AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
11th March 2026 | CSA XCON 2026
CSA XCON 2026 is the leading international cybersecurity conference, intended to promote both the cyber resilience of nations and the world through the means of sharing knowledge, developing skills, and strategic collaborating. Under the highlight of Cybersecurity, the event is organized by the CSA Uttarakhand Chapter, and it also marks the famous return of CSA XCON to Uttarakhand after so long, more than a decade, which positions the area as a developing center for the cybersecurity sector. The venue for the conference is Dehradun, at the Himalayan Cultural Center, which is a place very suitable for the hosting of large-scale, high-impact national and international technology events. CSA XCON 2026 is an event for senior government officials, industry leaders, policymakers, cybersecurity professionals, researchers, startups, and students that is organized in such a way as to enable meaningful cross-sector engagement. Key Highlights Event: CSA XCON 2026 Theme: Cybersecurity Host: CSA Uttarakhand Chapter Dates: 11-14 March 2026 Venue: Himalayan Cultural Centre, Dehradun Scale: 1000+ participants | 30+ national & international speakers The leading aspect of CSA XCON 2026 is its varied parallel, active training programs and competitive hackathons on 11–12 March in the year 2026. The entire package of training consists of various areas of cybersecurity, such as offensive security, hardware and IoT security, cloud and application security, and so on, along with threat intelligence and emerging attack techniques. The experienced global practitioners designed and delivered the sessions. The participants not only get the theory but also the practice through real-world scenarios, practical labs, and skill-based learning that is in tune with current industry and national security needs. The main event of the conference is going to be held from 13th to 14th March 2026, featuring high-impact keynote speeches, expert technical presentations, and strategic panel discussions. The discussion will include issues such as ethical hacking, cloud and application security, governance, risk and compliance, threat intelligence, and future-ready technologies that are indispensable for the survival of organizations and nations in the digital world. Moreover, the CSA XCON 2026 event is a global dialogue and collaboration for the future digital and cybersecurity policy of India that convenes the stakeholders. Thus, it is a conference with a non-conventional approach to creating a significant impact on India's cybersecurity ecosystem and policy-aligned digital security initiatives.
Hybrid (Both) • Paid • Part of Cloud Security Alliance
11th March 2026 | InsightEvents: Technology & Regulation in the Fnancial Sector 2026
Technology & Regulation in the Financial Sector 2026 is an annual conference focused on the intersection of technology, compliance, and legal requirements within financial services. The event is designed for professionals working with regulatory implementation, outsourcing, and risk management in technology driven environments. It addresses how evolving regulations affect the use of AI, cloud services, third party IT providers, and critical infrastructure across the financial sector.
The conference emphasizes practical experience and real world challenges, with sessions centered on governance, supplier control, documentation, and compliance operations. Attendees gain insight into current cyber threats, regulatory expectations, and how frameworks such as DORA and the EU AI Act are applied in practice. The event also highlights how effective compliance can support stronger risk management and become a strategic advantage for organizations operating in highly regulated financial environments.
Physical • Paid • Part of Insight Events Denmark
11th March 2026 | DiCyFor & AI Security Summit Bangkok 2026
DICYFOR & AI Security Summit Bangkok brings together regional and international cybersecurity stakeholders to examine the growing impact of AI on cyber risk and defense strategies. The event addresses how intelligent threats are changing the security landscape and what organizations must do to stay resilient across digital ecosystems.
Through expert led discussions and collaborative sessions, attendees gain insight into practical methods for improving threat detection, accelerating response, and strengthening governance. The Bangkok edition places strong emphasis on shared learning, policy to practice alignment, and cross sector cooperation, making it a valuable forum for professionals navigating complex and rapidly evolving cyber challenges.
Physical • Paid • Part of Nimat Media
11th March 2026 | Technology First: Ohio Information Security Conference 2026
The Ohio Information Security Conference 2026 returns with a clear message: act fast or fall behind. This year’s theme, "Next Threat. Next Move.", sets the tone for a focused look at how organizations can anticipate and respond to evolving cyber challenges. Attendees will explore the latest in incident response, AI-driven threats, and proactive defense strategies. The conference creates an environment where learning, collaboration, and execution align to strengthen organizational readiness.
