AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
9th April 2026 | Beyond the Perimeter: How to See Every Threat in Hybrid Networks
Hybrid networks have replaced the traditional security perimeter, creating new challenges for detecting threats across distributed environments. This webinar examines how visibility gaps across hybrid infrastructure can allow attackers to move undetected and contribute to some of today’s most damaging breaches. The session focuses on why detection strategies must evolve to address the complexity of modern networks that span on premises systems, cloud services, and remote access environments.
Experts will discuss how current security tools may leave organizations exposed to unseen attack paths and how adversaries exploit these blind spots. The webinar also presents a real world breach scenario to illustrate where detection typically fails and where it could have been prevented. Attendees will gain a practical framework for improving visibility and strengthening threat detection across hybrid network environments.
Company_Webinar • Part of Fidelis Cybersecurity
9th April 2026 | Learn How to Automate Compliance for SOC 2, ISO 27001, and More
Keeping up with evolving compliance requirements such as SOC 2, ISO 27001, and other frameworks can be challenging as expectations increase and security demands grow. Automation is becoming essential for maintaining continuous compliance while reducing manual effort and improving consistency across processes.
The session explores how compliance workflows can be streamlined through automated evidence collection, policy management, and remediation. It also highlights approaches to building stronger security foundations, improving transparency through trust centers, and using AI-driven tools to handle questionnaires efficiently. Attendees will gain insight into how automation can support audit readiness while allowing engineering teams to stay focused on core development work.
Company_Webinar • Part of Vanta
9th April 2026 | HIPAA in 2026: Balancing Compliance and Security with Lean Teams
Healthcare organizations are facing evolving threats where attackers prioritize data theft, identity abuse, and persistent access over disruption. At the same time, increasing system complexity and regulatory demands are making it harder to maintain visibility, monitoring, and audit readiness with limited resources.
The discussion focuses on balancing HIPAA compliance with effective security operations in constrained environments. It covers how threat patterns are shifting, the challenges of continuous monitoring, and approaches to simplify log retention and audit support. Practical guidance is provided to help organizations strengthen detection and response while meeting compliance requirements and maintaining control over sensitive patient data.
Company_Webinar • Part of Field Effect
9th April 2026 | Operationalize Threat Intelligence: 3 Essential Integration Workflows
Security teams often struggle with disconnected tools, manual alert enrichment, and limited scalability. The challenge is not the lack of tools, but the absence of integrated intelligence that enables efficient and coordinated security operations.
A practical workshop format walks through three integration workflows designed to operationalize threat intelligence across existing systems. Topics include automating alert enrichment within SIEM and SOAR environments, prioritizing vulnerabilities based on active exploitation, and identifying the right starting point based on organizational maturity. Attendees gain clear, actionable approaches to improve SOC efficiency, reduce manual effort, and move toward more scalable and intelligence-driven security operations.
Company_Webinar • Part of Recorded Future
9th April 2026 | App State Cyber Summit 2026
The App State Cyber Summit 2026 brings together cybersecurity professionals, educators, and students for a full day of insight and collaboration in Boone, North Carolina. Participants will gain practical insight into emerging cyber threats, defensive strategies, and the evolving role of cyber risk in business and public sectors. The event supports student scholarships through the Department of Computer Information Systems and offers networking opportunities across practitioners and academics.
Attendees will benefit from a blend of industry-expert presentations and mentoring sessions that highlight the connection between real-world cyber challenges and academic advancement. The event also features a Women in Tech dinner and panel discussion designed to foster diversity and inclusion in cybersecurity careers, creating a dynamic environment for learning and professional growth.
Physical • Paid • Part of Department of Computer Information Systems @ Appalachian State University
9th April 2026 | Women In Technology 2026
Calling all tech-savvy trailblazers! Join us for an empowering evening as we celebrate and uplift the brilliance of women in technology. Whether you're an aspiring techie, a seasoned pro, or simply passionate about technology, this event is for you! Come together to support and foster a thriving community of women in tech. Let's break barriers, shatter glass ceilings, and pave the way for a more inclusive tech future, and let's make history together!
