AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
31st March 2026 | From Insight to Impact: Staying Resilient Against Germany’s OT/IoT Threats
Operational technology and IoT environments across Germany are facing evolving threats, including credential abuse, data manipulation, wireless vulnerabilities, and increasing botnet activity. These trends are impacting sectors such as manufacturing, energy, and transportation, where connected industrial systems are critical to daily operations. This webinar examines recent developments in Germany’s OT and IoT threat landscape and what they mean for organizations responsible for critical infrastructure.
The session explores how improved visibility and threat detection can help organizations strengthen resilience across industrial environments. Speakers will discuss practical approaches for identifying risks, improving asset intelligence, and responding to emerging threats affecting OT and IoT networks. Attendees will also gain insight into preparing for regulatory requirements and reporting obligations under frameworks such as NIS2, the Cyber Resilience Act, and KRITIS.
Company_Webinar • Part of Nozomi Networks
31st March 2026 | 2026 Cyber Risk Trends: From Threat Response to Business Resilience
Cyber risk management in 2026 requires resilience built into strategy and operations. This webinar examines how organizations can use AI to quantify business impact, coordinate response efforts, and maintain continuity during disruption. As regulatory mandates expand and third party ecosystems grow, risk leaders are expected to shift from reactive defense to more proactive, risk informed decision making.
Jeffrey DiMuro, Deputy CISO, and Aneesh Bhatnagar, Head of Risk Product Management, discuss trends shaping cyber risk management, including operational resilience requirements, third party risk exposure, continuous compliance, and AI powered risk quantification. The session outlines key priorities and practical actions to strengthen enterprise resilience.
Company_Webinar • Part of ServiceNow
Organizations continue to store large volumes of sensitive information in on-premises repositories, and hybrid environments make it difficult to maintain consistent visibility and governance. This webinar examines five key capabilities required in modern Data Security Posture Management (DSPM) to protect on-prem data across hybrid infrastructure. The session explains how security teams can improve discovery and classification of sensitive data across file shares, databases, and applications.
The discussion also demonstrates how AI-powered DSPM tools help identify critical exposures and prioritize risk. Attendees will see how findings can be turned into remediation and compliance workflows, while simplifying deployment and reducing operational complexity compared to traditional approaches. The webinar provides practical guidance for security practitioners and leaders responsible for protecting on-premises data in hybrid environments.
Company_Webinar • Part of Cyera
31st March 2026 | INCYBER Forum: OSINT Day 2026
OSINT Day at the InCyber Forum Europe focuses on the practical use of open source intelligence in modern cybersecurity and cyberinvestigation work. The event brings together practitioners, analysts, and security professionals who rely on publicly available data to support investigations, threat analysis, and defensive operations. Sessions highlight real world applications of OSINT across cybercrime, fraud detection, financial crime, and geopolitical risk, making the content highly relevant for professionals working at the intersection of security, intelligence, and digital investigations.
The program emphasizes knowledge sharing through experience based presentations and feedback sessions that explore how OSINT techniques are applied in red team audits, counter terrorism efforts, and cryptocurrency scam investigations. Attendees benefit from expert insights, peer discussions, and networking opportunities within the broader InCyber Forum community. The event supports skill development while reinforcing the role of OSINT as a critical capability in cybersecurity operations.
Physical • Paid • Part of Forum InCyber Europe (FIC)
31st March 2026 | Securing OT Environments & Modernizing Operations with Splunk
Operational technology environments are increasingly targeted by cyber threats, requiring stronger security controls without disrupting critical systems. This webinar explores how organizations can secure OT environments while modernizing operations using Splunk. The session focuses on improving visibility, integrating security tools, and aligning with industrial architectures such as the Purdue Model.
Attendees will learn how to detect and respond to threats in industrial control systems, including ransomware and adversary techniques mapped to MITRE ATT&CK for ICS. The discussion also covers integrating OT security solutions, unifying monitoring across systems, and leveraging automation to improve response and efficiency. The webinar provides practical guidance for strengthening resilience, enhancing visibility, and securing OT infrastructure in complex industrial environments.
Company_Webinar • Part of Splunk (a Cisco Company)
31st March 2026 | BOUSSIAS Cloud Strategies Conference 2026
BOUSSIAS Cloud Strategies Conference 2026 is a leading Greek conference focused on the strategic use of cloud computing in modern organizations. Now in its twelfth year, the event reflects the shift from basic cloud adoption to mature, business driven cloud strategies that support operations, growth, and long term resilience. It brings together operational leaders, decision makers, and technology professionals who shape cloud investments and enterprise transformation.
