Cybersecurity Conferences 2026 - 2027

All Security Conference Niches | Upcoming Cybersecurity Events

Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.

Enter at least 3 characters...
Loading...
No results found.

Today’s Cybersecurity Conferences & Events

Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.

4th March 2026 | Tech Show London 2026

Tech Show London 2026 gathers technology and cybersecurity leaders from around the world for two days at Excel London. The event combines five co-located exhibitions—Cloud & AI Infrastructure, DevOps Live, Cloud & Cyber Security Expo, Big Data & AI World, and Data Centre World—under a single ticket. This structure allows attendees to explore wide-ranging tech and security topics in one place, making it an important meeting point for decision-makers and professionals shaping cloud, infrastructure, and cybersecurity strategy.

With tracks devoted to cloud security, threat intelligence, data protection, and secure infrastructure, Tech Show London offers rich opportunities for professionals dealing with modern cyber risks. The conference and expo deliver keynotes, panels, and technical sessions by global experts, along with exhibitor booths showcasing the latest tools and solutions. This makes the event highly relevant for anyone focused on building secure, robust, and future-proof IT and security architectures.

Physical • Paid • Part of CloserStill Media

united_kingdom_flag

4th March 2026 | AI Agents that Train, Test and Adapt to Manage Human Risk

AI driven threats such as deepfakes and advanced vishing are reshaping how organizations manage human risk. This live demo webinar showcases KnowBe4's AIDA, AI Defense Agents, and how it shifts security awareness from a manual, one size fits all model to an adaptive system that responds to user behavior in real time. The session addresses challenges teams face when resources are limited and user risk is difficult to measure.

Attendees will see how AIDA automates phishing simulations, personalizes training, generates deepfake content for executive impersonation scenarios, and identifies high risk users for targeted learning. The demo also highlights agents that reinforce policies and strengthen security culture through continuous, AI driven orchestration.

Company_Webinar • Part of KnowBe4

_flag

4th March 2026 | Zero Trust OT Security: How Armis & Zscaler Secure Factories

Industrial environments are increasingly exposed as connectivity replaces the traditional air gap, making factories attractive targets for ransomware and lateral movement. This webinar focuses on how Zero Trust principles can be applied specifically to operational technology to protect production systems without disrupting operations.

Experts from Armis and Zscaler explain how full asset visibility and granular access control work together to reduce risk in OT environments. The session covers identifying unmanaged industrial devices, limiting lateral movement, and using integrated security controls to enforce Zero Trust across factory networks. Attendees will see how combining real time asset intelligence with secure access creates a practical and scalable approach to securing modern industrial operations.

Company_Webinar • Part of Armis

_flag

4th March 2026 | Auth0 Streamcast Episode 2 | Stop experimenting, Start trusting: Scaling AI agents with confidence

AI agents are already acting on behalf of customers, and scaling them safely depends on trust and identity. This webinar focuses on how establishing a strong identity foundation from the start makes AI agents auditable, properly authorized, and easier to manage as they grow across real world use cases like healthcare and commerce.

The discussion brings together experts from Auth0 and Accenture in a live, conversational format to explain how identity reduces risk, prevents over permissioning, and supports secure adoption of agentic AI without slowing innovation. Attendees will gain practical insight into building trusted AI driven experiences that balance growth, security, and customer confidence.

Company_Webinar • Part of Okta

_flag

4th March 2026 | Data Centre World London 2026

Data Centre World London 2026 gathers professionals from across the data centre industry for a two-day event focused on infrastructure, sustainability, AI-driven optimisation, and next generation data centre design. With hundreds of suppliers and thought leaders attending, the event offers a deep dive into innovations shaping how data centres operate and scale, including infrastructure management, energy efficiency, and resilience. Given the convergence of infrastructure and digital security, many sessions are relevant to cybersecurity through their focus on secure data handling, infrastructure hardening, and operational reliability.

