AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
10th February 2026 | EspañaSec Cyber Summit 2026
EspañaSec Cyber Summit 2026 returns to Madrid with a strong focus on digital resilience and the future of Spain’s cybersecurity ecosystem. The summit connects senior security professionals, policy leaders, and innovators who are shaping Spain’s ‘España Digital 2026’ strategy. This year’s theme, “Forging the Future: Building Digital Resilience and Capability in Spain,” reflects how the country’s cybersecurity community is aligning technology, policy, and talent to meet new challenges.
Across two days, the agenda features deep discussions on regulatory change, operational resilience, and the role of leadership in modern security strategy. Sessions explore AI’s growing influence on defense, compliance with NIS2 and DORA, and how CISOs are redefining governance models to adapt to a shifting threat landscape. EspañaSec offers a practical environment where strategic planning meets peer insight, positioning it as one of Spain’s most important cybersecurity gatherings of the year.
Physical • Paid • Part of Information Security Media Group (ISMG)
10th February 2026 | Wild West Hackin' Fest @ Mile High
Hands-on labs, workshops, speakers, pre-con training, and lots of fun and entertainment in between! Red team, blue team, and purple teams welcome. Connect with the community, learn something new, and leave excited to try new things!
Hybrid (Both) • Paid • Part of Wild West Hackin' Fest
10th February 2026 | Live AWS Privilege Escalation Attacks and the Controls That Actually Stop Them
Real AWS privilege escalation attacks are demonstrated live in this webinar, showing how common cloud environments remain vulnerable even without zero day exploits or unusual misconfigurations. Independent security researchers execute multiple real world attack paths, including IAM escalation chains, service based lateral movement across AWS services and AI driven abuse of Bedrock and AgentCore. The session makes it clear why these attacks continue to succeed in typical AWS setups.
The discussion then shifts to what actually works. Attendees see the same attacks fail once effective preventative controls are applied, highlighting practical defenses rather than theory. This webinar is designed for cloud security, IAM, and platform teams who need clear visibility into real attack behavior and proven controls that reduce risk in AWS environments.
Company_Webinar • Part of Sonrai Security
10th February 2026 | ERTL-YANG Leader Summit 2026: Lisbon
ERTL-YANG Leader Summit 2026 in Lisbon emphasizes the role of leadership in navigating cybersecurity risk and digital trust. The summit is tailored for executives responsible for steering organizations through complex security, compliance, and technology landscapes.
Key discussions explore cybersecurity governance, emerging threats, and strategic responses to digital disruption. By engaging with peers from diverse industries, attendees gain practical insight into building resilient security strategies that support sustainable growth and protect critical assets.
Physical • Paid • Part of ERTL-YANG
10th February 2026 | AvePoint Innovates Channel Edition: Discover What's Next
Partners supporting multicloud and hybrid environments need stronger security, clearer governance, and better cost control without increasing operational complexity. This webinar focuses on how AvePoint is expanding its platform to help partners deliver secure, compliant, and scalable services while protecting margins and strengthening customer trust.
The session highlights new capabilities around cyber resiliency, including broader multi cloud protection, faster recovery, and centralized control for SaaS, IaaS, and PaaS data. It also covers simplified compliance through consistent governance baselines, automated alerts, and improved audit readiness, along with cloud optimization features that provide visibility into costs, licenses, and performance. The discussion is designed for partners looking to streamline operations, differentiate their services, and support long term growth.
Company_Webinar • Part of AvePoint
10th February 2026 | Scale Security Operations with AI: Introducing Proofpoint Satori™
Security operations teams are facing growing alert volumes while analyst time stays limited, making automation essential. This webinar focuses on how Proofpoint Satori introduces AI agents into existing security stacks to help teams work faster and more efficiently. The session explains how AI can reduce false positives, automate repetitive workflows and speed up threat response without disrupting current operations.
The discussion highlights how Proofpoint Satori agents support day to day security tasks, including faster handling of abuse mailbox submissions and more efficient DLP investigations. Attendees will also gain insight into how AI driven automation can act as a force multiplier for security teams and help scale operations as threats continue to grow. A live Q and A will wrap up the session.