A strong emphasis is placed on cloud security, zero trust models, compliance, and modern resilience practices. The conference also explores how new generation data centers support AI driven workloads and high intensity computing demands. Through expert led sessions and vendor agnostic insights, attendees gain a practical understanding of how cloud strategy, security, and governance intersect in real world environments, making the event highly relevant for cybersecurity aware organizations.
Physical • Paid • Part of BOUSSIAS
31st March 2026 | GitHub Roadmap Webinar Q1 2026 APAC
AI is reshaping the software development lifecycle as tools move from assistive features to agentic systems operating across planning, coding, review, and operations. In this Q1 2026 roadmap webinar, GitHub’s chief product officer outlines how GitHub is evolving into a fully AI powered SDLC platform. The session connects recently released capabilities with upcoming investments across GitHub and GitHub Copilot.
Through product walkthroughs, attendees will see how agentic features accelerate workflows, improve quality, and support efficiency at scale. The webinar also explains how governance and security controls are embedded into AI powered processes, giving organizations visibility and confidence as they adopt AI. A live Q&A with the product team is included.
Company_Webinar • Part of GitHub
31st March 2026 | ERTL-YANG Leader Summit 2026: Hong Kong
The Hong Kong edition of the ERTL-YANG Leader Summit 2026 focuses on cybersecurity leadership in a highly connected global market. The summit explores how executives can manage cyber risk across complex digital ecosystems and cross border operations.
Topics include governance, data protection, and leadership roles in responding to advanced cyber threats. The event provides a strategic forum for leaders seeking to align cybersecurity initiatives with business resilience and regulatory expectations.
Physical • Paid • Part of ERTL-YANG
31st March 2026 | Your Hidden Competition: Inside the Business of Modern Cybercrime
Cybercriminal groups now operate with structures and tools similar to legitimate businesses. This webinar features John Hammond, Senior Principal Security Researcher at Huntress, and Jim Browning, software engineer and YouTuber, as they examine the business side of modern cybercrime. The session presents a side by side look at the processes and technologies used by organizations and their criminal counterparts.
Speakers explore how threat actors organize teams, communicate, and execute attacks using familiar business tools. Attendees will gain practical strategies to anticipate, detect, and defend against adversaries who operate with coordination and intent. The discussion reframes the threat landscape by viewing cybercriminals as structured competitors rather than faceless attackers.
Company_Webinar • Part of Huntress
31st March 2026 | 35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
Managing a 35 million line, multi language monolith presents major security and visibility challenges. This webinar examines how Adyen addressed limited dependency insight within a highly customized build environment. DevSecOps expert Supun Vidana Pathiranage joins JFrog’s Yonatan Arbel to explain the architecture designed to separate dependency resolution from the core build system, enabling scalable visibility and reliable security scanning without disrupting developer workflows.
The session covers architectural patterns for handling dependency visibility in large monorepos, integration of a custom pipeline with JFrog Xray, and the design decisions behind deep software composition analysis. It also reviews the Battlestar framework for actionable scan results and practical shift left AppSec enforcement at the merge request level.
Company_Webinar • Part of JFrog
31st March 2026 | Identity Modernization: Navigating Change Securely in a Cloud & AI Era
Identity modernization is a continuous process shaped by cloud adoption, AI, and evolving security requirements. This webinar explores how organizations can modernize identity systems while reducing risk and maintaining business continuity. The session focuses on the challenges of transitioning from legacy identity models to modern, scalable approaches that support hybrid environments and emerging use cases such as non human identities.
Attendees will learn how to prioritize prevention strategies to reduce identity compromise and strengthen threat detection and incident response. The discussion also covers risk based access control in hybrid Active Directory and Entra environments. The webinar provides practical guidance for IT and security leaders on modernizing identity infrastructure while improving resilience against evolving identity based threats.
Company_Webinar • Part of Quest Software
31st March 2026 | Designing Resilient Connectivity for the Anywhere Workforce
This webinar examines how healthcare organizations can maintain secure, high performance connectivity as care delivery becomes more distributed. Traditional VPN and legacy access models often struggle to provide consistent visibility and control, increasing the risk of downtime that can directly affect patient care and revenue. The session highlights why a resilient security service edge approach is better suited for modern healthcare environments.
Product leaders will explain the difference between secure and resilient access, why legacy VPN models fail, and how Zero Trust policies can be enforced without disrupting clinicians. A live demonstration will show identity and device based policy enforcement, encrypted and compliant access to clinical systems, centralized visibility, and reduced third party risk across distributed care settings.
