Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
12th January 2026 | SANS Nashville Winter 2026
Unlock the full potential of your cybersecurity career at SANS Nashville Winter 2026 (January 12-17, CT). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve.
Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in your professional endeavors. Seize the opportunity to hone your skills during bonus sessions and activities, backed by SANS unwavering commitment to excellence and expertise.
Hybrid (Both) • Paid • Part of SANS Institute
12th January 2026 | INTERSEC Dubai 2026
Intersec Dubai 2026 brings together global leaders in security, safety, and fire protection for three days of innovation and collaboration. For over twenty years, the event has served as a vital meeting point for professionals focused on building safer and more resilient environments. Exhibitors showcase the latest technologies in cybersecurity, physical security, emergency response, and fire safety, while visitors gain first-hand exposure to tools that protect people and assets in an evolving threat landscape.
The conference welcomes policymakers, investors, and technology providers who are shaping tomorrow’s security strategies. It is a place where partnerships form, ideas take root, and new approaches are shared across industries. With its strong reputation and global reach, Intersec Dubai continues to set the standard for integrated safety and security events in the Middle East and beyond.
Physical • Paid • Part of Messe Frankfurt Exhibition GmbH
13th January 2026 | Office Hours: Security & Compliance
Get practical guidance on using N-able security and compliance tools to protect customer environments more effectively. This session focuses on current security updates, patching considerations, product enhancements and roadmap direction, helping teams understand how recent changes impact real world security operations.
Participants can raise specific security questions, review best practices for keeping systems secure and hear expert insight on emerging risks and compliance needs. The discussion also covers Patch Tuesday updates and other security developments that MSPs should be aware of. This office hours session is designed for teams that want clearer direction on maximizing N-able security products while maintaining strong protection for their customers.
Company_Webinar • Part of N-Able
13th January 2026 | AI-Powered Email Security
Sensitive data loss through misdirected email remains one of the most common and costly security risks for organizations. This webinar focuses on how modern email threats, human error and growing regulatory pressure are exposing the limits of traditional DLP tools. Proofpoint demonstrates how AI powered email security improves visibility into outbound risk and helps organizations prevent sensitive data leaks without disrupting everyday work.
The session explains why legacy DLP struggles in today’s threat landscape and shows how machine learning can detect and stop data loss in real time, even across multilingual environments. Attendees will see practical approaches for adapting email security to real user behavior, including contextual prompts that guide employees before mistakes happen. A live demo highlights how organizations can reduce data loss quickly while maintaining productivity and a smooth user experience.
Company_Webinar • Part of Proofpoint
13th January 2026 | The Business Value of a Unified Kubernetes Platform
Managing Kubernetes at scale becomes harder as teams juggle multiple clusters, distributions, and disconnected tools. This webinar focuses on how a unified Kubernetes platform can reduce complexity, control costs, and improve security without locking organizations into a single vendor. The session explains how networking, network security, and observability can be consolidated into one consistent operating model.
The discussion highlights how organizations can replace tool sprawl, improve workload portability across Kubernetes environments, and securely scale to multi cluster deployments. Attendees will see how a unified approach supports stronger security controls, simpler operations, and greater flexibility when expanding Kubernetes environments across teams and regions.
Company_Webinar • Part of Tigera
13th January 2026 | Computerworld Cyber Briefing: January 2025
The Computerworld Cyber Briefing: January 2026 offers IT and security professionals an early look at the cybersecurity challenges and opportunities shaping the year ahead. This concise digital session brings together Danish experts and analysts to share practical updates on threat trends, compliance shifts, and technology developments that impact local organizations.
Running for one hour, the event is designed for busy decision-makers who want a clear overview without lengthy presentations. It serves as a focused start to the cybersecurity calendar, helping attendees plan for the months ahead with confidence and clarity. The program emphasizes knowledge sharing and practical guidance over promotion, staying true to Computerworld’s straightforward and informative briefing style.
Online • Paid • Part of Computerworld Danmark
13th January 2026 | A Decade After the First Cyber Attack on Civilian Power Infrastructure: Lessons, Evolution, and Imperatives
This webinar revisits the landmark 2015 cyber attack on Ukraine’s power grid and examines how that event reshaped global understanding of cyber risk to critical infrastructure. Drawing on their direct involvement in the investigations, Robert M. Lee of Dragos and Tim Conway of the SANS Institute walk through what happened in the 2015 and 2016 incidents and why those attacks became defining moments for the OT security community. The session explains the broader impact on electric utilities and industrial organizations around the world.