Company_Webinar • Part of Proofpoint
10th February 2026 | Cybersecurity Fundamentals training and certification
The Cybersecurity Fundamentals training and certification event offers a comprehensive introduction to key cybersecurity concepts. Participants gain valuable insights into risk management, network security, and threat detection. The course is well-structured, with engaging instructors who provide practical examples and hands-on exercises. Attendees appreciate the balance between theory and application, making it suitable for beginners and those seeking to refresh their knowledge. Overall, it is a highly recommended foundational program.
Physical • Paid • Part of IMF Academy
10th February 2026 | CTRL+RUN: OFFENSAI <> CISO Dinner Portland
From Cloud to Crowd, to another location here we go — Meet OFFENSAI, the autonomous and continuous adversarial exposure validation solution redefining how security teams test and harden their cloud environments.
Join Karen Nguyen, CEO at OFFENSAI, and Ray Espinoza, VP of Information Security at Elite Technology, to discuss practical approaches to reducing alert fatigue and prioritizing what’s truly exploitable. See firsthand how AI-driven validation builds actionable kill chains that strengthen real-world cloud security.
Physical • Free • Part of OFFENSAI
10th February 2026 | Cyber Security for Critical Assets (CS4CA) ANZ 2026
CS4CA ANZ 2026 returns to Perth with a sharp focus on the growing urgency of securing operational technology across critical sectors. The summit connects cybersecurity and OT professionals from Australia and New Zealand’s key industries: energy, mining, utilities, maritime, and healthcare to exchange strategies that strengthen cyber resilience. With the theme “Managed Defence for OT: Putting into Practice a Cyber-Resilient Future,” the event goes beyond theory by emphasizing actionable practices that safeguard connected systems.
Attendees can expect a practical environment built around collaboration and insight sharing. Industry leaders and experts will explore how managed defense models are being applied to protect real-world infrastructure from persistent threats. The conversations aim to help organizations strengthen their response readiness, integrate resilience into operations, and stay aligned with evolving regulatory and technical standards across the ANZ region.
Physical • Paid • Part of Information Security Media Group (ISMG)
10th February 2026 | Love, Qubits, and Algorithms: A Valentine’s Guide to Quantum Security
Quantum computing and its impact on modern encryption take center stage in this webinar focused on emerging security risks and practical preparation. The discussion looks at how the threat of harvest now, decrypt later is already influencing attacker behavior and why existing RSA and ECC based protections will not be sufficient in a post quantum world. Speakers break down the real security implications without diving into heavy theory.
The session explains what post quantum cryptography is, why crypto agility matters, and how organizations can begin preparing today. Attendees will hear clear guidance on assessing current encryption exposure, understanding vendor readiness, and taking realistic first steps toward quantum resistant security. Designed for SMB leaders, this webinar delivers a practical roadmap for protecting sensitive data against next generation threats.
Company_Webinar • Part of Kobalt
10th February 2026 | The VPN Trap: Why Remote Access Is Failing You
Remote access security is breaking down as traditional VPNs become a common entry point for attackers. This webinar examines why SSL VPNs are increasingly exploited and how they enable credential theft, lateral movement, and data exposure in modern networks.
WatchGuard experts explain how a zero trust access model removes these risks while improving performance and simplicity for hybrid environments. Attendees will gain insight into the true cost of maintaining VPNs and learn how MSPs are replacing them with faster, safer zero trust access services that better protect users and infrastructure.
Company_Webinar • Part of WatchGuard
10th February 2026 | Live AWS Privilege Escalation Attacks and the Controls That Actually Stop Them
Independent security researchers demonstrate how AWS privilege escalation attacks still succeed in standard cloud environments and why most organizations remain exposed. This webinar shows real attack paths executed live, including IAM escalation chains, service based lateral movement, and emerging AI driven techniques using Bedrock and AgentCore.
The session then shifts from offense to defense by showing which controls actually stop these attacks when enforced correctly. Attendees will see the same escalation attempts fail in real time once preventative measures are applied, offering clear insight into what works in practice and what does not when securing AWS environments.
Company_Webinar • Part of Sonrai Security
10th February 2026 | Key Insights from the 2025 GigaOm Radar for Container Networking
Insights from the 2025 GigaOm Radar reveal how container networking and security are evolving in modern Kubernetes environments. This webinar breaks down why Calico was recognized as a leader and what the report’s findings mean for organizations running hybrid and multi cloud infrastructure.
