Cybersecurity Conferences 2026 - 2027

All Security Conference Niches | Upcoming Cybersecurity Events

Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.

Enter at least 3 characters...
Loading...
No results found.

Today’s Cybersecurity Conferences & Events

Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.

9th February 2026 | Foundational Application of Social Engineering

A 4 day interactive class all about the foundations of understanding human behavior. This course has been used by law enforcement around the globe, as well as sales organizations and communication organizations. If you want to improve your abilities to use human behavior and expert communications this class is for you.

Physical • Paid • Part of Social-Engineer, LLC

united_states_flag

9th February 2026 | Automating Your API Management

Centralize and automate API management workflows using Gravitee’s automation toolkit, with a clear look at how teams can move beyond manual console based operations. This webinar introduces the core automation options available in the Gravitee ecosystem and explains how they support scalable, controlled, and secure API environments.

The session covers the role of the Gravitee Kubernetes Operator, Terraform, the Management API, automation scripts, and the MCP server, with guidance on what each tool is designed for and how they can be combined effectively. It is suited for teams starting with API automation as well as those reviewing their current approach and looking to improve consistency, efficiency, and operational control across API lifecycles.

Company_Webinar • Part of Gravitee.io

_flag

10th February 2026 | Live AWS Privilege Escalation Attacks and the Controls That Actually Stop Them

Independent security researchers demonstrate how AWS privilege escalation attacks still succeed in standard cloud environments and why most organizations remain exposed. This webinar shows real attack paths executed live, including IAM escalation chains, service based lateral movement, and emerging AI driven techniques using Bedrock and AgentCore.

The session then shifts from offense to defense by showing which controls actually stop these attacks when enforced correctly. Attendees will see the same escalation attempts fail in real time once preventative measures are applied, offering clear insight into what works in practice and what does not when securing AWS environments.

Company_Webinar • Part of Sonrai Security

_flag

10th February 2026 | ERTL-YANG Leader Summit 2026: Lisbon

ERTL-YANG Leader Summit 2026 in Lisbon emphasizes the role of leadership in navigating cybersecurity risk and digital trust. The summit is tailored for executives responsible for steering organizations through complex security, compliance, and technology landscapes.

Key discussions explore cybersecurity governance, emerging threats, and strategic responses to digital disruption. By engaging with peers from diverse industries, attendees gain practical insight into building resilient security strategies that support sustainable growth and protect critical assets.

Physical • Paid • Part of ERTL-YANG

portugal_flag

10th February 2026 | GitLab Transcend 2026

This webinar focuses on how modern engineering teams can reduce friction across DevOps, security, and AI as software development accelerates. GitLab leaders and technology executives discuss how disconnected tools and manual workflows create security gaps, and how unified platforms help teams modernize without slowing delivery. The session highlights real perspectives from large enterprises on where software development is headed next.

The discussion also features live demonstrations of agentic AI use cases that automate tasks across the software lifecycle, along with an early look at GitLab’s upcoming product roadmap. Attendees will gain insight into practical modernization strategies, peer experiences, and how tighter integration across development and security workflows can improve efficiency, reduce risk, and support scalable innovation.

Company_Webinar • Part of GitLab

_flag

10th February 2026 | Key Insights from the 2025 GigaOm Radar for Container Networking

Insights from the 2025 GigaOm Radar reveal how container networking and security are evolving in modern Kubernetes environments. This webinar breaks down why Calico was recognized as a leader and what the report’s findings mean for organizations running hybrid and multi cloud infrastructure.

The session covers how unified networking, network security, and observability reduce operational complexity and strengthen security posture. Attendees will also hear about emerging trends in container networking and learn how consistent controls across environments help teams lower risk, simplify operations, and support faster innovation.

Company_Webinar • Part of Tigera

_flag

10th February 2026 | From Siloed to Unified: Identity Security in the AI-Driven Threat Era

This session focuses on how identity security must evolve as human, machine and AI identities expand and attackers increasingly use AI to amplify identity based attacks. The discussion explains why traditional IAM, PAM and IGA tools operating in isolation can no longer keep pace with the scale and speed of modern threats, and why many organizations are reaching a breaking point in their current approach.

The webinar looks at how a unified identity security platform improves visibility across environments, speeds up breach response through shared intelligence and enables more proactive threat detection using AI. It also covers how consistent privilege controls across all identity types help reduce risk and support CISO and SOC priorities. The goal is to show how moving away from fragmented tools creates stronger trust, control and resilience in an AI driven threat landscape.

