AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
25th February 2026 | V2 Security | Aarhus 2026
The V2 Security | Aarhus 2026 conference assembles cybersecurity professionals, leaders and vendors for a two-day forum of knowledge sharing and networking. It covers the full spectrum of cybersecurity topics including threat intelligence, governance, risk and compliance, identity and access management, as well as infrastructure, network and cloud security. The programme also addresses specialized domains such as industry and operational technology security while exploring how artificial intelligence, automation and emerging technologies are reshaping the threat landscape.
Participants will also engage with sessions on crisis management, resilience and the geopolitics of digital sovereignty to examine the broader strategic and societal dimensions of cybersecurity in an increasingly connected world. The editorial team from Version2 works with an advisory board of Denmark’s top experts to develop a conference agenda that is both current and highly relevant for security practitioners and decision-makers.
Physical • Paid • Part of Version2
25th February 2026 | Too Many Backups, Not Enough Profit
Backup sprawl is quietly eroding profitability for many MSPs as separate tools for endpoints, servers and SaaS create operational complexity and inconsistent recovery processes. This session examines how fragmented backup environments increase support overhead, drive reactive workflows and make it harder to scale efficiently.
The discussion focuses on how successful MSPs are moving away from disconnected point solutions toward a unified data protection strategy. Attendees will gain practical insight into reducing operational costs, improving efficiency and building scalable backup services that support long term growth. The webinar highlights the business impact of consolidation and explains how a streamlined approach to backup can shift data protection from a cost burden to a margin positive offering.
Company_Webinar • Part of Datto
25th February 2026 | Cyber Revolution Summit: Mozambique
The Cyber Revolution Summit series brings together cybersecurity practitioners, government officials and technology innovators across diverse regions including Africa, Southeast Asia and the Middle East. Each regional edition focuses on strengthening cyber-defense frameworks, advancing threat intelligence capabilities and aligning public-private efforts to secure national digital infrastructures. Attendees will find insight into trends such as ransomware resilience, AI-powered threat detection and the governance of critical systems, all within a context shaped by local market realities and global cyber-risk pressures.
This multi-city forum thrives on collaboration: participants engage in keynote sessions, panel discussions and one-on-one meetings that forge new partnerships and elevate organisational readiness. Whether in Manila or Riyadh, Maputo or Kuala Lumpur, the summit offers a meaningful platform to benchmark cybersecurity strategy, build network defences and translate emerging technology into practical advantage.
Physical • Paid • Part of TraiCon India Private Limited
25th February 2026 | Advanced Bot Protection and Account Take Over Roadmap 2026
Advanced Bot Protection and Account Takeover strategies take center stage in this roadmap session focused on Imperva’s 2026 plans. The product team will outline upcoming enhancements to Advanced Bot Protection and Account Takeover capabilities, highlighting new features designed to strengthen defenses against automated threats and credential abuse. The discussion centers on how these updates will address evolving bot activity and account compromise tactics.
The session also invites direct feedback from customers, encouraging participants to share pain points, feature priorities and operational challenges. Attendees will have the opportunity to engage with the product manager, ask questions and influence the direction of future security capabilities aimed at protecting applications and user accounts.
Company_Webinar • Part of Imperva
25th February 2026 | SHIFT 2026
SHIFT Cyber Resilience Event London is a focused cybersecurity and cloud resilience conference designed for security and IT leaders managing complex, cloud native environments. The event centers on preparing organizations for advanced cyber threats, including risks introduced by AI driven systems and agentic technologies. Through expert led sessions, attendees explore modern approaches to cyber recovery, data protection, and operational resilience across multi cloud infrastructures.
The agenda highlights practical cybersecurity strategy, including AI focused resilience planning, recovery metrics, and real world breach response lessons. Industry leaders from major technology and storage organizations share insights on securing enterprise environments and improving recovery readiness. The event is especially relevant for CISOs, IT leaders, and security decision makers seeking actionable guidance on protecting business critical systems while scaling securely in cloud and AI enabled ecosystems.
Physical • Paid • Part of CommVault
25th February 2026 | AI-Enabled Resilience Operations: From Insight to Action
AI enabled resilience operations are changing how organizations detect issues, protect data and respond to disruptions across hybrid environments. This session focuses on how ResOps powered by AI helps teams move beyond reactive troubleshooting toward coordinated, proactive response when incidents occur.
