<rss version="2.0">
					   <channel>
					      <title>TecnoWebinars</title>
					      <link>https://tecnowebinars.com/</link>
					      <description>Webinars de TecnoWebinars.com</description>					      
			
							<item>
					         <title><![CDATA[Global Focus update: The importance of diversification in the age of AI polarisation]]></title>
					         <link>https://tecnowebinars.com/webinar/110172/global-focus-update-the-importance-of-diversification-in-the-age-of-ai-polarisation/columbia-threadneedle-institutional</link>
					         <description><![CDATA[The past six months has been characterised by a bifurcation of equity markets, with capital flowing decisively toward companies perceived as direct beneficiaries of artificial intelligence and away from those viewed as AI laggards. This has created a widening gap between so-called “AI winners” and “AI losers”, with share prices often moving (...)]]></description>
					         <pubDate>Wed, 25 Feb 2026 00:00:50 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Navigating Through Kintone as an End User Training]]></title>
					         <link>https://tecnowebinars.com/webinar/110196/navigating-through-kintone-as-an-end-user-training/kintone</link>
					         <description><![CDATA[During this training, we'll review how to navigate the different features of Kintone as an End User. This includes running through Portal Home, interacting with the People Feature, using Spaces, and reviewing/adding data in an App.
 ]]></description>
					         <pubDate>Thu, 26 Feb 2026 00:02:52 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Local Pages 101: Everything You Need to Know About Local SEO Content (APAC)]]></title>
					         <link>https://tecnowebinars.com/webinar/110171/local-pages-101-everything-you-need-to-know-about-local-seo-content-apac/alchemer</link>
					         <description><![CDATA[Local pages do more than show an address and store hours, they’re a powerful driver of local search visibility, customer trust, and real-world action. In this webinar, we’ll break down what high-performing local pages look like, why they matter for multi-location brands, and how to turn them into revenue-generating assets.

In just 20 (...)]]></description>
					         <pubDate>Wed, 25 Feb 2026 00:00:22 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[[APJ] Carding-as-a-Service: The Underground Market of Stolen Cards]]></title>
					         <link>https://tecnowebinars.com/webinar/110164/apj-carding-as-a-service-the-underground-market-of-stolen-cards/rapid7</link>
					         <description><![CDATA[The evolution of carding marketplaces into full-scale “carding-as-a-service” platforms reveals just how mature and accessible the underground economy for stolen payment data has become.

In this session, Rapid7 researchers will explain how modern carding marketplaces operate like legitimate online businesses, offering storefronts, customer support, and automated tools. We’ll explore how these platforms make (...)]]></description>
					         <pubDate>Tue, 24 Feb 2026 00:03:41 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[APIセキュリティ入門：リスクの全体像とAkamaiの防御アプローチを学ぶ]]></title>
					         <link>https://tecnowebinars.com/webinar/109694/apiakamai/akamai-apac</link>
					         <description><![CDATA[近年、企業が提供するアプリケーションやサービスの多くがAPIを通じてデータをやり取りするようになり、APIはビジネスの中核を担う存在となっています。
しかしその一方で、APIを狙った攻撃は年々増加しており、情報漏えい、不正アクセス、サービス停止といった深刻な被害を引き起こすケースも後を絶ちません。

本ウェビナーでは、「なぜAPIが攻撃の標的になるのか」、「どのようなリスクが潜んでいるのか」を具体的な事例とともに解説し、AkamaiのAPI Securityソリューションがどのように可視化・防御・運用を支援するかをご紹介します。
デモンストレーションを交えながら、Akamaiならではの包括的なセキュリティアプローチをわかりやすくお伝えします。

