Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2025, 2026, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
13th December 2025 | Droidcon India 2025
Droidcon 2025 is the premier global conference series for Android developers, bringing together experts, enthusiasts, and industry leaders to discuss the latest advancements in Android development. The event features in-depth technical talks, hands-on workshops, and networking opportunities, offering valuable insights into best practices, emerging technologies, and innovative applications in the Android ecosystem.
Attendees can expect sessions on topics such as Jetpack Compose, Android security, AI-powered apps, and the latest updates from Google’s Android team. Whether you're an experienced developer or just starting your Android journey, Droidcon 2025 provides an opportunity to learn from top developers, collaborate with the community, and stay ahead in the rapidly evolving world of mobile development.
Physical • Paid • Part of Mobile Seasons GmbH
13th December 2025 | BSides London 2025
BSides London 2025 is a highly anticipated cybersecurity conference designed for security professionals, researchers, and enthusiasts to share knowledge, explore new tools, and engage in collaborative discussions. The event encourages submissions for papers, workshops, and presentations, providing a platform for both seasoned experts and newcomers to showcase innovative ideas in cybersecurity. Attendees gain insights into emerging threats, defensive strategies, and community-driven solutions.
The conference also offers sponsorship opportunities and creative engagement through events like a logo competition, reflecting its community-focused spirit. With a mix of hands-on sessions, networking, and professional development, BSides London provides a space for cybersecurity practitioners to connect, learn, and contribute to the broader security ecosystem.
Physical • Paid • Part of BSides
13th December 2025 | The Scale-Up Secret: How Keeper Security secured operations and saved time with Yubico
Yubico outlines how Keeper Security achieved a fast, large scale rollout of phishing resistant MFA using YubiKeys and modern deployment capabilities. The session explains how Yubico’s enterprise features enabled Keeper to secure more than 600 employees while cutting significant IT workload and simplifying the logistics of distributing hardware security keys across the organization.
Attendees get a clear look at how Yubico FIDO Pre reg in Microsoft Entra ID and YubiEnterprise Delivery supported a smooth rollout with minimal friction. The webinar provides practical guidance for security leaders who need to accelerate MFA modernization and strengthen authentication with hardware backed protection.
Company_Webinar • Part of Yubico
14th December 2025 | International Conference on Cryptology in India (Indocrypt) 2025
Indocrypt 2025 is India’s leading conference dedicated to cryptography and information security, bringing together world-renowned experts to explore the latest trends, breakthroughs, and challenges in the field. The event offers attendees an opportunity to gain insights into the evolving landscape of cryptography, including advancements that are shaping secure communications, data protection, and cybersecurity protocols.
Participants can expect in-depth discussions, keynote sessions, and expert panels that highlight both theoretical and applied aspects of modern cryptography. The conference fosters collaboration, knowledge sharing, and networking among academics, industry professionals, and technology enthusiasts, providing a platform to stay informed on cutting-edge developments and practical applications in information security.
Physical • Paid • Part of International Institute of Information Technology, Bhubaneswar
15th December 2025 | International Conference on AI and Materials for Sustainability - AIMS 2025
AIMS 2025 is a global conference focused on leveraging artificial intelligence and materials science to address sustainability challenges. Scheduled for 15–17 December 2025 at Fairmont Bab Al Bahr, Abu Dhabi, the conference brings together researchers, industry leaders, and policymakers to explore innovations in water, energy, and climate.
Key themes include carbon capture, hydrogen technologies, sustainable energy materials, AI-driven material design, digital sustainability, and circular energy transitions. The conference also emphasizes collaboration between academia and industry, and the integration of science, engineering, and policy.
Abstract submissions are open until 20 September 2025 via https://www.aims2025.com/abstractportal.
For details, contact aims@iitdabudhabi.ac.ae or call +971 (2) 495 8510.
Physical • Paid • Part of MCI Middle East LLC
15th December 2025 | International Conference on AI and Materials for Sustainability - AIMS 2025
AIMS 2025 is a global conference focused on leveraging artificial intelligence and materials science to address sustainability challenges. Scheduled for 15–17 December 2025 at Fairmont Bab Al Bahr, Abu Dhabi, the conference brings together researchers, industry leaders, and policymakers to explore innovations in water, energy, and climate. Key themes include carbon capture, hydrogen technologies, sustainable energy materials, AI-driven material design, digital sustainability, and circular energy transitions. The conference also emphasizes collaboration between academia and industry, and the integration of science, engineering, and policy.
