Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinars
Featured on-demand webinars

North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.

Ransomware by the Numbers: Insights, Trends, and Strategies for 2025
AI advancements, next-gen security tools, bigger budgets — despite these efforts, ransomware remains a growing challenge. What’s driving its continued success? And how can you stay ahead? Join us for an exclusive, data-driven webinar exploring the latest research findings of The Global Cost of Ransomware Study.

Simplifying Container Security with Zero Trust
Containers have revolutionized how applications are built and deployed. Yet, securing them can be a big challenge. In this 30-minute webinar, Illumio experts Christer Swartz and Nathan Tran will dive into why container security matters, how Illumio protects containers, and future trends in container security.

Breaking Down New NSA Guidance: A Zero Trust Webinar
It’s rare to see the National Security Agency release new cybersecurity guidance. So when they do, experts across the industry listen carefully.

No Zero Trust Without Microsegmentation
Meet John Kindervag, the Godfather of Zero Trust, and Illumio’s newly-minted Chief Evangelist! For over 10 years now, John has been pioneering a Zero Trust thought leadership and innovation approach to cybersecurity.

Bridging the Zero Trust skill gap with AI
Are you part of the 47% of businesses lacking key personnel to implement cyber Zero Trust initiatives, according to a recent Forrester study? Tackling that skill gap can feel overwhelming, but it doesn't have to be.
All webinars
Zero Trust Segmentation
ZTNA + ZTS: Delivering End-to-End Zero Trust
Organizations are rapidly adopting a Zero Trust security mindset to combat growing cyberthreats and support scattered workforces and interconnected workloads everywhere. Zero Trust Network Access (ZTNA) and Zero Trust Segmentation (ZTS) are essential pillars of any Zero Trust architecture. Together, they help reduce attack surfaces, contain breaches, and better secure user access to critical applications.
Endpoint Security
Ransomware Starts at the Endpoint
Attackers love targeting users. Traditional endpoint security solutions claim to stop breaches, but the reality is that devices still get breached. Vendors are playing cat and mouse to prevent exploitation of new zero-days to no avail. Endpoint security solutions needs time to adapt to new attack vectors, time you don't have.
Zero Trust Segmentation
Enhancing your Ransomware defenses through Zero Trust Segmentation
In this webinar, Paul Dant, Senior Director – Cybersecurity Strategy at Illumio, and Trevin Edgeworth, Red Team Practice Director at Bishop Fox, discuss the findings from the recent Bishop Fox Ransomware Emulation Report which quantifies the complementary benefits of Zero Trust Segmentation to existing Detection and Response capabilities, and how it enhances an organization’s defense in depth approach, making them more resilient to ransomware attacks.
Microsegmentation
The Time for Microsegmentation Is NOW
Join Illumio’s CTO and Co-Founder, PJ Kirner and guest speaker David Holmes, Senior Analyst at Forrester, and author of the Forrester New Wave™️: Microsegmentation, Q1 2022, for a fireside chat where they will discuss all manner of things related to microsegmentation.
Cloud Security
Agentless Cloud Security: Embrace the Cloud Without Blind Spots
Illumio CloudSecure bridges the visibility gap incurred in cloud deployments with agentless controls that provide real-time insights translated into refined security policy, orchestrated with cloud-native controls - reducing the attack surface of the network.
Cyber Resilience
Zero Trust Segmentation: The Key to Cyber Resilience
If cyber threats are keeping you up at night, you’re not alone. New research by analyst firm Enterprise Strategy Group found that 76% of surveyed organizations have suffered ransomware attacks in the past two years alone. Software supply chain attacks are not far behind, with 66% of organizations experiencing at least one in that same timeframe. Digital transformation has led to hyperconnectivity and more attack vectors than ever before. Breaches are now inevitable.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?