AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
8th April 2026 | Japan IT Week Spring 2026
Japan IT Week Spring 2026 is one of Japan’s largest and most established technology exhibitions, bringing together professionals involved in system development, operations, and IT infrastructure. The event features multiple specialized expos, including the Information Security Expo, which focuses on cybersecurity solutions such as network defense, threat detection, identity management, and secure system operations for enterprises and government organizations.
The exhibition offers strong value for cybersecurity professionals by combining technical solutions, business networking, and exposure to emerging trends across cloud, data centers, IoT, and enterprise security. With a large scale show floor and strong industry participation, the event serves as a key meeting point for vendors, system integrators, and security decision makers looking to strengthen organizational resilience and modern IT security strategies.
Physical • Paid • Part of RELXgroup
8th April 2026 | CxO Institute: San Francisco 2026
CxO Institute: San Francisco 2026 is designed for executive leaders driving digital strategy within their organizations. The summit covers digital transformation, data governance, emerging technology adoption, and the integration of secure practices into core business operations. Security executives will benefit from discussions on risk prioritization and resilience planning in dynamic environments.
The event features interactive sessions, peer panels, and expert perspectives that help leaders understand how to protect critical assets while pursuing innovation. Emphasis is placed on fostering executive collaboration around cybersecurity readiness and strategic planning. Attendees gain insights into balancing agility and security to support sustainable digital growth and stakeholder trust across complex technology ecosystems.
Physical • Paid • Part of CxO Institute
8th April 2026 | Insider Threat Defense Group Trainings
The Insider Risk Management Program (IRMP) Evaluation & Optimization Training Course, offered by Insider Threat Defense Group (ITDG), provides professionals with the expertise needed to develop, assess, and enhance insider risk programs. Delivered virtually over two days (April 8-9, 2026) in four-hour live sessions, this interactive training allows real-time engagement with instructors and peers while providing downloadable materials for advance preparation.
Designed for Insider Threat Investigators, FSOs, CISOs, HR professionals, legal counsel, and others supporting IRMPs, this comprehensive course covers insider threat motivations, behavioral indicators, organizational vulnerabilities, and the full spectrum of IRMP development and optimization. Participants receive an extensive toolkit including templates, checklists, and guidance documents that streamline program creation and gap analysis, saving countless hours of documentation work.
Attendees earn 16 CPE credits and the IRMP Evaluator & Optimization Specialist credential upon completion. The training is offered at a discounted rate of $895 (regularly $995) in recognition of organizational budget challenges.
ITDG brings real-world consulting experience to the classroom, having served over 700 prestigious clients including The White House, Department of Defense, FBI, Fortune 100 companies like Microsoft, Walmart, and Delta Airlines, and numerous intelligence community agencies. Over 1,000 professionals have completed ITDG training with exceptional satisfaction ratings.
The curriculum addresses everything from establishing continuous monitoring programs and conducting vulnerability assessments to presenting performance metrics to executive leadership for resource allocation. Organizations may also schedule on-site training to align all stakeholders through collaborative tabletop exercises using realistic threat scenarios, ensuring enterprise-wide alignment in detecting, preventing, and mitigating insider risks.
Online • Paid • Part of Insider Threat Defense Group
8th April 2026 | Ridiculously Easy AI Powered Security Awareness Training and Phishing
Human risk remains a leading cause of security breaches, with traditional awareness programs often failing to drive lasting behavior change. As threats become more sophisticated, especially with AI-driven social engineering, organizations need more adaptive and personalized approaches to security training.
This live demonstration highlights how AI can transform security awareness by identifying high-risk users and delivering tailored training and phishing simulations. It covers the use of deepfake scenarios to prepare users for modern manipulation tactics and the automation of realistic phishing campaigns. Attendees will also see how continuous, data-driven training and a broad content library can improve engagement, reduce manual effort, and strengthen overall security culture.
Company_Webinar • Part of KnowBe4
8th April 2026 | When Mules and Scams Converge: Lessons in Real-Time Detection
Financial fraud is increasingly driven by the convergence of scams and money mule activity, creating complex challenges for detection and prevention. This webinar examines how mule networks operate within modern fraud ecosystems and how unwitting individuals are often drawn into these schemes. The session focuses on why traditional approaches that treat scams, fraud, and mule activity separately fail to provide a complete view of risk.
