Illumio webinars
Watch live or on-demand to learn how you can stop ransomware, contain cyberattacks, and reduce risk on your path to Zero Trust
Upcoming webinars
Featured on-demand webinars

North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.

Ransomware by the Numbers: Insights, Trends, and Strategies for 2025
AI advancements, next-gen security tools, bigger budgets — despite these efforts, ransomware remains a growing challenge. What’s driving its continued success? And how can you stay ahead? Join us for an exclusive, data-driven webinar exploring the latest research findings of The Global Cost of Ransomware Study.

Simplifying Container Security with Zero Trust
Containers have revolutionized how applications are built and deployed. Yet, securing them can be a big challenge. In this 30-minute webinar, Illumio experts Christer Swartz and Nathan Tran will dive into why container security matters, how Illumio protects containers, and future trends in container security.

Breaking Down New NSA Guidance: A Zero Trust Webinar
It’s rare to see the National Security Agency release new cybersecurity guidance. So when they do, experts across the industry listen carefully.

No Zero Trust Without Microsegmentation
Meet John Kindervag, the Godfather of Zero Trust, and Illumio’s newly-minted Chief Evangelist! For over 10 years now, John has been pioneering a Zero Trust thought leadership and innovation approach to cybersecurity.

Bridging the Zero Trust skill gap with AI
Are you part of the 47% of businesses lacking key personnel to implement cyber Zero Trust initiatives, according to a recent Forrester study? Tackling that skill gap can feel overwhelming, but it doesn't have to be.
All webinars
Ransomware Containment
North, South, East West: Navigating Zero Trust
On average, every 1 MB of north-south traffic entering a data center or cloud will create 20 MB of east-west traffic workload-to-workload. If you're not building zero-trust security for both perimeter and interior traffic, you're leaving blind spots across network that attackers will exploit.
Zero Trust Segmentation
Ebay's Segmentation Story: A Fireside Chat
Three years ago, Brian Hansen, a 22-year eBay veteran, was tasked with leading the implementation of Illumio — despite having no prior experience in firewalls or cybersecurity. That quickly proved to be no issue. Within two years, eBay had successfully onboarded all 3,000 servers, thanks to Brian and Illumio's collaboration.
Ransomware Containment
Illumio & AWS Ransomware Protection Dev Day
Join Illumio and AWS for an interactive, hands-on event where you'll learn how Illumio's Zero Trust Segmentation platform can ensure you're prepared to defend against the next ransomware attack. Illumio helps you protect your crown jewels and, ultimately, your most important asset - your organization's reputation.
Zero Trust Segmentation
Bridging the Zero Trust skill gap with AI
Are you part of the 47% of businesses lacking key personnel to implement cyber Zero Trust initiatives, according to a recent Forrester study? Tackling that skill gap can feel overwhelming, but it doesn't have to be.
Zero Trust Segmentation
Securing Your Network in Every Direction with Zero Trust
Join this webinar to learn more about how Illumio and Netskope are partnering to provide you with the foundational elements you need to achieve your organization's Zero Trust goals. You'll hear how Illumio's Zero...
Zero Trust Segmentation
Securing Your Network and Systems with a Zero Trust Architecture
Adopting a Zero Trust architecture is increasingly recognized as a critical strategy for securing networks and systems in the face of evolving cyber threats. This MegaCast hosted by ActualTech Media is tailored for IT professionals and managers aiming to implement or enhance Zero Trust frameworks within their organizations.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?