このような方におすすめ
・自社のAPIがどのようなリスクに晒されているかを理解したい方
・APIの脆弱性対策を検討しているセキュリティ担当者・アーキテクト
・APIを活用した新規サービスを推進する開発・運用チーム
・セキュリティ戦略の見直しを検討しているマネージャー・リーダー層
 ]]></description>
					         <pubDate>Tue, 06 Jan 2026 00:00:14 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Securing DevOps Pipelines with Real-Time Threat Intelligence]]></title>
					         <link>https://tecnowebinars.com/webinar/109957/securing-devops-pipelines-with-real-time-threat-intelligence/information-security</link>
					         <description><![CDATA[As DevOps continues to redefine software delivery, the rapid pace of innovation has introduced unprecedented security challenges. With attack surfaces expanding across containers, cloud environments, third-party components and repositories, cyber threats are evolving faster than ever. For organizations, the stakes are high: a single compromised dependency or malicious artifact can disrupt operations, (...)]]></description>
					         <pubDate>Sat, 31 Jan 2026 00:03:10 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Securing DevOps Pipelines with Real-Time Threat Intelligence]]></title>
					         <link>https://tecnowebinars.com/webinar/110036/securing-devops-pipelines-with-real-time-threat-intelligence/information-security</link>
					         <description><![CDATA[As DevOps continues to redefine software delivery, the rapid pace of innovation has introduced unprecedented security challenges. With attack surfaces expanding across containers, cloud environments, third-party components and repositories, cyber threats are evolving faster than ever. For organizations, the stakes are high: a single compromised dependency or malicious artifact can disrupt operations, (...)]]></description>
					         <pubDate>Wed, 11 Feb 2026 00:02:48 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Anticipate Attacks Before They Strike: Harness Predictive Threat Intelligence]]></title>
					         <link>https://tecnowebinars.com/webinar/109776/anticipate-attacks-before-they-strike-harness-predictive-threat-intelligence/information-security</link>
					         <description><![CDATA[Despite years of investment in detection, response and post-incident analysis, breaches continue to occur at alarming rates. Why is this happening? The issue isn’t a lack of data or technology—it’s the inability to transform emerging threat signals into actionable insights that empower executives to act swiftly and decisively.

AI and machine learning are (...)]]></description>
					         <pubDate>Tue, 13 Jan 2026 00:02:19 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Threat Intelligence Unpacked Episode 1: How Initial Access Opens the Door to Cyber Breaches]]></title>
					         <link>https://tecnowebinars.com/webinar/110034/threat-intelligence-unpacked-episode-1-how-initial-access-opens-the-door-to-cyber-breaches/fortinet-emea</link>
					         <description><![CDATA[No matter how robust your security, a single careless click can still bring a world of trouble.
In this new video, Jonas Walker, Director of Threat Intelligence for FortiGuard Labs, shares his unique insights from analyzing the tactics and tools of such attacks, revealing their surprising complexity and persistence.

Jonas also shares critical strategies (...)]]></description>
					         <pubDate>Wed, 11 Feb 2026 00:02:18 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Local Pages 101: Everything You Need to Know About Local SEO Content (EU)]]></title>
					         <link>https://tecnowebinars.com/webinar/110170/local-pages-101-everything-you-need-to-know-about-local-seo-content-eu/alchemer</link>
					         <description><![CDATA[Local pages do more than show an address and store hours, they’re a powerful driver of local search visibility, customer trust, and real-world action. In this webinar, we’ll break down what high-performing local pages look like, why they matter for multi-location brands, and how to turn them into revenue-generating assets.

In just 20 (...)]]></description>
					         <pubDate>Wed, 25 Feb 2026 00:00:22 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[[EMEA] Carding-as-a-Service: The Underground Market of Stolen Cards]]></title>
					         <link>https://tecnowebinars.com/webinar/110163/emea-carding-as-a-service-the-underground-market-of-stolen-cards/rapid7</link>
					         <description><![CDATA[The evolution of carding marketplaces into full-scale “carding-as-a-service” platforms reveals just how mature and accessible the underground economy for stolen payment data has become.

In this session, Rapid7 researchers will explain how modern carding marketplaces operate like legitimate online businesses, offering storefronts, customer support, and automated tools. We’ll explore how these platforms make (...)]]></description>
					         <pubDate>Tue, 24 Feb 2026 00:03:41 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[NIS2 Compliance]]></title>
					         <link>https://tecnowebinars.com/webinar/110076/nis2-compliance/ubuntu-and-canonical</link>
					         <description><![CDATA[Open source software supply chain security for critical infrastructure providers within the EU
 ]]></description>
					         <pubDate>Fri, 13 Feb 2026 00:04:38 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Electronic Seals - How They Protect Integrity and Authenticity]]></title>
					         <link>https://tecnowebinars.com/webinar/110329/electronic-seals-how-they-protect-integrity-and-authenticity/entrust-corp</link>
					         <description><![CDATA[Join Entrust experts as they break down the critical role of electronic seals in securing corporate documents. 