Abstract submissions are open until 20 September 2025 via https://www.aims2025.com/abstractportal.
For details, contact aims@iitdabudhabi.ac.ae or call +971 (2) 495 8510.
Physical • Paid • Part of MCI Middle East LLC
16th December 2025 | The 2026 Guide to Securing AI-Generated Code at Scale
The webinar examines why AI generated code has quickly become a major security concern for engineering and AppSec teams and outlines what organizations must change as they move into 2026. James Berthoty and Boaz Barzel break down the risks that appear when AI driven development scales and explain how those risks can go unnoticed without the right policies and controls. The session gives a clear picture of the security gaps created by high velocity coding workflows powered by AI assistants.
Attendees will hear practical guidance on defining guardrails, managing Shadow AI and embedding modern application security checks directly into fast moving development pipelines. The speakers also show how AI powered security tools can analyze code, enforce policy and remediate issues at the pace development teams now operate. This webinar is built for CISOs, AppSec leaders and engineering managers who need structured frameworks to secure AI driven development without slowing innovation.
Company_Webinar • Part of OX Security
16th December 2025 | Mac in 2026: Secure by Design Meets the Enterprise
This session looks at how Apple’s Secure by Design approach is evolving inside the enterprise and why Mac devices are becoming a stronger option for organizations focused on Zero Trust security. The discussion explains how integrated hardware and software protections support modern security outcomes while fitting smoothly into existing enterprise environments and management workflows.
Attendees will hear the key reasons behind rising Mac adoption in large organizations, the challenges teams face when applying Zero Trust principles to Apple endpoints and the innovations that improve security and performance for Mac fleets. The webinar also highlights how Jamf works with Microsoft, CrowdStrike, Palo Alto Networks, Zscaler and Okta to support enterprise workflows and addresses the most common issues that appear as Mac usage expands.
Company_Webinar • Part of Jamf
16th December 2025 | The 2026 Identity Threat Outlook: Secrets, NHIs, AI Agents and What’s Next
The webinar examines the identity security threats expected to shape 2026 and outlines the attack vectors that matter most for security teams. Speakers from Akeyless and KuppingerCole Analysts break down how AI, automation and new offensive techniques are accelerating attacks on both human and non human identities. The session also highlights how secrets sprawl and unmanaged machine identities are expanding the internal attack surface across modern enterprises.
Security leaders will get a clear view of the trends that will influence identity programs in the coming year, including the rise of AI driven threats and the growing pressure to secure machine level access. The discussion provides guidance on the risks that require urgent attention and the areas where organizations need to strengthen their defenses before 2026.
Company_Webinar • Part of Akeyless
16th December 2025 | Navigating Privacy Regulations Without Losing Fraud Visibility
This session focuses on how rising privacy protections are reshaping fraud detection and why many organizations are struggling to maintain visibility in a privacy first world. The webinar examines the real impact of regulations like GDPR, CPRA and DMA on identification accuracy and shows how reduced insight creates opportunities for more sophisticated attackers. Participants will also see why so many teams are now exploring persistent, privacy compliant identification methods to close these new gaps.
Speakers break down the common misunderstandings that product, fraud and security teams face when navigating modern privacy rules and explain how organizations can balance user protection with effective detection. The discussion covers how AI agents may influence future privacy policy, how regulatory changes could affect fraud workflows and the principles behind building a compliant, low friction identification strategy that still delivers the visibility teams need.
Company_Webinar • Part of Fingerprint
16th December 2025 | Rubrik Holiday Lunch & Learn: Sleigh Your Cyber Recovery
Rubrik is hosting a technical deep-dive on Isolated Recovery Environments and how to achieve the fastest possible cyber RTO through automated orchestration and strategic architecture. If you're finalizing 2025 disaster recovery plans or evaluating ways to improve your recovery posture, this session on December 10th at noon is designed exactly for that.
You'll see a live demo of the platform, learn about IRE architecture options including partnerships with Rackspace and Iron Mountain, and walk away with actionable insights. Plus, they're sending all attendees a $50 UberEats card as a holiday thank you, and anyone who books a follow-up meeting gets a $150 gift card for holiday shopping.
