AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
27th March 2026 | Wicked 6 Cyber Games 2026
Wicked 6 Cyber Games 2026 is a global virtual cyber competition and learning experience designed to support and elevate women in cybersecurity and technology. The event blends competitive cyber games with mentorship, career exploration, and community engagement, creating an environment that encourages both skill building and confidence. Participants join from dozens of countries to collaborate, learn, and compete in structured attack and defense scenarios that reflect real world cybersecurity challenges.
The program includes team based competitions, practice sessions, and live championship gameplay, alongside talks from experienced women leaders in technology and security. Attendees gain exposure to different cybersecurity career paths while testing their skills in a supportive and inclusive setting. Wicked 6 is especially relevant for professionals and students seeking hands on cyber experience, global networking, and meaningful participation in a women focused cybersecurity community.
Online • Paid • Part of KATZCY
The International Conference on Generative Artificial Intelligence and Information Security brings together experts who study how modern AI technologies intersect with security, privacy, and ethical risk. The 2026 edition aims to explore how generative systems are changing the way organizations develop models, manage data, and interpret creative computational outputs. Attendees can expect meaningful conversations on how advances in big data and processing power are pushing this field forward, along with thoughtful discussions on the responsibilities that come with wider adoption.
Participants will examine the evolving challenges surrounding data privacy, copyright implications, and information protection in a rapidly shifting technological environment. The conference encourages scholars and engineers to share new findings, compare methodologies, and build future collaborations. Its focus on both generative AI and information security provides a balanced perspective for professionals who want to understand how these technologies can be applied safely and responsibly across research and industry.
Physical • Paid • Part of Wuhan University of Science and Technology
27th March 2026 | 6th Edition of Global VR Research Awards
Award Information - Global VR Research Awards
Welcome to the Global VR Research Awards, a premier event in the realm of VR Research Awards. Here's what you need to know about this exciting Award :
Theme: The theme for Global VR Research Awards "To celebrate researcher achievements and motivate them to continue
Online • Free • Part of VR Research
27th March 2026 | Exito: Cyber Security Summit Philippines 2026
Cyber Security Summit Philippines 2026 gathers senior cybersecurity professionals to address the unique challenges shaping the country’s digital ecosystem. Designed for leaders across government and private sectors, the summit focuses on securing critical industries such as finance, healthcare, technology, and infrastructure. It provides a forum for discussing regional threats, regulatory considerations, and organizational resilience.
Attendees benefit from expert led sessions and panel discussions that explore data protection, threat intelligence, and cybersecurity leadership. The event emphasizes practical strategies tailored to the Philippine context, supporting organizations as they strengthen defenses and advance digital initiatives. With a strong community of senior decision makers, the summit offers valuable opportunities for learning, collaboration, and engagement within the national cybersecurity landscape.
Physical • Paid • Part of Exito Media Concepts Pvt Ltd
27th March 2026 | HackconRD 2026
HackconRD 2026 is a leading cybersecurity conference in the Dominican Republic that brings together security professionals, ethical hackers, researchers, and technology leaders from across the region. The event is designed to strengthen technical knowledge while fostering collaboration within the local and international cybersecurity community. Through expert-led talks and hands-on sessions, attendees gain practical insight into current threats, defensive strategies, and emerging security technologies shaping today’s digital environments.
The conference program focuses on real-world cybersecurity challenges, including threat detection, incident response, ethical hacking, and the impact of new technologies such as artificial intelligence on security operations. HackconRD places strong emphasis on knowledge sharing and skill development, making it valuable for both experienced practitioners and those looking to deepen their understanding of cybersecurity. The in-person format encourages meaningful networking and direct engagement with speakers, sponsors, and peers throughout the event.
Physical • Paid • Part of RedTeamRD
27th March 2026 | Beyond Tools - SMB Security that Works
Small and midsize businesses often struggle to manage growing security complexity while still facing breaches caused by simple errors and compromised credentials. This webinar explores a practical approach to SMB security, focusing on how existing tools and controls can work together more effectively. The session highlights common gaps in protection and explains how organizations can improve their security posture without requiring enterprise level resources.
Attendees will learn how a Zero Trust Network Access approach can unify identity, email, and endpoint security into a more cohesive architecture. The discussion also covers how to reduce the impact of human error and simplify secure access for users. The webinar provides actionable insight into building stronger, more efficient security strategies tailored to SMB environments.
