Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intel Options with Sumo Logic -- Customer Brown Bag -- May 21st, 2026

Join us as Senior Technical Account Specialist Trent Driesler walks through Sumo Logic’s threat intelligence capabilities, including built-in feeds from providers like Intel 471 and CrowdStrike, and how to ingest custom indicators using collectors and APIs.

Beyond the AI Hype with Netskope: Why Governance is the Bedrock of AI & Cloud Integration at Embecta

Modern enterprise solutions—ranging from cloud data and power platforms to agentic AI and API connections—require rigorous oversight. Every platform integration must be evaluated through the lenses of risk, data compliance, and privacy to ensure secure operations. Netskope provides the necessary visibility and control for all data paths, including APIs and cloud-based AI platforms, helping Embecta enforce the data compliance and privacy standards required when integrating disparate applications.

Episode 15 - The Right Eyes: Mythos, and the Future of Vulnerability Discovery

The emergence of advanced large language models like Anthropic's Mythos represents an epochal shift in cybersecurity, fundamentally altering how zero-day vulnerabilities are surfaced and remediated. In this episode, host Richard Bejtlich sits down with Corelight Co-founder Greg Bell to analyze the security implications of this AI-driven bug explosion, highlighting recent AI-assisted vulnerability discoveries across infrastructure mainstays like FreeBSD and Firefox.

Fireside Chat With TPRA: Three Hard TruthsAbout TPRM in the Post-Mythos Era

Frontier AI models like Mythos have intensified the urgency to rethink cybersecurity. But for third-party risk teams, the harder question remains: how do we prioritize the actions that actually drive business outcomes? As TPRM becomes more tightly tied to business impact, resilience, continuity, and revenue protection, leaders need a clearer view of the hard truths shaping their programs.

New Security Gap: Your WAF Has No Idea What Your AI Is Doing

In this webcast, we get into why signature-based protection breaks down in AI-first environments, what behavioral detection and positive security models actually look like in production, and what it takes to evaluate whether your runtime tools are genuinely adapting to your environment or just adding noise to your stack.