The discussion highlights how the threat landscape has evolved over the past decade and outlines the most important lessons for securing operational environments today. Attendees will gain technical insight into attacker behavior, the weaknesses exposed during the Ukraine incidents and the defensive imperatives that have emerged since. The webinar concludes with an open Q and A for participants seeking deeper perspective on protecting critical infrastructure.
Company_Webinar • Part of Dragos
13th January 2026 | International Journal on Integrating Technology in Education (IJITE) 2026
This journal is an interdisciplinary form for educators who wish to improve the quality of instruction through the use of computers and how to implement it effectively into instruction. This forum also aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Online • Paid • Part of AIRCC Publishing Corporation
13th January 2026 | Privacy pulse: Q1 2026 global regulatory update
Privacy teams are facing a rapidly changing regulatory environment as new laws and enforcement priorities take effect in 2026. This webinar provides a global Q1 privacy update, focusing on how emerging regulations and compliance expectations are impacting organizations across regions. OneTrust will outline the most important privacy and AI related developments shaping programs at the start of the year.
The discussion covers new US state privacy and AI laws, updates tied to the EU Digital Omnibus, key developments across APAC, and enforcement trends drawn from recent regulatory actions. Attendees will also hear practical guidance on keeping privacy programs aligned with evolving requirements. The session is designed to help teams start the year with a clear view of the global privacy landscape and prepare for regulatory change.
Company_Webinar • Part of OneTrust
13th January 2026 | Leading Amid Disruption: How leaders are balancing innovation, security and trust in 2026 (EMEA)
Senior leaders from Delinea and IBM come together to discuss how organizations are balancing innovation, security, and trust as AI adoption accelerates toward 2026. The discussion focuses on how shifting regulations, expanding attack surfaces, and emerging technologies such as quantum computing are forcing leaders to rethink resilience and security strategies. The panel examines how traditional approaches are being challenged by rapid change and real time AI driven threats.
The session highlights practical approaches to strengthening security without slowing innovation, defending against AI powered adversaries, and maintaining human oversight as automation increases. Attendees will gain insight into how leaders are planning for uncertainty, building trust in AI enabled environments, and preparing for risks that are no longer theoretical. This event is designed for executives and security leaders navigating constant disruption in the modern threat landscape.
Company_Webinar • Part of Delinea
13th January 2026 | Inside the React2Shell Exploits
A technical deep dive into the React2Shell vulnerability shows how a flaw in React Server Components is being actively exploited to deliver advanced Linux malware. This webinar breaks down CVE-2025-55182 and explains how attackers are using the unauthenticated remote code execution weakness to deploy the PeerBlight backdoor in real world attacks.
Huntress analysts Anna and Michael walk through how the React2Shell exploit works in practice and examine the design of PeerBlight’s command and control model. The session highlights how the malware uses the BitTorrent DHT network to build a resilient and difficult to disrupt C2 infrastructure. Security teams will gain a clearer understanding of the attack chain, the techniques involved and why this threat represents a serious risk for modern environments.
Company_Webinar • Part of Huntress
13th January 2026 | SASIG Events: Data Management SASIG - Security, Resilience and Application in the Face of Growing Threats 2026
SASIG Data Management: Security, Resilience and Application in the Face of Growing Threats focuses on how organizations can strengthen their data security posture while meeting growing regulatory and operational demands. The event brings together security leaders, practitioners, and data professionals to explore practical approaches to data classification, protection, governance, and compliance across modern enterprise environments. Discussions center on managing data securely across cloud and hybrid infrastructures while maintaining resilience and trust.
Through real-world case studies and expert-led sessions, attendees gain insight into improving data lifecycle security amid evolving threats and regulatory change. The event operates under the Chatham House Rule, encouraging open discussion and knowledge sharing in a trusted setting. With no cost to attend and eligibility for professional CPE and CPD credits, the session is designed to support continuous learning while fostering meaningful peer engagement within the cybersecurity community.