Company_Webinar • Part of SonicWall
27th March 2026 | Cyber Security Summit Philippines 2026
Attend the Cyber Security Summit Philippines 2026, a leading cyber security conference for professionals to learn, network, and secure businesses.
Online • Free • Part of Exito Media Concepts
28th March 2026 | CyberForge 2026
CyberForge 2026 is a two day cybersecurity conference designed to combine learning, competition, and direct engagement with industry professionals. Hosted in Coastal Virginia, the event brings together students, early career practitioners, and anyone interested in cybersecurity for an immersive experience focused on real world skills. The conference creates an accessible environment where attendees can learn directly from professionals while building practical knowledge.
A central feature of CyberForge is its capture the flag competition, which allows participants to apply what they learn in a hands on and competitive setting. Alongside the CTF, the event includes talks and sessions led by cybersecurity professionals who share insights on current threats, defensive strategies, and career development. By blending education with active participation, CyberForge helps attendees strengthen both technical skills and confidence in cybersecurity concepts.
Physical • Paid • Part of Coastal Virginia Cybersecurity Student Association and Tidewater Community College's Cybersecurity Club
28th March 2026 | BSides Charlotte 2026
BSides Charlotte 2026 is a community driven cybersecurity conference that brings together security practitioners, researchers, and enthusiasts in Charlotte, North Carolina. This event is part of the global Security BSides series, known for its locally organized sessions where attendees and volunteers share real world security experiences, tools, and research. Focused on both offensive and defensive topics, BSides Charlotte encourages active participation through talks, workshops, and village style activities that highlight collaboration and peer learning across diverse information security disciplines.
The conference takes place over one or two days at Discovery Place Science and is designed for professionals at all levels seeking practical insights and new connections in the cybersecurity community. Attendees gain exposure to emerging trends, hands on learning, and networking opportunities with regional experts, volunteers, and sponsors. With modest registration fees and a grassroots ethos, the event supports knowledge sharing and community growth in the Carolinas and beyond.
Physical • Paid • Part of BSides
28th March 2026 | BSides Charlotte 2026
At BSides Charlotte 2026, we’re bridging the gap between the cybersecurity challenges of our physical world and the visionary digital realm.
Conference Theme: Enter the Grid
Join us on March 28th, 2026, as we explore modern cybersecurity through the lens of The Grid, examining how yesterday’s science fiction has become today’s security reality.
Hybrid (Both) • Paid • Part of BSides Charlotte
Boost your cybersecurity skills at SANS 2026! Immerse yourself in a week of immersive, distraction-fee, industry-leading training tailored to elevate your capabilities, whether you’re new to the field or looking to deepen your advanced expertise. Benefit from direct mentorship by top experts in the field through practical labs and real-world strategies, experiencing insights that only in-person engagement can provide.
Interact with esteemed SANS faculty and fellows, and access exclusive sessions available only to onsite attendees. Connect with a vibrant community of like-minded professionals, engage in enriching networking events and benefit from community-building efforts that are structured to enhance your professional network and forge impactful, enduring relationships.
Hybrid (Both) • Paid • Part of SANS Institute
29th March 2026 | Quartz Network: CIO Leadership Summit | Spring 2026
Quartz Network CIO Leadership Summit Spring 2026 is an invitation-only leadership event for senior IT executives focused on strategic technology, innovation, and executive leadership. Held in Phoenix Arizona, the summit brings together senior CIOs and technology leaders to discuss emerging trends, strategic challenges, digital transformation, and organizational leadership.
The event connects experienced leaders with peers and solutions providers in an exclusive setting designed to accelerate executive insight and business outcomes. Sessions are crafted around executive level discussions, networking, and curated one-on-one meetings to match leaders with relevant insights and technology partners. This summit offers a focused environment for executives responsible for IT strategy and technology leadership.
Physical • Paid • Part of Quartz Network
30th March 2026 | Phishing Trends and Outlook for 2026
Phishing attacks continue to evolve rapidly, with AI playing an increasing role in their scale and sophistication. This webinar explores key trends shaping the phishing landscape in 2026, based on large scale analysis of real and simulated threat data. The session focuses on how attackers are adapting techniques to bypass traditional defenses and target users more effectively.
Attendees will gain insight into the rise of AI generated phishing campaigns and how their prevalence has surged in recent months. The discussion highlights how these attacks evade detection and what this means for organizations managing human risk. The webinar provides practical perspective on emerging phishing threats and how security teams can adapt to defend against increasingly advanced social engineering tactics.