For cybersecurity professionals, the event is relevant because modern data centres are critical nodes for cloud services, storage, and network routing, and their design impacts data integrity, access control, and system resilience. By attending this event, professionals can explore solutions around secure infrastructure design, power and cooling redundancy, data centre security practices, and emerging risks tied to AI-enabled infrastructure, helping build stronger, safer data environments.

Physical • Free • Part of CloserStill Media

united_kingdom_flag

4th March 2026 | Inside monday.com’s Security Strategy: When App Growth Outpaces Identity Control

Rapid growth at monday.com exposed identity gaps as hundreds of business critical applications without SCIM or security APIs fell outside existing identity tools. With thousands of employees depending on these apps, manual access management increased risk and slowed IT operations. This webinar features Lior Zagury, Director of Global IT at monday.com, and Matt Chiodi, CSO at Cerby, sharing how the organization responded to these challenges.

The session explains how more than 200 applications outside traditional identity coverage were secured, how access and credential policies were standardized across every application, and how coverage increased from 20 percent to 78 percent. It also outlines how identity lifecycle management efforts were reduced, saving 3,300 IT hours annually.

Company_Webinar • Part of Cerby

_flag

4th March 2026 | Zero Trust World 2026

Three-day interactive cybersecurity learning conference for IT professionals interested in adopting or improving a default-deny posture. Over 1500 attendees will enjoy thought leadership, hands-on labs, exhibits from a variety of IT vendors, meals, and networking events. Cybersecurity sessions are eligible for CPEs and organizer is an approved ISC2 CPE Submitter.

Physical • Paid • Part of ThreatLocker

united_states_flag

4th March 2026 | Beyond silos: Real-time incident management for Security, Continuity, and IT

Real time incident coordination across Security, Business Continuity and IT takes center stage in this session focused on managing both physical and cyber crises as one connected challenge. The discussion highlights how critical events quickly cross departmental lines and why isolated response processes slow down decision making. By creating shared awareness, faster escalation paths and synchronized playbooks, organizations can respond to incidents in minutes instead of hours while protecting people and maintaining operations.

The webinar also introduces High Velocity Critical Event Management and outlines practical steps to automate and streamline response efforts. Attendees will see how to remove operational silos, improve handoffs between teams and establish a unified operating picture during disruptive events. The session is designed for leaders who want stronger resilience and faster, coordinated incident response without restructuring their organizations.

Company_Webinar • Part of Everbridge

_flag

4th March 2026 | Zero Trust World 2026

ThreatLocker is bringing some of the brightest cybersecurity professionals and special guests together for the 6th year in a row. ‍ Zero Trust World is built to strengthen your defenses from every angle. Across three days, you’ll learn directly from industry experts, frontline practitioners, and peers who are facing the same challenges you are. You’ll gain practical tactics for hardening your environment, identifying weaknesses, and implementing defenses that actually work against the attacks you are facing right now.

From decoding complex attacks, to mastering Zero Trust strategies, to understanding how leading organizations secure their environments, you’ll take home practical methods you can implement immediately to harden your environments and lower your stress levels.

Whether you’re Zero Trust curious, actively adopting, or simply want to harden your cybersecurity, Zero Trust World provides education and training to support IT professionals.

Don’t miss out on this exciting interactive 3-day event to get hands-on cybersecurity training, expert insights, and more.

Physical • Paid • Part of ThreatLocker

united_states_flag

4th March 2026 | OpenText Summit Singapore 2026

OpenText Summit Singapore 2026 brings together business and technology leaders to explore how AI powered digital knowledge workers are reshaping the modern enterprise. The event focuses on agentic AI, intelligent automation, and secure information management, showing how organizations can increase productivity while keeping people at the center of innovation. Attendees will gain insight into how repetitive work can be automated to support better decision making and stronger operational outcomes.

The summit highlights practical use cases across cybersecurity, content management, analytics, cloud, and DevOps, supported by real world examples and live demonstrations. A strong emphasis is placed on responsible AI, data sovereignty, and security, particularly through sovereign cloud strategies that protect local data while enabling global scale. The event is designed for organizations looking to build resilient, future ready digital ecosystems with confidence.