Held in Dayton, OISC has built its reputation as a hands-on, community-driven gathering for cybersecurity professionals. It draws CISOs, analysts, and technical leaders who share practical insights and real experiences. Beyond presentations, it’s a place where peers connect, vendors showcase live solutions, and ideas turn into strategies. The event continues to serve as a trusted platform for those serious about advancing cybersecurity across Ohio and beyond.
Physical • Paid • Part of Technology First
11th March 2026 | The Autonomous Future: The Power of GRC Engineering
Autonomous trust operations and the rise of GRC Engineering take center stage in this forward looking session focused on the future of compliance and risk management. As AI and automation reshape security programs, the discussion examines how trust automation and compliance as code are redefining how organizations manage governance, risk and compliance at scale.
The webinar explores how AI is transforming evidence collection, risk identification and remediation, while outlining the organizational models that support a modern GRC Engineering function. Through practical examples, speakers explain how manual and reactive processes are evolving into automated, intelligence driven systems designed for continuous compliance. The session is tailored for technical and strategic leaders seeking to modernize their GRC programs and prepare for a more autonomous approach to trust management.
Company_Webinar • Part of Drata
11th March 2026 | Digital Parasite in Action: Validate Top 10 Techniques with Picus
Adversaries are shifting from forced entry to long term persistence within enterprise environments. This webinar demonstrates how to detect and validate the top ten techniques highlighted in the Red Report 2026 using pre configured threat validation templates. The session explores how organizations can identify behaviors linked to critical malware and advanced persistent threats observed across 1.1 million samples.
During the live demo, high severity threats such as TinkyWinkey, Raven, and XLoader will be simulated to assess the resilience of existing security controls. Attendees will see dynamic threat templates mapped to real attack behaviors, along with automated reporting and mitigation paths designed to validate defensive effectiveness.
Company_Webinar • Part of Picus Security
Engineering repeatable risk reduction for cyber physical systems requires more than isolated tools and informal processes. This session focuses on the growing security challenges facing industrial, healthcare and public sector environments as CPS adoption expands. It examines why fragmented teams and tool centric approaches often fail to deliver meaningful risk reduction, compliance readiness or operational resilience.
The discussion introduces a structured CPS Protection Program that aligns people, processes and technology into a coordinated model for managing risk. Attendees will explore how to define clear ownership between asset owners and security leaders, establish governance frameworks and RACIs, prioritize CPS risks and demonstrate measurable value to the business. The webinar is designed for organizations seeking a more systematic and sustainable approach to securing cyber physical environments.
Company_Webinar • Part of Claroty
AI driven threats and ransomware are expanding the Microsoft 365 and Azure attack surface faster than many security teams can manage. This webinar brings together insights from Forrester research and Druva to examine how AI, GenAI controls, and cloud adoption are reshaping risk inside Microsoft environments. The discussion focuses on why AI privacy and data protection are now major budget drivers and how attackers are moving beyond traditional perimeter defenses.
The session also looks closely at the real cost of modern ransomware, including operational disruption, data theft, extortion, and insurance impact, especially in cloud environments with inconsistent security controls. Attendees will gain practical guidance on where organizations typically focus after a breach and how to strengthen protection, governance, and recovery across Microsoft platforms using data driven security strategies.
Company_Webinar • Part of Druva
11th March 2026 | Human + Tech Defense: The Complete Security Strategy
Security strategies for 2026 require equal focus on people and technology, and this webinar shows how MSPs can bring both together into one practical defense model. The session centers on the growing role of human risk alongside technical threats and explains why modern attackers target behavior, awareness, and processes as much as infrastructure.
The discussion covers the key security challenges MSPs are expected to face in 2026 and shares clear, actionable steps to strengthen both human and technical controls. Attendees will gain insight into building a balanced security approach that protects users, reduces risk, and helps MSPs position security as a business advantage for their customers.