Physical • Free • Part of SASIG Events
13th January 2026 | Yellowhat 2026
Yellowhat 2026 is a premier cybersecurity conference focused on advanced Microsoft security technologies and deep-dive technical sessions. The event brings together security professionals, engineers, and researchers to explore high-level topics such as threat detection and incident response within the Microsoft ecosystem. This year the program emphasizes the future of artificial intelligence in security, specifically addressing how generative AI can reduce false negatives and improve security operations center efficiency. Attendees have the option to join the physical gathering in Almere for live networking or participate via a global livestream to access expert insights from anywhere in the world.
The conference is designed for practitioners who seek level 400 plus knowledge rather than basic introductions. Sessions cover a wide range of critical defense strategies, including Windows security features, telemetry analysis, and real world monitoring of sophisticated authentication attacks. By providing a platform for experts to share actionable insights and innovative methodologies, Yellowhat helps the community stay ahead of evolving digital threats. The hybrid format ensures that the valuable research presented by industry leaders remains accessible to a broad international audience. This commitment to technical excellence and community growth makes it a significant event for those dedicated to mastering modern defensive security.
Hybrid (Both) • Paid • Part of Yellowhat
13th January 2026 | Patching That Keeps Users Productive: Best Practices for Smooth IT Operations
Effective patch management is not just about fixing vulnerabilities, it is also about protecting productivity. This webinar focuses on how patching strategies can be designed to strengthen security while minimizing disruption for end users. Using real world policy configuration data from NinjaOne and insights from experienced IT product leaders, the session highlights what works in day to day operations.
The discussion covers practical best practices for balancing security requirements with operational efficiency. Attendees will see how thoughtful patching policies help reduce user friction, maintain system stability and support smoother IT operations overall. This session is ideal for teams looking to improve patch outcomes without compromising user experience.
Company_Webinar • Part of NinjaOne
13th January 2026 | San Diego NORTH COUNTY Cyber Meetup (January 2026)
This is a satellite meetup in North County.
We'll meet outside (if the weather is clear).
If you live in North County San Diego and you work in cyber, and you want to hang with like-minded professionals, this event is for you. Let's get together for a beer and conversation. There will be a food truck outside as well.
DO NOT CONFUSE this event with our regular event in Mission Valley.
Physical • Free • Part of San Diego Cyber Group
13th January 2026 | What’s next for AI identity in 2026
This discussion examines how AI agents will reshape identity security in 2026 and why organizations must be ready for a dramatic shift in how access and trust are managed. As enterprises begin operating alongside hundreds of autonomous AI agents, the session highlights the growing challenge of understanding their behavior, controlling their permissions and ensuring they cannot act without proper safeguards.
Okta and Accenture experts walk through key predictions for AI driven identity, focusing on the need for stronger visibility, adaptive governance and modern security controls that keep pace with rapidly evolving automation. The talk explains how identity strategies must adjust as AI becomes an active participant in the enterprise ecosystem and offers clear guidance for leaders preparing for this next stage of security transformation.
Company_Webinar • Part of Okta
13th January 2026 | From Experiments to Ecosystems: Building AI Identities That Last
This session focuses on building durable and secure identity models as AI agents become part of everyday business systems. As organizations accelerate AI adoption, the discussion looks at the risks of short term identity decisions and why future ready approaches are needed to keep identity ethical, resilient and aligned with human oversight. Futurist Heather Vescent outlines how identity must evolve as digital employees, digital twins and autonomous agents become more common.
The webinar examines practical questions around verifying AI identities, assigning accountability and understanding new attack surfaces that may emerge in 2026. Through a guided exercise, attendees will explore the long term impact of the agentic web and how to prepare for future security and governance challenges. The session is relevant for security professionals, technologists and product leaders who want to build AI identity systems that remain effective over time.
Company_Webinar • Part of Ping Identity
13th January 2026 | Don't Settle For Partial Protection: ZPA Delivers Comprehensive ZTNA
Inconsistent ZTNA policies and legacy VPNs often create security gaps and unnecessary complexity across modern environments. This webinar focuses on how organizations can move beyond partial zero trust implementations by adopting a unified ZTNA approach that delivers consistent protection for both remote and in office users.
The session features real world insights from Xerox, sharing their transition from legacy VPNs to Zscaler Private Access and how that shift helped enforce consistent zero trust policies across their workforce. Attendees will gain practical guidance on consolidating secure access tools, simplifying operations and closing gaps caused by fragmented access solutions, while ensuring a smoother and more secure user experience.