This session explores how seals differ from signatures and why they are becoming a mandatory standard for global business.

What you’ll learn:Seals vs. Signatures: 
-Why signatures represent individuals, while seals represent legal entities.
-The Three Pillars of (...)]]></description>
					         <pubDate>Sat, 07 Mar 2026 00:02:54 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[How AI Agents Are Becoming Your Marketing Brain]]></title>
					         <link>https://tecnowebinars.com/webinar/109943/how-ai-agents-are-becoming-your-marketing-brain/treasure-data</link>
					         <description><![CDATA[Too many platforms. Too many agents. Too many disconnected systems trying to “optimize” one tiny piece of the journey. 

This webinar introduces something different: a unified AI decision engine, where your data, agents, campaigns, journeys, messages, and optimization all live in one brain. See what happens when AI stops working in silos (...)]]></description>
					         <pubDate>Fri, 30 Jan 2026 00:03:59 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[How eIDAS 2.0 Impacts IDV for Financial Services]]></title>
					         <link>https://tecnowebinars.com/webinar/110110/how-eidas-20-impacts-idv-for-financial-services/entrust-corp</link>
					         <description><![CDATA[The introduction of eIDAS 2.0 and the related ETSI technical standards (specifically ETSI 119‑461 v2.1.1) marks a significant milestone in how identity proofing is standardized and regulated across the European Union. This webinar will explore the role this evolved identity proofing framework plays in shaping the future of compliance, onboarding, and fraud (...)]]></description>
					         <pubDate>Thu, 19 Feb 2026 00:01:44 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[SOC: Build, Buy, or Hybrid?]]></title>
					         <link>https://tecnowebinars.com/webinar/110175/soc-build-buy-or-hybrid/kaspersky-webinars</link>
					         <description><![CDATA[Is a centralized SOC always the answer? Join our expert discussion on the nuances of SOC strategy. We move beyond simple answers to debate in-house vs. outsourced models and how to pitch ROI to management. From "minimum" services to complex global operations, we’ll analyze how your unique business risks should dictate your (...)]]></description>
					         <pubDate>Wed, 25 Feb 2026 00:02:47 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[From Cost Center to Business Enabler: Building the Case for PKI Modernization]]></title>
					         <link>https://tecnowebinars.com/webinar/110209/from-cost-center-to-business-enabler-building-the-case-for-pki-modernization/keyfactor</link>
					         <description><![CDATA[Certificate volumes are exploding. Lifespans are shrinking. Post-quantum is coming. Yet many teams still rely on duct tape, scripts, and spreadsheets to hold it all together. So, how do you make the business case to modernize your PKI? 

In this webinar, Forrester Consulting shares findings from a new Total Economic Impact™ (TEI) (...)]]></description>
					         <pubDate>Fri, 27 Feb 2026 00:03:14 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Compliance vs. Customer Experience In the Banking Sector]]></title>
					         <link>https://tecnowebinars.com/webinar/110328/compliance-vs-customer-experience-in-the-banking-sector/entrust-corp</link>
					         <description><![CDATA[With abandonment rates for digital onboarding reaching as high as 80% in European banking, the pressure is on to streamline the path from "hello" to "signed". 

This webinar explores how to reduce friction in digital signing workflows while strictly adhering to financial security mandates

What you’ll learn:
- The Cost of Friction: Why up (...)]]></description>
					         <pubDate>Sat, 07 Mar 2026 00:02:54 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[The Luck of the Prepared: Proactive Cybersecurity Before It’s Too Late]]></title>
					         <link>https://tecnowebinars.com/webinar/109828/the-luck-of-the-prepared-proactive-cybersecurity-before-its-too-late/opentext-cybersecurity</link>
					         <description><![CDATA[Modern cyberthreats move fast, evolve faster, and increasingly target the distributed endpoints that keep businesses running. From exploited vulnerabilities to stealthy ransomware operators, defenders can no longer rely on reactive tools or yesterday’s playbooks. The organisations that thrive are those that prepare before incident response becomes a fire drill.