Physical • Paid • Part of Appalachian State University
9th April 2026 | FutureCon CyberSecurity Conference: Minneapolis 2026
FutureCon CyberSecurity Conferences bring together IT and security professionals for a series of in-person events across major U.S. cities. Each conference offers practical sessions led by CISOs and security leaders who share insights from their own experiences. The focus is on strategies that help organizations strengthen defenses, manage risks, and stay resilient in the face of growing cyber threats. The discussions are grounded in real-world lessons rather than theory, creating a setting that helps attendees apply what they learn right away.
Participants also gain direct exposure to the latest technologies and solutions shaping the cybersecurity landscape. The event encourages meaningful dialogue among experts, executives, and vendors, promoting collaboration on emerging issues such as cloud security, identity management, and zero trust. More than a conference, FutureCon is a space where leaders connect, exchange perspectives, and walk away with actionable strategies to improve their security posture.
Hybrid (Both) • Paid • Part of FutureCon CyberSecurity Events
9th April 2026 | AtlSecCon 2026
AtlSecCon 2026 is Atlantic Canada’s major cybersecurity conference built to share knowledge, deepen collaboration, and strengthen resilience within the infosec community. Held at the Halifax Convention Centre over two days, the event unites professionals, students, and enthusiasts from around the region and beyond to examine real world threats, emerging trends, and practical defenses. The conference is guided by volunteers passionate about advancing cybersecurity education, innovation, and inclusive learning for all participants.
Attendees can expect a wide array of sessions covering technical and strategic topics, networking opportunities with peers and industry leaders, and access to a vibrant sponsor trade show. The event also features a call for speakers, offering practitioners a platform to share insights and contribute to discussions shaping the future of security. With its community driven format, AtlSecCon continues to grow as a go to forum for cybersecurity education and collaboration.
Physical • Paid • Part of AtlSecCon
9th April 2026 | Kernelcon 2026
Welcome to Kernelcon Unplug. Connect. Hack. Go Off Grid. Out here, under the endless Midwest sky, technology feels different. It's raw. It's hands-on. And its free from the digital noise of daily life. Kernelcon 2026 invites you to step off the grid and immerse yourself in a weekend where curiosity meets community.
From sunrise keynotes to late-night hardware hacks, every moment is designed to push your skills further and recharge your inspiration. Whether you're exploring our villages, cracking challenges in the CTF, or sharing stories around the afterparty, you'll find yourself surrounded by people who live and breathe infosec.
So leave the VR headset behind, feel the real breeze, and come join one of the Midwest's premier security experiences. Out here, it's not just about technology, it's about the people who shape it.
Kernelcon is the result of many motivated information security professionals who recognized the opportunity to create an awesome security conference in Omaha. The idea for Kernelcon started within the local DEF CON Group, DC402, with lots of help from other members of other local security groups such as NebraskaCERT and OWASP. We are inspired by many other conferences including DEF CON, DerbyCon, ShmooCon, etc., and wanted to bring those same experiences to the Mid-West here in Omaha.
Our goal is to make Omaha an annual destination for security professionals around the world that want to have a unique conference experience.
We hope you enjoy the conference as much as we did planning it.
Physical • Paid • Part of Kernelcon
9th April 2026 | BSides Salt Lake City 2026
BSidesSLC — Community-Driven Cybersecurity Conference (April 9–10, 2026, Sandy, UT)
BSidesSLC is a community-focused cybersecurity event where students, practitioners, researchers, and industry experts come together to learn, share, and build connections. Designed “for the people, by the people,” the conference brings together curious minds and experienced professionals to strengthen Utah’s cybersecurity community and help attendees advance their skills and careers.
