinars.
- A Blueprint for reimagining cybersecurity through AI â by Deloitteby admin on December 4, 2025 at 8:09 pm
Security organizations have a two-dimensional business imperativeâto secure AI adoption and to AI-enable the cyber function. The full scope can be realized by a reimagining of the cyber function to help improve processes, synergies, and threat detection. In this session covers: 1.  How to navigate rapid evolutions in AI tech and map the trends to… The post A Blueprint for reimagining cybersecurity through AI â by Deloitte appeared first on Cyber Defense Webinars.
- Intersection of Privacy, Cyber Security and AIby admin on November 20, 2025 at 8:56 pm
Introduction The rapid convergence of privacy, cybersecurity, and artificial intelligence (AI) is reshaping the digital landscape. Organizations increasingly depend on AI-driven systems to process vast amounts of data, making data protection, ethical responsibility, and trust more critical than ever. This intersection creates both opportunities and challenges: from safeguarding personal information and mitigating cyber threats, to… The post Intersection of Privacy, Cyber Security and AI appeared first on Cyber Defense Webinars.
- Securing the Infinite Feed: Why Legacy DLP Fails in the GenAI Worldby admin on October 16, 2025 at 7:01 pm
As organizations embrace GenAI and SaaS-driven ecosystems, data risk is growing exponentially. Traditional Data Loss Prevention (DLP) solutions, designed for static file protection, can no longer keep pace with todayâs dynamic data flows across AI tools, collaboration apps, and shadow IT. In this webinar, Gidi Cohen, CEO and Co-Founder of Bonfy, will explore why yesterdayâs… The post Securing the Infinite Feed: Why Legacy DLP Fails in the GenAI World appeared first on Cyber Defense Webinars.
- Looking Forward to Whatâs Next in Cybersecurityby admin on September 1, 2025 at 8:18 pm
Watch highlights from our 2025 Deloitte Cyber House event panel discussions focused on whatâs next in cybersecurity, including agentic AI, secure modernization, the identity landscape, and building resilience. Hosted by Adnan Amjad, US Cyber Leader, partner, Deloitte & Touche LLP The post Looking Forward to Whatâs Next in Cybersecurity appeared first on Cyber Defense Webinars.
- Securing AI Systems: A Playbook for Strategic Defenseby admin on July 24, 2025 at 1:43 pm
AI is no longer experimental; itâs already embedded across your enterprise, from chatbots and developer tools to recommendation engines. But as adoption accelerates, so does the risk. Unlike traditional systems, AI behaves unpredictably, evolves post-deployment, and often acts as a âblack boxâ thatâs difficult to audit, secure, or even explain. In this session, Mike Burch,… The post Securing AI Systems: A Playbook for Strategic Defense appeared first on Cyber Defense Webinars.
- More Money, More Problems: Why Cybersecurity Spending Isnât Making Us Saferby admin on July 10, 2025 at 7:26 pm
Despite record-breaking cybersecurity budgets, global organizations continue to fall short in their ability to prevent breaches, manage risk, and build true resilience. Whereâs the disconnect? Why isnât more spending translating into better outcomes? In this webinar, âMore Money, More Problems: Why Cybersecurity Spending Isnât Making Us Safer,â weâll unpack the findings of the newly released… The post More Money, More Problems: Why Cybersecurity Spending Isnât Making Us Safer appeared first on Cyber Defense Webinars.
- AI-Powered Identity Fraud: What Youâre Up Againstby admin on June 19, 2025 at 2:28 pm
How AI Is Amplifying Social Engineering and Digital Deception Speaker information: ⢠Maya Ogranovitch Scott, Retail Solutions Lead at Ping Identity ⢠Adam Preis, Solution Marketing Director at Ping Identity Abstract: In the age of generative AI, identity fraud is evolving faster than ever. Attackers are now leveraging advanced AI tools to create hyper-realistic phishing… The post AI-Powered Identity Fraud: What Youâre Up Against appeared first on Cyber Defense Webinars.
- Optimizing Identity Access Managementby admin on October 7, 2024 at 8:25 pm
Identity and Access Management (IAM) is a system that helps organizations control who can access their digital resources. It makes sure the right people can log in and use specific applications or data, while keeping unauthorized users out. However, deploying IAM can be difficult because it needs to be set up across different systems, which… The post Optimizing Identity Access Management appeared first on Cyber Defense Webinars.
- Gaps in Breach Insurance Coverage: Insights From The Latest Reportby admin on April 11, 2024 at 8:07 pm
The cost of data breaches continues to rise due to numerous factors, including the increasing sophistication of cyberattacks, expanded reliance on digital infrastructure, and growing regulatory requirements and penalties. As a result, organizations are increasingly relying on insurance policies to mitigate the enormous potential cost of data breaches. While breach insurance coverage sounds like a… The post Gaps in Breach Insurance Coverage: Insights From The Latest Report appeared first on Cyber Defense Webinars.
Cyber Defense Webinars
We are an ethical website cyber security team and we perform security assessments to protect our clients.