Company_Webinar • Part of CyberArk

_flag

10th February 2026 | The VPN Trap: Why Remote Access Is Failing You

Remote access security is breaking down as traditional VPNs become a common entry point for attackers. This webinar examines why SSL VPNs are increasingly exploited and how they enable credential theft, lateral movement, and data exposure in modern networks.

WatchGuard experts explain how a zero trust access model removes these risks while improving performance and simplicity for hybrid environments. Attendees will gain insight into the true cost of maintaining VPNs and learn how MSPs are replacing them with faster, safer zero trust access services that better protect users and infrastructure.

Company_Webinar • Part of WatchGuard

_flag

10th February 2026 | SASIG Events: Cybersecurity Awareness SASIG - Human Risk Management Forum 2026

This SASIG forum focuses on the human side of cybersecurity and how organizations can build security-aware cultures that last. The session examines why user behavior continues to be one of the biggest challenges in security and how awareness programs can move beyond basic training to create meaningful engagement. Attendees will gain insight into how leading organizations approach human risk management in practical and measurable ways.

Speakers will share real-world examples of awareness campaigns, behavior change strategies, and methods for sustaining engagement over time. The discussion also explores how different audiences require different approaches and how success can be measured beyond surface-level metrics. This event is designed for security leaders and practitioners looking to strengthen resilience by influencing behavior and embedding security into everyday organizational practices.

Physical • Free • Part of SASIG Events

united_kingdom_flag

10th February 2026 | CTRL+RUN: OFFENSAI <> CISO Dinner Portland

From Cloud to Crowd, to another location here we go — Meet OFFENSAI, the autonomous and continuous adversarial exposure validation solution redefining how security teams test and harden their cloud environments.

​Join Karen Nguyen, CEO at OFFENSAI, and Ray Espinoza, VP of Information Security at Elite Technology, to discuss practical approaches to reducing alert fatigue and prioritizing what’s truly exploitable. See firsthand how AI-driven validation builds actionable kill chains that strengthen real-world cloud security.

Physical • Free • Part of OFFENSAI

united_states_flag

10th February 2026 | Corinium: OT Security Sydney 2026

OT Security Sydney 2026 brings together a powerful mix of cybersecurity professionals, operational technology leaders, and decision-makers focused on securing critical infrastructure. The event is designed to bridge the gap between IT and OT security, highlighting how resilience can be built across legacy systems and modern digital frameworks. Attendees can expect to gain actionable insights from industry pioneers on how to integrate security protocols seamlessly into industrial operations while improving asset visibility and compliance.

This conference serves as a vital forum for those responsible for safeguarding energy, transport, utilities, and manufacturing systems. With its 2026 edition hosted alongside CISO Sydney at the Royal Randwick Racecourse, the event offers an expanded platform for learning and collaboration. Participants will leave equipped with the strategies and partnerships needed to strengthen their organizations against evolving cyber threats while driving innovation within their operational environments.

Physical • Paid • Part of Corinium Global Intelligence

australia_flag

10th February 2026 | TRU Intelligence Briefing: February 2026

A focused threat intelligence briefing covering the latest attacker activity, critical vulnerabilities, and emerging risks shaping the global cybersecurity landscape. This webinar presents research-driven insights from eSentire’s Threat Response Unit, highlighting how threat actors are weaponizing AI and large language models, abusing authentication and single sign-on flaws, and exploiting newly disclosed vulnerabilities across major enterprise platforms.

The session also examines recent malware activity and provides an update on cyber threats influenced by ongoing geopolitical tensions. Designed to keep security teams informed and prepared, the briefing delivers timely analysis and practical context to help organizations better understand current attack methods and strengthen their defensive posture.

Company_Webinar • Part of eSentire

_flag

10th February 2026 | Wild West Hackin' Fest @ Mile High

Hands-on labs, workshops, speakers, pre-con training, and lots of fun and entertainment in between! Red team, blue team, and purple teams welcome. Connect with the community, learn something new, and leave excited to try new things!

Hybrid (Both) • Paid • Part of Wild West Hackin' Fest

united_states_flag

10th February 2026 | Love, Qubits, and Algorithms: A Valentine’s Guide to Quantum Security

Quantum computing and its impact on modern encryption take center stage in this webinar focused on emerging security risks and practical preparation. The discussion looks at how the threat of harvest now, decrypt later is already influencing attacker behavior and why existing RSA and ECC based protections will not be sufficient in a post quantum world. Speakers break down the real security implications without diving into heavy theory.

The session explains what post quantum cryptography is, why crypto agility matters, and how organizations can begin preparing today. Attendees will hear clear guidance on assessing current encryption exposure, understanding vendor readiness, and taking realistic first steps toward quantum resistant security. Designed for SMB leaders, this webinar delivers a practical roadmap for protecting sensitive data against next generation threats.

