Catch up on the latest content from our in-person events – virtually.

Cyber Insights 2025

Next-Gen SOC: Intelligence in Action

Learn from industry experts, explore innovative technologies, and discover actionable strategies that will redefine how SOCs operate in the age of intelligence-driven cybersecurity. Whether you’re looking to enhance situational awareness, streamline workflows, or improve decision-making in high-pressure scenarios, the videos will provide insights and tools you need to elevate your SOC to the next level.


Know Your Adversary with the Threat Landscape

Redefining Cyber Security in the Age of AI Transformation: Frost & Sullivan industry analysis

Kaspersky Enterprise Solutions in Action

Kaspersky SOC in 2025: Key Observations and Findings

Less Firefighting, More Strategy: A Smarter Approach to Security Operations

Beyond the Perimeter: Practical Strategies to Leverage Threat Intelligence for Proactive Cybersecurity

Top Priorities Shaping SOC Investments & Innovations: A CISO Perspective

AI-Related Threat Landscape: 2025 and Beyond

Advance Threats Detection and Response with Kaspersky Solutions

Staying Ahead of Threats: Innovative Approach to Vulnerability Management

Discover a world of knowledge and inspiration at our Virtual Security Summit, where we bring you a series of webinars and events that promise to transform your perspective. Join us on this digital journey to explore cutting-edge insights, engage with industry experts, and elevate your understanding of key topics.

Inside the Dark Web: exploring the human side of cybercriminals

Read more

During this webinar, Kaspersky Digital Footprint Intelligence expert Anna Pavlovskaya will explore the motivations and drivers of cybercriminals, providing a unique perspective on the threats coming from the dark web to companies of all sizes.

ChatGPT – good or evil? AI impact on cybersecurity

Read more

In this webinar, Kaspersky experts will discuss how ChatGPT currently influences the cyber threats landscape and cybersecurity in organizations, and contemplate whether this is a real game changer for the industry and, in particular Security Operation Centers (SOCs). The experts will also discuss the potential benefits of using ChatGPT in threat hunting and malware analysis.

Securing The Fort How to master cyber incident response in a large company

Read more

In large companies, the sheer volume of information resources makes their attack surface significantly larger, compared to smaller businesses. Numerous factors contribute to this exposure, including networks spread across various locations that are consolidated into a single infrastructure, mergers and acquisitions with companies possessing lower security levels, outdated hardware and software, and more.

The level of preparedness for a potential incident directly impacts the effectiveness of the response and allows you to mitigate the attack’s impact. In this webinar, you will learn how to enhance incident responses for large-scale networks.

Responding to a data breach a step-by-step guide

Read more

In today’s media landscape, we consistently encounter news of companies falling victim to cyberattacks, resulting in the exposure and sale of their data on the dark web. The wide array of data available on the dark web market, including internal databases, infrastructure access, and compromised accounts, presents a pervasive problem that affects businesses of all sizes. These breaches and related incidents don’t only disrupt operations and damage reputations, but they can also result in substantial fines and legal consequences.

Insights to Ransomware Tactics and Negotiation

Read more

Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the attacker have to “meet” face-to-face. Moreover, by the time the two sides meet to discuss the price, the attackers have already gained control of a company’s data or network – that puts the victim in a weak position.

What is it like to negotiate with someone who is trying hard to get a ransom whilst remaining in the dark? What can you expect from such negotiations? In this webcast, Insights to Ransomware Tactics and Negotiation, Marc Rivero, senior security researcher, GReAT at Kaspersky will observe various tactics used by ransomware groups, explain how the companies are trying to negotiate with these cybercriminals, and what outcome such negotiations may have.

Building and prioritizing detection engineering backlogs with MITRE ATT&CK

Read more

Security Operations Centers (SOCs) have long recognized the critical need for building effective detection techniques. In this webinar, Andrey Tamoykin, an expert at Kaspersky SOC Consulting will explain how to develop and prioritize a detection backlog from scratch using the MITRE ATT&CK framework.

We will explore various open-source tools to automate and streamline this process, providing practical insights and solutions to common challenges in detection engineering. This session will also cover key SOC development aspects driven by an optimized detection backlog.

Unveiling the Darknet’s Malware-as-a-Service model

Read more

Not only do cybercriminals make money by committing cybercrime, but they also expand their operations by offering services to individuals without strong technical skills in malware development. This business model is known as Malware-as-a-Service (MaaS), and it operates on various sites of the “shadow” internet, including the Darknet. MaaS generates stable profits, enabling cybercriminals to maintain a team and continuously improve their services to carry out attacks on companies and individual users.

Through our research, we have identified 97 families of malware that have been distributed in the MaaS format – or “by subscription” – over the last seven years. These families include ransomware, various loaders, backdoors, botnets, and infostealers.

Сrimeware and financial cyberthreats in 2025

Read more

Kaspersky’s Global Research and Analysis Team is constantly monitoring known and emerging cyberthreats targeting the financial industry, including banks and fintech companies. We will review the key events that occurred in 2024 in the financial cyberthreat landscape and then predict the trends for 2025.

Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System

Read more

As AI systems based on large language models become more powerful and widespread, more cybersecurity challenges emerge. From jailbreaks to indirect prompt injections, they are vulnerable to a wide array of LLM-specific threats. However, all these problems can be boiled down to one single issue: LLMs are probabilistic algorithms that are inherently unreliable, just like any other ML system. Does it mean they cannot be useful? Absolutely not! In this talk, we will discuss the challenges of secure and reliable LLM-based applications and the way to make them safer and more aligned with your business goals.

MDR Report Analyzing the state of the global threat landscape

Read more

In 2023, Kaspersky Managed Detection and Response (MDR) received more than 314,000 alerts worldwide. Kaspersky team processed these alerts and accumulated as anonymized customer cases to provide information about the current threat landscape. Sergey Soldatov, Head of Kaspersky Security Operations Center, will discuss the nature of the identified incidents and highlight the most common tactics and techniques attackers used.

Addressing myths around EDR

Read more

While some of the existing cybersecurity solutions already provide Endpoint Detection and Response functionality for small and medium business, implementation of EDR in these organizations can cause doubts.