Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinars
Featured on-demand webinars

North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.

Ransomware by the Numbers: Insights, Trends, and Strategies for 2025
AI advancements, next-gen security tools, bigger budgets — despite these efforts, ransomware remains a growing challenge. What’s driving its continued success? And how can you stay ahead? Join us for an exclusive, data-driven webinar exploring the latest research findings of The Global Cost of Ransomware Study.

Simplifying Container Security with Zero Trust
Containers have revolutionized how applications are built and deployed. Yet, securing them can be a big challenge. In this 30-minute webinar, Illumio experts Christer Swartz and Nathan Tran will dive into why container security matters, how Illumio protects containers, and future trends in container security.

Breaking Down New NSA Guidance: A Zero Trust Webinar
It’s rare to see the National Security Agency release new cybersecurity guidance. So when they do, experts across the industry listen carefully.

No Zero Trust Without Microsegmentation
Meet John Kindervag, the Godfather of Zero Trust, and Illumio’s newly-minted Chief Evangelist! For over 10 years now, John has been pioneering a Zero Trust thought leadership and innovation approach to cybersecurity.

Bridging the Zero Trust skill gap with AI
Are you part of the 47% of businesses lacking key personnel to implement cyber Zero Trust initiatives, according to a recent Forrester study? Tackling that skill gap can feel overwhelming, but it doesn't have to be.
All webinars
Cyber Resilience
Maximizing Cyber Resilience with Microsoft
Microsoft has deployed Illumio across its entire corporate IT environment — a strong validation of Illumio technology and its ability to deliver breach containment at scale. In this webinar, learn how new Illumio integrations with Microsoft Sentinel and Security Copilot help organizations detect threats faster, contain breaches quickly, and improve cyber resilience.
Building Resilience on the Road to Compliance
Staying compliant is more challenging than ever. Evolving technical standards, strict enforcement, and new mandates like DORA are front and center. From GDPR and HIPAA to PCI DSS, the pressure is on. Success starts with understanding the risks across your environment, like risky connections and hidden vulnerabilities, and having the solutions to fix them.
Illumio Insights: Find and Contain Cloud Threats Instantly
It takes an average of 292 days to detect and contain a breach — and 44% of organizations admit they can’t respond fast enough. Attackers may already be inside, moving undetected across your hybrid cloud as legacy tools fail to catch and contain them. The solution? Illumio Insights — the first Cloud Detection and Response (CDR) solution built on an AI security graph.
Cyber Resilience
The Illusion of Cyber Control
Cyber budgets keep climbing. But so do breaches and business disruptions. In today’s increasingly complex threat landscape, throwing money at the problem isn’t enough. Discover how Zero Trust helps you get more value and resilience from every dollar you spend.
Microsegmentation
How Zero Trust Segmentation Reduces Zero-Day Vulnerabilities and Protects Assets
Join Kyndryl and Illumio for an exclusive session tailored for security and IT leaders in financial services. Cxplore how Kyndryl and Illumio can help you build a resilient Zero Trust architecture.
How SWACRIT Systems and ROS\\TECH Closed the Segmentation Gap
Modern IT environments demand more than strong identity controls and traditional VLAN strategies. For SWACRIT (with the help of their partner, ROS\\TECH), that meant addressing one of their final security blind spots: network segmentation.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?