Company_Webinar • Part of Kobalt

_flag

10th February 2026 | EspañaSec Cyber Summit 2026

EspañaSec Cyber Summit 2026 returns to Madrid with a strong focus on digital resilience and the future of Spain’s cybersecurity ecosystem. The summit connects senior security professionals, policy leaders, and innovators who are shaping Spain’s ‘España Digital 2026’ strategy. This year’s theme, “Forging the Future: Building Digital Resilience and Capability in Spain,” reflects how the country’s cybersecurity community is aligning technology, policy, and talent to meet new challenges.

Across two days, the agenda features deep discussions on regulatory change, operational resilience, and the role of leadership in modern security strategy. Sessions explore AI’s growing influence on defense, compliance with NIS2 and DORA, and how CISOs are redefining governance models to adapt to a shifting threat landscape. EspañaSec offers a practical environment where strategic planning meets peer insight, positioning it as one of Spain’s most important cybersecurity gatherings of the year.

Physical • Paid • Part of Information Security Media Group (ISMG)

spain_flag

10th February 2026 | AvePoint Innovates Channel Edition: Discover What's Next

Partners supporting multicloud and hybrid environments need stronger security, clearer governance, and better cost control without increasing operational complexity. This webinar focuses on how AvePoint is expanding its platform to help partners deliver secure, compliant, and scalable services while protecting margins and strengthening customer trust.

The session highlights new capabilities around cyber resiliency, including broader multi cloud protection, faster recovery, and centralized control for SaaS, IaaS, and PaaS data. It also covers simplified compliance through consistent governance baselines, automated alerts, and improved audit readiness, along with cloud optimization features that provide visibility into costs, licenses, and performance. The discussion is designed for partners looking to streamline operations, differentiate their services, and support long term growth.

Company_Webinar • Part of AvePoint

_flag

10th February 2026 | Live AWS Privilege Escalation Attacks and the Controls That Actually Stop Them

Real AWS privilege escalation attacks are demonstrated live in this webinar, showing how common cloud environments remain vulnerable even without zero day exploits or unusual misconfigurations. Independent security researchers execute multiple real world attack paths, including IAM escalation chains, service based lateral movement across AWS services and AI driven abuse of Bedrock and AgentCore. The session makes it clear why these attacks continue to succeed in typical AWS setups.

The discussion then shifts to what actually works. Attendees see the same attacks fail once effective preventative controls are applied, highlighting practical defenses rather than theory. This webinar is designed for cloud security, IAM, and platform teams who need clear visibility into real attack behavior and proven controls that reduce risk in AWS environments.

Company_Webinar • Part of Sonrai Security

_flag

10th February 2026 | Cybersecurity Fundamentals training and certification

The Cybersecurity Fundamentals training and certification event offers a comprehensive introduction to key cybersecurity concepts. Participants gain valuable insights into risk management, network security, and threat detection. The course is well-structured, with engaging instructors who provide practical examples and hands-on exercises. Attendees appreciate the balance between theory and application, making it suitable for beginners and those seeking to refresh their knowledge. Overall, it is a highly recommended foundational program.

Physical • Paid • Part of IMF Academy

netherlands_flag

10th February 2026 | Scale Security Operations with AI: Introducing Proofpoint Satori™

Security operations teams are facing growing alert volumes while analyst time stays limited, making automation essential. This webinar focuses on how Proofpoint Satori introduces AI agents into existing security stacks to help teams work faster and more efficiently. The session explains how AI can reduce false positives, automate repetitive workflows and speed up threat response without disrupting current operations.

The discussion highlights how Proofpoint Satori agents support day to day security tasks, including faster handling of abuse mailbox submissions and more efficient DLP investigations. Attendees will also gain insight into how AI driven automation can act as a force multiplier for security teams and help scale operations as threats continue to grow. A live Q and A will wrap up the session.

Company_Webinar • Part of Proofpoint

_flag

10th February 2026 | Cyber Security for Critical Assets (CS4CA) ANZ 2026

CS4CA ANZ 2026 returns to Perth with a sharp focus on the growing urgency of securing operational technology across critical sectors. The summit connects cybersecurity and OT professionals from Australia and New Zealand’s key industries: energy, mining, utilities, maritime, and healthcare to exchange strategies that strengthen cyber resilience. With the theme “Managed Defence for OT: Putting into Practice a Cyber-Resilient Future,” the event goes beyond theory by emphasizing actionable practices that safeguard connected systems.

