AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
28th March 2026 | CyberForge 2026
CyberForge 2026 is a two day cybersecurity conference designed to combine learning, competition, and direct engagement with industry professionals. Hosted in Coastal Virginia, the event brings together students, early career practitioners, and anyone interested in cybersecurity for an immersive experience focused on real world skills. The conference creates an accessible environment where attendees can learn directly from professionals while building practical knowledge.
A central feature of CyberForge is its capture the flag competition, which allows participants to apply what they learn in a hands on and competitive setting. Alongside the CTF, the event includes talks and sessions led by cybersecurity professionals who share insights on current threats, defensive strategies, and career development. By blending education with active participation, CyberForge helps attendees strengthen both technical skills and confidence in cybersecurity concepts.
Physical • Paid • Part of Coastal Virginia Cybersecurity Student Association and Tidewater Community College's Cybersecurity Club
28th March 2026 | BSides Charlotte 2026
BSides Charlotte 2026 is a community driven cybersecurity conference that brings together security practitioners, researchers, and enthusiasts in Charlotte, North Carolina. This event is part of the global Security BSides series, known for its locally organized sessions where attendees and volunteers share real world security experiences, tools, and research. Focused on both offensive and defensive topics, BSides Charlotte encourages active participation through talks, workshops, and village style activities that highlight collaboration and peer learning across diverse information security disciplines.
The conference takes place over one or two days at Discovery Place Science and is designed for professionals at all levels seeking practical insights and new connections in the cybersecurity community. Attendees gain exposure to emerging trends, hands on learning, and networking opportunities with regional experts, volunteers, and sponsors. With modest registration fees and a grassroots ethos, the event supports knowledge sharing and community growth in the Carolinas and beyond.
Physical • Paid • Part of BSides
28th March 2026 | BSides Charlotte 2026
At BSides Charlotte 2026, we’re bridging the gap between the cybersecurity challenges of our physical world and the visionary digital realm.
Conference Theme: Enter the Grid
Join us on March 28th, 2026, as we explore modern cybersecurity through the lens of The Grid, examining how yesterday’s science fiction has become today’s security reality.
Hybrid (Both) • Paid • Part of BSides Charlotte
29th March 2026 | Quartz Network: CIO Leadership Summit | Spring 2026
Quartz Network CIO Leadership Summit Spring 2026 is an invitation-only leadership event for senior IT executives focused on strategic technology, innovation, and executive leadership. Held in Phoenix Arizona, the summit brings together senior CIOs and technology leaders to discuss emerging trends, strategic challenges, digital transformation, and organizational leadership.
The event connects experienced leaders with peers and solutions providers in an exclusive setting designed to accelerate executive insight and business outcomes. Sessions are crafted around executive level discussions, networking, and curated one-on-one meetings to match leaders with relevant insights and technology partners. This summit offers a focused environment for executives responsible for IT strategy and technology leadership.
Physical • Paid • Part of Quartz Network
Boost your cybersecurity skills at SANS 2026! Immerse yourself in a week of immersive, distraction-fee, industry-leading training tailored to elevate your capabilities, whether you’re new to the field or looking to deepen your advanced expertise. Benefit from direct mentorship by top experts in the field through practical labs and real-world strategies, experiencing insights that only in-person engagement can provide.
Interact with esteemed SANS faculty and fellows, and access exclusive sessions available only to onsite attendees. Connect with a vibrant community of like-minded professionals, engage in enriching networking events and benefit from community-building efforts that are structured to enhance your professional network and forge impactful, enduring relationships.
Hybrid (Both) • Paid • Part of SANS Institute
30th March 2026 | Pathlock Innovation Days
Identity and access management and governance, risk, and compliance practices are evolving rapidly as organizations face new regulatory requirements and security challenges. This event brings together industry experts, partners, and practitioners to explore current trends, practical implementations, and emerging approaches in IAM and GRC. The session focuses on how organizations can modernize identity governance while maintaining compliance and operational continuity.