Company_Webinar • Part of Rubrik
16th December 2025 | The Future of DAST
The discussion focuses on how dynamic application security testing must evolve as AI generated code accelerates development and widens the gap between speed and security. The session examines why traditional approaches struggle to keep pace and what a modern, production ready DAST strategy looks like as organizations move into 2026. Experts share practical insight into current market trends, customer experiences and the role unified AppSec platforms play in bringing context and prioritization to testing.
Attendees will hear why DAST is seeing renewed relevance in the AI era, how runtime security expectations are shifting and what tactics organizations are using to strengthen coverage without slowing development. The webinar offers guidance for teams building an updated application security strategy that matches today’s rapid release cycles.
Company_Webinar • Part of Checkmarx
16th December 2025 | App-Centric Security: How Mobile App Vetting Fits Into Your Security Stack
This session focuses on the security risks that remain inside mobile applications even when organizations rely on MDM and MTD tools. The webinar explains why mobile app vetting has become a necessary layer in enterprise protection and how evaluating apps for security, privacy and compliance issues helps close gaps that traditional controls miss.
Quokka walks through the core elements of an effective app vetting program and shows where this approach fits within a modern security stack without disrupting users. The presentation includes a demo of Q scout and how it integrates with platforms such as Microsoft and Hexnode to support app centric security across the enterprise.
Company_Webinar • Part of Quokka
16th December 2025 | Turning Your Tech Stack into Profit: Market Your MSP to Win Clients
This webinar focuses on helping MSPs bring their security stack to market with a clear and compelling message. CyberFOX experts Wes Spencer and Bill Morgan walk through practical approaches for presenting security services in a way that resonates with business decision makers. The session explains how to position an MSP’s security strategy as essential protection, not an optional add on, and how to frame its value in language prospects immediately understand.
Attendees will hear guidance on strengthening credibility, showcasing expertise and creating messaging that supports confident sales conversations. The webinar also includes access to customizable marketing materials that MSPs can use to promote their services and reinforce the importance of a well built security offering.
Company_Webinar • Part of CyberFOX
16th December 2025 | QCon AI 2025 | December 16-17
QCon AI (Dec 16-17, 2025): The AI software conference for senior practitioners using AI to accelerate the SDLC. Learn practical patterns from peers to build faster, avoid missteps, manage MLOps, and scale reliably. No hype, just real-world takeaways.
Physical • Paid • Part of QCon
17th December 2025 | RENEWSEC 2025
RENEWSEC 2025 (A Premier OT Cybersecurity Summit in Renewable Energy Sector) scheduled to be held in 17th - 18th Dec 2025 at Pride Plaza Hotel, Aerocity, New Delhi.
This is one of India’s first dedicated summit focusing on cybersecurity challenges and solutions in the renewable energy ecosystem. This event will bring together CISOs, OT Cybersecurity Leaders, Regulators & Policy Makers, RE Producers (Solar, Wind, Hydro, Biomass, Geothermal & Green Hydrogen), Nuclear, NLDC, RLDCs, SLDCs, DISCOMs, TRANSCOs and Technology Innovators to collaborate, share insights, and drive security transformation in Renewable Energy Sector.
Physical • Paid • Part of CONFEX Exhibition & Conference Pvt Ltd
17th December 2025 | Live Debate: Which Cyber Trends, Threats & Techniques Will Dominate 2026?
This debate brings together cybersecurity leaders to examine which emerging threats are most likely to shape 2026. The speakers compare identity based attacks, cloud misconfigurations and AI driven offensive techniques, outlining why each vector is becoming more dangerous as environments expand and attackers move faster. Their discussion draws heavily on evidence from ongoing investigations and industry wide intelligence.
Participants will hear competing viewpoints on the trends and tactics that demand the most immediate attention and what organizations should do now to prepare. The session offers a clear look at the attacker behaviors that are gaining momentum and highlights the operational weaknesses businesses need to close before these threats intensify. Attendees will also have the opportunity to vote on which perspective best outlines the dominant risk for the coming year.
Company_Webinar • Part of Blackpoint
17th December 2025 | Data-First Forum: Holiday Cheer for Your Cybersecurity Career
This webinar highlights how professionals at every stage of their career can grow and succeed in the rapidly expanding cybersecurity field. Melissa Rappl, CISO at Children’s Nebraska, and Matt Radolec, VP of Incident Response at Varonis, share guidance on developing the skills and mindset needed to advance, whether someone is new to the industry or working toward leadership roles. The session focuses on how the talent landscape is shifting and what opportunities are emerging as cybersecurity continues to evolve.