Physical • Paid • Part of OpenText

singapore_flag

4th March 2026 | HKIB Cybersecurity Solutions Day 2026

HKIB Cybersecurity Solutions Day 2026 brings together leaders from the financial services industry to address the growing security challenges driven by artificial intelligence and emerging quantum technologies. As AI continues to reshape both cyber defense and cybercrime, organizations are facing new risks such as deepfake fraud, automated attacks, and increasingly sophisticated methods to bypass existing controls. At the same time, the approach of the quantum era is raising urgent questions about the future of encryption and data protection across the financial sector.

This event focuses on practical and strategic responses to these converging threats. Participants will explore how financial institutions can prepare for quantum related risks while strengthening defenses against AI driven attacks. Through expert insights and industry driven discussions, the event aims to help organizations design resilient, future ready security frameworks that protect trust, data integrity, and long term operational stability.

Physical • Paid • Part of The Hong Kong Institute of Bankers

hong_kong_flag

4th March 2026 | European Cybersecurity Skills Conference 2026

The European Cybersecurity Skills Conference 2026 brings together policymakers, educators, industry leaders, and cybersecurity professionals to address Europe’s growing skills needs. Hosted by ENISA in Larnaca, the conference serves as a central meeting point for the cybersecurity skills community to exchange experiences, discuss shared challenges, and highlight practical approaches to workforce development across the EU.

A core focus of the conference is the European Cybersecurity Skills Framework and its real-world application across public and private sectors. Sessions also highlight initiatives from the European Commission and EU Member States connected to the Cybersecurity Skills Academy. Through expert-led discussions and collaborative dialogue, the event aims to strengthen alignment between education, policy, and industry, supporting a more resilient and skilled European cybersecurity workforce.

Hybrid (Both) • Paid • Part of European Union Agency for Cybersecurity (ENISA)

cyprus_flag

4th March 2026 | HKIB Cybersecurity Solutions Day 2026

HKIB Cybersecurity Solutions Day 2026 is a financial sector focused event exploring cybersecurity challenges facing banks and financial institutions. The program examines how organizations can strengthen defenses against fraud, ransomware, and advanced persistent threats while maintaining customer trust and regulatory compliance. Industry specialists present solutions tailored to protecting sensitive financial data and digital banking platforms.

Sessions address threat intelligence, network protection, identity verification, and incident response strategies relevant to modern financial ecosystems. Attendees gain insights into securing digital services while enabling innovation within regulated environments. The event highlights cybersecurity as a critical pillar of financial stability, supporting professionals responsible for safeguarding banking infrastructure and customer information.

Physical • Paid • Part of Nexusguard

hong_kong_flag

4th March 2026 | The State of Procurement & Third Party Risk: From Market Trends to Real World Program Success

Procurement and third party risk teams are facing growing pressure from cybersecurity threats, geopolitical instability and AI driven disruption. This session reviews findings from The Hackett Group’s 2026 Procurement Agenda and examines how increasing workload, shrinking budgets and limited staffing are forcing organizations to modernize their operating models. The discussion highlights AI enabled technology, analytics and improved third party risk visibility as key priorities for strengthening resilience and performance.

Hackett Procurement experts break down the most impactful market trends before exploring a real world case study from Trustmark. Attendees will see how Trustmark is advancing its Third Party Risk Management program using the ProcessUnity platform to improve supplier visibility, streamline workflows and better align Procurement, IT and risk teams. The webinar provides practical insight into modernizing vendor risk and procurement operations in a complex risk environment.

Company_Webinar • Part of ProcessUnity

_flag

4th March 2026 | How to build a strong identity security profile

Identity has become a primary attack surface, with credential theft, privilege abuse, and orphaned accounts bypassing traditional defenses. This webinar explains how to strengthen identity security using Zero Trust principles and practical steps that can be applied immediately. Topics include implementing MFA effectively, enforcing least privilege, applying conditional access, and maintaining continuous posture assessment.