Attendees will gain insight from customer case studies, partner presentations, and expert discussions on topics such as cross ERP identity governance, managed services, and compliance strategies. The event also highlights best practices for building scalable, audit ready identity programs. Participants will learn how to align identity governance with business needs while improving security, efficiency, and regulatory compliance.
Company_Webinar • Part of Pathlock
30th March 2026 | Staged Attacks in 2026: What DNS Threat Intelligence Reveals Early
Cyberattacks are increasingly premeditated, with adversaries building and staging infrastructure well before launching campaigns. This webinar explores how DNS activity reveals early indicators of attack preparation, including newly registered domains, domain generation algorithms, and staged malware activation. The session focuses on how attackers use the DNS layer to prepare and execute phishing and malware campaigns while evading traditional detection methods.
Attendees will learn how DNS threat intelligence can uncover early signals of staged attacks and enable proactive defense. The discussion also covers how AI driven analysis helps detect patterns at scale and disrupt attacks before they are activated. The webinar provides practical insight into leveraging DNS visibility to identify and respond to threats earlier in the attack lifecycle.
Company_Webinar • Part of EfficientIP
30th March 2026 | IAPP Global Summit 2026
The IAPP Global Summit 2026 gathers privacy, AI governance and cybersecurity law professionals from around the world for a detailed exploration of digital responsibility and regulation. The conference combines strategic vision, operational insight and global networking by delivering more than 70 breakout sessions, expert panels and a keynote lineup featuring high-profile speakers and thought leaders.
Attendees can expect deep dives into key issues like data privacy, vendor risk and AI governance, while engaging in robust discussions on evolving privacy and security trends. The Summit offers a rare opportunity to connect with regulators, industry leaders and peers to share knowledge, shape best practices and navigate the complex intersection of technology, policy and law in a rapidly changing global environment.
Physical • Paid • Part of IAPP - International Association of Privacy Professionals
30th March 2026 | IAPP Global Summit 2026: Privacy | AI Governance | Cybersecurity Law
IAPP Global Summit 2026 is the leading global conference for professionals working in privacy, AI governance, and cybersecurity law. The event brings together regulators, legal experts, technologists, and compliance leaders to explore how evolving digital regulations and security expectations are shaping organizations worldwide. Attendees gain strategic insight into global policy trends, enforcement priorities, and emerging risks affecting data protection and cybersecurity programs.
The summit is designed for both strategic leaders and operational practitioners who manage privacy and security responsibilities on a daily basis. Sessions focus on real world challenges such as regulatory alignment, AI risk management, and cybersecurity compliance across jurisdictions. With its strong emphasis on practical guidance and peer connection, the event offers a valuable forum for learning, collaboration, and professional growth within the digital responsibility community.
Physical • Paid • Part of IAPP - International Association of Privacy Professionals
30th March 2026 | Fintech Meetup 2026
Fintech Meetup 2026 brings together the full financial technology community for a week of connection and collaboration. The event gathers startups, banks, investors, and service providers to exchange ideas, form partnerships, and explore the latest in payments, banking, and financial innovation. The program includes targeted networking and curated meetings that help attendees find real business opportunities instead of casual introductions.
The environment is fast-paced and focused, designed for professionals who want to move projects and partnerships forward. With structured 1:1 meetings, keynotes, and exhibitor showcases, it provides a clear path for meaningful conversations and deal-making. Fintech Meetup 2026 continues to grow as a central meeting point for the industry, bringing together the people and solutions driving financial transformation.
Physical • Paid • Part of Hyve Group
30th March 2026 | Gartner CIO Leadership Forum Hollywood 2026
The Gartner CIO Leadership Forum 2026 offers a trusted space for Chief Information Officers to engage in strategic discussions that drive business growth and innovation. Tailored specifically for senior technology leaders, the event emphasizes how to balance digital acceleration with long-term stability, addressing key challenges such as governance, transformation leadership, and executive collaboration. Attendees explore frameworks for achieving measurable business outcomes through technology.