The discussion highlights how Commvault applies AI through conversational interfaces and automation to surface insights, reduce manual effort and guide protection and recovery workflows. Real world examples and demonstrations show how operational issues can be identified earlier, decisions made faster and response actions executed more efficiently without adding unnecessary complexity. The webinar is designed for infrastructure, security and AI leaders looking to strengthen operational resilience as AI adoption expands.
Company_Webinar • Part of CommVault
25th February 2026 | Ransomware Resilience & Recovery Summit 2026
The Ransomware Resilience & Recovery Summit 2026 is a virtual cybersecurity event designed to help security professionals strengthen their defenses against ransomware threats and improve response and recovery practices. Hosted by SecurityWeek, the summit brings together enterprise and security leaders to explore emerging trends in ransomware attacks, proactive defense strategies, and lessons learned from recent incidents. The virtual format makes it accessible to a global audience of security practitioners, incident responders, and risk managers who want practical guidance on building resilient systems.
The summit covers topics such as rapid detection strategies, effective containment methods, and planning for business continuity in the face of sophisticated ransomware intrusions. With an open call for speakers and expert contributions from the cybersecurity community, attendees can gain insights from real world case studies and peer discussions. The event supports professional development and encourages collaboration to improve organizational ransomware resilience across industries.
Physical • Paid • Part of SecurityWeek
25th February 2026 | Regulation S-P – What You Need to Know!
A focused briefing on the updated Regulation S-P requirements and what financial institutions need to do to stay compliant as the new rules take effect. The webinar breaks down how recent amendments change expectations around safeguarding customer information, data disposal, and privacy controls for investment advisors and other covered firms.
The session outlines the new regulatory requirements, explains their impact on day to day operations, and highlights practical steps organizations should take to prepare for the compliance deadline. Led by Kroll experts, the discussion also covers proven best practices that support stronger data protection, reduce regulatory risk, and help firms maintain long term compliance.
Company_Webinar • Part of Kroll
25th February 2026 | DEFEND WEBINAR | Fraud & AML Executive Insights for 2026
An executive level discussion on how financial institutions are responding to the rapid rise of AI driven fraud and modern AML challenges. This webinar presents five key insights from DataVisor’s latest survey of senior fraud and AML leaders, highlighting where banks and fintechs are struggling and how leading organizations are adapting their data, detection, and decisioning strategies for the future.
The panel examines real world implications of AI enabled fraud, fragmented data environments, real time payments risk, and the use of AI within investigative workflows. Speakers also discuss how modern scorecards are evolving beyond simple fraud rates to better measure success. The session is designed for fraud, AML, risk, compliance, and payments leaders looking for practical direction as they modernize controls and prepare for the years ahead.
Company_Webinar • Part of Datavisor
25th February 2026 | The Real Story Behind Zero Trust, Identity, and Device Security
Workforce access now spans managed and unmanaged endpoints, personal and corporate devices, and trusted and unknown networks. This webinar examines why identity alone is no longer sufficient and how organizations can secure access from end to end. It focuses on combining strong identity controls with real time device trust to reduce risk across changing environments.
The session explains how endpoint posture, authentication, and access decisions work together to protect users without adding friction. It also provides practical guidance for IT administrators on strengthening workforce protection and extending Zero Trust beyond passwords, enabling informed access decisions based on both user identity and device context.
Company_Webinar • Part of Outpost24
Modern cyber attacks rarely stop at the first breach, and the outcome often depends on how quickly teams can respond. This webinar focuses on what happens after an attacker is already inside an environment, examining how real world attacks progress, how dwell time increases damage, and why fast detection and response are critical to limiting impact.
The session breaks down identity driven lateral movement, the role of automation and AI in accelerating attacks, and what effective detection looks like in practice. Attendees will gain practical guidance on spotting early indicators of compromise, prioritizing alerts, and escalating incidents before they spread. The discussion is designed for IT and security professionals responsible for containing active threats and restoring control under pressure.
Company_Webinar • Part of N-Able
25th February 2026 | Why Intune Reporting Feels Hard and How Teams Are Solving It Webinar
Uncertainty around Intune reporting often is not about missing data but about lacking confidence in the answers. This webinar examines why reporting in Intune feels complicated when deeper questions arise and how teams are addressing those gaps. The session focuses on turning scattered information into clear, defensible insights that IT teams can rely on.