Company_Webinar • Part of Absolute Software
31st March 2026 | Inside Barracuda’s product launch event: A first look at what's coming next
Staying ahead of evolving cyber threats requires continuous innovation across security platforms. This webinar provides a preview of upcoming enhancements and capabilities within a cybersecurity platform, focusing on how new features strengthen protection across email, data, network, and extended detection and response environments. The session highlights how integrated security approaches are evolving to address modern threat landscapes.
Attendees will gain insight into new platform innovations designed to improve visibility, detection, and response capabilities. The discussion also covers how layered security strategies help organizations defend against increasingly sophisticated attacks. The webinar provides a forward looking view of how cybersecurity platforms are adapting to support stronger, more unified protection.
Company_Webinar • Part of Barracuda
31st March 2026 | INCYBER Forum: Europe 2026
The INCYBER Forum: Europe 2026 brings together the full European cybersecurity ecosystem (government agencies, private companies, research centers, solution vendors, and users) to address digital security and trust. This major gathering offers a trade show floor for vendors and an in-depth conference track focused on cyber risk management, industrial cybersecurity, identity protection, operational security, and cybercrime prevention. With 20,000 past visitors and approximately 700 partners, the event serves as a central hub for networking, solution discovery, and strategic dialogue around Europe’s cyber resilience.
For professionals working in digital security, InCyber Europe 2026 presents valuable opportunities: attending sessions to stay up to date on threats and defenses, connecting with potential partners or clients, and exploring the latest security technologies. The forum’s broad scope spans from operational security to policy and digital trust, making it a key event for anyone interested in shaping or following cybersecurity developments in Europe.
Physical • Paid • Part of Forum InCyber (FIC)
31st March 2026 | Advancing DNS Security: Insights from the GigaOm Radar Report
DNS security plays a critical role in protecting modern digital environments as threats continue to evolve. Insights from the latest GigaOm DNS Security Radar Report highlight current trends, emerging risks, and how organizations can strengthen their defenses through more integrated approaches to application delivery and security.
The discussion explores the significance of recent industry findings and what they indicate for future DNS security strategies. It also examines how platform-based models can improve resilience, visibility, and control across environments. Attendees will gain practical perspectives on mitigating DNS-related threats while supporting innovation, along with a clearer understanding of how organizations can adapt to a rapidly changing threat landscape.
Company_Webinar • Part of F5 Networks
31st March 2026 | Beyond the Checkbox: Scaling Compliance Across European Regulations
This session examines how organizations can scale compliance programs across evolving European regulations. It highlights key frameworks such as NIS2, DORA, and the EU AI Act, and explains how they build on existing standards like SOC 2, ISO 27001, and GDPR. The discussion focuses on aligning requirements without duplicating effort.
Attendees will gain insight into mapping current controls to new regulatory expectations and using automation and continuous monitoring to manage compliance efficiently. The webinar also covers practical approaches for reusing evidence across audits and meeting the expectations of regulators and enterprise customers in 2026 and beyond.
Company_Webinar • Part of Vanta
31st March 2026 | World Conference on Information Systems and Technologies (WorldCist) 2026
WorldCist 2026 is an international academic conference focused on information systems, digital technologies, and their impact across industries and society. Held in Madeira, Portugal with online participation options, the event brings together researchers, academics, and professionals working in areas that intersect with cybersecurity, including ethics, computer security, data analytics, and intelligent systems. The conference emphasizes peer reviewed research, with submissions evaluated through a structured blind review process.
Cybersecurity relevance is reflected through dedicated themes addressing ethics, computers, and security, as well as topics related to networks, decision support systems, and big data. Participants gain exposure to current research, emerging risks, and technological approaches that influence secure system design and governance. Accepted papers are published by Springer and indexed in major academic databases, making WorldCist a recognized platform for sharing cybersecurity related research within the broader information systems community.
Physical • Paid • Part of WorldCist
31st March 2026 | SentinelOne Quarterly Threat Briefing
The gap between theoretical security models and real world operations continues to widen as organizations face evolving threats and complex environments. This webinar examines how geopolitical developments and emerging attack techniques influence organizational risk. The session focuses on translating global threat intelligence into actionable strategies that security teams can apply in their environments.
Attendees will gain insight into regional adversary tactics, techniques, and procedures, along with practical approaches to improving defense. The discussion highlights how organizations can shift from reactive patching to proactive, intelligence led threat hunting. The webinar provides guidance for both security leaders and practitioners on strengthening resilience and aligning security operations with the current threat landscape.