Through focused sessions, roundtables, and peer exchanges, participants gain access to Gartner’s exclusive insights and proven methodologies for IT leadership excellence. The forum’s collaborative environment allows CIOs to learn directly from one another, discuss challenges openly, and return to their organizations equipped with strategies that enhance influence, innovation, and impact at the enterprise level.
Physical • Paid • Part of Gartner
INSIDER THREAT INVESTIGATIONS & ANALYSIS TRAINING COURSE W/ LEGAL GUIDANCE FROM ATTORNEY Insider Threat Investigator / Analyst Certificate - Credential Provided By: Insider Threat Defense Group (ITDG)
DATES / TIMES March 30-31, 2025 / 8:30am to 5pm
LOCATION (Classroom Or Virtual) University Of Maryland, College Park
Virtual Attendance Option This course is also offered virtually, providing the same expert instruction and training materials as the classroom experience. Course materials will be available for download ahead of time, ensuring you’re fully prepared. The training will be delivered live via Go To Meeting, allowing for real-time interaction, questions, and engagement.
COST / REGISTRATION ($1,595 - Discounts For 2+ Students) The link to register is a Bank of America merchant services vendor: https://stats.slimcd.com/soft/multisession.asp?sessionid=DB0FED86553BBB2B0CFA6AE7389136CD3FE8A1D9
OVERVIEW This highly sought after 2 day training course is designed for anyone managing or supporting an Insider Risk Management Program (IRMP): Insider Threat Investigator- Analyst, FSO, CSO, CISO, Human Resources, CIO – IT, Network Security, Counterintelligence Investigators, Governance, Risk & Compliance Professionals, Mental Health / Behavioral Science Professionals, Legal Etc.
This very comprehensive training will provide students with the critical thinking skills and in-depth knowledge that is needed for conducting investigations from A to Z, and for collecting and analyzing various employee data sources to generate accurate employee risk and threat profiles using proven analytic principles and methodologies.
Employee investigations require a structured and repeatable approach that is legally sound and hold can hold up to legal scrutiny in court. This training will provide expert legal guidance on reporting, case management, privacy considerations, interviewing, documentation, collection and use of employee data sources, evidence, chain of custody and more.
Instructor #2 for this training is Mr. Shawn Thompson, Esq., who is a licensed and recognized attorney with extensive experience in Employment Law and Insider Threat Program’s. He will provide legal guidance on the collection, use and sharing of employee information, computer user activity monitoring and conducting investigations. Mr. Thompson built and led Google’s Global Insider Risk Management Services.
Training Course Brochure https://www.insiderthreatdefense.us/wp-content/uploads/2025/05/Insider-Threat-Investigations-Analysis-Training-Course-Brochure.pdf
IRMP TOOLKIT This training provides students a handbook and an abundance of training materials, educational resources, templates and checklists needed for an IRMP. The handbook provides guidance and checklists for Insider Threat Investigations, conducting an Insider Threat Vulnerability Assessment, and guidance to review, tweak and enhance the security controls of the organization (Physical Security, Human Resources, IT-Network Security, Etc.). They will also help with identifying any vulnerabilities related to the Malicious Insider Playbook Of Tactics. (Information & Data Exfiltration As Easy As 1,2,3) The training materials and toolkit will be provided to the students via a USB thumb drive for the classroom training, or via a download link.
EXCEPTIONAL STUDENT REVIEWS Our very high levels of client satisfaction are the result of the ITDG being experts at building IRMP's as we do more than just provide training. We also provide consulting services and incorporate lessons learned from our consulting engagements.
The ITDG has provided IRMP Program training to 1000+ students, and issued them certificates / credentials as an IRMP Manager and Insider Threat Investigator – Analyst. Even our most experienced students that attend our training courses, state that they are amazed at the depth of the training and the resources provided, and are very satisfied they took the training and learned some new concepts and techniques for IRM.