Attendees will learn how mule behavior unfolds across digital banking journeys and why contextual risk assessment is critical for early intervention. The discussion highlights how unified detection strategies can help financial institutions identify suspicious activity sooner and prevent funds from being transferred. The webinar provides practical insight into improving real time fraud detection and reducing financial crime exposure.
Company_Webinar • Part of Outseer
8th April 2026 | NetDiligence: Cyber Risk Summit Toronto 2026
The NetDiligence Cyber Risk Summit Series is a leading forum dedicated to cybersecurity, cyber insurance, and risk management. Held in four key cities—Miami Beach, Toronto, San Diego, and Philadelphia—the series gathers industry experts, insurers, law firms, and security executives to explore current trends in cyber threats, data breach response, and the legal frameworks shaping cyber risk. Each summit provides a high-level platform for professionals to share insights, learn about new risk mitigation strategies, and discuss the evolving intersection between cybersecurity and business resilience.
Attendees can expect focused panel discussions, hands-on sessions, and networking opportunities designed to foster collaboration among the cyber insurance community and cybersecurity practitioners. NetDiligence’s long-standing reputation as a neutral and informed convenor makes the series a cornerstone of professional development in the field. Whether in the U.S. or Canada, every event in this series emphasizes actionable intelligence and best practices for effectively managing cyber incidents.
Physical • Paid • Part of NetDiligence
8th April 2026 | Executive impersonation in Finance: Exploring modern phishing tactics
Executive impersonation has become a highly effective phishing tactic, particularly in the financial sector where urgency and hierarchy can be exploited. This webinar explores how attackers use impersonation techniques combined with social engineering to manipulate employees into taking high risk actions. The session focuses on why financial institutions are prime targets and how these attacks are evolving.
Attendees will learn how executive impersonation campaigns operate, including common patterns and tactics used to create urgency and bypass scrutiny. The discussion also covers how security teams can detect and prevent these attacks before damage occurs. The webinar provides practical insight into defending against modern phishing techniques targeting finance organizations.
Company_Webinar • Part of Sublime Security
8th April 2026 | From Awareness to Resilience: What Happens When Users Click the Wrong Thing
Human error remains one of the most significant drivers of security incidents, even with awareness training in place. This webinar explores what happens after users fall victim to attacks, focusing on real world incident response and the impact on organizations. The session highlights the limitations of prevention only strategies and the need for a more resilient, end to end approach to managing human risk.
Attendees will learn how to prepare for incidents caused by user actions, improve response processes, and reduce operational and financial impact. The discussion also covers how managed service providers can support clients through incidents and maintain trust. The webinar provides practical guidance on building resilience, strengthening response capabilities, and managing security risks beyond initial awareness training.
Company_Webinar • Part of usecure
8th April 2026 | Beyond the Perimeter 2026
As AI reshapes the threat landscape, traditional security boundaries are disappearing and attack surfaces are expanding. This webinar explores how AI is accelerating cyber threats, reducing response times, and increasing complexity across identity, network, and endpoint environments. The session focuses on how security leaders are adapting to defend against AI powered adversaries in a rapidly evolving environment.
Attendees will gain insight into integrated security approaches that unify identity, network, and endpoint protection. The discussion highlights what strategies are proving effective and where gaps still exist as organizations adopt AI driven defenses. The webinar provides practical perspective on how to strengthen security posture and keep pace with increasingly sophisticated, AI enabled attacks.
Company_Webinar • Part of Okta
8th April 2026 | Threat Briefing Q1 2026
DNS infrastructure is increasingly targeted by threat actors who use it for command and control, phishing campaigns, and large scale attack coordination. As adversaries continuously refine their tactics, outdated detection methods can leave organizations vulnerable to evolving threats. This webinar provides an overview of the latest DNS threat landscape and the techniques attackers are using to exploit DNS infrastructure.
The session examines recent threat campaigns, emerging DNS based attack patterns, and detection evasion techniques used by adversaries. Speakers will also discuss how attackers leverage multi channel strategies and, in some cases, AI technologies to expand their operations. Attendees will gain insights into current DNS threat metrics and practical strategies for strengthening defenses using predictive intelligence and improved visibility into malicious infrastructure.