Company_Webinar • Part of Hoxhunt
30th March 2026 | IAPP Global Summit 2026
The IAPP Global Summit 2026 gathers privacy, AI governance and cybersecurity law professionals from around the world for a detailed exploration of digital responsibility and regulation. The conference combines strategic vision, operational insight and global networking by delivering more than 70 breakout sessions, expert panels and a keynote lineup featuring high-profile speakers and thought leaders.
Attendees can expect deep dives into key issues like data privacy, vendor risk and AI governance, while engaging in robust discussions on evolving privacy and security trends. The Summit offers a rare opportunity to connect with regulators, industry leaders and peers to share knowledge, shape best practices and navigate the complex intersection of technology, policy and law in a rapidly changing global environment.
Physical • Paid • Part of IAPP - International Association of Privacy Professionals
30th March 2026 | Staged Attacks in 2026: What DNS Threat Intelligence Reveals Early
Cyberattacks are increasingly premeditated, with adversaries building and staging infrastructure well before launching campaigns. This webinar explores how DNS activity reveals early indicators of attack preparation, including newly registered domains, domain generation algorithms, and staged malware activation. The session focuses on how attackers use the DNS layer to prepare and execute phishing and malware campaigns while evading traditional detection methods.
Attendees will learn how DNS threat intelligence can uncover early signals of staged attacks and enable proactive defense. The discussion also covers how AI driven analysis helps detect patterns at scale and disrupt attacks before they are activated. The webinar provides practical insight into leveraging DNS visibility to identify and respond to threats earlier in the attack lifecycle.
Company_Webinar • Part of EfficientIP
30th March 2026 | Pathlock Innovation Days
Identity and access management and governance, risk, and compliance practices are evolving rapidly as organizations face new regulatory requirements and security challenges. This event brings together industry experts, partners, and practitioners to explore current trends, practical implementations, and emerging approaches in IAM and GRC. The session focuses on how organizations can modernize identity governance while maintaining compliance and operational continuity.
Attendees will gain insight from customer case studies, partner presentations, and expert discussions on topics such as cross ERP identity governance, managed services, and compliance strategies. The event also highlights best practices for building scalable, audit ready identity programs. Participants will learn how to align identity governance with business needs while improving security, efficiency, and regulatory compliance.
Company_Webinar • Part of Pathlock
INSIDER THREAT INVESTIGATIONS & ANALYSIS TRAINING COURSE W/ LEGAL GUIDANCE FROM ATTORNEY Insider Threat Investigator / Analyst Certificate - Credential Provided By: Insider Threat Defense Group (ITDG)
DATES / TIMES March 30-31, 2025 / 8:30am to 5pm
LOCATION (Classroom Or Virtual) University Of Maryland, College Park
Virtual Attendance Option This course is also offered virtually, providing the same expert instruction and training materials as the classroom experience. Course materials will be available for download ahead of time, ensuring you’re fully prepared. The training will be delivered live via Go To Meeting, allowing for real-time interaction, questions, and engagement.
COST / REGISTRATION ($1,595 - Discounts For 2+ Students) The link to register is a Bank of America merchant services vendor: https://stats.slimcd.com/soft/multisession.asp?sessionid=DB0FED86553BBB2B0CFA6AE7389136CD3FE8A1D9
OVERVIEW This highly sought after 2 day training course is designed for anyone managing or supporting an Insider Risk Management Program (IRMP): Insider Threat Investigator- Analyst, FSO, CSO, CISO, Human Resources, CIO – IT, Network Security, Counterintelligence Investigators, Governance, Risk & Compliance Professionals, Mental Health / Behavioral Science Professionals, Legal Etc.
This very comprehensive training will provide students with the critical thinking skills and in-depth knowledge that is needed for conducting investigations from A to Z, and for collecting and analyzing various employee data sources to generate accurate employee risk and threat profiles using proven analytic principles and methodologies.
Employee investigations require a structured and repeatable approach that is legally sound and hold can hold up to legal scrutiny in court. This training will provide expert legal guidance on reporting, case management, privacy considerations, interviewing, documentation, collection and use of employee data sources, evidence, chain of custody and more.
Instructor #2 for this training is Mr. Shawn Thompson, Esq., who is a licensed and recognized attorney with extensive experience in Employment Law and Insider Threat Program’s. He will provide legal guidance on the collection, use and sharing of employee information, computer user activity monitoring and conducting investigations. Mr. Thompson built and led Google’s Global Insider Risk Management Services.
