Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinars

Harnessing Zero Trust Segmentation with Microsoft Sentinel
As enterprises grapple with complex network infrastructures, effective security monitoring and response requires the centralization of multiple data sources. Leveraging Illumio’s Zero Trust Segmentation workload and traffic insights with Sentinel’s advanced analytics gives security teams deeper visibility into their estate to simplify prioritization and remediation efforts.
Featured on-demand webinars

North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.

Ransomware by the Numbers: Insights, Trends, and Strategies for 2025
AI advancements, next-gen security tools, bigger budgets — despite these efforts, ransomware remains a growing challenge. What’s driving its continued success? And how can you stay ahead? Join us for an exclusive, data-driven webinar exploring the latest research findings of The Global Cost of Ransomware Study.

Simplifying Container Security with Zero Trust
Containers have revolutionized how applications are built and deployed. Yet, securing them can be a big challenge. In this 30-minute webinar, Illumio experts Christer Swartz and Nathan Tran will dive into why container security matters, how Illumio protects containers, and future trends in container security.

Breaking Down New NSA Guidance: A Zero Trust Webinar
It’s rare to see the National Security Agency release new cybersecurity guidance. So when they do, experts across the industry listen carefully.

No Zero Trust Without Microsegmentation
Meet John Kindervag, the Godfather of Zero Trust, and Illumio’s newly-minted Chief Evangelist! For over 10 years now, John has been pioneering a Zero Trust thought leadership and innovation approach to cybersecurity.

Bridging the Zero Trust skill gap with AI
Are you part of the 47% of businesses lacking key personnel to implement cyber Zero Trust initiatives, according to a recent Forrester study? Tackling that skill gap can feel overwhelming, but it doesn't have to be.
All webinars
Zero Trust Segmentation
Simplifying Container Security with Zero Trust
Containers have revolutionized how applications are built and deployed. Yet, securing them can be a big challenge. In this 30-minute webinar, Illumio experts Christer Swartz and Nathan Tran will dive into why container security matters, how Illumio protects containers, and future trends in container security.
Ransomware Containment
Ransomware by the Numbers: Insights, Trends, and Strategies for 2025
AI advancements, next-gen security tools, bigger budgets — despite these efforts, ransomware remains a growing challenge. What’s driving its continued success? And how can you stay ahead? Join us for an exclusive, data-driven webinar exploring the latest research findings of The Global Cost of Ransomware Study.
Cyber Resilience
Illumio and IBM: Building Resiliency for DORA Compliance
January 17, 2025, marks a crucial deadline for financial institutions across the EU. Are you ready to meet the Digital Operational Resilience Act (DORA) compliance requirements? Learn about the crucial role Zero Trust Segmentation plays in building cyber resilience for DORA compliance.
Cloud Security
Inside the Forrester Wave for Microsegmentation Solutions
Join Scott Smith, analyst relations director at Illumio, as he interviews John Kindervag, Illumio’s chief evangelist and the visionary behind zero trust. Discover why microsegmentation is essential for modern networks and what Illumio's top placement in the Forrester Wave means for the future of cybersecurity.
Education
Breaking Boundaries: Empowering Women in Cybersecurity
When it comes to the roles women hold in cybersecurity, it's essential to recognize both the significant progress made and the challenges that remain. It's a nuanced conversation that needs to be had, especially as the tech industry shows no signs of slowing down.
Ransomware Containment
North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?