Company_Webinar • Part of Infoblox
8th April 2026 | Nuix XLR8/User Group 2026
Nuix XLR8/User Group 2026 is a focused, in person gathering designed for professionals working in investigations, compliance, legal, and data privacy. The event centers on how AI powered workflows within Nuix Neo help teams manage growing data volumes, respond faster to risk, and improve decision making. Through plenary sessions and expert led discussions, attendees gain a deeper understanding of how modernized platforms support agility in complex regulatory and investigative environments.
The program combines platform updates, roadmap briefings, customer perspectives, and collaborative discussions that encourage real knowledge sharing. Attendees can follow dedicated tracks aligned to investigations, data privacy, discovery, and legal use cases, ensuring practical relevance across roles. The day concludes with structured networking that allows participants to connect directly with peers and Nuix specialists while exchanging real world insights on evolving data and cybersecurity challenges.
Physical • Paid • Part of Nuix
8th April 2026 | From None to Done: 100% Patching Coverage in Just 5 Minutes
Patching remains a persistent challenge for many organizations, especially as environments grow more complex and diverse. Achieving full coverage across operating systems and third-party applications requires automation, visibility, and consistent enforcement to reduce vulnerabilities and maintain security posture.
The demo highlights how automated patch management can deliver near-complete coverage across Windows, macOS, and Linux environments, including offline systems. It explores real-time vulnerability detection, continuous compliance, and unified visibility across endpoints. Attendees will gain insight into improving remediation workflows, prioritizing risks effectively, and maintaining secure, scalable patching practices without relying on manual processes or periodic scanning.
Company_Webinar • Part of Action1
8th April 2026 | International Conference on Computing and Machine Intelligence (ICMI) 2026
The International Conference on Computing and Machine Intelligence (ICMI) 2026 is an IEEE affiliated academic conference that brings together researchers and professionals working across computing, artificial intelligence, and machine intelligence. The conference has direct relevance to cybersecurity through its technical tracks covering networking and security, AI driven security systems, intrusion detection, privacy, and secure cloud and 5G environments. These topics reflect the growing role of intelligent systems in defending modern digital infrastructure.
Held at King Faisal University in Al Ahsa, Saudi Arabia, the event provides a structured platform for presenting peer reviewed research with real world security implications. Accepted papers are presented orally and published in the official proceedings, with submission to IEEE Xplore. By connecting academia and industry, the conference supports collaboration on securing cyber physical systems, IoT environments, and data driven infrastructures.
Physical • Paid • Part of Central Michigan University
8th April 2026 | SecureWorld Boston 2026
SecureWorld conferences in 2026 offer a consistent experience across each city, giving cybersecurity professionals a place to learn about current threats, new defensive strategies, and practical approaches to risk management. The events bring together security leaders, technology providers, and hands on practitioners who share real world insights on cloud security, identity, incident response, and the growing challenges linked to AI and automation. Attendees can expect thoughtful conversations and technical sessions that help strengthen security programs in organizations of all sizes.
Each SecureWorld location creates a community centered environment where regional challenges and best practices are openly discussed. The conferences highlight collaboration and offer opportunities to speak with experts who understand the evolving threat landscape. Participants gain actionable guidance they can apply immediately, especially in areas such as compliance readiness, threat intelligence, and secure architecture. SecureWorld events continue to play an important role in helping teams stay informed and resilient in a fast changing cybersecurity world.
Physical • Paid • Part of SecureWorld
8th April 2026 | HMG Strategy: Annual Dallas C-Level Technology Leadership Summit 2026
HMG Strategy’s Annual Dallas C-Level Technology Leadership Summit addresses the role of executives in managing cybersecurity risk and digital transformation. The event explores how leadership decisions impact organizational resilience and security maturity.
Key discussions focus on governance, incident response leadership, and aligning cybersecurity investments with business outcomes. Attendees gain practical insight into leading secure and resilient technology organizations.
Physical • Paid • Part of HMG Strategy
8th April 2026 | Trust But Verify Your AI
Enterprises increasingly rely on AI systems built internally, sourced from open-source communities, and delivered through third-party vendors. This webinar examines the security risks across the AI supply chain and explains why organizations need independent verification of the AI and machine learning components running in their environments.