Company_Webinar • Part of usecure
11th March 2026 | How to secure your brand with DMARC as email threats evolve
Email impersonation, phishing and Business Email Compromise are accelerating as attackers use AI to scale their tactics, putting brands at greater risk. This session focuses on how DMARC strengthens domain protection by ensuring only authorized senders can use your organization’s email domain. It highlights why DMARC is considered a foundational control for stopping spoofing attempts before they reach employees and customers.
The webinar also examines how Red Sift OnDMARC helps organizations move quickly from monitoring to full enforcement through automation and simplified reporting. Attendees will see how features such as DNS configuration monitoring reduce the risk of subdomain hijacking and domain takeover. The discussion provides practical guidance for turning DMARC into a scalable, long term defense against evolving email threats.
Company_Webinar • Part of Red Sift
Incident response strategies built for a pre AI environment are no longer enough for today’s Microsoft 365 and Azure ecosystems. This session examines how AI driven tools, constant integrations and expanding cloud services are reshaping risk, and why many organizations still face critical readiness gaps when incidents occur. Experts from Druva and Forrester discuss what effective cyber readiness looks like in a cloud first world and where traditional playbooks fall short.
The discussion focuses on identifying weaknesses before they surface during an active breach, improving coordination across Security, IT, Risk and Legal teams and building a unified response plan. Attendees will also gain insight into modernizing cloud incident response for Microsoft environments, strengthening recovery capabilities and ensuring the right data and processes are in place to respond quickly and confidently.
Company_Webinar • Part of Druva
11th March 2026 | National Security Cybersecurity and Critical Infrastructure Conference 2026
The National Security Cybersecurity and Critical Infrastructure Conference 2026 brings together government, military, academic, and industry professionals who work on securing the systems that support national operations. It focuses on the growing complexity of infrastructure networks and the risks that come with their interconnected nature. Participants explore the challenges created by physical and digital dependencies across energy, transportation, communications, and public services, along with the strategic decisions needed to strengthen resilience. The program highlights how federal, state, and local partners can coordinate more effectively in the face of evolving threats.
A key feature of the event is the cybersecurity preparedness exercise modeled after the JACK VOLTAIC activities of the Army Cyber Institute. This hands on scenario allows attendees to examine gaps, test response procedures, and understand how different sectors react when critical infrastructure is disrupted. It provides a realistic environment to build awareness, improve planning, and reinforce collaboration among all stakeholders involved in national security.
Physical • Paid • Part of AFCEA
11th March 2026 | Building a Friction-Free Release Cycle
Release delays often come from friction between fast moving development teams and security processes that slow delivery. This webinar focuses on how organizations can align developer and security pipelines to reduce bottlenecks while still identifying and fixing vulnerabilities early in the release cycle.
ReversingLabs and DefectDojo explain practical ways to detect malicious components, uncover software tampering, and manage security debt without sacrificing speed. The session shows how using both platforms together helps teams prioritize findings, track remediation, and maintain momentum from build to release. It is designed for organizations looking to improve vulnerability management while keeping development workflows efficient and predictable.
Company_Webinar • Part of ReversingLabs
11th March 2026 | Modernizing Data Sanitization for the Age of AI: Securing the Future of Finance
Enterprise finance teams are facing growing data risk as AI driven modernization accelerates across IT environments. This webinar focuses on why data sanitization is often overlooked during refresh cycles, migrations, and decommissioning, and how those gaps create exposure as AI environments become more distributed and data intensive. The discussion centers on securing sensitive data throughout the IT asset lifecycle while maintaining control during rapid change.
Blancco and IBM share practical guidance on how modern data sanitization supports enterprise AI initiatives and strengthens governance as adoption scales. The session connects sanitization practices to lifecycle management and explains how verifiable data protection helps organizations reduce risk, protect end of life assets, and move forward with greater confidence in AI driven environments.