When & Where: April 9–10, 2026 Conference Center at Miller Campus, 9750 S 300 W, Sandy, Utah 84070
What to Expect: • Talks and presentations covering the latest research, real-world attacks, defense strategies, emerging threats, cloud security, AI security, hardware hacking, and more. • Hands-on workshops and trainings offering practical skill-building in areas such as cloud and cloud-native security, red/blue team tactics, forensics, secure DevSecOps, and embedded systems. • Community sessions and panels focused on leadership, GRC, threat detection, adversary emulation, career development, and human factors in security. • Capture-the-Flag competitions, hardware challenges, and hands-on contests—with prizes for participants. • Networking opportunities with security professionals, students, mentors, hiring managers, and local industry leaders.
Why Attend: BSidesSLC offers valuable technical content for beginners and experts alike, with a uniquely friendly and collaborative community vibe. Attendees gain access to practical workshops, career opportunities, hackable electronic badges, community engagement, and one-on-one networking with peers and mentors from Utah’s thriving cybersecurity ecosystem.
Why Speak or Train: The event welcomes submissions across all cybersecurity domains, including red teaming, blue teaming, cloud security, AI and security, offensive research, appsec, DevSecOps, embedded security, privacy, and more. Speaker opportunities include 25- or 50-minute talks, 2–4 hour workshops, panels, hands-on demos, and community sessions. Speakers must present in person and are encouraged to submit fresh, original material.
Why Sponsor: BSidesSLC is produced by the non-profit Utah Cybersecurity Society (501(c)(3)). Sponsorship provides direct access to a highly engaged audience of practitioners, students, and industry professionals while supporting the growth of the local cybersecurity community. Sponsor packages offer brand exposure, recruiting visibility, and opportunities to participate in a grassroots, mission-driven event.
Call to Action: • Speakers and trainers are invited to submit proposals before January 9, 2026. • Attendees can register starting January 12, 2026 for two days of hands-on learning and community engagement. • Sponsors can contact the organizers to explore sponsorship packages and participation options.
BSidesSLC is more than a conference—it’s a community. Whether you want to attend, speak, sponsor, or collaborate, we welcome you to join us in 2026.
Physical • Paid • Part of Utah Cybersecurity Society
9th April 2026 | Achieving MISRA C++:2023 Compliance with Sonar
Software compliance standards such as MISRA C++:2023 play an important role in improving code safety and reliability, particularly in critical systems. This webinar explores how modern tools integrate compliance into the development lifecycle, enabling developers to enforce standards directly within their coding workflows. The session focuses on how shifting compliance earlier in development helps reduce risk and improve code quality.
Attendees will learn how SonarQube supports MISRA compliance through integrated analysis, real time feedback, and reporting capabilities. The discussion also covers how embedding compliance into development processes streamlines audits and ensures consistency. The webinar provides insight into aligning development practices with safety and compliance requirements, with moderate relevance to broader security objectives.
Company_Webinar • Part of Sonar
9th April 2026 | GITEX AI ASIA 2026
GITEX AI ASIA 2026 is a major technology conference held in Singapore that brings together global leaders across artificial intelligence, cybersecurity, cloud infrastructure, and digital innovation. The event serves as a central meeting point for enterprises, startups, investors, and public sector organizations focused on building secure and scalable technology ecosystems. With a strong emphasis on AI driven transformation, the conference also addresses cybersecurity challenges tied to data protection, infrastructure resilience, and enterprise adoption.
The event is designed to deliver practical outcomes through high level discussions, industry led sessions, and collaboration between public and private sectors. Attendees gain insight into how emerging technologies are shaping secure digital environments across Asia and beyond. GITEX AI ASIA provides a valuable platform for cybersecurity professionals seeking to understand how AI, infrastructure, and innovation intersect in modern threat landscapes.
Physical • Paid • Part of Dubai World Trade Centre
9th April 2026 | India Cloud Summit & Awards 2026
India Cloud Summit & Awards 2026 is a technology-focused event centered on cloud computing and enterprise digital transformation. It brings together industry professionals, technology leaders, and business stakeholders to explore innovations in cloud infrastructure and application development.