The session also covers identity lifecycle management for joiners, movers, and leavers, along with policy enforcement across human, machine, and AI agent identities. Attendees will learn ITDR fundamentals, key signals to monitor, and response playbooks integrated with SecOps. Guidance is included for hardening cloud identity platforms such as Microsoft Entra ID to improve resilience and privileged access control.

Company_Webinar • Part of Barracuda

_flag

4th March 2026 | Empowering Consumers in the Fight Against Financial Crime

Financial crime prevention takes center stage in this expert led panel focused on strengthening consumer awareness and institutional response. The discussion walks through the full financial crime lifecycle, beginning with common fraud schemes and moving through the methods criminal networks use to launder illicit funds within the financial system. Speakers highlight how scams evolve and where vulnerabilities typically appear.

The session emphasizes the shared responsibility between informed consumers and proactive financial institutions in disrupting criminal activity at every stage. Attendees will gain clearer insight into how education, monitoring and coordinated action reduce fraud exposure and limit the movement of illicit funds, reinforcing stronger defenses across the financial ecosystem.

Company_Webinar • Part of Nasdaq Verafin

_flag

4th March 2026 | Secure By Design: Foundations and Credential Control

Security teams are redefining firewall management by focusing on Secure by Design principles that reduce credential based risk from the start. This webinar introduces the foundations of Secure by Design in the context of firewall environments, with a clear focus on controlling credentials that often become weak entry points due to unmanaged accounts, outdated passwords, and inconsistent policies.

The session covers new automated capabilities that address core security hygiene, including remediation of local user passwords, resetting TOTP bindings, and identifying compromised credentials through Credential Auditor. Attendees will see how these controls are orchestrated centrally within NSM and work across firewall versions. The webinar provides a practical blueprint for improving identity resilience, eliminating credential blind spots, and establishing stronger authentication baselines across the network.

Company_Webinar • Part of SonicWall

_flag

4th March 2026 | DEVNEXUS 2026

Devnexus 2026 is a major three-day conference held in Atlanta that brings together developers across the Java ecosystem to learn, share and connect in person. It covers ten tracks and more than one hundred sessions, and its Security & Dev Tools track is dedicated to helping developers build more secure software systems by focusing on secure coding practices, threat modelling, vulnerability management, identity and access control, and advancements in cloud and application security.

Participants in the security track gain practical strategies they can apply immediately in development and architecture of enterprise applications. The atmosphere supports mentoring and peer interaction, so attendees can learn from experienced Java Champions and industry experts about real challenges and real solutions in safeguarding code, data, and infrastructure against evolving threats.

Physical • Paid • Part of Atlanta Java Users Group

united_states_flag

4th March 2026 | Cloud & AI Infrastructure London 2026

Cloud & AI Infrastructure London 2026 brings together cloud, AI, data, and infrastructure professionals for a two-day event at ExCeL London. The conference offers sessions on building and managing scalable cloud and AI workloads, deploying infrastructure, and adapting to rapidly evolving technologies. For cybersecurity professionals, the event provides relevant insight into how AI and cloud infrastructure design affects security posture, data protection, identity and access management, and secure infrastructure operations.

This event presents a good opportunity to explore security implications of cloud and AI infrastructure, including risk management, secure deployment practices, and strategies to protect enterprise and cloud-native workloads. Attendees can learn how infrastructure choices shape security outcomes and see how leading vendors and architects approach cloud security and AI-driven environments.

Physical • Free • Part of CloserStill Media

united_kingdom_flag

4th March 2026 | CISM (Certified Information Security Manager) training

CISM – one of the most requested (and best paying) certifications in information security In this 4-day CISM training you will learn about an internationally recognized standard based on the CISM Body of Knowledge. The 4 CISM domains are extensively covered during the training and tested during the CISM exam, i.e.:

Domain 1 - Information Security Governance Domain 2 - Information Security Risk Management Domain 3 - Information Security Program Domain 4 - Incident Management

The CISM training (and certification) focuses on the strategic side of information security and its relationship with business goals. This CISM training is more than just an exam training. Practical cases and getting started with CISM also play an important role in this training. During the training, the 4 CISM domains are covered in detail. For example, you will learn how to align information security with your organization's strategy and current laws and regulations. You will learn to think in terms of risks and you will learn how to limit these risks (such as security incidents) as much as possible for your organization. Become CISM certified and you will be able to assess risks, implement effective governance, and proactively respond to incidents.