Our students have endorsed and given our training courses EXCEPTIONAL reviews for the comprehensive knowledge and resources provided. You are encouraged to read the feedback from our students on this link. https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-evaluations-comments.pdf
COMPANY RECOGNITION The ITDG Has Provided IRMP Training / Consulting Services To An Impressive List Of 700+ Clients: White House, U.S. Government Agencies, DHS, TSA, DoD, Intelligence Community Agencies, Law Enforcement, Critical Infrastructure Providers, Universities, Microsoft, Walmart, Home Depot, Nike, Tesla, Dell Technologies, Discovery Channel, UPS, FedEx, Visa, American Express, Equifax, Delta Airlines and many more.
Full Client Listing https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-listing.pdf
Questions, Please Contact
Jim Henderson, CISSP, CCISO CEO Insider Threat Defense Group, Inc. Insider Risk Management Program (IRMP) Training Course Instructor / Consultant Insider Threat Investigations & Analysis Training Course Instructor / Analyst Insider Risk / Threat Vulnerability Assessor www.insiderthreatdefensegroup.com LinkedIn Company Profile: https://www.linkedin.com/in/insiderthreatdefense Follow Us On Twitter: @InsiderThreatDG Founder / Chairman Of The National Insider Threat Special Interest Group NITSIG LinkedIn Group: https://www.linkedin.com/groups/12277699/ 561-809-6800
Hybrid (Both) • Paid • Part of Insider Threat Defense Group
30th March 2026 | Phishing Trends and Outlook for 2026
Phishing attacks continue to evolve rapidly, with AI playing an increasing role in their scale and sophistication. This webinar explores key trends shaping the phishing landscape in 2026, based on large scale analysis of real and simulated threat data. The session focuses on how attackers are adapting techniques to bypass traditional defenses and target users more effectively.
Attendees will gain insight into the rise of AI generated phishing campaigns and how their prevalence has surged in recent months. The discussion highlights how these attacks evade detection and what this means for organizations managing human risk. The webinar provides practical perspective on emerging phishing threats and how security teams can adapt to defend against increasingly advanced social engineering tactics.
Company_Webinar • Part of Hoxhunt
31st March 2026 | You’ve never mainframed like this
Accelerating mainframe development also plays a critical role in strengthening application security and cyber resilience, especially in environments that handle highly sensitive financial and personal data. This hands on virtual workshop shows how BMC AMI DevX uses AI driven insights to help developers understand complex COBOL, PL/I, and assembler code faster, reducing hidden technical debt that can introduce security weaknesses and operational risk.
The session demonstrates how modern tooling and visual code analysis support a shift left approach by making it easier to identify logic flaws, risky dependencies, and potential vulnerabilities earlier in the lifecycle. Attendees will see how integrating mainframe development into modern workflows improves visibility, auditability, and control, while supporting more secure and resilient application delivery.
Company_Webinar • Part of BMC Software
31st March 2026 | World Conference on Information Systems and Technologies (WorldCist) 2026
WorldCist 2026 is an international academic conference focused on information systems, digital technologies, and their impact across industries and society. Held in Madeira, Portugal with online participation options, the event brings together researchers, academics, and professionals working in areas that intersect with cybersecurity, including ethics, computer security, data analytics, and intelligent systems. The conference emphasizes peer reviewed research, with submissions evaluated through a structured blind review process.
Cybersecurity relevance is reflected through dedicated themes addressing ethics, computers, and security, as well as topics related to networks, decision support systems, and big data. Participants gain exposure to current research, emerging risks, and technological approaches that influence secure system design and governance. Accepted papers are published by Springer and indexed in major academic databases, making WorldCist a recognized platform for sharing cybersecurity related research within the broader information systems community.
Physical • Paid • Part of WorldCist
31st March 2026 | SentinelOne Quarterly Threat Briefing
The gap between theoretical security models and real world operations continues to widen as organizations face evolving threats and complex environments. This webinar examines how geopolitical developments and emerging attack techniques influence organizational risk. The session focuses on translating global threat intelligence into actionable strategies that security teams can apply in their environments.