Training Course Brochure https://www.insiderthreatdefense.us/wp-content/uploads/2025/05/Insider-Threat-Investigations-Analysis-Training-Course-Brochure.pdf
IRMP TOOLKIT This training provides students a handbook and an abundance of training materials, educational resources, templates and checklists needed for an IRMP. The handbook provides guidance and checklists for Insider Threat Investigations, conducting an Insider Threat Vulnerability Assessment, and guidance to review, tweak and enhance the security controls of the organization (Physical Security, Human Resources, IT-Network Security, Etc.). They will also help with identifying any vulnerabilities related to the Malicious Insider Playbook Of Tactics. (Information & Data Exfiltration As Easy As 1,2,3) The training materials and toolkit will be provided to the students via a USB thumb drive for the classroom training, or via a download link.
EXCEPTIONAL STUDENT REVIEWS Our very high levels of client satisfaction are the result of the ITDG being experts at building IRMP's as we do more than just provide training. We also provide consulting services and incorporate lessons learned from our consulting engagements.
The ITDG has provided IRMP Program training to 1000+ students, and issued them certificates / credentials as an IRMP Manager and Insider Threat Investigator – Analyst. Even our most experienced students that attend our training courses, state that they are amazed at the depth of the training and the resources provided, and are very satisfied they took the training and learned some new concepts and techniques for IRM.
Our students have endorsed and given our training courses EXCEPTIONAL reviews for the comprehensive knowledge and resources provided. You are encouraged to read the feedback from our students on this link. https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-evaluations-comments.pdf
COMPANY RECOGNITION The ITDG Has Provided IRMP Training / Consulting Services To An Impressive List Of 700+ Clients: White House, U.S. Government Agencies, DHS, TSA, DoD, Intelligence Community Agencies, Law Enforcement, Critical Infrastructure Providers, Universities, Microsoft, Walmart, Home Depot, Nike, Tesla, Dell Technologies, Discovery Channel, UPS, FedEx, Visa, American Express, Equifax, Delta Airlines and many more.
Full Client Listing https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-listing.pdf
Questions, Please Contact
Jim Henderson, CISSP, CCISO CEO Insider Threat Defense Group, Inc. Insider Risk Management Program (IRMP) Training Course Instructor / Consultant Insider Threat Investigations & Analysis Training Course Instructor / Analyst Insider Risk / Threat Vulnerability Assessor www.insiderthreatdefensegroup.com LinkedIn Company Profile: https://www.linkedin.com/in/insiderthreatdefense Follow Us On Twitter: @InsiderThreatDG Founder / Chairman Of The National Insider Threat Special Interest Group NITSIG LinkedIn Group: https://www.linkedin.com/groups/12277699/ 561-809-6800
Hybrid (Both) • Paid • Part of Insider Threat Defense Group
30th March 2026 | Gartner CIO Leadership Forum Hollywood 2026
The Gartner CIO Leadership Forum 2026 offers a trusted space for Chief Information Officers to engage in strategic discussions that drive business growth and innovation. Tailored specifically for senior technology leaders, the event emphasizes how to balance digital acceleration with long-term stability, addressing key challenges such as governance, transformation leadership, and executive collaboration. Attendees explore frameworks for achieving measurable business outcomes through technology.
Through focused sessions, roundtables, and peer exchanges, participants gain access to Gartner’s exclusive insights and proven methodologies for IT leadership excellence. The forum’s collaborative environment allows CIOs to learn directly from one another, discuss challenges openly, and return to their organizations equipped with strategies that enhance influence, innovation, and impact at the enterprise level.
Physical • Paid • Part of Gartner
30th March 2026 | IAPP Global Summit 2026: Privacy | AI Governance | Cybersecurity Law
IAPP Global Summit 2026 is the leading global conference for professionals working in privacy, AI governance, and cybersecurity law. The event brings together regulators, legal experts, technologists, and compliance leaders to explore how evolving digital regulations and security expectations are shaping organizations worldwide. Attendees gain strategic insight into global policy trends, enforcement priorities, and emerging risks affecting data protection and cybersecurity programs.
The summit is designed for both strategic leaders and operational practitioners who manage privacy and security responsibilities on a daily basis. Sessions focus on real world challenges such as regulatory alignment, AI risk management, and cybersecurity compliance across jurisdictions. With its strong emphasis on practical guidance and peer connection, the event offers a valuable forum for learning, collaboration, and professional growth within the digital responsibility community.