Company_Webinar • Part of SentinelOne
31st March 2026 | You’ve never mainframed like this
Accelerating mainframe development also plays a critical role in strengthening application security and cyber resilience, especially in environments that handle highly sensitive financial and personal data. This hands on virtual workshop shows how BMC AMI DevX uses AI driven insights to help developers understand complex COBOL, PL/I, and assembler code faster, reducing hidden technical debt that can introduce security weaknesses and operational risk.
The session demonstrates how modern tooling and visual code analysis support a shift left approach by making it easier to identify logic flaws, risky dependencies, and potential vulnerabilities earlier in the lifecycle. Attendees will see how integrating mainframe development into modern workflows improves visibility, auditability, and control, while supporting more secure and resilient application delivery.
Company_Webinar • Part of BMC Software
31st March 2026 | How to Secure Your Mobile Apps and the APIs It Interacts With
Mobile apps have become a primary channel for banking, shopping, and digital engagement, making them a frequent target for reverse engineering, cloning, fraud, and API abuse. This webinar examines how threats now span the app, device, and backend, creating exposure that can lead to revenue loss, brand damage, regulatory risk, and recurring security incidents.
The session presents a lifecycle based approach to mobile security rather than isolated controls. It covers integrating automated validation into CI CD pipelines, using compiler based polymorphic hardening to resist tampering, and securing API communication with real time, risk based validation. Attendees will gain a clearer view of how to strengthen app resilience and protect backend systems.
Company_Webinar • Part of Guardsquare
31st March 2026 | European Cyber Cup 2026
European Cyber Cup 2026 is a competitive cybersecurity event focused on real world technical challenges in ethical hacking and team based cyber skills. Hosted at Lille Grand Palais in France, this event brings together cybersecurity professionals and students to compete in capture the flag, forensics, red team versus blue team, social engineering, and other practical cybersecurity tasks. Participants form teams of skilled operators to demonstrate technical mastery across multiple cyber disciplines.
The event promotes skill development, community engagement, and visibility within the European cybersecurity ecosystem. It is set inside the wider Forum INCYBER environment, attracting companies, academic teams, and industry partners. Teams compete not just for prizes but also to benchmark their skills against peers in a structured environment that values practical cyber defense and offensive techniques.
Physical • Paid • Part of Forward Global
31st March 2026 | Transform Your Business Partner Connectivity: Zero Trust Exchange for B2B is Here
Traditional site to site VPNs and network centric approaches to business to business connectivity can introduce complexity and security risks. Extending network access to external partners may increase exposure to lateral movement and supply chain attacks. This webinar examines how organizations can modernize partner connectivity using a Zero Trust approach designed to reduce risk while improving operational flexibility.
The session explores how a Zero Trust architecture can replace legacy connectivity models and better secure digital supply chains. Attendees will learn about common challenges in B2B connectivity and how Zero Trust solutions can support secure partner access and faster onboarding. The webinar also includes demonstrations of ZPA B2B Extranet and B2B Federation capabilities, along with strategies to support partner integrations and merger and acquisition activities without adding new infrastructure.
Company_Webinar • Part of Zscaler
1st April 2026 | Top 6 Challenges with Proactive Remediation and How to Solve Them in Intune
Managing large numbers of Proactive Remediations in Microsoft Intune can quickly become difficult as environments grow. What starts as a helpful automation tool can turn into a collection of scripts that are hard to maintain, poorly documented, and difficult for teams to manage consistently. This webinar examines common issues that appear when remediation scripts scale across enterprise environments.
The session reviews six key challenges organizations face when using Proactive Remediations, including script sprawl, unclear ownership, outdated documentation, and dashboards that do not reflect actual system health. It also discusses practical approaches for organizing, maintaining, and improving remediation frameworks so teams can manage their Intune environments more effectively.
Company_Webinar • Part of Patch My PC
1st April 2026 | Cyber Security for Critical Assets (CS4CA) APAC 2026
CS4CA APAC 2026 returns to Singapore, partnering once again with the APAC Cyber Summit and ISACA Singapore Chapter. The two-day event will bring together regional and global leaders from critical sectors to discuss how Asia-Pacific nations can strengthen resilience against cyber threats. From industrial control systems to cloud-driven enterprises, the focus remains on practical defense measures and governance models tailored to the region’s unique regulatory and infrastructure challenges.
Delegates can expect a rich exchange of perspectives on evolving frameworks, including Singapore’s OT Cybersecurity Masterplan. The agenda includes in-depth discussions on securing digital transformation across energy, transport, and manufacturing. Through case studies and peer-driven sessions, CS4CA APAC serves as a key meeting point for cybersecurity decision-makers shaping the region’s operational defense strategies.