In this webinar, we’ll (...)]]></description>
					         <pubDate>Wed, 21 Jan 2026 00:02:20 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Solving the energy trilemma: Existing and next‑generation infrastructure hand-in-hand]]></title>
					         <link>https://tecnowebinars.com/webinar/110084/solving-the-energy-trilemma-existing-and-next-generation-infrastructure-hand-in-hand/ipe-webcast-channel</link>
					         <description><![CDATA[This webcast will delve into IFM Investors’ integrated approach to advancing the energy transition by simultaneously developing new infrastructure assets and optimising the use of existing ones.

With nearly 30 years of experience in global infrastructure, IFM is distinctively positioned to navigate the complexities of today’s energy landscape. The industry is increasingly shaped (...)]]></description>
					         <pubDate>Sat, 14 Feb 2026 00:03:41 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Under the Hood: WAF Comparison Project 2026 -  Final Test Results and How to Run the Tests Yourself]]></title>
					         <link>https://tecnowebinars.com/webinar/110100/under-the-hood-waf-comparison-project-2026-final-test-results-and-how-to-run-the-tests-yourself/check-point-software</link>
					         <description><![CDATA[As cyber threats continue to evolve, web applications, APIs, and GenAI workloads have become prime targets. While WAFs remain a critical first line of defense, attackers are no longer relying solely on basic OWASP Top 10 techniques. Modern attacks increasingly use evasion strategies, payload padding, and zero-day techniques specifically designed to bypass (...)]]></description>
					         <pubDate>Wed, 18 Feb 2026 00:01:07 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Mastering Threat Hunting: Aligning with Adversary Tactics in 2026]]></title>
					         <link>https://tecnowebinars.com/webinar/109775/mastering-threat-hunting-aligning-with-adversary-tactics-in-2026/information-security</link>
					         <description><![CDATA[Cybercriminal tactics are evolving faster than ever. Adversaries are using increasingly sophisticated techniques to outpace traditional defenses. For threat hunters, it's becoming harder than ever to understand their mindset and methodologies. Without this insight, even the most advanced tools and strategies can fall short, leaving organizations vulnerable to emerging threats.

This session explores (...)]]></description>
					         <pubDate>Tue, 13 Jan 2026 00:02:19 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[[NA] Carding-as-a-Service: The Underground Market of Stolen Cards]]></title>
					         <link>https://tecnowebinars.com/webinar/110162/na-carding-as-a-service-the-underground-market-of-stolen-cards/rapid7</link>
					         <description><![CDATA[The evolution of carding marketplaces into full-scale “carding-as-a-service” platforms reveals just how mature and accessible the underground economy for stolen payment data has become.

In this session, Rapid7 researchers will explain how modern carding marketplaces operate like legitimate online businesses, offering storefronts, customer support, and automated tools. We’ll explore how these platforms make (...)]]></description>
					         <pubDate>Tue, 24 Feb 2026 00:03:41 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Local Pages 101: Everything You Need to Know About Local SEO Content]]></title>
					         <link>https://tecnowebinars.com/webinar/110169/local-pages-101-everything-you-need-to-know-about-local-seo-content/alchemer</link>
					         <description><![CDATA[Local pages do more than show an address and store hours, they’re a powerful driver of local search visibility, customer trust, and real-world action. In this webinar, we’ll break down what high-performing local pages look like, why they matter for multi-location brands, and how to turn them into revenue-generating assets.

In just 20 (...)]]></description>
					         <pubDate>Wed, 25 Feb 2026 00:00:22 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Unlocking Enterprise Potential: The New Era of 5G Wireless WAN for Sites]]></title>
					         <link>https://tecnowebinars.com/webinar/109816/unlocking-enterprise-potential-the-new-era-of-5g-wireless-wan-for-sites/ericsson-enterprise-wireless-cradlepoint</link>
					         <description><![CDATA[Is 5G really making a difference for fixed site connectivity? We have the answer. Join experts from Ericsson for an in-depth exploration of how advanced 5G technology, intelligent failover systems, and seamless SASE integration are driving the next iteration of wireless WAN.