Company_Webinar • Part of Blancco
11th March 2026 | Building loyalty under pressure in modern travel platforms
Travel and hospitality platforms are balancing seamless customer experiences with growing fraud exposure. This webinar examines how convenience across booking, account access, and loyalty programs can expand the attack surface. With industry research estimating an average of 11 million dollars in annual fraud losses, the session highlights how compromised accounts can lead to loyalty theft, high value bookings, and disputes that surface weeks later.
Speakers explore why trust can no longer be assumed and how session level evaluation helps detect risk earlier. The discussion covers fraud patterns across the travel journey, high signal indicators including device level signals, and how teams apply selective controls to protect conversion while reducing financial and operational impact.
Company_Webinar • Part of Fingerprint
11th March 2026 | AKJ Associates: e-Crime & Cybersecurity Congress London 2026
This flagship London event serves as a central meeting point for CISOs, analysts, and investigators from both public and private sectors. Discussions cover advanced threat detection, response strategies, and new security models shaped by AI and automation.
The congress combines technical and strategic viewpoints, ensuring attendees gain insights they can apply immediately. It’s known for its direct discussions, honest assessments of risk, and a strong emphasis on community-driven learning across all industries.
Physical • Paid • Part of AKJ Associates
11th March 2026 | Bridging the Gap: Inventory, CMDB and Intelligent Service Workflows
Inventory accuracy, CMDB integrity and intelligent service workflows play a critical role in strengthening an organization’s security posture. This webinar focuses on building a unified inventory foundation within ITSM environments to improve visibility across the technology landscape, which directly impacts risk management and control. By ensuring assets are accurately discovered and tracked in real time, organizations reduce blind spots that often lead to unpatched systems and unmanaged endpoints.
The session explains how Ivanti Neurons uses dynamic data, automation and proactive self healing to maintain system reliability and support faster response to configuration or compliance issues. Integration with major service platforms enhances coordinated workflows, while real time discovery and edge intelligence help identify unknown or unauthorized assets. The discussion highlights how improved asset visibility and automated service processes contribute to stronger governance, reduced operational risk and better overall security control.
Company_Webinar • Part of Ivanti
11th March 2026 | How IT and finance can collaborate to take control of SaaS spend
Uncontrolled SaaS usage is creating hidden security gaps as finance and IT lose visibility into who has access to critical business applications. This webinar focuses on how collaboration between IT and finance helps uncover shadow IT, reduce offboarding risks, and strengthen access governance across a growing SaaS environment.
The discussion shows how better visibility into SaaS spend also improves security by identifying unmanaged tools, preventing former employees from retaining access, and tightening control over application identities. Real examples highlight how aligning procurement, finance, and IT teams reduces risk while bringing order to SaaS sprawl, turning spend management into a practical layer of cybersecurity defense.
Company_Webinar • Part of 1Password
11th March 2026 | CyberBay Summit 2026
Join us March 11-13, 2026, at the JW Marriott Tampa Water Street for the premier gathering of cybersecurity’s brightest minds. CyberBay Summit 2026 brings together national leaders from military, academia, and the private sector to bridge the gap between emerging threats and actionable defenses. This is more than a conference; it is the national epicenter for democratizing cybersecurity and fostering a culture of collective resilience.
Physical • Paid • Part of Cyber Florida at USF
11th March 2026 | Retail Secure Conference 2026
Retail Secure Conference is a leading Canadian event focused on loss prevention, retail security, and the growing intersection between physical and digital threats. Organized by the Retail Council of Canada, the conference brings together retail leaders, loss prevention professionals, cybersecurity teams, and law enforcement partners to address organized retail crime, fraud, and emerging security risks. The event is designed for hands on learning and real world discussion, with sessions that reflect the evolving challenges facing modern retail environments.
Cybersecurity plays a central role through discussions on data protection, digital fraud, cloud technologies, AI driven security tools, and secure retail operations. Attendees gain practical insight into how technology, collaboration, and policy can reduce risk across both physical stores and digital channels. Retail Secure emphasizes peer exchange, applied strategies, and industry collaboration, making it highly relevant for professionals responsible for safeguarding retail organizations against complex and evolving threats.