What does ISACA's CISM title stand for? CISM - IMF AcademyCISM stands for Certified Information Security Manager and is a title of ISACA. CISM is internationally recognized as the most complete and comprehensive information security certification. The CISM training (and certification) is important to gain knowledge about management, organization, risk management, and change management techniques. Since its inception in 2002, more than 48,000 professionals worldwide have achieved the CISM title. CISM is now one of the most requested and one of the best paying certifications in information security!

For whom is the CISM certification important? The CISM training is particularly important for (future) information security managers who want to obtain the globally recognized CISM title, as well as for professionals such as risk managers, CISOs, CIOs, information architects, IT auditors, and many other professionals who deal with the strategic side of information security. Take your expertise in information security to the next level and become CISM certified!

Language of communication The language of communication during the CISM training is English. The CISM training is also organized in the Dutch language, please have a look at our Dutch website for the dates.

CISM certification requirements The certification requirements that have been set for obtaining the CISM title are:

You must have at least 5 years of work experience in information security in at least 3 CISM domains If you have a CISA or CISSP certification or a Bachelor in an information security related field, then 3 years of relevant work experience is sufficient You must subscribe and adhere to the ISACA Code of Professional Ethics If you do not (yet) meet these requirements, you can become a CISM associate.

About the CISM exam The CISM exam is a multiple-choice exam. You will have to answer 150 questions in a relatively short time (4 hours). The exam is taken by means of Computer-Based Testing (CBT) at a test center affiliated with ISACA. The costs of the CISM exam are determined by ISACA.

Exam success guarantee In the unlikely event that you do not pass the CISM exam the first time, you can attend the CISM training again, free of charge (within one year)!

CISM recertification/CPE credits The CISM title is a 3-year title. To continue your CISM title, you must obtain 120 CPE credits in 3 years.

Educational materials To prepare for the training you will receive the official ISACA CISM Review Manual and access to the CISM Questions & Answers database.

About ISACA ISACA - IMF AcademyISACA (Information Systems Audit and Control Association) is an international professional, non profit association focused on IT, assurance, security, and governance. ISACA has more than 170,000 members in 188 countries and 225 chapters worldwide. ISACA issues multiple titles, including CISM, CISA (Certified Information Systems Auditor), CRISC (Certified in Risk and Information Systems Control), CGEIT (Certified in the Governance of Enterprise IT), Cybersecurity Fundamentals, and CDPSE (Certified Data Privacy Solutions engineers).

CISM vs CISSP, CISA, CRISC and Cybersecurity Fundamentals There are 2 globally recognized leaders in the field of (cyber)security certifications, namely: ISACA and (ISC)2. The top certification of (ISC)2 is CISSP (Certified Information Systems Security Professional). ISACA offers 4 (cyber)security certifications: CISM (Certified Information Security Manager), CISA (Certified Information Systems Auditor), CRISC (Certified in Risk and Information Systems Control) and Cybersecurity Fundamentals. You can obtain all these certifications with us. The main difference between the certifications is:

CISSP focuses on the operational side of information security and its technical aspects CISM focuses on the strategic side of information security and its relationship with business goals CISA is aimed at IT professionals who (want to) work in governance and audit-related roles CRISC is specifically aimed at professionals who (will) work in IT risk management at the enterprise level Cybersecurity Fundamentals is fully focused on technical security knowledge and skills and is therefore an extensive preparation/addition to the CISM certification

The CISM training takes place in Amsterdam (or surroundings). Class times are from 09:00 in the morning to 17:00 in the afternoon. You can join in-class and live online (up to your choice). The training takes place on:

15 - 18 December 2025 16 - 19 March 2026 4 - 7 May 2026 29 June - 2 July 2026

Hybrid (Both) • Paid • Part of IMF Academy

netherlands_flag

4th March 2026 | IT Security Insights 2026

IT Security Insights 2026 marks the 10th edition of one of Sweden’s most respected cybersecurity conferences. Over the past decade, the event has evolved into a crucial platform for leaders in digital security, bringing together CISOs, CIOs, CTOs, and compliance professionals to discuss both strategic and technical aspects of cybersecurity. This year’s programme emphasizes real-world case studies, sector-focused workshops, and interactive panels, ensuring attendees leave with actionable insights to strengthen organizational resilience and navigate complex digital environments.

The conference is also defined by its collaborative community. Beyond the formal sessions, IT Security Insights fosters meaningful connections, enabling professionals to build partnerships that extend beyond the event. By celebrating a decade of progress, the conference continues to inspire, empower, and equip the next generation of cybersecurity leaders. Attendees can expect a highly engaging and practical experience, focused not only on current challenges but on shaping the future of digital security in Sweden and globally.

Physical • Paid • Part of ItSec Insights

sweden_flag

4th March 2026 | AI Agents Under Attack: The Emerging Threats Your Team Can’t Ignore

AI agents are introducing new security, governance, and compliance gaps that many organizations are not prepared to address. This webinar examines the emerging risks tied to AI agents, including data leakage, prompt injection, and the rise of shadow AI within enterprise environments. The session explains why threats targeting AI agents differ fundamentally from traditional applications or bots and how these differences create new exposure points.

The discussion also highlights how high privilege levels combined with limited visibility create serious challenges for security teams. Attendees will gain a clearer view of today’s AI agent threat landscape and understand the practical implications for monitoring, access control, and risk management in AI enabled environments.

Company_Webinar • Part of Zenity

_flag

4th March 2026 | The Recipe for Resilience: Survival Guide for Critical Infrastructure Facing the AI and Nation-State Attack Quagmire

Critical infrastructure is facing escalating pressure from nation state attacks amplified by AI. Traditional perimeter based security models are no longer sufficient in an environment shaped by remote access gaps, supplier weaknesses, and exposed cloud systems. This webinar examines why waiting for compliance mandates or relying solely on zero trust frameworks is not enough in today’s threat landscape.

Dr. Ymir Vigfusson, CTO and co founder of Keystrike, presents a practical survival guide for CISOs operating amid legacy systems and ongoing uncertainty. The session focuses on realistic strategies for rapidly strengthening resilience and adapting to an assume compromise mindset in the face of advanced, persistent threats.

Company_Webinar • Part of Keystrike

_flag

4th March 2026 | Blue Team Workshop – Middle East | Modern Network Attacks

Detect and respond to modern hybrid network attacks through a hands-on blue team workshop focused on real world post compromise behavior. This session centers on identifying threats without relying on signatures, helping teams recognize when a hybrid environment has already been breached and how attackers move inside the network.

Participants will practice deeper attack investigations using Vectra AI’s network detection and response platform to contain threats before they escalate. The workshop is designed for security teams looking to strengthen network visibility, improve response skills, and gain practical experience identifying advanced attacks in modern environments.

Company_Webinar • Part of Vectra AI

_flag

4th March 2026 | Navigating the future of security: Concrete strategies, emerging trends, and practical insights

Security leaders are facing rapid changes driven by emerging technologies and evolving threats. This interactive webinar features insights from Forrester and F5 experts, offering practical guidance on how to address today’s most pressing security challenges. The session focuses on three major trends shaping the landscape and what they mean for organizational security strategies.

Topics include the risks associated with quantum computing, the shift toward platformization in application security, and the challenges of securing a growing number of AI applications. Attendees will gain actionable strategies to strengthen their security posture and have the opportunity to participate in a live Q&A with the speakers.