In this 45-minute webinar, you’ll learn:

· The revolutionary capabilities of next-gen (...)]]></description>
					         <pubDate>Mon, 19 Jan 2026 00:01:13 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Duties and Responsibilities of Board Members]]></title>
					         <link>https://tecnowebinars.com/webinar/110060/duties-and-responsibilities-of-board-members/information-systems-security-association</link>
					         <description><![CDATA[The path to the boardroom is often opaque, leaving many accomplished executives uncertain about how boards identify, evaluate, and select directors—and what is truly expected once appointed. This webinar shines a spotlight on the Duties and Responsibilities of Board Members, offering an insider’s perspective on modern governance and board effectiveness. This session (...)]]></description>
					         <pubDate>Fri, 13 Feb 2026 00:02:30 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[From IOC to Action in Minutes: Unlocking Agentic Capabilities in Google Threat Intel]]></title>
					         <link>https://tecnowebinars.com/webinar/110149/from-ioc-to-action-in-minutes-unlocking-agentic-capabilities-in-google-threat-intel/mandiant-intelligence-and-expertise</link>
					         <description><![CDATA[For modern security teams, the gap between detecting a suspicious indicator and fully understanding the threat is often measured in days—time that defenders simply don’t have. Manually correlating data, mapping TTPs, and authoring detection rules creates critical bottlenecks that slow down response and burn out analysts.

Join Tim Gallo, Lead Global Solutions Architect, (...)]]></description>
					         <pubDate>Sat, 21 Feb 2026 00:02:00 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Card Testing, Revenue Pressure, and the New Reality for Payment Companies in 2026]]></title>
					         <link>https://tecnowebinars.com/webinar/109974/card-testing-revenue-pressure-and-the-new-reality-for-payment-companies-in-2026/cloud-security-alliance-cloudbytes</link>
					         <description><![CDATA[Card testing isn’t JUST a “fraud problem.”
It’s an operational and revenue problem.

Most ISOs don’t realize how much card testing is costing them — until they’re already dealing with it.

Card testing attacks don’t usually show up as headline-grabbing breaches.

They show up as:
- Rising authorization and network costs
- Operational fire drills no one budgeted (...)]]></description>
					         <pubDate>Tue, 03 Feb 2026 00:01:19 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[ESET MDR Demo and Q&A]]></title>
					         <link>https://tecnowebinars.com/webinar/110298/eset-mdr-demo-and-qa/eset-threat-research-security-trends</link>
					         <description><![CDATA[Join us for one of our weekly sessions where we do a deep dive into ESET's latest offerings in security software and services. In today's session we will go over ESET's MDR service. Following the demo one of our engineers will be joining us to conduct a Q&A for the audience to (...)]]></description>
					         <pubDate>Thu, 05 Mar 2026 00:02:28 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[SentinelOne Research: Malicious Activism and Nation-State Fronts in Times of Conflict]]></title>
					         <link>https://tecnowebinars.com/webinar/110303/sentinelone-research-malicious-activism-and-nation-state-fronts-in-times-of-conflict/sentinelone</link>
					         <description><![CDATA[What once appeared as spontaneous acts of digital protest is now being strategically weaponized by nation-states and mercenary groups to obscure intent, disrupt operations, and manipulate global narratives.

Join this session with Senior Threat Researcher Jim Walter as he explores how malicious hacktivist activity is being leveraged by nation-states and mercenary groups. 

Through (...)]]></description>
					         <pubDate>Thu, 05 Mar 2026 00:04:49 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[The AI-Powered Adversary: Tracking the New Wave of LLM-Enabled Cyber Attacks]]></title>
					         <link>https://tecnowebinars.com/webinar/110181/the-ai-powered-adversary-tracking-the-new-wave-of-llm-enabled-cyber-attacks/mandiant-intelligence-and-expertise</link>
					         <description><![CDATA[Threat actors are no longer using Artificial Intelligence (AI) just for basic productivity gains; they have entered a new operational phase by deploying novel, AI-enabled malware and evolving their Tactics, Techniques, and Procedures (TTPs) across the entire attack lifecycle.