Physical • Paid • Part of Retail Council of Canada
11th March 2026 | WSJ Tech Live 2026
WSJ Tech Live: Cybersecurity 2026 convenes leading cybersecurity experts, senior executives and policy influencers for a focused one-day forum on combating threats, reducing risk and protecting privacy at scale. Hosted in New York City on March 11, the event mixes panel discussions, interviews with newsmakers and executive roundtables designed for decision makers who need practical, strategic guidance. The invitation model concentrates senior voices so conversations stay candid and forward looking, with sessions aimed at operational resilience, incident response and executive accountability.
Attendees will benefit from high level insights that translate into boardroom priorities and technical discipline alike. Beyond sessions, the format promotes direct networking and targeted conversation with peers, journalists and solution providers. Whether the goal is to refine enterprise strategy, understand evolving regulatory pressures or connect with potential partners, the event delivers concentrated value for leaders responsible for cybersecurity and privacy.
Physical • Paid • Part of The Wall Street Journal
11th March 2026 | HXZ.ONE #2 2026
The HXZ.ONE IT-Security Conference [ˈhækˌzoʊn] is a unique pop-up conference aimed at bringing the topic of cybersecurity to a broader audience. Our mission is to raise awareness about cybersecurity through exciting lectures and interactive sessions, and to provide practical solutions for protecting our digital world.
Hybrid (Both) • Paid • Part of IT-Wachdienst.com
11th March 2026 | HXZ.ONE #2 2026
HXZ.ONE #2 2026 is a compact IT security conference designed to make cybersecurity accessible, engaging, and practical for a broader audience. Hosted in Salzburg, the event brings together security professionals, industry practitioners, and interested attendees for a focused one-day program. With a limited number of speakers and sessions, the conference emphasizes quality discussions, real-world experience, and direct interaction rather than large-scale presentations.
The agenda covers a wide range of cybersecurity topics through keynotes, lightning talks, workshops, and interactive sessions. Discussions focus on current security challenges, compliance requirements, and practical approaches to protecting digital environments. By keeping the format small and community driven, HXZ.ONE #2 encourages open exchange, networking, and hands-on learning, making it especially valuable for professionals who want clear insights without the noise of larger conferences.
Physical • Paid • Part of IT-Wachdienst
11th March 2026 | Securing AI Agents Now: How to Regain Control Before It’s Too Late
AI agents are rapidly being adopted across organizations, creating new security risks that demand immediate attention. This webinar focuses on building a practical strategy to manage AI agents throughout their lifecycle, from initial deployment to ongoing oversight. It outlines a modern security framework that combines governance, policy enforcement and threat detection to maintain visibility and control.
The session also addresses how security, IT and business teams can work together to manage AI related risks more effectively. Attendees will gain guidance on monitoring agent behavior, responding to emerging threats and clearly communicating AI security priorities to executive leadership. The discussion is designed to help organizations regain control before unmanaged AI agents introduce serious exposure.
Company_Webinar • Part of Zenity
11th March 2026 | Jack Henry Cybersecurity & Fraud + Digital Banking Forums: Las Vegas 2026
In Las Vegas the forum offers the same blend of digital banking innovation and cybersecurity/fraud training over two days. Day one focuses on how financial institutions can enhance their digital front door, embed payments innovation, and attract or retain accountholders through better experience. On day two the spotlight shifts to security teams, fraud prevention, incident-response tactics, and how to align risk strategies with the digital growth agenda.
What makes this edition special is the pairing of the bright lights of Las Vegas with an agenda that moves fast and covers emerging threats, opportunities, and vendor-agnostic peer discussions. Participants leave with not just ideas but practical takeaways about tooling, governance, and cross-functional coordination across marketing, digital, IT, and risk teams. It’s a good opportunity to step away from the routine, reflect, network, and come back ready to act.