The event features expert-led sessions, product demonstrations, and peer discussions aimed at advancing cloud adoption and operational efficiency. Attendees gain insights into modern cloud solutions and emerging trends that support scalable and resilient enterprise systems, with some overlap into areas such as cloud security and risk management.
Physical • Paid • Part of Entraine Business Services
9th April 2026 | DevOpsDays: Buenos Aires 2026
DevOpsDays Buenos Aires connects developers, infrastructure engineers, and security professionals who are interested in improving collaboration between development and operations teams. As part of the international DevOpsDays conference series, the event focuses on topics such as automation, continuous delivery, testing strategies, and security practices that support modern software development environments.
Participants take part in a combination of curated talks and open space sessions that encourage knowledge sharing and collaborative learning. These interactive discussions allow attendees to exchange real world experiences and explore better approaches to building resilient and scalable systems. DevOpsDays Buenos Aires helps strengthen the local technology community while supporting professionals who want to improve operational efficiency and integrate security more effectively into their development workflows.
Physical • Paid • Part of DevOpsDays
9th April 2026 | 2026 RSAC Conference Recap
Key insights from RSAC 2026 are distilled into a focused discussion on the trends shaping the cybersecurity landscape. Topics include AI trust and verification, software supply chain transparency, and the growing importance of managing risk in commercial software.
The conversation highlights what mattered most from the conference, cutting through the volume of announcements and sessions to focus on practical implications. It explores how organizations can respond to evolving threats, strengthen supply chain security, and prepare for what comes next in the industry. Attendees will gain a clearer view of emerging priorities and how to align their strategies with current and future security challenges.
Company_Webinar • Part of ReversingLabs
Onchain fraud has evolved into a large scale, organized threat, with criminal networks leveraging reusable infrastructure to execute scams and laundering activities across multiple blockchain environments. This webinar explores how traditional investigation first approaches fail to prevent losses in real time, leaving organizations exposed to rapidly moving financial crime. The session focuses on understanding how modern fraud operations function and why reactive detection methods are no longer sufficient.
Attendees will learn how to shift toward a prevention first strategy that enables earlier detection and intervention. The discussion covers key capabilities required for real time fraud prevention and how to evaluate current defenses against evolving threats. The webinar provides practical guidance for strengthening fraud risk management and improving resilience in digital asset environments.
Company_Webinar • Part of Hypernative
Managing data across multiple systems can create silos that limit visibility and efficiency. This webinar explores how organizations can unify data sources to improve accessibility and collaboration. The session focuses on tools that allow users to visualize complex data relationships, connect external databases using SQL, and build interactive environments for analysis.
Attendees will learn how unified data approaches can support better decision making and reduce operational inefficiencies. The discussion highlights how integrating data sources enables teams to work more effectively across environments. The webinar provides practical insight into building a connected data foundation for analytics and collaboration.
Company_Webinar • Part of New Relic
9th April 2026 | Oracle AI World Tour 2026: New York City
Oracle AI World Tour 2026 brings free one-day events to major cities worldwide. These gatherings let participants hear from Oracle leaders, technology partners, and local business professionals about the newest breakthroughs in AI-powered cloud applications, databases and infrastructure. Attendees will get a firsthand look at the latest Oracle AI capabilities, real world use cases and practical strategies for integrating AI into business operations across sectors.
The tour encourages networking with peers, sharing ideas with Oracle’s partner community and seeing how companies around the world apply AI for competitive advantage. For organizations focused on security and compliance, sessions on cloud infrastructure and identity-and-access management are especially relevant. The event offers a chance to learn how AI may accelerate transformation while keeping data and workloads secure and well governed.
Physical • Free • Part of Oracle
9th April 2026 | Securing Modern AI Applications with Wiz AI-APP: From Code to Runtime
AI driven application development is accelerating rapidly, creating new security challenges across code, infrastructure, and runtime environments. This webinar explores how modern AI applications introduce complex, interconnected risks that traditional security tools struggle to detect. The session focuses on addressing visibility gaps and managing risks across models, agents, and cloud systems.