Attendees will see how organizations are simplifying reporting workflows, gaining better visibility into third party patching and reducing the need for manual exports or data stitching. A live walkthrough will demonstrate practical approaches that improve clarity, strengthen reporting confidence and make it easier to respond when important compliance or operational questions come up.
Company_Webinar • Part of Patch My PC
25th February 2026 | Zero Trust Purdue Model: A Blueprint for Secure Factories
Modern factory environments are stretching the limits of the traditional Purdue Model as cloud services, remote access, and IT driven workflows become standard. This webinar focuses on applying Zero Trust principles to industrial networks while keeping the Purdue Model’s layered structure intact. The session explains how implicit trust can be replaced with explicit, policy based access to better protect operational technology environments.
The discussion covers practical ways to secure factory connectivity without disrupting operations or adding unnecessary complexity. Attendees will see what a real Zero Trust journey looks like for a manufacturing organization, where to begin implementation, and how this approach helps reduce exposure to ransomware and other industrial cyber threats.
Company_Webinar • Part of Zscaler
25th February 2026 | 2026 Global Cyber Risk Outlook Webinar
A focused discussion on the cyber risks expected to shape 2026, based on Quorum Cyber’s Global Cyber Risk Outlook. The webinar examines how geopolitical instability and rapid advances in AI are influencing today’s threat landscape and increasing pressure on organizations across sectors.
Experts from Quorum Cyber and Microsoft share key findings from the report, highlight emerging risks for the year ahead, and offer practical guidance on strengthening cyber security posture, resilience, and risk management. The session is designed to help organizations better understand current threats and take informed action to reduce cyber risk in an increasingly uncertain environment.
Company_Webinar • Part of Quorum Cyber
25th February 2026 | The State of Compliance 2026: Insights from 1,000+ Professionals
Gain a clear view of how compliance programs are evolving in 2026 based on real data from more than 1,000 professionals worldwide. This webinar presents key findings from A-LIGN’s 2026 Compliance Benchmark Report and highlights how teams are adapting to new regulations, higher expectations, and the need to operate more efficiently.
The session focuses on audit quality, audit harmonization, changes in federal compliance requirements, and why technology enabled compliance has become the baseline. Speakers will also address how organizations are approaching AI risk management as part of modern compliance strategies. Attendees will leave with practical insight to benchmark their programs, identify gaps, and plan improvements for the year ahead.
Company_Webinar • Part of A-Lign
25th February 2026 | Lunch n Learn: Deep Dive into MDR for Microsoft
Explore how to strengthen security across Microsoft environments using managed detection and response designed to maximize existing investments. This Lunch and Learn session focuses on how Rapid7 MDR for Microsoft enhances visibility across Endpoint, Identity, Cloud, and O365 while helping teams move from alerts to meaningful security outcomes. The discussion addresses common challenges organizations face when relying on Microsoft Defender alone and how to improve protection without adding complexity.
The session explains how 24/7 expert monitoring, investigation, and unlimited incident response support faster threat containment and clearer prioritization. Attendees will see how alert noise can be reduced, how detection is extended across the Microsoft stack, and how real world use cases translate into stronger operational security. A live Q and A will close the discussion.
Company_Webinar • Part of Rapid7
25th February 2026 | The EOL Trap: Why Supply Chain Risk is Often Born of Neglect, Not Malice
End of Life software has become a growing compliance and security risk, especially as frameworks like SOC 2 and PCI DSS treat unsupported systems as business liabilities. This session examines how organizations get caught in the EOL trap when legacy applications remain in production long after support ends, creating exposure that is difficult to eliminate quickly.
HeroDevs and Anchore walk through practical steps to identify operating system and package level EOL risks that traditional scanners may overlook. The speakers demonstrate how to assess technical debt, maintain compliance and reduce exposure without forcing disruptive migrations. Attendees will see how replacement packages and improved visibility can help security leaders meet risk requirements while allowing development teams to maintain delivery speed.
Company_Webinar • Part of Anchore
25th February 2026 | Government Innovation Showcase: Federal 2026
The Government Innovation Showcase: Federal 2026 gathers Canada’s top public sector and technology leaders for a focused look at how digital transformation is reshaping government. The discussions emphasize real outcomes—better service delivery, smarter use of data, and practical paths toward modernization. Attendees hear directly from peers and experts working to balance citizen needs with policy demands, all while navigating an evolving digital landscape.