In this briefing, drawn from the latest Google Threat Intelligence Group (GTIG) reporting, we (...)]]></description>
					         <pubDate>Thu, 26 Feb 2026 00:02:00 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Threat Intelligence: Will AI Make Human Analysts Obsolete?]]></title>
					         <link>https://tecnowebinars.com/webinar/109992/threat-intelligence-will-ai-make-human-analysts-obsolete/information-security</link>
					         <description><![CDATA[AI-enhanced threat intelligence is revolutionizing cybersecurity practices. As automation accelerates, a critical question arises: what role will human analysts play in an increasingly machine-driven landscape? AI isn't a replacement, but a force multiplier. Rather than replacing human expertise, the future of threat intelligence depends on effective human machine collaboration. By fusing human (...)]]></description>
					         <pubDate>Fri, 06 Feb 2026 00:04:12 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Beyond the Perimeter: Stopping Brand Abuse, Credential Exposure, and External Threats]]></title>
					         <link>https://tecnowebinars.com/webinar/109954/beyond-the-perimeter-stopping-brand-abuse-credential-exposure-and-external-threats/infoblox</link>
					         <description><![CDATA[AI-driven adversaries are reshaping how modern cyberattacks begin. Fake domains, impersonation across social platforms and messaging channels, malicious search ads, rogue mobile apps, and leaked credentials on the dark web now form the front lines of attack. These threats operate entirely outside the enterprise and often emerge long before traditional security controls (...)]]></description>
					         <pubDate>Sat, 31 Jan 2026 00:03:06 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Kaspersky ICS CERT Trends and Predictions for 2026]]></title>
					         <link>https://tecnowebinars.com/webinar/109819/kaspersky-ics-cert-trends-and-predictions-for-2026/kaspersky-apac</link>
					         <description><![CDATA[In this webinar, we are taking a look at how cyberthreats in the industrial sector have evolved throughout 2025 and elaborate on what 2026 holds. Speakers will discuss per quarter ICS threat statistics, describe the industries that were most targeted in different regions, explain the most prominent attack cases, and give recommendations (...)]]></description>
					         <pubDate>Tue, 20 Jan 2026 00:02:47 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Digital Fortitude - Episode 3 - Resilience by Design: Navigating Regulation]]></title>
					         <link>https://tecnowebinars.com/webinar/109537/digital-fortitude-episode-3-resilience-by-design-navigating-regulation/fortinet-emea</link>
					         <description><![CDATA[Resilience by Design: Navigating Regulation - DORA, NIS2, and the AI Act are here. How can FSI leaders prove resilience—not just compliance? Learn how automation, vendor oversight, and AI cut audit headaches.
 ]]></description>
					         <pubDate>Tue, 09 Dec 2025 00:02:01 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Beyond the Perimeter: Stopping Brand Abuse, Credential Exposure, and External Threats]]></title>
					         <link>https://tecnowebinars.com/webinar/109953/beyond-the-perimeter-stopping-brand-abuse-credential-exposure-and-external-threats/infoblox</link>
					         <description><![CDATA[AI-driven adversaries are reshaping how modern cyberattacks begin. Fake domains, impersonation across social platforms and messaging channels, malicious search ads, rogue mobile apps, and leaked credentials on the dark web now form the front lines of attack. These threats operate entirely outside the enterprise and often emerge long before traditional security controls (...)]]></description>
					         <pubDate>Sat, 31 Jan 2026 00:03:06 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Chef vs Puppet: Choosing the Right Infrastructure Automation Solution]]></title>
					         <link>https://tecnowebinars.com/webinar/110126/chef-vs-puppet-choosing-the-right-infrastructure-automation-solution/progress</link>
					         <description><![CDATA[Infrastructure automation is at an inflection point. Many teams find themselves spending more time maintaining their automation platforms than delivering safe, repeatable changes. As a result, it leads to increased operational overhead, unpredictable rollout behavior and extra effort to assemble audit evidence. 

 

Join Progress Chef experts for an interactive session comparing (...)]]></description>
					         <pubDate>Fri, 20 Feb 2026 00:04:14 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Mastering Compliance, Controls and Assurance with the ISF SOGP security framework]]></title>
					         <link>https://tecnowebinars.com/webinar/110208/mastering-compliance-controls-and-assurance-with-the-isf-sogp-security-framework/information-security-forum</link>
					         <description><![CDATA[Today’s cyber threat landscape is rapidly shifting, and global regulations continue to multiply, fragment and evolve. New technologies, like AI and post-quantum cryptographic solutions are being deployed at pace—creating governance, risk, and compliance challenges for security teams.

