Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Look At GitGuardian's ML-Powered Contextual EnrichmentAnd Incident Scoring

In this quick introductory video, Mathieu Bellon, Senior Product Manager at GitGuardian, sits down with Dwayne McDaniel, Developer Advocate, to cover some of the advancements GitGuardian has made by integrating machine learning directly into the secrets security platform. Mathieu describes how engineers and responders can save serious time as by automating contextual analysis, geving the humans in the loop with the best information to be able to take an informed action when it comes to secrets leaks. They also discuss the security implications and where teams can look if they want to opt out or bring their own agents.

Observability and Security for the AI Era

Datadog has always been driven by a broader vision of helping teams understand and operate complex systems. In this session, you’ll hear from Yanbing Li, Chief Product Officer, and Shri Subramanian, Group Product Manager, as they share the latest updates across the Datadog product suite and discuss how that vision continues to shape the platform’s evolution and support the next generation of AI-driven applications.

Detecting Adversary Intent: Analyzing Behavioral Tells in Admin Logs with Allison Wikoff

Adversaries are already logging into your network using your own admin credentials. In this episode, Caleb Tolin sits down with Allison Wikoff to move past the identity clichés and analyze the specific behavioral signals that separate routine IT maintenance from state-sponsored sabotage. They dissect why resilience is not a flash of genius during a crisis, but a mindset that organizations can adopt to stay ahead of dynamic threat actors.

Charlotte Agentic SOAR: The next evolution of intelligent and adaptive security automation

At Fal.Con 2025, CrowdStrike introduced Agentic SOAR, uniting automation and intelligent agents to deliver the next evolution of fast, adaptive security operations. This innovation sets a new standard for enterprise protection, enabling SOCs to stay ahead of threats and operate with greater confidence and agility. Subscribe and stay updated!

Why Threat Hunting Isn't Optional

27 seconds That is the fastest breakout time recorded last year. In less time than it takes to read this sentence, an adversary can gain access and begin moving through your network. Join us as we explore why proactive threat hunting is no longer optional in a world where 82% of attacks are malware-free. From AI-amplified reconnaissance to adversaries "living off the land" with your own IT tools, we break down how to stop intrusions before they become breaches.

What's Actually Changing in HIPAA (and What IT Teams Need to Fix Now)

Hosted by CalCom — helping healthcare and financial organizations secure and harden server environments for compliance frameworks like HIPAA, CIS, and NIST. Trusted by organizations managing regulated environments where configuration security and audit readiness matter. A HIPAA Auditor won't tell your servers to turn their head an cough, but your configurations may still not be healthy. Some security practices that used to be “recommended” are quickly becoming expected controls. This session breaks down what’s changing, what auditors will look for, and what you should address now.