Company_Webinar • Part of Zscaler
13th January 2026 | Decoding MITRE ER7: How to Interpret Results That Matter
Interpreting MITRE ATT&CK Evaluation results can be challenging, especially when comparing endpoint security tools in real world conditions. This webinar breaks down WatchGuard’s MITRE ER7 results and explains how to focus on the metrics that truly reflect security effectiveness and operational efficiency for MSPs.
The session shows how detection quality, prevention capability and alert volume influence service cost, scalability and margins. Attendees will gain clarity on which ER7 indicators matter most for delivering predictable, low friction security services and how to use evaluation data to make better decisions for customer environments.
Company_Webinar • Part of WatchGuard
13th January 2026 | Managing Microsoft Teams using Active Roles
This webinar focuses on securing Microsoft Teams environments as adoption continues to grow across organizations. It addresses how unmanaged teams, memberships, and permissions can introduce security gaps and operational risk. The session shows how One Identity Active Roles helps bring structure and control to Microsoft Teams by improving visibility, reducing unmanaged access, and enforcing consistent governance across collaborative apps.
Attendees will see practical ways to regain control of Teams environments, strengthen security, and establish a cleaner, more manageable approach to collaboration without disrupting productivity.
Company_Webinar • Part of One Identity
13th January 2026 | Joint Custody - The Digital Asset Dialogues
This episode brings together leaders from the blockchain ecosystem to examine how decentralized networks approach institutional engagement, governance, and long term financial sustainability. The discussion looks at how blockchain native systems manage treasuries, allocate capital, and design on chain governance models that support growth and resilience at scale.
The conversation also highlights common gaps between decentralized protocol design and traditional institutional expectations. Speakers explore how Polkadot is preparing for broader institutional participation, what on chain governance means for large scale decision making, and what future digital asset infrastructure must deliver to support secure and sustainable adoption. The session offers practical insight for organizations evaluating decentralized technologies from both a governance and risk perspective.
Company_Webinar • Part of GK8
13th January 2026 | AgileBlue Q1 Roadmap Webinar
The Q1 Roadmap Webinar will highlight AgileBlue’s newest updates to its AI native SecOps platform and preview what is planned for 2026. The session will cover improvements in AI driven detection and response, upgrades that reduce alert overload and new capabilities designed to simplify day to day security operations. Attendees will also hear how the platform continues to support organizations with full stack monitoring, vulnerability scanning and automated incident response.
The speakers will share real examples of how customers are improving detection speed, lowering false positives and strengthening overall protection through the combination of agentic AI and 24 by 7 human expertise. This webinar offers a clear view of what AgileBlue delivers today and what users can expect as the platform evolves.
Company_Webinar • Part of AgileBlue
13th January 2026 | PQShield with Microchip’s PolarFire® SoC FPGAs: Securing the Future of Embedded Systems in the Post-Quantum Era
Embedded system security is entering a new phase as quantum computing advances and long lifecycle designs face growing cryptographic risk. This webinar focuses on post quantum security challenges and explains why traditional cryptography is no longer enough for protecting modern embedded environments. The discussion covers the need for crypto agility and strong hardware based security to address emerging threats.
The session highlights how PQShield and Microchip’s PolarFire SoC FPGA technologies approach post quantum protection through hardware and software co design. Attendees will gain insight into defending against risks such as side channel attacks and learn practical ways to prepare embedded systems for a post quantum future while maintaining performance and resilience.
Company_Webinar • Part of PQShield Ltd
13th January 2026 | TRU Intelligence Briefing
This month’s TRU Intelligence Briefing gives security teams an inside look at the latest cyber threats identified by eSentire’s Threat Response Unit. The session highlights new research findings from TRU’s analysts, who track malware activity, vulnerability exploitation and threat actor behavior across global environments. Attendees will see what is shaping the current threat landscape and how these trends impact enterprise defense.
The briefing covers the major Adversary in the Middle campaigns seen throughout 2025, including techniques used by prominent toolkit operators and their affiliates. TRU will also break down recent Phishing as a Service activity, detection opportunities and common infrastructure abused in these operations. Additional insights include updates on recently disclosed vulnerabilities, notable malware families observed by the SOC and a short geopolitical overview focusing on AI enabled cyberespionage.
