Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinars
Featured on-demand webinars

North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.

Ransomware by the Numbers: Insights, Trends, and Strategies for 2025
AI advancements, next-gen security tools, bigger budgets — despite these efforts, ransomware remains a growing challenge. What’s driving its continued success? And how can you stay ahead? Join us for an exclusive, data-driven webinar exploring the latest research findings of The Global Cost of Ransomware Study.

Simplifying Container Security with Zero Trust
Containers have revolutionized how applications are built and deployed. Yet, securing them can be a big challenge. In this 30-minute webinar, Illumio experts Christer Swartz and Nathan Tran will dive into why container security matters, how Illumio protects containers, and future trends in container security.

Breaking Down New NSA Guidance: A Zero Trust Webinar
It’s rare to see the National Security Agency release new cybersecurity guidance. So when they do, experts across the industry listen carefully.

No Zero Trust Without Microsegmentation
Meet John Kindervag, the Godfather of Zero Trust, and Illumio’s newly-minted Chief Evangelist! For over 10 years now, John has been pioneering a Zero Trust thought leadership and innovation approach to cybersecurity.

Bridging the Zero Trust skill gap with AI
Are you part of the 47% of businesses lacking key personnel to implement cyber Zero Trust initiatives, according to a recent Forrester study? Tackling that skill gap can feel overwhelming, but it doesn't have to be.
All webinars
Ransomware Containment
How to Stop Crippling Breaches with End-to-End Segmentation
In this webinar, Neil Patel, Sr. Technical Marketing Engineer, unpacks why and demos how to use Illumio Core and Illumio Edge for end-to-end segmentation.
Zero Trust Segmentation
Introducing Illumio Edge: Bringing Zero Trust To The Endpoint
Join our upcoming webinar to discover how to contain threats to a single infected machine by default, before other tools can even detect and respond.
Zero Trust Segmentation
Enabling End-to-End Zero Trust in a Distributed World
Join Illumio, the company recently featured as a Zero Trust Wave Leader by Forrester, to learn how to deploy end-to-end Zero Trust segmentation from endpoints to datacenters and the cloud.
Microsegmentation
Simplify & Automate Workload Security with Illumio and Palo Alto Networks
See the following when you watch this webinar:
• Key challenges and customer requirements to secure today's workloads.
• An overview of the Illumio and Palo Alto Network's solution, integration use cases, and integrated architectures for effective micro-segmentation and Zero Trust.
• Live demonstration and best practices to reduce complexity and help you better operationalize dynamic security policies for workloads in Panorama and in Palo Alto Networks NGFWs.
Microsegmentation
6 Micro-Segmentation Requirements with Saunderson House
Micro-segmentation is a very effective approach to preventing unauthorized lateral movement within your organization, and it is no accident that it has become a key tenet of a Zero Trust framework. Join Illumio and our special guest Saunderson House for a one-hour journey through the six key functions and capabilities needed for effective micro-segmentation deployments.
Cyber Resilience
Network Segmentation Without a Single Firewall Rule
To prevent malware epidemics that are designed to move laterally, Stowe Australia needed stronger data center segmentation, limiting the spread of breaches by blocking unauthorized East-West traffic and reducing lateral movement.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?