Cyber GRC leaders have to address an almost impossible challenge - how do we protect our (...)]]></description>
					         <pubDate>Fri, 27 Feb 2026 00:03:01 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Informing Your European ETF Strategy: Insights from BBH’s 2026 Global ETF Investor Survey]]></title>
					         <link>https://tecnowebinars.com/webinar/110058/informing-your-european-etf-strategy-insights-from-bbhs-2026-global-etf-investor-survey/etf-stream</link>
					         <description><![CDATA[As the European ETF market enters its next phase of development, understanding investor priorities, regulatory direction and competitive strategy has become increasingly critical.

In this webinar, hosted in partnership with Brown Brothers Harriman, Andrea Murray, VP, European ETF Product at BBH, Gea Blumberg, Co-Head of Europe at Global X, and Stephanie Hanrahan, Partner (...)]]></description>
					         <pubDate>Fri, 13 Feb 2026 00:01:55 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Why Chatbot Assistants Fail in Ops and What Advisor Does Differently]]></title>
					         <link>https://tecnowebinars.com/webinar/110072/why-chatbot-assistants-fail-in-ops-and-what-advisor-does-differently/sciencelogic</link>
					         <description><![CDATA[Prompt-based assistants often fall short in operations because under pressure teams don’t need conversation they need clarity: what matters now, why it matters, and what to do next. Skylar Advisor uses native AI to deliver proactive advisories and explainable next best actions grounded in your telemetry and operational knowledge. 

It also adds (...)]]></description>
					         <pubDate>Fri, 13 Feb 2026 00:04:00 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[From CDP to AI Agents: A Blueprint for Scaling Data and Intelligence]]></title>
					         <link>https://tecnowebinars.com/webinar/110075/from-cdp-to-ai-agents-a-blueprint-for-scaling-data-and-intelligence/treasure-data</link>
					         <description><![CDATA[Data shouldn’t be a bottleneck. Learn how Extraco Banks, a $2.5B+ Texas-based community bank, and its partner Infoverity are democratizing customer data platform (CDP) insights by putting AI agents directly into the hands of the frontline. Join us for a behind-the-scenes look at their strategy, implementation process, and learnings, from setting "stage (...)]]></description>
					         <pubDate>Fri, 13 Feb 2026 00:04:34 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Why Encryption Alone Won’t Stop the Next Generation of Breaches]]></title>
					         <link>https://tecnowebinars.com/webinar/110093/why-encryption-alone-wont-stop-the-next-generation-of-breaches/thales-cybersecurity-solutions</link>
					         <description><![CDATA[Encryption has become a baseline security control — yet data breaches continue to grow in scale and impact. Today’s attackers aren’t breaking cryptographic algorithms; they’re exploiting poor key management, cloud complexity, and a lack of visibility into how encryption is actually deployed and governed.

In this thought-leadership webinar, we’ll explore how modern breaches (...)]]></description>
					         <pubDate>Tue, 17 Feb 2026 00:04:13 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Ransomware in the AI Era: Microsegmentation to Stop Lateral Movement]]></title>
					         <link>https://tecnowebinars.com/webinar/110095/ransomware-in-the-ai-era-microsegmentation-to-stop-lateral-movement/akamai</link>
					         <description><![CDATA[Ransomware isn’t just “an endpoint problem”. Attackers use automation, living-off-the-land techniques, and increasingly AI-assisted reconnaissance to move faster once they’re inside. The difference between a bad day and a business-stopping event is whether they can move laterally and reach your most critical systems.