Company_Webinar • Part of eSentire
14th January 2026 | Zero Trust for Users Masterclass: Upgrading to AI-Powered Threat Protection
This masterclass focuses on how Zero Trust principles combined with AI powered security can improve user protection across modern enterprises. The session highlights how Zscaler applies its Zero Trust architecture internally to reduce attack surface, protect critical systems and improve threat response as cyberattacks become more advanced.
The discussion covers practical examples from Zscaler’s own Zero Trust journey, including stronger access controls based on user and device posture, secure use of generative AI with data loss prevention and faster threat containment through ecosystem integrations. Attendees will also see how proactive defenses such as deception techniques help security teams detect incidents earlier and respond with greater precision. This webinar is designed for security teams looking to modernize user protection using AI driven Zero Trust strategies.
Company_Webinar • Part of Zscaler
14th January 2026 | NEW Deepfake Training: Empowering Your Users to Recognize What AI Can Fake
This session examines how deepfakes, AI generated impersonations and synthetic narratives are becoming a central tool for social engineering attacks. The speakers explain why traditional security training no longer prepares users for messages, voices or videos that feel convincingly real and show how attackers use plausibility and framing to make impersonations seem trustworthy. Real incidents are reviewed to illustrate where human judgment breaks down and how stronger cognitive defenses could have prevented compromise.
The webinar introduces practical methods employees can use to verify suspicious content, even when it sounds or looks familiar. It also highlights KnowBe4’s new deepfake training materials that allow organizations to create realistic, leadership based examples to build user awareness. Attendees leave with strategies to help their workforce stay calm, think critically and recognize AI driven manipulation, along with ways to show leaders measurable risk reduction.
Company_Webinar • Part of KnowBe4
14th January 2026 | From Blind Spots to Control: How DSPM + SSE Protects Data in the GenAI Era
The session focuses on the growing data security risks created by rapid AI adoption and the lack of visibility into where sensitive information resides and how it moves across cloud, SaaS and AI workflows. The discussion explains why traditional DLP cannot address these challenges on its own and why Data Security Posture Management has become the foundation for protecting sensitive data in AI driven environments.
Speakers from Skyhigh Security and Omdia outline how DSPM uncovers exposure across structured and unstructured data, sanctioned and shadow AI tools and multicloud setups. They show how DSPM, combined with SSE and modern DLP, enables real time controls that extend to GenAI prompts, outputs and multiturn interactions. Attendees get practical guidance on reducing data leakage risks and operationalizing DSPM as part of a modern data security strategy.
Company_Webinar • Part of Skyhigh Security
14th January 2026 | Future Proof Your TPRM Program: Advanced Automation and AI in Action
This webinar showcases how advanced automation and AI can elevate third party risk management programs beyond basic compliance. Through a live demonstration of the ProcessUnity platform, the session shows how organizations can modernize TPRM by improving visibility, speeding up assessments and reducing manual effort across the entire risk lifecycle. The discussion focuses on building a program that scales as demands increase, rather than simply keeping pace with current requirements.
Attendees will see how AI driven assessment cycles, integrated data sources and configurable workflows help teams validate controls, engage vendors more efficiently and automate routine tasks with minimal intervention. The session also highlights flexible scoring models and dashboards that adapt to different risk domains. This webinar is designed for teams looking for a practical path to future proof TPRM operations and stay ahead of evolving third party risk expectations.
Company_Webinar • Part of Process Unity
14th January 2026 | Learn How You Can Eliminate Tool Sprawl and Vendor Lock-in on Kubernetes with Calico
Kubernetes teams are facing rising complexity as networking, security, and observability tools continue to pile up across multiple distributions. This webinar focuses on how tool sprawl and vendor lock in increase costs, complicate operations, and limit flexibility in modern Kubernetes environments. The session explains why managing fragmented tooling has become a common challenge as adoption grows.
The discussion shows how Calico provides a unified networking and network security approach that works consistently across Kubernetes distributions. Attendees will see real customer examples of organizations replacing multiple tools, reducing operational overhead, and avoiding vendor dependence. The webinar is designed for teams looking to simplify Kubernetes operations, improve portability, and scale securely with greater control.
Company_Webinar • Part of Tigera
14th January 2026 | The Elephant in AppSec Conference
Get ready for an event where bold opinions and top Application Security experts come together like toast and butter. Our mission is to explore a wide range of AppSec topics, delivering an engaging and educational experience for all attendees.
Online • Free • Part of Escape
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.