Welcome to the Cyber Security Workbench.
A practitioner community for people building Zero Trust.
The Cyber Security Workbench is a community for practitioners who want to learn from real-world experience.
It’s a space to explore how technologies are applied, how decisions are made, and how challenges are solved in live environments.
We host regular peer-led sessions for security practitioners tackling real implementation challenges, identity enforcement, safe egress, and usable logging, commonly mapped to Cloudflare One and modern Zero Trust practices.
What is the Cyber Security Workbench?
The Workbench is a practitioner-first community focused on:
Real-world use of Cloudflare One and Zero Trust controls (Access, Gateway/SWG, visibility and logging)
Open discussion around implementation challenges, policy design, exceptions, rollout, and adoption
Peer-led sessions and roundtables that prioritise shared experience over presentations
Practical insight into tools, workflows, and operational realities, how teams actually run, monitor, and improve controls day to day
Sessions are designed for people actively working in cyber environments, including SOC analysts, security engineers, architects, consultants, and security leads, especially those responsible for deploying or operating Cloudflare One (or mapping toward that model).
Learning At The Workbench.
Learning at the Workbench are small, practitioner-led sessions for people implementing and operating Zero Trust controls, often using Cloudflare One as the shared reference point.
Small groups (max 10 people) so everyone can contribute
Chatham House Rule: share what’s useful, without attributing it to individuals or organisations
Peer learning first: what’s working, what isn’t, and what you’d do differently next time
Practical and specific: policy decisions, rollout lessons, exceptions, and real-world trade-offs
Tickets are released for each session on a first come, first served basis. Apply to join the Cyber Security Workbench to be notified as soon as tickets go live.
Our Events.
March — Securing Agentic AI Identity & Access
AI agents and automations are being granted access to internal tools without clear identity, least privilege, or reliable auditability, creating silent bypass and over-privilege risk.
April — Controlling Agentic AI Egress
Agentic workflows increase outbound data movement and make it easier to leak sensitive information to untrusted destinations, often without clear visibility of what left, when, and why.
May — Protecting APIs from AI-Driven Misuse
APIs get abused by “valid-looking” automated calls: hallucinated endpoints, malformed requests, and retry loops that don’t always trigger classic attack detections.
June — Proving What Happened
Teams can’t confidently answer: what did the agent do, what did it access, and what data moved? Without consistent telemetry, incidents turn into guesswork and audits become painful.
Apply to be part of the Cyber Security Workbench.
Get notified when new Learning at the Workbench sessions and events drop.