The session covers how unified networking, network security, and observability reduce operational complexity and strengthen security posture. Attendees will also hear about emerging trends in container networking and learn how consistent controls across environments help teams lower risk, simplify operations, and support faster innovation.
Company_Webinar • Part of Tigera
10th February 2026 | From Siloed to Unified: Identity Security in the AI-Driven Threat Era
This session focuses on how identity security must evolve as human, machine and AI identities expand and attackers increasingly use AI to amplify identity based attacks. The discussion explains why traditional IAM, PAM and IGA tools operating in isolation can no longer keep pace with the scale and speed of modern threats, and why many organizations are reaching a breaking point in their current approach.
The webinar looks at how a unified identity security platform improves visibility across environments, speeds up breach response through shared intelligence and enables more proactive threat detection using AI. It also covers how consistent privilege controls across all identity types help reduce risk and support CISO and SOC priorities. The goal is to show how moving away from fragmented tools creates stronger trust, control and resilience in an AI driven threat landscape.
Company_Webinar • Part of CyberArk
10th February 2026 | SASIG Events: Cybersecurity Awareness SASIG - Human Risk Management Forum 2026
This SASIG forum focuses on the human side of cybersecurity and how organizations can build security-aware cultures that last. The session examines why user behavior continues to be one of the biggest challenges in security and how awareness programs can move beyond basic training to create meaningful engagement. Attendees will gain insight into how leading organizations approach human risk management in practical and measurable ways.
Speakers will share real-world examples of awareness campaigns, behavior change strategies, and methods for sustaining engagement over time. The discussion also explores how different audiences require different approaches and how success can be measured beyond surface-level metrics. This event is designed for security leaders and practitioners looking to strengthen resilience by influencing behavior and embedding security into everyday organizational practices.
Physical • Free • Part of SASIG Events
10th February 2026 | GitLab Transcend 2026
This webinar focuses on how modern engineering teams can reduce friction across DevOps, security, and AI as software development accelerates. GitLab leaders and technology executives discuss how disconnected tools and manual workflows create security gaps, and how unified platforms help teams modernize without slowing delivery. The session highlights real perspectives from large enterprises on where software development is headed next.
The discussion also features live demonstrations of agentic AI use cases that automate tasks across the software lifecycle, along with an early look at GitLab’s upcoming product roadmap. Attendees will gain insight into practical modernization strategies, peer experiences, and how tighter integration across development and security workflows can improve efficiency, reduce risk, and support scalable innovation.
Company_Webinar • Part of GitLab
10th February 2026 | The Quantum Countdown: Why Your Current Encryption is Already Under Threat
Quantum computing is turning encrypted data into a time sensitive liability as attackers collect information today with plans to decrypt it once current encryption standards fail. This webinar focuses on the real world risk behind Harvest Now, Decrypt Later tactics and why RSA and ECC are approaching the end of their effective lifespan for protecting sensitive data.
The session centers on how organizations, especially SMBs, can begin transitioning to post quantum cryptography without disrupting operations. Speakers discuss building crypto agility, reducing reliance on hard coded algorithms, and preparing systems to adapt as standards change. Attendees will also receive a practical readiness roadmap for 2026, including guidance on auditing cryptographic assets and evaluating vendor preparedness for the post quantum era.
Company_Webinar • Part of Kobalt
10th February 2026 | TRU Intelligence Briefing: February 2026
A focused threat intelligence briefing covering the latest attacker activity, critical vulnerabilities, and emerging risks shaping the global cybersecurity landscape. This webinar presents research-driven insights from eSentire’s Threat Response Unit, highlighting how threat actors are weaponizing AI and large language models, abusing authentication and single sign-on flaws, and exploiting newly disclosed vulnerabilities across major enterprise platforms.
The session also examines recent malware activity and provides an update on cyber threats influenced by ongoing geopolitical tensions. Designed to keep security teams informed and prepared, the briefing delivers timely analysis and practical context to help organizations better understand current attack methods and strengthen their defensive posture.