Attendees will gain insight into regional adversary tactics, techniques, and procedures, along with practical approaches to improving defense. The discussion highlights how organizations can shift from reactive patching to proactive, intelligence led threat hunting. The webinar provides guidance for both security leaders and practitioners on strengthening resilience and aligning security operations with the current threat landscape.
Company_Webinar • Part of SentinelOne
31st March 2026 | INCYBER Forum: Europe 2026
The INCYBER Forum: Europe 2026 brings together the full European cybersecurity ecosystem (government agencies, private companies, research centers, solution vendors, and users) to address digital security and trust. This major gathering offers a trade show floor for vendors and an in-depth conference track focused on cyber risk management, industrial cybersecurity, identity protection, operational security, and cybercrime prevention. With 20,000 past visitors and approximately 700 partners, the event serves as a central hub for networking, solution discovery, and strategic dialogue around Europe’s cyber resilience.
For professionals working in digital security, InCyber Europe 2026 presents valuable opportunities: attending sessions to stay up to date on threats and defenses, connecting with potential partners or clients, and exploring the latest security technologies. The forum’s broad scope spans from operational security to policy and digital trust, making it a key event for anyone interested in shaping or following cybersecurity developments in Europe.
Physical • Paid • Part of Forum InCyber (FIC)
31st March 2026 | BOUSSIAS Cloud Strategies Conference 2026
BOUSSIAS Cloud Strategies Conference 2026 is a leading Greek conference focused on the strategic use of cloud computing in modern organizations. Now in its twelfth year, the event reflects the shift from basic cloud adoption to mature, business driven cloud strategies that support operations, growth, and long term resilience. It brings together operational leaders, decision makers, and technology professionals who shape cloud investments and enterprise transformation.
A strong emphasis is placed on cloud security, zero trust models, compliance, and modern resilience practices. The conference also explores how new generation data centers support AI driven workloads and high intensity computing demands. Through expert led sessions and vendor agnostic insights, attendees gain a practical understanding of how cloud strategy, security, and governance intersect in real world environments, making the event highly relevant for cybersecurity aware organizations.
Physical • Paid • Part of BOUSSIAS
31st March 2026 | Designing Resilient Connectivity for the Anywhere Workforce
This webinar examines how healthcare organizations can maintain secure, high performance connectivity as care delivery becomes more distributed. Traditional VPN and legacy access models often struggle to provide consistent visibility and control, increasing the risk of downtime that can directly affect patient care and revenue. The session highlights why a resilient security service edge approach is better suited for modern healthcare environments.
Product leaders will explain the difference between secure and resilient access, why legacy VPN models fail, and how Zero Trust policies can be enforced without disrupting clinicians. A live demonstration will show identity and device based policy enforcement, encrypted and compliant access to clinical systems, centralized visibility, and reduced third party risk across distributed care settings.
Company_Webinar • Part of Absolute Software
31st March 2026 | European Cyber Cup 2026
European Cyber Cup 2026 is a competitive cybersecurity event focused on real world technical challenges in ethical hacking and team based cyber skills. Hosted at Lille Grand Palais in France, this event brings together cybersecurity professionals and students to compete in capture the flag, forensics, red team versus blue team, social engineering, and other practical cybersecurity tasks. Participants form teams of skilled operators to demonstrate technical mastery across multiple cyber disciplines.
The event promotes skill development, community engagement, and visibility within the European cybersecurity ecosystem. It is set inside the wider Forum INCYBER environment, attracting companies, academic teams, and industry partners. Teams compete not just for prizes but also to benchmark their skills against peers in a structured environment that values practical cyber defense and offensive techniques.
Physical • Paid • Part of Forward Global
31st March 2026 | Transform Your Business Partner Connectivity: Zero Trust Exchange for B2B is Here
Traditional site to site VPNs and network centric approaches to business to business connectivity can introduce complexity and security risks. Extending network access to external partners may increase exposure to lateral movement and supply chain attacks. This webinar examines how organizations can modernize partner connectivity using a Zero Trust approach designed to reduce risk while improving operational flexibility.
