Catch up on the latest content from our in-person events – virtually.

Cyber Insights 2025

Next-Gen SOC: Intelligence in Action

Learn from industry experts, explore innovative technologies, and discover actionable strategies that will redefine how SOCs operate in the age of intelligence-driven cybersecurity. Whether you’re looking to enhance situational awareness, streamline workflows, or improve decision-making in high-pressure scenarios, the videos will provide insights and tools you need to elevate your SOC to the next level.


Know Your Adversary with the Threat Landscape

Redefining Cyber Security in the Age of AI Transformation: Frost & Sullivan industry analysis

Kaspersky Enterprise Solutions in Action

Kaspersky SOC in 2025: Key Observations and Findings

Less Firefighting, More Strategy: A Smarter Approach to Security Operations

Beyond the Perimeter: Practical Strategies to Leverage Threat Intelligence for Proactive Cybersecurity

Top Priorities Shaping SOC Investments & Innovations: A CISO Perspective

AI-Related Threat Landscape: 2025 and Beyond

Advance Threats Detection and Response with Kaspersky Solutions

Staying Ahead of Threats: Innovative Approach to Vulnerability Management

Discover a world of knowledge and inspiration at our Virtual Security Summit, where we bring you a series of webinars and events that promise to transform your perspective. Join us on this digital journey to explore cutting-edge insights, engage with industry experts, and elevate your understanding of key topics.

Inside the Dark Web: exploring the human side of cybercriminals

ChatGPT – good or evil? AI impact on cybersecurity

Securing The Fort How to master cyber incident response in a large company

Responding to a data breach a step-by-step guide

Insights to Ransomware Tactics and Negotiation

Building and prioritizing detection engineering backlogs with MITRE ATT&CK

Unveiling the Darknet’s Malware-as-a-Service model

Сrimeware and financial cyberthreats in 2025

Unreliable AI: Addressing the Cybersecurity Risks of LLM-Based System

MDR Report Analyzing the state of the global threat landscape


Addressing myths around EDR