Company_Webinar • Part of eSentire
10th February 2026 | Corinium: OT Security Sydney 2026
OT Security Sydney 2026 brings together a powerful mix of cybersecurity professionals, operational technology leaders, and decision-makers focused on securing critical infrastructure. The event is designed to bridge the gap between IT and OT security, highlighting how resilience can be built across legacy systems and modern digital frameworks. Attendees can expect to gain actionable insights from industry pioneers on how to integrate security protocols seamlessly into industrial operations while improving asset visibility and compliance.
This conference serves as a vital forum for those responsible for safeguarding energy, transport, utilities, and manufacturing systems. With its 2026 edition hosted alongside CISO Sydney at the Royal Randwick Racecourse, the event offers an expanded platform for learning and collaboration. Participants will leave equipped with the strategies and partnerships needed to strengthen their organizations against evolving cyber threats while driving innovation within their operational environments.
Physical • Paid • Part of Corinium Global Intelligence
11th February 2026 | Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
AI driven phishing and deepfake impersonation are reshaping how social engineering attacks succeed in modern organizations. This webinar focuses on how advanced phishing emails, fake voice calls, video impersonations and collaboration platform attacks are bypassing traditional defenses, even on trusted channels like corporate messaging tools and protected domains.
The session examines modern phishing forensics techniques used to identify AI generated deception, understand the real limits of email protections like DMARC and analyze attacks across email, voice, messaging platforms and social media. Attendees will gain practical insight into spotting subtle indicators of machine crafted attacks, improving investigation skills and strengthening user awareness to reduce the risk of compromise in an evolving threat landscape.
Company_Webinar • Part of KnowBe4
11th February 2026 | Rethinking Patient Zero Security: Cyber Defense Strategies for the AI Era
This webinar focuses on why traditional patient zero detection no longer works in an AI driven threat landscape and what security teams must do instead. The discussion explains how attackers now use automation and AI to rapidly change techniques, making incident based defenses ineffective almost immediately. As a result, organizations can no longer rely on learning from the first victim and must assume they are a primary target from the start.
The session takes a technical look at how AI enabled adversaries launch large scale, polymorphic attacks and why proactive, behavior based defense models are becoming essential. Attendees will gain insight into modern research, defensive frameworks and strategies designed to improve resilience against fast evolving threats. The content is aimed at security teams looking to adapt their cyber defense approach for the AI era.
Company_Webinar • Part of Infoblox
11th February 2026 | Intelligence Blindness: You Bought the Feeds, But You Can’t See the Threats
Many organizations rely on threat intelligence feeds but still struggle to identify and respond to real threats. This webinar examines why threat intelligence programs often fail despite significant investment and explains what is missing when intelligence is treated as a tool rather than a capability.
The discussion focuses on common mistakes in how threat intelligence is built and used, including over reliance on technology and misaligned processes. Group IB shares practical insight into why intelligence efforts fall short and how organizations can develop intelligence that supports clearer understanding, better decision making, and more effective threat response.
Company_Webinar • Part of Group-IB
This masterclass focuses on how a Zero Trust architecture can reduce security costs while simplifying operations across users, branches, and cloud environments. Using Zscaler’s own internal Zero Trust journey, the session shows how moving to a cloud native approach helped eliminate unnecessary tools, streamline workflows, and improve overall security posture without adding complexity.
The discussion highlights practical strategies for applying Zero Trust in real environments, including ways to improve efficiency, strengthen protection, and scale securely as organizations grow. Attendees will gain clear insight into how Zero Trust can improve agility, reduce operational overhead, and deliver stronger returns by aligning security investments with business priorities.
Company_Webinar • Part of Zscaler
11th February 2026 | Wild West Hackin’ Fest @ Mile High 2026
Wild West Hackin’ Fest @ Mile High 2026 is a hands on cybersecurity event designed for professionals who want practical skills they can use immediately. The conference blends technical talks, real world attack and defense scenarios, and immersive training sessions led by experienced practitioners. Attendees can expect deep dives into offensive security, defensive strategies, threat detection, and emerging risks that impact modern organizations. The event supports both in person and virtual participation, making it accessible to a broad cybersecurity audience.
In addition to the main conference, pre conference training through Antisyphon offers focused courses for beginners and seasoned professionals alike. These sessions emphasize skill building, problem solving, and applied learning rather than theory alone. The event is known for its strong community atmosphere, encouraging collaboration, networking, and shared learning among security professionals across industries and experience levels.