Company_Webinar • Part of F5 Networks

_flag

4th March 2026 | Forcepoint AWARE 2026

Forcepoint AWARE 2026 focuses on data security challenges emerging from AI adoption and modern enterprise environments. The event brings security leaders, practitioners, and Forcepoint customers together to examine how organizations are managing AI driven data exposure, insider risk, and evolving compliance requirements using adaptive data security strategies. Sessions explore governance, monitoring, and protection of sensitive information across cloud, endpoint, and AI workflows.

While not exclusively focused on cybersecurity, the summit centers on protecting data wherever it moves, including AI systems, collaboration platforms, and enterprise applications. Attendees learn how security teams are operationalizing visibility, automation, and policy enforcement to reduce risk while enabling responsible AI innovation. Discussions highlight practical approaches for balancing productivity, governance, and data protection in AI enabled organizations.

Online • Free • Part of Forcepoint

united_states_flag

4th March 2026 | Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need

Enterprise security teams are reassessing cloud only SSE as real world requirements around performance, visibility, and compliance continue to grow. This webinar focuses on how a unified SASE approach gives organizations greater flexibility by enforcing security closer to users and applications while maintaining consistent Zero Trust controls both on network and off network.

The session explains where standalone SSE models can fall short and how unified visibility across networking and security simplifies operations, improves troubleshooting, and supports data sovereignty needs. A live demo shows Unified SASE in practice, highlighting how enterprises improve application performance, streamline management, and reduce operational complexity through a single, integrated platform.

Company_Webinar • Part of Fortinet

_flag

4th March 2026 | ARC European Leadership Industry Forum 2026

The ARC European Industry Leadership Forum focuses on the intersection of industrial innovation, AI adoption, and cybersecurity for operational environments. Attendees gain insight into how companies across Europe are securing digital transformation projects, integrating AI into production systems, and building architectures that support safer and more resilient industrial operations. Sessions cover topics like cyber defense for OT networks, AI enabled monitoring, and strategies that help facilities maintain uptime while defending against increasingly complex threats. The forum also highlights practical case studies that show how real organizations are modernizing factories and infrastructure without compromising security.

This event brings together engineers, technology executives, and cybersecurity professionals who work with industrial systems, creating a collaborative setting for sharing experiences and comparing approaches. Participants learn how robotics, digital twins, connected worker tools, and industrial data platforms depend on strong security foundations to function at scale. The conversations aim to simplify complex challenges and provide clear guidance that companies can apply across plants, facilities, and supply chains. The forum delivers a grounded view of what AI and cybersecurity can deliver today, making it a valuable gathering for anyone shaping Europe’s industrial future.

Physical • Paid • Part of ARC Advisory Group

spain_flag

4th March 2026 | Live Demo: Scaling Executive Protection with Flashpoint

Protecting high profile leaders requires timely insight across both digital and physical environments. This live 20 minute webinar demonstrates how Flashpoint Physical Security Intelligence transforms large volumes of data into actionable intelligence for executive protection teams. Attendees will see how geospatial mapping can be used to monitor localized threat chatter around offices, travel routes, and event venues in real time.

The session also highlights AI driven analysis through Echosec Assist, which identifies critical sentiment and threatening language across the web. In addition, it covers how human vetted intelligence reports can support internal research efforts and enable faster, more confident security decisions.

Company_Webinar • Part of Flashpoint

_flag

5th March 2026 | Client-Side Protection: Specialists or Platforms? Featuring Insights from Forrester, MVW & BT Group

Organizations are weighing whether consolidated web application security platforms can adequately protect the client side or if specialized tools offer stronger risk reduction and compliance. This webinar focuses on the tradeoffs between platform based approaches and dedicated client side protection as web threats continue to evolve.

The discussion draws on Forrester research and real world perspectives to explain why many enterprises turn to specialized client side security to address regulatory pressure, protect customer data, and maintain trust. Attendees will gain clarity on when consolidation makes sense and when best of breed solutions deliver greater security value.

Company_Webinar • Part of Jscrambler

_flag

Insights & Analysis from Security Events

Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.

AI LLM Injection

AI Security | Our Content Hub

Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!

Stay Ahead in Cybersecurity – Explore Global Conferences Today

Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.