The event’s open and collaborative setting makes it easy for participants to exchange ideas and compare approaches. Sessions move from high-level vision to detailed case studies, giving people clear takeaways they can apply within their departments. The day supports honest conversations about technology, trust, and collaboration across agencies. For anyone helping steer Canada’s digital government agenda, this showcase offers a clear view of what progress looks like and where the next opportunities lie.
Physical • Paid • Part of Public Sector Network (Certified B Corp)
25th February 2026 | AppSec On-Prem: WAF Protection & PCAP
Strengthen protection for on premises applications by understanding how Web Application Firewall capabilities and packet capture work together to defend against modern threats. This session focuses on how WAF technology mitigates common web based attacks and how PCAP supports validation, troubleshooting and deeper investigation within on premises environments.
The discussion covers practical deployment models for WAF implementations and explains where packet capture should be positioned for accurate visibility. It also highlights common PCAP mistakes, such as capturing on the wrong interface or direction, missing VLAN tags or expecting decrypted payloads without session keys. Attendees will gain clear guidance on tuning and operating on premises WAF solutions while using packet data effectively for analysis and response.
Company_Webinar • Part of Imperva
25th February 2026 | 2026 Malware Trends: Hunting the Digital Parasite
Digital Parasites are redefining modern malware by favoring stealth, persistence and evasion over noisy encryption attacks. This session breaks down the latest research behind 2026 malware trends and explains how adversaries are maintaining long term access inside compromised networks while avoiding traditional detection methods. The discussion focuses on why most leading attack techniques now center on staying hidden rather than causing immediate disruption.
Attendees will see how so called self aware malware adapts its behavior to evade sandboxes and monitoring tools, and how advanced detection strategies can expose these hidden threats. The webinar also introduces dynamic threat templates designed to uncover unauthorized access and adversaries already operating inside the environment, helping security teams strengthen visibility and response.
Company_Webinar • Part of Picus Security
25th February 2026 | Corinium: CISO Financial Services 2026
CISO Financial Services brings together senior security leaders from across the financial services industry for honest, peer-to-peer conversations on the challenges that rarely make it to the stage. On February 25, 2026, at the Hyatt Jersey City on the Hudson, CISOs from leading banks, insurance companies, and financial institutions will tackle the real pressures they face, from AI accountability and insider threat to board dynamics and multi-cloud resilience. It's a community-first event designed for unfiltered exchange: expert AMAs, live debates, interactive discussion groups, and a crisis response hackathon. If you're navigating the unique regulatory intensity, evolving threats, and executive scrutiny that define security in financial services, this is where you'll find the insights and peer connections that actually matter.
Physical • Paid • Part of Corinium Global Intelligence
Artificial intelligence is rapidly transforming IT operations, creating both operational pressure and strategic opportunity. This webinar examines the real world impact of AI on infrastructure, budgeting, and cyber resilience. It addresses the financial, ethical, and human implications of AI adoption, helping IT leaders understand how these factors affect both global markets and their own organizations.
The session also explores why AI is increasing demand for data center space, licensing, and hardware, and how organizations can plan investments accordingly. It analyzes AI’s dual role as a tool for threat actors and as a component of modern cyber resilience strategies, while highlighting where human oversight remains essential.
Company_Webinar • Part of 11:11 Systems
25th February 2026 | Government Cybersecurity Showcase: Federal 2026
The Government Cybersecurity Showcase: Federal 2026 focuses on how Canada’s federal agencies can strengthen cyber resilience while advancing digital modernization. With rapid adoption of cloud services, AI systems, and online citizen platforms, the stakes for data protection and service continuity are higher than ever. Sessions highlight how collaboration between public and private sectors can enhance security visibility, accelerate incident response, and uphold trust across essential systems.
Participants can expect in-depth conversations on policy-driven security frameworks, the use of threat intelligence to anticipate risks, and the importance of readiness in national infrastructure defense. The event offers a focused environment where government leaders and technology providers share practical insights, grounded in real-world challenges faced by public agencies. It is a valuable opportunity to align federal cybersecurity strategies with evolving digital expectations and citizen needs.
Physical • Paid • Part of Public Sector Network (Certified B Corp)
25th February 2026 | From Risk to Resilience: Leveraging KYC Data for Stronger AML Programs
Strengthening Anti Money Laundering programs through better use of Know Your Customer data is the focus of this session, addressing how financial institutions can improve resilience while maintaining operational efficiency. The discussion highlights how enriched KYC data supports more informed AML decisions and helps shift risk management from reactive controls to a more proactive strategy.