Physical • Paid • Part of Jack Henry
11th March 2026 | Women in Cybersecurity (WiCys) 2026
The Women in Cybersecurity (WiCyS) 2026 Annual Conference is a major cybersecurity event that brings together women, allies, students, professionals, academics, and industry leaders to support the recruitment, retention, and advancement of women in cybersecurity. The in-person portion is held at the Gaylord National Harbor Resort and Convention Center in the Washington DC area, while a separate virtual conference takes place later in the spring. This hybrid approach ensures greater accessibility and broad participation from around the world.
WiCyS 2026 offers a rich agenda of keynote presentations, technical sessions, workshops, panel discussions, lightning talks, and interactive activities designed to build skills, foster collaboration, and empower attendees in their cybersecurity careers. The event also includes networking opportunities, a career fair where employers and job seekers can connect, and community-driven discussions that address trends, challenges, and opportunities in cybersecurity. With its emphasis on diversity, inclusion, and professional growth, WiCyS remains one of the most influential conferences advancing women in the field of cybersecurity.
Hybrid (Both) • Paid • Part of Women in CyberSecurity (WiCyS)
11th March 2026 | How to Build and Scale a Modern Fraud Organization
Fraud prevention has become a core business function that connects security operations, revenue goals, and customer experience. This webinar examines how organizations can design and scale a modern fraud program as threats and digital platforms evolve and expectations around trust increase across online services today.
Speakers discuss lessons from building fraud programs at large technology platforms and explain how team structure, priorities, and ownership have changed over the past decade. The session also looks at aligning fraud strategy with revenue outcomes, customer experience, and measurable business impact through practical examples and benchmarking insights.
Company_Webinar • Part of Sift
11th March 2026 | Cohesity Catalyst On Tour Singapore 2026
Cohesity Catalyst On Tour Singapore 2026 brings together regional technology and security leaders to discuss modern data protection and cyber resilience strategies. The event focuses on helping organizations defend against ransomware and data loss through secure backup, recovery automation, and intelligent data management. Industry experts share operational insights into protecting distributed workloads across cloud and on premises environments.
Cybersecurity discussions emphasize proactive defense through rapid recovery planning, anomaly detection, and zero trust aligned data access controls. Attendees gain practical guidance on strengthening resilience while supporting digital transformation initiatives across Asia Pacific enterprises. The conference highlights how secure data infrastructure has become a foundational component of organizational cybersecurity and business continuity planning.
Physical • Free • Part of Cohesity
11th March 2026 | Africa CIO Summit 2026
Africa CIO Summit 2026 is a high level cybersecurity focused gathering that brings together senior technology and security leaders from across the continent. The event centers on how organizations can secure rapidly expanding digital ecosystems while balancing cloud adoption, compliance demands, and innovation. With participation from CISOs, CIOs, and policy influencers, the summit highlights the strategic role of cybersecurity in enabling trust and sustainable growth across African markets.
The summit emphasizes practical insight into emerging threats, ransomware trends, talent challenges, and regulatory alignment. Designed for decision makers responsible for shaping security strategy, the event creates a space for meaningful dialogue, peer exchange, and investment driven conversations. By combining thought leadership with real world business outcomes, Africa CIO Summit 2026 positions cybersecurity as a core driver of resilience and digital progress across the region.
Physical • Paid • Part of CIO Africa by dx5
Recorded Future’s 2026 State of Security report highlights how geopolitical fragmentation, persistent cyber access, and AI driven change are reshaping the global threat landscape. This webinar focuses on what these shifts mean for Asia Pacific organizations, including shorter warning times, supply chain exposure, and increasing expectations for security teams to explain cyber risk in business terms.
Speakers discuss how CTI professionals can translate threat intelligence into organizational risk insights. Topics include reframing cyber threats as operational risk, identifying early warning signals, assessing supplier and digital dependencies, and communicating mitigation strategies in language that resonates with executives and board leaders.
Company_Webinar • Part of Recorded Future
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.