Attendees will learn how to secure AI applications end to end, from development through runtime. The discussion covers building unified visibility across AI components, identifying real attack paths, and detecting threats such as prompt injection and unsafe agent behavior. The webinar provides practical guidance on operationalizing AI security, prioritizing risks, and automating remediation to protect modern AI environments.
Company_Webinar • Part of Wiz
9th April 2026 | ERTL-YANG Leader Summit 2026: Singapore
ERTL-YANG Leader Summit 2026 in Singapore emphasizes executive level approaches to cybersecurity and digital risk. The summit addresses how leadership decisions shape security strategy, innovation, and organizational trust.
Participants discuss governance, AI related risk, and incident preparedness within fast moving digital environments. The event offers leaders practical insights into building resilient security frameworks that support sustainable growth and regional operations.
Physical • Paid • Part of ERTL-YANG
9th April 2026 | CodeStock 2026
CodeStock 2026 is a community driven technology conference where developers, IT professionals, and security practitioners share practical knowledge from real world experience. While not exclusively focused on cybersecurity, the event includes sessions on application security, secure coding practices, identity protection, and managing risk in modern development environments. These discussions help teams understand security responsibilities during software delivery.
Attendees collaborate through peer led sessions that explore protecting applications, strengthening infrastructure, and reducing vulnerabilities across software lifecycles. Security minded developers and IT leaders exchange lessons learned from incidents, compliance challenges, and defensive design strategies that improve resilience across enterprise systems. Networking conversations also highlight the importance of integrating security into everyday engineering decisions.
Physical • Paid • Part of CodeStock Corporation
9th April 2026 | Ransomware in the AI Era: What's Real, What's Not
AI is reshaping the ransomware landscape, but not always in the ways many assume. Recent research highlights a gap between perceived risk and actual attacker capabilities, showing where AI is meaningfully improving attacks and where its impact remains limited.
A discussion grounded in threat intelligence explores how ransomware groups are using AI in areas such as phishing, deepfakes, and vulnerability exploitation, while remaining cautious in later stages of the attack chain. It also examines emerging signals from agentic AI and orchestration frameworks, along with the defensive priorities that matter most, including identity hardening, rapid patching, behavioral detection, and resilient recovery strategies.
Company_Webinar • Part of Halcyon
9th April 2026 | SCYTHE Unicon 2026
SCYTHE UniCon 2026 is a cybersecurity-focused virtual conference centered on proactive defense strategies and adversary emulation. It brings together industry experts to examine how modern attackers operate across enterprise environments, including IT, OT, and industrial control systems.
The event covers topics such as AI-driven threats, ransomware resilience, detection engineering, and continuous threat exposure management. Through expert-led sessions, attendees gain insights into validating security controls and improving organizational readiness against evolving attack techniques. The conference emphasizes practical approaches to strengthening security posture in increasingly complex threat landscapes.
Physical • Free • Part of SCYTHE
9th April 2026 | Beyond L4: Unlocking Layer 7 Traffic Management in Istio Ambient Mesh
Istio Ambient Mesh enables secure pod-to-pod communication using zero trust mTLS, but adding Layer 7 traffic management introduces new architectural considerations. Organizations need ways to apply advanced routing and observability without increasing operational complexity or reverting to sidecar models.
A technical walkthrough demonstrates how Layer 7 capabilities can be implemented using Waypoint Proxies while maintaining Layer 4 security through ztunnel. It covers deployment approaches, request-level load balancing, and header-based routing without modifying application pods. The session also highlights how combining L4 and L7 observability improves visibility across service traffic, helping teams manage performance and enforce security controls within Kubernetes environments more effectively.
Company_Webinar • Part of Tigera
9th April 2026 | Don't Leave Budget to Vibes: 4 Strategic Paths to Funding CPS Security
Cyber-physical systems are critical to industrial operations, yet security budgets often lag behind the risks they face. This webinar explores how organizations can align cybersecurity investments with business outcomes to secure funding more effectively. The session focuses on bridging the gap between security needs and financial justification by tying cyber risk to measurable operational and business impacts.