The session explores how to secure AI across three areas: purchased services, internally built models, and production deployments. Topics include gaining visibility into external AI services using SaaSBOM, generating a Machine Learning Bill of Materials to inventory open-source models, and protecting GenAI applications and RAG pipelines from prompt injection and data poisoning. The discussion focuses on improving transparency, strengthening controls, and supporting compliance with emerging regulations such as the EU AI Act.
Company_Webinar • Part of ReversingLabs
8th April 2026 | The Agentic Security Landscape: Lessons from 500+ AI Discovery Assessments
The rapid shift from prompt based AI tools to autonomous agent frameworks is introducing new security challenges for organizations. As AI agents begin to operate within development environments and enterprise systems, security teams must understand how these technologies expand the attack surface. This webinar explores the emerging agentic AI security landscape using insights from more than 500 enterprise AI discovery assessments.
The session examines how organizations are adopting autonomous AI agents and the security implications of these systems across industries such as healthcare, finance, and technology. Speakers will explain how a system level discovery approach can reveal hidden models and shadow AI components within enterprise environments. Attendees will also see a demonstration of generating an AI Bill of Materials (AI-BOM) to help benchmark AI risk and support more effective AI security governance.
Company_Webinar • Part of Snyk
Digital asset service providers face increasing pressure from cyber threats, regulatory requirements, and the complexity of managing secure transactions at scale. This webinar explores how organizations can strengthen security and compliance across digital asset operations. The session focuses on protecting funds, enforcing transaction controls, and maintaining visibility across complex financial ecosystems.
Attendees will learn how to implement secure wallet segregation, advanced key management, and policy driven transaction approvals to reduce risk. The discussion also covers automated monitoring for AML and CTF compliance, as well as audit ready reporting to meet regulatory expectations. The webinar provides practical guidance on securing digital asset infrastructure while maintaining compliance and operational resilience.
Company_Webinar • Part of Fireblocks
8th April 2026 | OneTrust + Adobe: How consent powers creativity
This webinar explores how consent management supports data privacy, marketing innovation, and AI-driven customer engagement. The session examines how integrating OneTrust consent and preference management with Adobe Real-Time Customer Data Platform (RTCDP) enables organizations to activate trusted, permissioned data while meeting evolving privacy requirements.
Speakers will discuss how consent signals can guide AI-powered marketing workflows, enable personalized campaigns, and support compliance with regulations such as GDPR, CPRA, and the EU AI Act. The webinar also highlights how unified customer profiles and consent-driven data strategies help organizations manage privacy risk while enabling real-time engagement and cross-channel marketing initiatives.
Company_Webinar • Part of OneTrust
8th April 2026 | ClouderaNOW 2026
ClouderaNOW 2026 is a virtual event designed for data practitioners exploring the latest developments in data, analytics, and AI. While not exclusively focused on cybersecurity, the event addresses important security and governance considerations tied to cloud architectures, unified data fabrics, and AI driven systems. As organizations scale data platforms and adopt AI agents, protecting sensitive information and maintaining compliance becomes a critical part of digital strategy.
Through product demonstrations, customer case studies, and live discussions, attendees gain insight into modern data infrastructure, cloud bursting strategies, and open data architectures. Security is embedded in conversations around responsible AI, privacy, and operational resilience. For cybersecurity professionals supporting data platforms, the event offers visibility into how emerging AI technologies intersect with data protection, governance, and secure cloud operations.
Online • Free • Part of Cloudera
8th April 2026 | Zero Trust for Users Masterclass: The Playbook for M&A Day-1 Secure Access
Mergers and acquisitions create complex challenges for IT and security teams as organizations integrate workforces, applications, and infrastructure across newly combined environments. Ensuring secure access while maintaining business continuity is critical during this transition. This webinar explores how a Zero Trust approach can help organizations manage secure connectivity and reduce risk during M&A integration.
The session presents practical lessons from Zscaler’s experience with acquisitions and explains how Zero Trust architecture can simplify networking and reduce challenges such as complex routing and overlapping private subnets. Attendees will learn strategies for providing newly integrated users with secure access from day one while minimizing operational disruption. The webinar also outlines steps organizations can use to develop their own playbook for secure and efficient M&A integration.