Physical • Paid • Part of Wild West Hackin' Fest
11th February 2026 | Architecting Agentic Payments: The Two Pillars of Payment Success
AI driven payments are reshaping how merchants manage risk, trust, and control across the payment stack. This webinar focuses on architecting agentic payments safely, with a clear look at how increasing agent autonomy changes validation, liability, and resiliency. The discussion centers on the realities merchants face as agent driven transactions become more common and why reliability and security must be designed in from the start.
The session dives into two core pillars of success in the agentic payments era: AI payments intelligence and universal tokens. Speakers explain how better visibility into payment data supports safer automation, stronger compliance, and more confident decision making. Attendees will gain a practical framework for building payment architectures that remain adaptable and controlled while reducing operational and fraud risk as agent based commerce scales.
Company_Webinar • Part of IXOPAY
11th February 2026 | Navigating AI Risk
Explore how organizations can approach AI risk in a structured and practical way while balancing innovation, governance, and investment decisions. This webinar looks at how AI risk fits within existing data and software risk frameworks and helps clarify what is genuinely new versus what builds on long established security and governance practices.
Taking a Nordic perspective, the discussion draws on real experience from regulated industries and private enterprises to show how AI and data related risks are being evaluated today. Attendees will gain practical frameworks and best practices for governing AI initiatives, aligning investments with business value, and moving forward with confidence while maintaining strong oversight and responsible risk management.
Company_Webinar • Part of ServiceNow
11th February 2026 | Inside the 2026 Software Supply Chain Security Report
Software supply chains have become one of the most targeted attack surfaces, forcing security leaders to rethink how risk is managed going into 2026. This webinar centers on findings from RL’s 2026 Software Supply Chain Security Report and examines how attackers exploited trust, automation, and scale across open source, commercial software, and AI ecosystems.
The roundtable discussion reviews the most significant compromises of the past year, new techniques adopted by threat actors, and the risk areas CISOs should prioritize next. Report authors and product leaders will walk through real world observations from the research and answer audience questions live, offering clear insight into how the software supply chain threat landscape is evolving.
Company_Webinar • Part of ReversingLabs
11th February 2026 | Modernizing VMware & Storage Encryption for Zero Trust
Federal agencies running mission workloads on VMware and enterprise storage face growing pressure to modernize encryption while meeting Zero Trust and federal compliance requirements. This webinar focuses on how organizations can upgrade VMware and storage encryption to align with current mandates while avoiding the scalability limits of legacy hardware HSMs.
The session explains how Fortanix Data Security Manager delivers software based, HSM level protection using confidential computing, enabling runtime encryption and centralized key management across hybrid environments. Attendees will see how to secure data at rest, in motion, and in use, support enclave segmentation, and gain unified visibility across VMware, databases, and storage systems as part of a broader Zero Trust strategy.
Company_Webinar • Part of Fortanix
11th February 2026 | The Next Big Breach: What Threat Intelligence Is Telling Us About 2026
Threat intelligence is revealing clear signals about where major breaches are headed in 2026 and how attackers are preparing long before incidents make headlines. This webinar examines real threat actor activity and dark web intelligence to show how behavior, tooling, and targeting patterns point to the next wave of high impact attacks. The session focuses on intelligence that appears weeks or months before traditional alerts surface.
The discussion highlights early warning indicators that many SOCs overlook and explains how intelligence led teams turn raw data into timely action. Using real operational examples, the webinar shows how threat intelligence can be embedded into day to day security operations to anticipate attacks and reduce response time.
Company_Webinar • Part of CYJAX
11th February 2026 | Government Innovation Showcase: Georgia 2026
The Government Innovation Showcase Georgia brings together leaders from across the state to share ideas and explore practical solutions that enhance public services. This event focuses on how agencies can use technology and collaboration to build a stronger, more connected government. Attendees will hear about current modernization efforts, data use, and digital transformation strategies shaping the state’s public sector. The setting encourages open discussion on what works, what challenges remain, and where to focus next.
This program also gives professionals from different departments and regions the chance to learn from each other. Sessions look at how innovation can strengthen operations, improve service delivery, and make public administration more efficient. It’s a day built for exchanging ideas, forming partnerships, and understanding the real impact of technology in government.
Physical • Paid • Part of Public Sector Network (Certified B Corp)
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.