Attendees can expect a practical environment built around collaboration and insight sharing. Industry leaders and experts will explore how managed defense models are being applied to protect real-world infrastructure from persistent threats. The conversations aim to help organizations strengthen their response readiness, integrate resilience into operations, and stay aligned with evolving regulatory and technical standards across the ANZ region.

Physical • Paid • Part of Information Security Media Group (ISMG)

australia_flag

11th February 2026 | The Official Cybersecurity Summit: Silicon Valley 2026

The Official Cybersecurity Summits 2026 is a nationwide conference series designed for senior-level cybersecurity, IT, and business leaders across multiple US markets and virtual audiences. The series includes both in-person and virtual events such as Ransomware Resilience, Healthcare Security, and city-based summits in Tampa, Seattle or Bellevue, San Diego, Atlanta, Silicon Valley, New York, and Chicago. Each summit is curated to address real-world security challenges faced by enterprises, government organizations, and critical infrastructure sectors.

Across all locations, the summits focus on practical cybersecurity strategies, emerging threats, compliance pressures, and executive-level decision making. Attendees gain insights through expert-led sessions that emphasize actionable solutions rather than theoretical discussions. By combining regional networking with nationally recognized speakers, the 2026 series creates consistent value for security leaders looking to stay informed, connected, and prepared in a rapidly evolving threat landscape.

Physical • Paid • Part of The Official Cyber Security Summit

united_states_flag

11th February 2026 | Passwordless in Practice: Comparing Enterprise Deployment Architectures

Passkeys and phishing-resistant authentication are no longer experimental, but deploying them across real enterprise environments is still a hard architectural problem.

Large organizations rarely start from a greenfield. They operate a mix of legacy applications, modern web platforms, on-prem and cloud identity systems, and multiple authentication protocols. Choosing how to deploy passwordless authentication often matters more than choosing which standard to use.

In this session, Bartosz Cieszewski will provide a clear, practical comparison of the main enterprise architectures used to deploy passwordless authentication at scale.

What this webinar covers:

  • The most common passwordless deployment architectures used in large organizations
  • Native vs mediated approaches (application-level, identity-layer, and access-layer models)
  • How different architectures impact legacy applications, IAM complexity, and operational risk
  • Trade-offs between security guarantees, rollout speed, and long-term maintainability
  • How to select an architecture that fits your existing systems, not an idealized future state

This is a technical, vendor-agnostic discussion focused on decision-making - not product demos.

Who should attend:

  • IAM and security architects
  • Enterprise platform and identity engineers
  • CISOs and security leaders responsible for authentication strategy
  • Teams planning or evaluating passkey adoption in complex environments

Please note: a company (business) email address is required to confirm registration. Registrations submitted with personal or non-business email domains will be declined.

Company_Webinar • Part of Secfense

_flag

11th February 2026 | Turning AI Governance into Revenue: How Service Providers Build Scalable Offerings

AI governance is becoming a commercial opportunity for service providers as customers face growing regulatory pressure and rising third party AI risk. This webinar focuses on how MSPs, MSSPs, and consultancies can turn governance requirements driven by the EU AI Act, NIST AI RMF, and ISO standards into scalable, revenue generating services that customers are actively seeking.

The session presents a practical roadmap based on real delivery experience from Cynomi and Intercity. It covers how to package AI governance into managed and advisory offerings, identify and manage AI usage and third party risk, and enable safe AI adoption without slowing the business. Attendees will also hear what is resonating with customers in the field and how to position AI governance as a business enabler rather than a compliance blocker.

Company_Webinar • Part of Cynomi

_flag

11th February 2026 | Stopping Modern Email Attacks with 99.9% Accuracy

Advanced email threats like business email compromise, phishing, and social engineering continue to bypass traditional security tools. This live webinar demonstrates how Varonis Interceptor uses a multi modal AI approach, combining vision, language, and behavioral models, to detect and stop modern email attacks that other solutions miss.

The session walks through a live demo showing how higher detection accuracy improves protection before threats reach users. Attendees will see how AI driven analysis identifies subtle attack patterns and strengthens email security against today’s most sophisticated techniques.

Company_Webinar • Part of Varonis

_flag

11th February 2026 | Empowering IT leaders to manage their SaaS ecosystem

IT teams are under growing pressure to secure and manage sprawling SaaS environments they did not choose and often cannot fully see. This webinar focuses on how IT leaders can regain control of SaaS usage, access, and risk as shadow IT, unused licenses, and over-permissioned accounts continue to grow across organizations.