Physical • Paid • Part of IAPP - International Association of Privacy Professionals
30th March 2026 | Fintech Meetup 2026
Fintech Meetup 2026 brings together the full financial technology community for a week of connection and collaboration. The event gathers startups, banks, investors, and service providers to exchange ideas, form partnerships, and explore the latest in payments, banking, and financial innovation. The program includes targeted networking and curated meetings that help attendees find real business opportunities instead of casual introductions.
The environment is fast-paced and focused, designed for professionals who want to move projects and partnerships forward. With structured 1:1 meetings, keynotes, and exhibitor showcases, it provides a clear path for meaningful conversations and deal-making. Fintech Meetup 2026 continues to grow as a central meeting point for the industry, bringing together the people and solutions driving financial transformation.
Physical • Paid • Part of Hyve Group
31st March 2026 | World Conference on Information Systems and Technologies (WorldCist) 2026
WorldCist 2026 is an international academic conference focused on information systems, digital technologies, and their impact across industries and society. Held in Madeira, Portugal with online participation options, the event brings together researchers, academics, and professionals working in areas that intersect with cybersecurity, including ethics, computer security, data analytics, and intelligent systems. The conference emphasizes peer reviewed research, with submissions evaluated through a structured blind review process.
Cybersecurity relevance is reflected through dedicated themes addressing ethics, computers, and security, as well as topics related to networks, decision support systems, and big data. Participants gain exposure to current research, emerging risks, and technological approaches that influence secure system design and governance. Accepted papers are published by Springer and indexed in major academic databases, making WorldCist a recognized platform for sharing cybersecurity related research within the broader information systems community.
Physical • Paid • Part of WorldCist
31st March 2026 | INCYBER Forum: Europe 2026
The INCYBER Forum: Europe 2026 brings together the full European cybersecurity ecosystem (government agencies, private companies, research centers, solution vendors, and users) to address digital security and trust. This major gathering offers a trade show floor for vendors and an in-depth conference track focused on cyber risk management, industrial cybersecurity, identity protection, operational security, and cybercrime prevention. With 20,000 past visitors and approximately 700 partners, the event serves as a central hub for networking, solution discovery, and strategic dialogue around Europe’s cyber resilience.
For professionals working in digital security, InCyber Europe 2026 presents valuable opportunities: attending sessions to stay up to date on threats and defenses, connecting with potential partners or clients, and exploring the latest security technologies. The forum’s broad scope spans from operational security to policy and digital trust, making it a key event for anyone interested in shaping or following cybersecurity developments in Europe.
Physical • Paid • Part of Forum InCyber (FIC)
31st March 2026 | SentinelOne Quarterly Threat Briefing
The gap between theoretical security models and real world operations continues to widen as organizations face evolving threats and complex environments. This webinar examines how geopolitical developments and emerging attack techniques influence organizational risk. The session focuses on translating global threat intelligence into actionable strategies that security teams can apply in their environments.
Attendees will gain insight into regional adversary tactics, techniques, and procedures, along with practical approaches to improving defense. The discussion highlights how organizations can shift from reactive patching to proactive, intelligence led threat hunting. The webinar provides guidance for both security leaders and practitioners on strengthening resilience and aligning security operations with the current threat landscape.
Company_Webinar • Part of SentinelOne
31st March 2026 | You’ve never mainframed like this
Accelerating mainframe development also plays a critical role in strengthening application security and cyber resilience, especially in environments that handle highly sensitive financial and personal data. This hands on virtual workshop shows how BMC AMI DevX uses AI driven insights to help developers understand complex COBOL, PL/I, and assembler code faster, reducing hidden technical debt that can introduce security weaknesses and operational risk.
The session demonstrates how modern tooling and visual code analysis support a shift left approach by making it easier to identify logic flaws, risky dependencies, and potential vulnerabilities earlier in the lifecycle. Attendees will see how integrating mainframe development into modern workflows improves visibility, auditability, and control, while supporting more secure and resilient application delivery.
Company_Webinar • Part of BMC Software
31st March 2026 | Securing OT Environments & Modernizing Operations with Splunk
Operational technology environments are increasingly targeted by cyber threats, requiring stronger security controls without disrupting critical systems. This webinar explores how organizations can secure OT environments while modernizing operations using Splunk. The session focuses on improving visibility, integrating security tools, and aligning with industrial architectures such as the Purdue Model.