Attendees will learn strategic approaches to justify security investments, including leveraging safety risks, audit findings, cyber insurance requirements, and regulatory pressures. The discussion also highlights how improved asset visibility can uncover cost savings while strengthening security posture. The webinar provides practical guidance on aligning cybersecurity strategy with financial decision making to support resilient CPS environments.
Company_Webinar • Part of Claroty
9th April 2026 | Announcing Zip + IXOPAY: Building a Unified Trust Layer for Agentic Commerce
The rise of agentic commerce is reshaping digital payments as AI agents begin to act autonomously within transaction flows. This shift introduces new challenges around verifying identity and intent, exposing gaps in traditional fraud detection and security models that were designed for human participants.
The discussion focuses on a unified trust layer framework aimed at making identity and transaction intent machine-verifiable in this evolving ecosystem. It examines the limitations of existing controls and the need for programmable infrastructure to support secure, scalable interactions. Attendees will gain insight into emerging risks in AI-driven commerce and how collaborative approaches can help establish stronger trust and governance models.
Company_Webinar • Part of IXOPAY
9th April 2026 | What is Zero Trust Application Access and Why Should You Care?
Zero Trust has become essential for protecting applications, APIs, and data in modern environments. A focus on Zero Trust Application Access highlights how identity- and context-aware controls can reduce risk while enabling secure access across distributed systems.
The content explains the principles behind Zero Trust Architecture and how they apply to application access. It outlines strategies for enforcing consistent policies, simplifying secure access, and aligning existing security frameworks with Zero Trust models. Attendees will gain practical insight into strengthening application security through adaptive access controls and better visibility, helping organizations protect resources regardless of where users or applications are located.
Company_Webinar • Part of F5 Networks
9th April 2026 | How AI is transforming phishing and what IT leaders must do next in EMEA
AI is reshaping phishing by enabling highly convincing and context-aware email attacks that are harder to detect during everyday workflows. These messages mimic legitimate communication, bypass traditional email defenses, and scale rapidly, creating new challenges for security teams managing human-centered threats.
The session explores how AI-driven phishing campaigns operate, why legacy protections are no longer sufficient, and how organizations can adapt their defenses. It highlights changes in the email threat landscape and outlines practical approaches to help users make better decisions in real time. Attendees will gain insight into strengthening detection and response strategies against increasingly sophisticated, AI-enabled attacks.
Company_Webinar • Part of Kaseya
9th April 2026 | Agentic AI for Threat Hunting: How to Safely Apply AI to Hunt Faster and Smarter
Threat hunting remains one of the most effective ways to proactively identify attacker activity, yet it is often deprioritized due to the demands of reactive security operations. AI is emerging as a way to scale and accelerate hunting efforts while maintaining accuracy and trust.
The content explores how AI can support the creation of hunt packages, execute investigations across security tools, and analyze results by linking events and identifying attack chains. It also addresses the risks associated with using AI in threat hunting and outlines guardrails that security leaders should implement. Attendees will gain a practical framework for applying AI to threat hunting in a controlled and effective way.
Company_Webinar • Part of ReliaQuest
9th April 2026 | Agentic Architecture: How AI Is Changing Application Architecture and API Design
As AI agents move into production, traditional application architecture and API design are being redefined to support machine driven interactions. This webinar explores how agentic systems introduce new architectural considerations, particularly as organizations scale AI use cases beyond initial proofs of concept. The session focuses on how APIs and application design must evolve to accommodate autonomous agents rather than human users.
Attendees will learn about emerging trends in agentic architecture and how to design systems that support scalable AI driven operations. The discussion also highlights the implications of these changes on system design and governance. The webinar provides insight into adapting application architecture for AI, with moderate relevance to security considerations as systems become more autonomous and complex.
Company_Webinar • Part of Gravitee.io
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.