Company_Webinar • Part of Zscaler
8th April 2026 | Privileged remote access: The blind spot in PAM
Privileged remote access remains a critical but often overlooked gap in many PAM programs, particularly when it involves third-party vendors, contractors, and external support teams. Limited visibility, weak session control, and inconsistent policy enforcement can expose organizations to significant security risks.
The content explores why this gap persists and how it increases exposure through shared credentials, excessive access, and unmanaged tools. It also clarifies the difference between basic remote access and true privileged access. Practical guidance is provided on strengthening control, improving visibility, and implementing scalable strategies that secure external access without disrupting operations or compliance requirements.
Company_Webinar • Part of Devolutions
8th April 2026 | PwC & Ping Identity: Securing AI at Scale, Identity as the Foundation for Trust
As organizations begin deploying agentic AI in customer facing and operational systems, new identity and governance challenges are emerging. Autonomous agents can access systems, make decisions, and act on behalf of users, introducing risks related to authenticity, authority, accountability, and intent. This webinar explores how identity frameworks must evolve to securely manage interactions between humans and AI agents.
Experts from PwC and Ping Identity will discuss how an Identity for AI approach establishes identity as the foundation of trust for AI driven environments. The session examines why identity and access management is critical for registering, authenticating, authorizing, and governing AI agents at scale. Attendees will also gain practical insight into deploying identity controls that enable secure adoption of agentic AI while maintaining compliance and organizational trust.
Company_Webinar • Part of Ping Identity
8th April 2026 | How to Balance Fraud and Friction in Fintech
Balancing fraud prevention with user experience is a growing challenge for fintech organizations aiming to scale securely. Leading approaches treat compliance and fraud controls as performance drivers, enabling stronger protection while supporting conversion and global expansion.
The content examines how a global payments company unified KYC, KYB, document verification, and fraud intelligence into a single adaptive workflow. It highlights how risk-based decisions can dynamically adjust user friction based on geography, behavior, and real-time signals. Attendees will gain insight into reducing fraud exposure while maintaining a streamlined onboarding experience and supporting sustainable growth.
Company_Webinar • Part of Trulioo
8th April 2026 | State of Cybercrime: The Axios Supply Chain Attack
A recent supply chain attack involving the Axios library highlights how attackers can bypass traditional defenses by targeting trusted components in the development pipeline. By compromising a single npm maintainer account, malicious code was introduced into updates and executed across developer environments and CI/CD systems before detection.
The analysis explores how this incident reflects a broader shift toward supply chain attacks and the increasing overlap between cybercrime and geopolitical activity. It also examines attribution insights linked to a North Korean-affiliated group and what this means for developer infrastructure security. Attendees will gain a clearer understanding of emerging risks and how organizations can strengthen defenses against similar threats.
Company_Webinar • Part of Varonis
8th April 2026 | Introducing Varonis Atlas: The fastest path to trustworthy and secure AI
As organizations accelerate AI adoption, gaps in data visibility and control are creating significant security and compliance risks. This webinar introduces an AI security platform designed to help organizations understand how AI agents and models access and use sensitive data. The session focuses on addressing hidden data exposure risks and strengthening governance across AI environments.
Attendees will learn how to implement end to end AI security capabilities, including data discovery, posture management, testing, and runtime guardrails. The discussion also covers how to maintain compliance while enabling AI innovation across different platforms and configurations. The webinar provides practical insight into securing AI systems and protecting sensitive data in increasingly complex environments.
Company_Webinar • Part of Varonis
9th April 2026 | BSides Salt Lake City 2026
BSidesSLC — Community-Driven Cybersecurity Conference (April 9–10, 2026, Sandy, UT)
BSidesSLC is a community-focused cybersecurity event where students, practitioners, researchers, and industry experts come together to learn, share, and build connections. Designed “for the people, by the people,” the conference brings together curious minds and experienced professionals to strengthen Utah’s cybersecurity community and help attendees advance their skills and careers.