Attendees will learn how to detect and respond to threats in industrial control systems, including ransomware and adversary techniques mapped to MITRE ATT&CK for ICS. The discussion also covers integrating OT security solutions, unifying monitoring across systems, and leveraging automation to improve response and efficiency. The webinar provides practical guidance for strengthening resilience, enhancing visibility, and securing OT infrastructure in complex industrial environments.
Company_Webinar • Part of Splunk (a Cisco Company)
31st March 2026 | INCYBER Forum: OSINT Day 2026
OSINT Day at the InCyber Forum Europe focuses on the practical use of open source intelligence in modern cybersecurity and cyberinvestigation work. The event brings together practitioners, analysts, and security professionals who rely on publicly available data to support investigations, threat analysis, and defensive operations. Sessions highlight real world applications of OSINT across cybercrime, fraud detection, financial crime, and geopolitical risk, making the content highly relevant for professionals working at the intersection of security, intelligence, and digital investigations.
The program emphasizes knowledge sharing through experience based presentations and feedback sessions that explore how OSINT techniques are applied in red team audits, counter terrorism efforts, and cryptocurrency scam investigations. Attendees benefit from expert insights, peer discussions, and networking opportunities within the broader InCyber Forum community. The event supports skill development while reinforcing the role of OSINT as a critical capability in cybersecurity operations.
Physical • Paid • Part of Forum InCyber Europe (FIC)
Organizations continue to store large volumes of sensitive information in on-premises repositories, and hybrid environments make it difficult to maintain consistent visibility and governance. This webinar examines five key capabilities required in modern Data Security Posture Management (DSPM) to protect on-prem data across hybrid infrastructure. The session explains how security teams can improve discovery and classification of sensitive data across file shares, databases, and applications.
The discussion also demonstrates how AI-powered DSPM tools help identify critical exposures and prioritize risk. Attendees will see how findings can be turned into remediation and compliance workflows, while simplifying deployment and reducing operational complexity compared to traditional approaches. The webinar provides practical guidance for security practitioners and leaders responsible for protecting on-premises data in hybrid environments.
Company_Webinar • Part of Cyera
31st March 2026 | BOUSSIAS Cloud Strategies Conference 2026
BOUSSIAS Cloud Strategies Conference 2026 is a leading Greek conference focused on the strategic use of cloud computing in modern organizations. Now in its twelfth year, the event reflects the shift from basic cloud adoption to mature, business driven cloud strategies that support operations, growth, and long term resilience. It brings together operational leaders, decision makers, and technology professionals who shape cloud investments and enterprise transformation.
A strong emphasis is placed on cloud security, zero trust models, compliance, and modern resilience practices. The conference also explores how new generation data centers support AI driven workloads and high intensity computing demands. Through expert led sessions and vendor agnostic insights, attendees gain a practical understanding of how cloud strategy, security, and governance intersect in real world environments, making the event highly relevant for cybersecurity aware organizations.
Physical • Paid • Part of BOUSSIAS
31st March 2026 | Designing Resilient Connectivity for the Anywhere Workforce
This webinar examines how healthcare organizations can maintain secure, high performance connectivity as care delivery becomes more distributed. Traditional VPN and legacy access models often struggle to provide consistent visibility and control, increasing the risk of downtime that can directly affect patient care and revenue. The session highlights why a resilient security service edge approach is better suited for modern healthcare environments.
Product leaders will explain the difference between secure and resilient access, why legacy VPN models fail, and how Zero Trust policies can be enforced without disrupting clinicians. A live demonstration will show identity and device based policy enforcement, encrypted and compliant access to clinical systems, centralized visibility, and reduced third party risk across distributed care settings.
Company_Webinar • Part of Absolute Software
31st March 2026 | European Cyber Cup 2026
European Cyber Cup 2026 is a competitive cybersecurity event focused on real world technical challenges in ethical hacking and team based cyber skills. Hosted at Lille Grand Palais in France, this event brings together cybersecurity professionals and students to compete in capture the flag, forensics, red team versus blue team, social engineering, and other practical cybersecurity tasks. Participants form teams of skilled operators to demonstrate technical mastery across multiple cyber disciplines.
The event promotes skill development, community engagement, and visibility within the European cybersecurity ecosystem. It is set inside the wider Forum INCYBER environment, attracting companies, academic teams, and industry partners. Teams compete not just for prizes but also to benchmark their skills against peers in a structured environment that values practical cyber defense and offensive techniques.
Physical • Paid • Part of Forward Global
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.