In this session, we’ll break down the ransomware kill chain (...)]]></description>
					         <pubDate>Wed, 18 Feb 2026 00:00:24 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Unlock Digital Wallet Provisioning— No App Required]]></title>
					         <link>https://tecnowebinars.com/webinar/110283/unlock-digital-wallet-provisioning-no-app-required/entrust-corp</link>
					         <description><![CDATA[Banks and credit unions without mobile apps have historically been excluded from offering Apple Pay and Google Wallet provisioning. With Entrust Web Push Provisioning, issuers can now enable frictionless wallet adds directly from any browser. Learn how to boost activation rates, provide additional payment options to your cardholders, increase top of wallet (...)]]></description>
					         <pubDate>Wed, 04 Mar 2026 00:01:47 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Extiende la protección de WAF más allá del edge]]></title>
					         <link>https://tecnowebinars.com/webinar/109711/extiende-la-proteccion-de-waf-mas-alla-del-edge/akamai-latam</link>
					         <description><![CDATA[A medida que las aplicaciones y las APIs se distribuyen entre entornos cloud, on-premise e híbridos, contar con una protección consistente es esencial, pero complejo.
Sumate a este deep dive sobre Akamai App & API Protector Hybrid y descubrí cómo extender capacidades confiables de WAAP más allá del edge.

Qué vas a aprender:

- Cómo (...)]]></description>
					         <pubDate>Wed, 07 Jan 2026 00:00:16 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Enterprise Automation at Scale: Ensono’s Journey with Ansible]]></title>
					         <link>https://tecnowebinars.com/webinar/110021/enterprise-automation-at-scale-ensonos-journey-with-ansible/red-hat-partner-program-live</link>
					         <description><![CDATA[Driven by the need for speed, consistency, and accuracy, Ensono implemented broad enterprise automation to move away from routine, high-volume tasks. By doing so, their teams shifted their focus toward innovation and strategic priorities rather than manual maintenance. Today, Ensono uses the platform as a centralized management tool for a variety of (...)]]></description>
					         <pubDate>Tue, 10 Feb 2026 00:05:50 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[The Future of CNAPP: Operationalizing Cloud Security in 2026]]></title>
					         <link>https://tecnowebinars.com/webinar/110212/the-future-of-cnapp-operationalizing-cloud-security-in-2026/qualys</link>
					         <description><![CDATA[The definition of cloud risk is rapidly evolving. Today’s attack surface extends far beyond traditional infrastructure to include AI workloads, model supply chains, APIs, and autonomous agents. This shift challenges legacy CNAPP approaches focused primarily on posture management and increases pressure on organizations to deliver continuous compliance in a new regulatory landscape.

Modern (...)]]></description>
					         <pubDate>Fri, 27 Feb 2026 00:04:08 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[People-Powered Security: How to Build a Cyber-Savvy Workforce]]></title>
					         <link>https://tecnowebinars.com/webinar/109871/people-powered-security-how-to-build-a-cyber-savvy-workforce/isc2-security-briefings-emea</link>
					         <description><![CDATA[Cybersecurity is no longer just a technology challenge—it’s a people challenge. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how organizations can reduce risk by empowering employees to recognize, prevent, and respond to cyber threats. 

This webinar will cover practical strategies for creating engaging security awareness (...)]]></description>
					         <pubDate>Sun, 25 Jan 2026 00:00:10 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[People-Powered Security: How to Build a Cyber-Savvy Workforce]]></title>
					         <link>https://tecnowebinars.com/webinar/109882/people-powered-security-how-to-build-a-cyber-savvy-workforce/isc2-security-briefings</link>
					         <description><![CDATA[Cybersecurity is no longer just a technology challenge—it’s a people challenge. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how organizations can reduce risk by empowering employees to recognize, prevent, and respond to cyber threats. 

This webinar will cover practical strategies for creating engaging security awareness (...)]]></description>
					         <pubDate>Sun, 25 Jan 2026 00:00:12 GMT</pubDate>				         
					      </item>
				
							<item>
					         <title><![CDATA[Beyond the Perimeter: Stopping Brand Abuse, Credential Exposure, and External Threats]]></title>
					         <link>https://tecnowebinars.com/webinar/109952/beyond-the-perimeter-stopping-brand-abuse-credential-exposure-and-external-threats/infoblox</link>
					         <description><![CDATA[AI-driven adversaries are reshaping how modern cyberattacks begin. Fake domains, impersonation across social platforms and messaging channels, malicious search ads, rogue mobile apps, and leaked credentials on the dark web now form the front lines of attack. These threats operate entirely outside the enterprise and often emerge long before traditional security controls (...)]]></description>
					         <pubDate>Sat, 31 Jan 2026 00:03:05 GMT</pubDate>				         
					      </item>
				</channel>
					   </rss>
			