The session explores how a Zero Trust architecture can replace legacy connectivity models and better secure digital supply chains. Attendees will learn about common challenges in B2B connectivity and how Zero Trust solutions can support secure partner access and faster onboarding. The webinar also includes demonstrations of ZPA B2B Extranet and B2B Federation capabilities, along with strategies to support partner integrations and merger and acquisition activities without adding new infrastructure.
Company_Webinar • Part of Zscaler
31st March 2026 | Securing OT Environments & Modernizing Operations with Splunk
Operational technology environments are increasingly targeted by cyber threats, requiring stronger security controls without disrupting critical systems. This webinar explores how organizations can secure OT environments while modernizing operations using Splunk. The session focuses on improving visibility, integrating security tools, and aligning with industrial architectures such as the Purdue Model.
Attendees will learn how to detect and respond to threats in industrial control systems, including ransomware and adversary techniques mapped to MITRE ATT&CK for ICS. The discussion also covers integrating OT security solutions, unifying monitoring across systems, and leveraging automation to improve response and efficiency. The webinar provides practical guidance for strengthening resilience, enhancing visibility, and securing OT infrastructure in complex industrial environments.
Company_Webinar • Part of Splunk (a Cisco Company)
31st March 2026 | INCYBER Forum: OSINT Day 2026
OSINT Day at the InCyber Forum Europe focuses on the practical use of open source intelligence in modern cybersecurity and cyberinvestigation work. The event brings together practitioners, analysts, and security professionals who rely on publicly available data to support investigations, threat analysis, and defensive operations. Sessions highlight real world applications of OSINT across cybercrime, fraud detection, financial crime, and geopolitical risk, making the content highly relevant for professionals working at the intersection of security, intelligence, and digital investigations.
The program emphasizes knowledge sharing through experience based presentations and feedback sessions that explore how OSINT techniques are applied in red team audits, counter terrorism efforts, and cryptocurrency scam investigations. Attendees benefit from expert insights, peer discussions, and networking opportunities within the broader InCyber Forum community. The event supports skill development while reinforcing the role of OSINT as a critical capability in cybersecurity operations.
Physical • Paid • Part of Forum InCyber Europe (FIC)
Organizations continue to store large volumes of sensitive information in on-premises repositories, and hybrid environments make it difficult to maintain consistent visibility and governance. This webinar examines five key capabilities required in modern Data Security Posture Management (DSPM) to protect on-prem data across hybrid infrastructure. The session explains how security teams can improve discovery and classification of sensitive data across file shares, databases, and applications.
The discussion also demonstrates how AI-powered DSPM tools help identify critical exposures and prioritize risk. Attendees will see how findings can be turned into remediation and compliance workflows, while simplifying deployment and reducing operational complexity compared to traditional approaches. The webinar provides practical guidance for security practitioners and leaders responsible for protecting on-premises data in hybrid environments.
Company_Webinar • Part of Cyera
31st March 2026 | 35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
Managing a 35 million line, multi language monolith presents major security and visibility challenges. This webinar examines how Adyen addressed limited dependency insight within a highly customized build environment. DevSecOps expert Supun Vidana Pathiranage joins JFrog’s Yonatan Arbel to explain the architecture designed to separate dependency resolution from the core build system, enabling scalable visibility and reliable security scanning without disrupting developer workflows.
The session covers architectural patterns for handling dependency visibility in large monorepos, integration of a custom pipeline with JFrog Xray, and the design decisions behind deep software composition analysis. It also reviews the Battlestar framework for actionable scan results and practical shift left AppSec enforcement at the merge request level.
Company_Webinar • Part of JFrog
31st March 2026 | ERTL-YANG Leader Summit 2026: Hong Kong
The Hong Kong edition of the ERTL-YANG Leader Summit 2026 focuses on cybersecurity leadership in a highly connected global market. The summit explores how executives can manage cyber risk across complex digital ecosystems and cross border operations.