When & Where: April 9–10, 2026 Conference Center at Miller Campus, 9750 S 300 W, Sandy, Utah 84070
What to Expect: • Talks and presentations covering the latest research, real-world attacks, defense strategies, emerging threats, cloud security, AI security, hardware hacking, and more. • Hands-on workshops and trainings offering practical skill-building in areas such as cloud and cloud-native security, red/blue team tactics, forensics, secure DevSecOps, and embedded systems. • Community sessions and panels focused on leadership, GRC, threat detection, adversary emulation, career development, and human factors in security. • Capture-the-Flag competitions, hardware challenges, and hands-on contests—with prizes for participants. • Networking opportunities with security professionals, students, mentors, hiring managers, and local industry leaders.
Why Attend: BSidesSLC offers valuable technical content for beginners and experts alike, with a uniquely friendly and collaborative community vibe. Attendees gain access to practical workshops, career opportunities, hackable electronic badges, community engagement, and one-on-one networking with peers and mentors from Utah’s thriving cybersecurity ecosystem.
Why Speak or Train: The event welcomes submissions across all cybersecurity domains, including red teaming, blue teaming, cloud security, AI and security, offensive research, appsec, DevSecOps, embedded security, privacy, and more. Speaker opportunities include 25- or 50-minute talks, 2–4 hour workshops, panels, hands-on demos, and community sessions. Speakers must present in person and are encouraged to submit fresh, original material.
Why Sponsor: BSidesSLC is produced by the non-profit Utah Cybersecurity Society (501(c)(3)). Sponsorship provides direct access to a highly engaged audience of practitioners, students, and industry professionals while supporting the growth of the local cybersecurity community. Sponsor packages offer brand exposure, recruiting visibility, and opportunities to participate in a grassroots, mission-driven event.
Call to Action: • Speakers and trainers are invited to submit proposals before January 9, 2026. • Attendees can register starting January 12, 2026 for two days of hands-on learning and community engagement. • Sponsors can contact the organizers to explore sponsorship packages and participation options.
BSidesSLC is more than a conference—it’s a community. Whether you want to attend, speak, sponsor, or collaborate, we welcome you to join us in 2026.
Physical • Paid • Part of Utah Cybersecurity Society
9th April 2026 | Achieving MISRA C++:2023 Compliance with Sonar
Software compliance standards such as MISRA C++:2023 play an important role in improving code safety and reliability, particularly in critical systems. This webinar explores how modern tools integrate compliance into the development lifecycle, enabling developers to enforce standards directly within their coding workflows. The session focuses on how shifting compliance earlier in development helps reduce risk and improve code quality.
Attendees will learn how SonarQube supports MISRA compliance through integrated analysis, real time feedback, and reporting capabilities. The discussion also covers how embedding compliance into development processes streamlines audits and ensures consistency. The webinar provides insight into aligning development practices with safety and compliance requirements, with moderate relevance to broader security objectives.
Company_Webinar • Part of Sonar
9th April 2026 | 2026 RSAC Conference Recap
Key insights from RSAC 2026 are distilled into a focused discussion on the trends shaping the cybersecurity landscape. Topics include AI trust and verification, software supply chain transparency, and the growing importance of managing risk in commercial software.
The conversation highlights what mattered most from the conference, cutting through the volume of announcements and sessions to focus on practical implications. It explores how organizations can respond to evolving threats, strengthen supply chain security, and prepare for what comes next in the industry. Attendees will gain a clearer view of emerging priorities and how to align their strategies with current and future security challenges.
Company_Webinar • Part of ReversingLabs
9th April 2026 | AtlSecCon 2026
AtlSecCon 2026 is Atlantic Canada’s major cybersecurity conference built to share knowledge, deepen collaboration, and strengthen resilience within the infosec community. Held at the Halifax Convention Centre over two days, the event unites professionals, students, and enthusiasts from around the region and beyond to examine real world threats, emerging trends, and practical defenses. The conference is guided by volunteers passionate about advancing cybersecurity education, innovation, and inclusive learning for all participants.
Attendees can expect a wide array of sessions covering technical and strategic topics, networking opportunities with peers and industry leaders, and access to a vibrant sponsor trade show. The event also features a call for speakers, offering practitioners a platform to share insights and contribute to discussions shaping the future of security. With its community driven format, AtlSecCon continues to grow as a go to forum for cybersecurity education and collaboration.
Physical • Paid • Part of AtlSecCon
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.