Industry experts will outline practical methods for integrating KYC insights across compliance workflows, improving customer due diligence and enhancing adverse media screening. The webinar also examines how data intelligence uncovers hidden risks, accelerates investigations and creates efficiencies across business lines. Attendees will gain clear guidance on using KYC data to build a more effective and responsive AML framework.
Company_Webinar • Part of NICE Actimize
25th February 2026 | Simplifying the Analyst Experience with Finding-based Detections
Security teams are under pressure to investigate faster while dealing with growing alert volume and complexity. This webinar focuses on how finding based detections improve the analyst experience by reducing alert fatigue and making security incidents easier to understand and prioritize. The session explains how contextual alerts help analysts quickly see what matters most and respond with greater confidence.
The discussion covers how finding based detections identify multi stage attacks, group related activity using risk based alerting best practices, and present a unified view of high priority incidents. Live demos and real world examples show how these capabilities shorten investigation time and improve response to sophisticated threats, while giving analysts the context they need to act efficiently.
Company_Webinar • Part of Splunk
25th February 2026 | Infosec Compliance Now
This half day virtual event focuses on the most urgent cyber risk and compliance challenges organizations are facing today. Infosec Compliance Now 2026 brings together experts to discuss how security and compliance teams can stay resilient as risks continue to evolve across technology and regulation.
The session covers key areas such as AI governance, cyber risk management, continuous control monitoring and third party risk management. Attendees will gain practical takeaways that support stronger security programs and help embed compliance into everyday operations. The event is designed for teams looking for clear guidance on managing cyber risk in a changing environment.
Company_Webinar • Part of AuditBoard
25th February 2026 | Defending Critical Infrastructure Against APTs like Salt Typhoon
State sponsored cyber espionage campaigns targeting critical infrastructure are reshaping how organizations must defend their networks. This session focuses on advanced persistent threats exploiting vulnerabilities in routers, edge devices, and core network infrastructure to gain long term access and visibility across telecom, government, transportation, and military environments.
The discussion outlines practical ways to detect and disrupt these campaigns using advanced threat hunting and proactive detection techniques. Attendees will see how specialized tools can uncover APT activity that often bypasses traditional security controls, helping organizations reduce exposure to long term surveillance and protect critical systems.
Company_Webinar • Part of Red Piranha
25th February 2026 | SecureWorld Healthcare Virtual Conference 2026
SecureWorld conferences in 2026 offer a consistent experience across each city, giving cybersecurity professionals a place to learn about current threats, new defensive strategies, and practical approaches to risk management. The events bring together security leaders, technology providers, and hands on practitioners who share real world insights on cloud security, identity, incident response, and the growing challenges linked to AI and automation. Attendees can expect thoughtful conversations and technical sessions that help strengthen security programs in organizations of all sizes.
Each SecureWorld location creates a community centered environment where regional challenges and best practices are openly discussed. The conferences highlight collaboration and offer opportunities to speak with experts who understand the evolving threat landscape. Participants gain actionable guidance they can apply immediately, especially in areas such as compliance readiness, threat intelligence, and secure architecture. SecureWorld events continue to play an important role in helping teams stay informed and resilient in a fast changing cybersecurity world.
Online • Paid • Part of SecureWorld
AI adoption is accelerating across enterprises, and securing both AI applications and AI workloads has become a critical priority. This session outlines a unified framework for protecting AI systems during the run time phase, where many organizations face growing exposure. The discussion focuses on how Cloudflare brings together its SASE and application security capabilities to secure the AI tools companies use and the AI driven workloads they develop internally.
The presentation covers securing access to AI apps and workloads, including visibility into shadow AI usage, prompt protection and protection of agentic AI workflows. It also addresses defending AI enabled applications and APIs against risks such as the OWASP Top 10 for LLMs, enforcing content moderation guardrails and embedding security into AI workloads from the beginning. Attendees will gain practical insight into building and operating AI environments with stronger, unified protection.
Company_Webinar • Part of Cloudflare
25th February 2026 | OWASP London Training Days 2026
Official OWASP Training event in London - classroom-based instructor-led training on topics such as Application Security, mobile Security, Privacy & AI, API Security, Penetration Testing, Threat Modelling (with Labs)
Physical • Paid • Part of OWASP
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.