Attendees will gain practical insights on navigating career growth, understanding modern expectations in security teams and positioning themselves for long term success. The discussion also offers encouragement for those entering the field and direction for experienced professionals aiming to take the next step.
Company_Webinar • Part of Varonis
17th December 2025 | When Cyber Threats Feel Human: The 2026 Identity Wake-Up Call
This session examines the growing pressure on digital identity security as credential theft, weak authentication and AI driven phishing continue to dominate attack patterns. The discussion focuses on why identity protection must be strengthened across organizations and how the next wave of cyber threats is becoming more humanlike and harder to detect.
Participants will hear insights from Yubico’s Global State of Authentication research along with practical steps to improve identity resilience. The webinar highlights key trends, regulatory expectations and the actions both individuals and enterprises can take to reduce risk and reinforce trust in a rapidly shifting threat landscape.
Company_Webinar • Part of Yubico
17th December 2025 | AI SOC Fact vs. Fiction
Cut through the AI noise and get a clear reality check on what AI can and cannot do in the security operations center, straight from Simbian’s hands on experience building some of the largest AI SOCs. The discussion separates genuine capabilities from vendor hype and gives practical guidance teams can apply immediately.
Attendees will get a fact versus fiction view of AI SOCs so they understand where human expertise remains essential, a set of evaluation questions to spot chatbox wrappers and operational blind spots, and a practical roadmap for evolving from today’s overloaded SOC to more proactive, AI-augmented security operations.
Company_Webinar • Part of Simbian
17th December 2025 | AI SOC: Fact vs Fiction
Cut through the AI hype in security operations with Simbian, as experts separate fact from fiction about AI in the SOC. Drawing on hands-on experience building some of the largest AI-enabled SOCs, the session delivers practical tools and a clear framework to plan and evolve your security operations.
You will learn what AI SOC tools can and cannot do and how they extend, not replace, human teams, which questions reveal hidden vendor limitations, and a phased roadmap from today’s reactive SOC to proactive, AI-powered SecOps. Register for the live session to get actionable guidance for your AI SOC strategy.
Company_Webinar • Part of Simbian
17th December 2025 | Taming Tool Sprawl: How Portnox Unifies Security Through Smarter Integrations
Security teams are facing growing risk as disconnected tools create gaps in visibility and overwhelming alert noise. This webinar examines how Portnox reduces tool sprawl by unifying device intelligence and security controls through smarter integrations, giving teams a clearer and more reliable view of their environment. The session explains why fragmented stacks lead to missed threats and operational blind spots, and how consolidation strengthens overall security posture.
Attendees will see how centralized insights help cut through alert overload, improve detection accuracy and streamline daily workflows. The discussion highlights practical ways to bring order to complex security environments and shows how a unified approach lowers risk while making teams more effective.
Company_Webinar • Part of Portnox
17th December 2025 | CyberRisk CISO Dinner: Portland 2025
The CyberRisk CISO Dinner in Portland offers cybersecurity executives a private environment for meaningful discussions on emerging risks and defense strategies. Attendees engage in peer-to-peer exchanges that highlight practical solutions for evolving security challenges.
The dinner fosters community building and equips leaders with new ideas to strengthen organizational resilience against modern threats.
Physical • Free • Part of CyberRisk Alliance
17th December 2025 | Why code quality is a compliance accelerator
The webinar explains how strong code health works as the technical foundation for a compliant software environment. The session connects everyday development practices with broader compliance goals and shows why improving code quality has a direct impact on meeting regulatory and internal standards. Speakers will demonstrate how SonarQube automates key steps in the compliance journey by identifying issues early and supporting consistent, verifiable code practices.
Attendees will get a clear view of the difference between what a team builds and the underlying quality it is built on, along with practical examples of how healthier code leads to a more compliant codebase. The discussion also highlights how automation simplifies the process of proving compliance and makes it a natural outcome of well managed development workflows.
Company_Webinar • Part of Sonar
17th December 2025 | Level Up Your Defense: Reduce Risk Across Your Network
This event takes a straightforward look at how security teams can reduce network risk as environments grow more complex. FireMon specialists outline practical ways to gain real time visibility across hybrid networks and show how stronger control over firewall policies helps teams cut down noise, focus on real issues, and stay ahead of emerging threats.