Physical • Paid • Part of Information Security Media Group (ISMG)
1st April 2026 | Digital Twin | BIM World 2026
Digital Twin | BIM World 2026 in Paris brings together innovators, technology leaders, and decision makers from the construction, real estate, infrastructur,e and urban planning sectors to explore how digital technology is transforming the built environment. The event highlights the role of data, artificial intelligence, BIM, digital twins, and cybersecurity in creating smart, connected buildings and safe, sustainable cities. Attendees will experience keynotes, expert presentations, panel discussions, and technology showcases that dive into digital transformation trends that are reshaping the industry, including secure AI systems and integrated data platforms.
This summit offers a deep look at how digital tools are redefining design, construction, and lifecycle management of assets while also addressing risks and challenges, including cybersecurity concerns in digital infrastructure. With thousands of visitors expected and a diverse program of technical sessions and networking opportunities, Digital Twin | BIM World 2026 is a key platform for professionals to learn, connect and discover solutions that enhance efficiency, resilience and digital security across the built world.
Physical • Paid • Part of Beyond Event
1st April 2026 | Technical Partner Onboarding with Huntress
This interactive webinar guides new Huntress partners through the full technical onboarding process. Attendees will receive a structured walkthrough covering platform essentials, agent deployment, alert management, reporting, and security workflows. The session also outlines best practices across Managed EDR, ITDR, SAT, and SIEM solutions to help partners configure customer environments properly and reduce common misconfigurations.
Key topics include setting up tenants and users, configuring notifications and escalations, managing static IPs, and deploying agents on Windows and Mac systems, including FDA guidance. The webinar also explains roles during incident response, how to work with support, and how to use reports and knowledge bases effectively. A live Q and A session will address participant questions.
Company_Webinar • Part of Huntress
1st April 2026 | CypherCon 2026
CypherCon 2026 is Wisconsin’s premier technology and hacker conference, held in Milwaukee and designed for cybersecurity professionals, developers, and technology enthusiasts. The event brings together a diverse community to explore cybersecurity, artificial intelligence, privacy, and emerging technologies through expert led sessions and hands on learning. With dedicated training days and a full conference program, CypherCon offers a structured yet engaging experience for both seasoned professionals and newcomers.
The conference is known for its collaborative atmosphere, combining technical depth with creativity and community driven energy. Attendees can expect high quality presentations, interactive workshops, and opportunities to connect with peers across multiple disciplines. By hosting CypherCon alongside BSidesMKE, the event strengthens regional cybersecurity engagement while maintaining a strong national reputation within the security community.
Physical • Paid • Part of CypherCon
1st April 2026 | Default Deny: Hardening Your Cloud for Agentic AI
AI agents can rapidly test thousands of permission paths, creating security risks that traditional controls may miss. This webinar demonstrates how developers using agentic AI in real world scenarios can unintentionally create unauthorized roles and access points while attempting simple tasks. A live AWS environment is used to show how these situations occur and why existing RBAC models often fail to detect or prevent the resulting overprivilege.
The session explains how cloud native IAM guardrails can help manage these risks and why additional controls may still be required. It also presents the role of Cloud Permissions Firewall as a final defensive layer and shows how automated Default Deny policies can block agents from creating new identities or ingress points.
Company_Webinar • Part of Sonrai Security
1st April 2026 | Drive Verified Trust with Biometric Authentication Built for Privacy
Organizations face increasing challenges in verifying user identities as fraud techniques such as account takeover and deepfake based impersonation become more sophisticated. Traditional authentication methods, including passwords, SMS one time codes, and device based biometrics, may not provide sufficient assurance that the person accessing an account is the legitimate user. This webinar explores how biometric authentication can strengthen identity verification across digital services.
The session introduces zero knowledge biometrics and explains how biometric verification can be integrated into the identity lifecycle to confirm that users remain the same verified individual throughout their interactions. Speakers will discuss how biometric authentication can support fraud prevention while reducing friction for customers. Attendees will gain insight into approaches for implementing privacy focused biometric authentication that strengthens trust across digital identity systems.
Company_Webinar • Part of Keyless (part of Ping Identity)
1st April 2026 | CISO Middle East Summit 2026
Aligned with Saudi Vision 2030’s digital security objectives, the event fosters collaboration between the public and private sectors, facilitating knowledge exchange and regional partnership building among 100 + Chief Information Security Officers and policy leaders. Sponsors and exhibitors will gain direct access to key decision-makers, positioning their solutions at the forefront of cybersecurity innovation in the Middle East.
Physical • Free • Part of EXE Globe
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.