Live Webinar– Wednesday, February 11, 2026 –Register to AttendIdentity has become the new perimeter, making an identity-first security approach essential for protecting sensitive data, ensuring regulatory compliance, and safeguarding your organization’s reputation.In this webinar, cybersecurity expert Dr. Torsten George, will explore why identity-first security is no longer optional but a strategic business imperative. Attendees will gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats.Join the live webinar onFebruary 11, 2026at 1PM ET as we explore:The evolving threat landscapeCommon attack vectors targeting user identitiesActionable strategies to detect, assess, and mitigate identity risksWhether you’re a security professional, IT leader, or business decision-maker, this session will provide the knowledge and tools to strengthen your identity defenses and protect what matters most in a perimeter-less world.Register for Webinar
Identity has become the new perimeter, making an identity-first security approach essential for protecting sensitive data, ensuring regulatory compliance, and safeguarding your organization’s reputation.In this webinar, cybersecurity expert Dr. Torsten George, will explore why identity-first security is no longer optional but a strategic business imperative. Attendees will gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats.Join the live webinar onFebruary 11, 2026at 1PM ET as we explore:The evolving threat landscapeCommon attack vectors targeting user identitiesActionable strategies to detect, assess, and mitigate identity risksWhether you’re a security professional, IT leader, or business decision-maker, this session will provide the knowledge and tools to strengthen your identity defenses and protect what matters most in a perimeter-less world.Register for Webinar
Identity has become the new perimeter, making an identity-first security approach essential for protecting sensitive data, ensuring regulatory compliance, and safeguarding your organization’s reputation.In this webinar, cybersecurity expert Dr. Torsten George, will explore why identity-first security is no longer optional but a strategic business imperative. Attendees will gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats.Join the live webinar onFebruary 11, 2026at 1PM ET as we explore:The evolving threat landscapeCommon attack vectors targeting user identitiesActionable strategies to detect, assess, and mitigate identity risksWhether you’re a security professional, IT leader, or business decision-maker, this session will provide the knowledge and tools to strengthen your identity defenses and protect what matters most in a perimeter-less world.Register for Webinar
In this webinar, cybersecurity expert Dr. Torsten George, will explore why identity-first security is no longer optional but a strategic business imperative. Attendees will gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats.Join the live webinar onFebruary 11, 2026at 1PM ET as we explore:The evolving threat landscapeCommon attack vectors targeting user identitiesActionable strategies to detect, assess, and mitigate identity risksWhether you’re a security professional, IT leader, or business decision-maker, this session will provide the knowledge and tools to strengthen your identity defenses and protect what matters most in a perimeter-less world.Register for Webinar
Join the live webinar onFebruary 11, 2026at 1PM ET as we explore:The evolving threat landscapeCommon attack vectors targeting user identitiesActionable strategies to detect, assess, and mitigate identity risksWhether you’re a security professional, IT leader, or business decision-maker, this session will provide the knowledge and tools to strengthen your identity defenses and protect what matters most in a perimeter-less world.Register for Webinar
Whether you’re a security professional, IT leader, or business decision-maker, this session will provide the knowledge and tools to strengthen your identity defenses and protect what matters most in a perimeter-less world.Register for Webinar
Attendees will walk away with guidance for how to build robust identity defenses, unify them under a consistent security model, and ensure business operations move quickly without compromise.
SecurityWeek’s 2026 Ransomware Summit will discuss a roadmap for defending the enterprise, from mitigating root causes to mastering recovery, giving security teams the critical insights needed to navigate and neutralize today’s ransomware extortion threats.
Pennsylvania has named Andy Ritter as CISO and Jim Sipe as executive deputy CIO.
Hayete Gallot has rejoined Microsoft as Executive Vice President, Security.
Source: SecurityWeek