The session highlights key use cases that demonstrate how faster issue discovery, smarter cleanup of outdated rules, and continuous policy tuning improve both security posture and compliance. Attendees also see how integrated change tracking and contextual insights support quicker response and more confident decision making across the network.
Company_Webinar • Part of FireMon
18th December 2025 | 2025 CTO Global Summit: Chapter 8
CTO Global Summit 2025 is a premier executive program designed specifically for technology leaders mastering the challenges and opportunities of AI transformation. Structured across multiple chapters from September to December, the summit provides an immersive learning experience where CTOs explore emerging technologies, exchange real-world implementation insights, and develop best practices for guiding their organizations through AI-driven change. Each chapter features focused sessions with thought leaders, practical frameworks, and opportunities for peer-to-peer knowledge sharing.
Beyond the executive track, the event includes the DevTool Arena, where developer tool teams compete live to showcase products directly to over 1,000 tech decision-makers, driving rapid adoption and visibility. Investors benefit from early access to rising companies through live pitches and market feedback, while service providers connect with executives to identify genuine client needs. With live demos, keynote presentations, interactive voting, and high-value networking, CTO Global Summit 2025 is positioned as a must-attend global platform for decision-makers shaping the future of AI transformation and digital innovation.
Online • Paid • Part of Geekle.us
18th December 2025 | Simplifying everyday Active Directory operations.
The "Simplifying Everyday Active Directory Operations" webinar provided valuable insights into streamlining Active Directory management. Attendees appreciated the expert-led sessions that covered automation techniques, best practices, and troubleshooting tips. The event was well-organized, with clear presentations and interactive Q&A sessions. Participants found the practical demonstrations particularly useful for real-world application. Overall, the webinar was highly informative, equipping IT professionals with tools to enhance efficiency in Active Directory operations.
Online • Part of ManageEngine
18th December 2025 | Workload Identity 101: What Every Security Team Needs to Know
This webinar explains why traditional PAM tools designed for human identities fall short when applied to fast moving machine workloads. The session covers real challenges seen in enterprise environments, including static credentials in code, identity silos, overly permissive service accounts and limited visibility into workload activity. Attendees will learn why these gaps grow as machines scale far beyond human users.
The presentation introduces the core concepts of workload identity and explains how the SPIFFE standard supports secure and automated authentication for dynamic environments. The speakers will show how trust domains, attestation and short lived identities reduce the risk of leaked secrets and strengthen access control across on premises and cloud workloads. The session also highlights how automation and standard APIs simplify authentication for developers and improve operational security at scale.
Company_Webinar • Part of CyberArk
19th December 2025 | Agile Gurugram Conference 2025
Agile Gurugram 2025 is a flagship event that brings together professionals and thought leaders in Lean and Agile methodologies. Now in its tenth edition, the conference serves as a pivotal meeting point for innovation, collaboration, and knowledge sharing within India’s Agile community. Organized by Agile Network India, this event has evolved into a recognized platform for exchanging real-world experiences and best practices in Agile transformation and enterprise agility.
While Agile Gurugram is highly relevant for software development and project management professionals, it is not directly focused on cybersecurity topics. The sessions primarily revolve around Agile frameworks, team dynamics, Lean methodologies, and organizational change—not security or threat management. Therefore, this event is considered unrelated to cybersecurity for the purposes of your listings.
Physical • Paid • Part of Agile Network India
19th December 2025 | International Conference on Computer, Internet of Things and Control Engineering (CITCE) 2025
The 5th International Conference on Computer, Internet of Things and Control Engineering (CITCE 2025) will gather experts and innovators to explore advancements in IoT technologies, smart systems, and control engineering. This event serves as a vital meeting point for professionals from academia and industry who are looking to exchange ideas, present research findings, and collaborate on emerging solutions that are shaping the future of connected technologies. Through keynote speeches, technical sessions, and research presentations, attendees will gain valuable insights into the evolving trends of computer science and IoT applications.
CITCE 2025 aims to create a dynamic platform that not only fosters academic discussion but also encourages practical collaborations between global enterprises and research institutions. Participants will have opportunities to network with international scholars, engineers, and decision-makers who are actively driving technological innovation. This event is ideal for anyone seeking to stay ahead in IoT advancements and control engineering breakthroughs.
Physical • Paid • Part of Guangzhou Computer Society
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.