Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinars
Featured on-demand webinars

North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.

Ransomware by the Numbers: Insights, Trends, and Strategies for 2025
AI advancements, next-gen security tools, bigger budgets — despite these efforts, ransomware remains a growing challenge. What’s driving its continued success? And how can you stay ahead? Join us for an exclusive, data-driven webinar exploring the latest research findings of The Global Cost of Ransomware Study.

Simplifying Container Security with Zero Trust
Containers have revolutionized how applications are built and deployed. Yet, securing them can be a big challenge. In this 30-minute webinar, Illumio experts Christer Swartz and Nathan Tran will dive into why container security matters, how Illumio protects containers, and future trends in container security.

Breaking Down New NSA Guidance: A Zero Trust Webinar
It’s rare to see the National Security Agency release new cybersecurity guidance. So when they do, experts across the industry listen carefully.

No Zero Trust Without Microsegmentation
Meet John Kindervag, the Godfather of Zero Trust, and Illumio’s newly-minted Chief Evangelist! For over 10 years now, John has been pioneering a Zero Trust thought leadership and innovation approach to cybersecurity.

Bridging the Zero Trust skill gap with AI
Are you part of the 47% of businesses lacking key personnel to implement cyber Zero Trust initiatives, according to a recent Forrester study? Tackling that skill gap can feel overwhelming, but it doesn't have to be.
All webinars
Zero Trust Segmentation
Illumio & Splunk: An Integrated Approach to Your Zero Trust Journey
Investing in a Zero Trust approach to security helps organizations mitigate cyber threats by improving their preventative controls and enhancing their ability to detect and respond to incidents.
Cloud Security
5 Security Design Practices for Your Modern Data Center
Today’s data center network is changing with the adoption of technologies like SDN, HCI, and virtualization that enable greater IT efficiency, programmability, and network agility to enable your business to move faster with the delivery of dynamic workloads anytime, anywhere.
Zero Trust Segmentation
Segment in Minutes: Accelerate Your Path to Zero Trust
We can help to accelerate your Zero Trust Segmentation journey with a new approach to how you manage your segmentation security policy. Illumio Core allows your organization to safely create security policy at scale on time, simplify cloud migrations, and expand the scope of your Zero Trust Architecture. Join us to hear how Illumio Core will help guide you on your journey to Zero Trust success.
Zero Trust Segmentation
Zero Trust: Practical Steps to go from Strategy to Reality
Zero Trust is a security strategy and framework based on the concept that you must never trust, always verify. Learn practical ways to implement Zero Trust with confidence. Align to Forrester’s framework for Zero Trust and minimize your attack surface, improve visibility, reduce complexity and cost, and strengthen your overall security to protect your business from data loss and cyber breaches.
Microsegmentation
Micro-Segmentation and Compliance
In this presentation we cover the basics of micro-segmentation, understand how effective this control is in hindering attackers, look at what has driven change in compliance requirements, and wrap up by looking at a specific mandate and how micro-segmentation can be used to achieve it.
Zero Trust Segmentation
Simplify Achieving Zero Trust with Segmentation - Demonstration
Traffic flows in the data center can be hugely complex and so creating security rules for that is equally complex. View this demo to see how to simplify the process to save time and money in achieving Zero Trust. See how Illumio Core delivers real-time application dependency mapping and simplified policy creation to prevent lateral movement and greatly reduce your organization's cyber risk.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?