Topics include governance, data protection, and leadership roles in responding to advanced cyber threats. The event provides a strategic forum for leaders seeking to align cybersecurity initiatives with business resilience and regulatory expectations.
Physical • Paid • Part of ERTL-YANG
1st April 2026 | Secure by Design: Operational Assurance and Visibility
Security teams rely on visibility that turns raw data into clear, actionable insight, and this webinar focuses on how modern firewall management supports a secure by design approach. The session looks at how correlated analytics and reporting help teams understand security posture, identify weaknesses early, and prevent misconfigurations from becoming attack paths.
The discussion highlights a built in Security Assessment Report that evaluates configuration hygiene and surfaces gaps before they are exploited. Attendees will also see how advanced search across analytics logs, system events, and detailed reports speeds investigations and improves anomaly detection. The webinar is designed for security and network administrators who want stronger operational assurance, continuous validation, and greater confidence in day to day security operations.
Company_Webinar • Part of SonicWall
1st April 2026 | CypherCon 9 2026
CypherCon 9: Rediscover When the Internet Was Fun
April 1-2, 2026 | Baird Center, Milwaukee, WI
Join us for CypherCon 9, Wisconsin’s largest technology and cybersecurity conference, as we embrace nostalgia and innovation under our theme, "Remember When the Internet Was Fun?" Experience two vibrant days packed with cutting-edge presentations, interactive wards, and networking opportunities with over 3,000 fellow tech enthusiasts, industry leaders, hackers, and innovators.
Explore 7 dynamic tracks featuring more than 135 expert speakers covering everything from cybersecurity and hacking techniques to digital rights, AI, privacy, and technology trends shaping the future. Engage in hands-on learning within our specialty wards, designed for direct interaction and in-depth exploration of fascinating topics.
CypherCon 9 is a cornerstone event of InfoSec Spring Break, offering comprehensive training sessions ahead of the main conference and concluding with BSides Milwaukee. Whether you're a seasoned cybersecurity professional, an aspiring hacker, or simply nostalgic for the early days of the web, CypherCon 9 is your opportunity to reconnect, recharge, and rediscover what made technology exciting.
Secure your spot now and prepare for a journey back—and forward—in digital adventure!
Physical • Paid • Part of CypherCon
1st April 2026 | UN:BLOCK 2026
UN:BLOCK 2026 is a large international conference focused on blockchain technology and financial innovation in Northern Europe. The event brings together industry leaders, technology companies, policymakers, investors, and startups to explore developments in blockchain systems, fintech platforms, and digital financial infrastructure. The conference program features keynote presentations, expert panels, and networking events designed to facilitate collaboration across the global blockchain and financial technology ecosystem.
The program is structured across two main stages, one dedicated to blockchain technologies and the other focused on fintech and traditional banking. Discussions examine emerging applications of decentralized technologies, regulatory developments, digital assets, and financial innovation. The event also includes side events and networking opportunities aimed at connecting innovators, companies, and decision-makers shaping the future of digital finance.
Physical • Paid • Part of UN:BLOCK
1st April 2026 | Oracle AI World Tour 2026: Milan
Oracle AI World Tour 2026 brings free one-day events to major cities worldwide. These gatherings let participants hear from Oracle leaders, technology partners, and local business professionals about the newest breakthroughs in AI-powered cloud applications, databases and infrastructure. Attendees will get a firsthand look at the latest Oracle AI capabilities, real world use cases and practical strategies for integrating AI into business operations across sectors.
The tour encourages networking with peers, sharing ideas with Oracle’s partner community and seeing how companies around the world apply AI for competitive advantage. For organizations focused on security and compliance, sessions on cloud infrastructure and identity-and-access management are especially relevant. The event offers a chance to learn how AI may accelerate transformation while keeping data and workloads secure and well governed.
Physical • Free • Part of Oracle
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.