Skip Navigation

Webinar

Identity, edge, and trust: Insights from the 2026 Cyber Threat Outlook Report

 From compromised identities to vulnerable edge devices and social engineering, this webinar explores the access points attackers are exploiting most often. 

Drawing on insights from Field Effect’s 2026 Cyber Threat Outlook Report, our security experts will walk through the patterns we’re observing across real-world security events and what they reveal about how attacks are unfolding inside organizations.

Rather than focusing on isolated incidents, this session highlights the underlying trends connecting many of today’s breaches—and the practical lessons security teams and IT leaders should take from them

In this session, we’ll explore:

  • Why identity compromise is becoming one of the most reliable ways for attackers to gain access to organizations
  • How vulnerabilities in edge devices such as firewalls and VPN appliances are increasingly being used as entry points
  • Why attacks that exploit human trust, including phishing and social engineering, continue to succeed
  • The key patterns and observations drawn from Field Effect’s 2026 Cyber Threat Outlook Report
  • What these trends reveal about where organizations should focus their security efforts

Watch the webinar recording