The session walks through how visibility, governance, and automation can reduce security gaps while freeing IT from constant access requests and manual cleanup. Using real world examples, the speakers show how teams can track SaaS usage in real time, manage access throughout the employee lifecycle, optimize license spend, and stay ahead of contract renewals. The discussion is designed for IT leaders looking to strengthen SaaS security, improve compliance, and shift their focus from reactive tasks to strategic initiatives.

Company_Webinar • Part of 1Password

_flag

11th February 2026 | Snyk: Unveiling A New AI Security Foundation

AI driven development is accelerating faster than traditional security controls can keep up, creating new risks across code, models, and autonomous agents. This webinar focuses on how organizations can establish a stronger security foundation for AI powered software by embedding governance and trust directly into modern development workflows.

The session explores how to balance rapid innovation with effective security practices, addressing the challenges that emerge when humans and AI systems build together. Attendees will gain insight into approaches for securing AI driven creation without slowing velocity, helping teams reduce risk while maintaining confidence across the full development lifecycle.

Company_Webinar • Part of Snyk

_flag

11th February 2026 | CISO Middle East Summit 2025: Riyadh, KSA

The CISO Middle East Summit 2026 is scheduled to take place in Riyadh, Saudi Arabia, on February 11, 2026. This premier cybersecurity event will serve as a vital platform for over 100 Chief Information Security Officers (CISOs) and senior cybersecurity leaders from various sectors, including leading companies, government agencies, and policymakers.

As the Middle East continues its rapid digital transformation, the summit will focus on securing critical infrastructure, managing emerging cyber threats, and navigating the evolving landscape of cyber risks and compliance requirements.

Attendees can expect a comprehensive program featuring expert-led keynotes, in-depth panel discussions, and practical workshops designed to foster knowledge sharing and collaboration. In addition to the informative sessions, the summit offers ample networking opportunities, allowing professionals to connect with peers, potential partners, and solution providers, thereby fostering valuable relationships that can drive their cybersecurity initiatives forward.

Whether you're looking to refine your current security strategy, learn about the latest cybersecurity technologies, or exchange insights with fellow professionals, the CISO Middle East Summit is an essential gathering for anyone serious about securing the future of their business.

Physical • Free • Part of Executive Excellence Events

saudi_arabia_flag

11th February 2026 | FutureCIO Conference Thailand 2026

FutureCIO Conference Thailand 2026 is a leadership focused technology and cybersecurity event designed for senior IT decision makers navigating an increasingly complex digital environment. The conference addresses how CIOs and CTOs can respond to rising cyber threats, regulatory pressure, and rapid AI adoption while still delivering measurable business value. With cybersecurity positioned as a core leadership responsibility, sessions explore how trust, resilience, and compliance intersect with innovation.

The event brings together technology leaders across Thailand to share practical insights on AI integration, enterprise resilience, and workforce readiness. Discussions emphasize balancing security with agility, strengthening governance, and aligning IT investment with organizational outcomes. By focusing on real world leadership challenges, the conference supports executives looking to turn cybersecurity and technology change into long term strategic advantage.

Physical • Paid • Part of CXOCIETY

thailand_flag

11th February 2026 | Cyber Simulation Real-Time Workshop – Europe

A live cyber simulation workshop that places participants inside a realistic incident response scenario based on active adversaries targeting organizations today. Led by the CrowdStrike Incident Response Team, the session walks through how fast moving attacks unfold, how threat actors infiltrate mature environments, and how early decisions can change the outcome of an incident.

The interactive format allows attendees to guide the response through real time voting, with each decision influencing escalation paths, response options, and time pressure. The scenario centers on a sophisticated China nexus threat compromising a managed service provider and impacting downstream customers. Participants gain practical insight into adversary behavior, prioritization under pressure, team coordination, and the actions security leaders must be ready to take during a real cyber incident.

Company_Webinar • Part of CrowdStrike

_flag

11th February 2026 | Modernizing VMware & Storage Encryption for Zero Trust

Federal agencies running mission workloads on VMware and enterprise storage face growing pressure to modernize encryption while meeting Zero Trust and federal compliance requirements. This webinar focuses on how organizations can upgrade VMware and storage encryption to align with current mandates while avoiding the scalability limits of legacy hardware HSMs.

The session explains how Fortanix Data Security Manager delivers software based, HSM level protection using confidential computing, enabling runtime encryption and centralized key management across hybrid environments. Attendees will see how to secure data at rest, in motion, and in use, support enclave segmentation, and gain unified visibility across VMware, databases, and storage systems as part of a broader Zero Trust strategy.

Company_Webinar • Part of Fortanix

_flag

Insights & Analysis from Security Events

Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.

AI LLM Injection

AI Security | Our Content Hub

Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!

Stay Ahead in Cybersecurity – Explore Global Conferences Today

Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.