AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
11th February 2026 | Architecting Agentic Payments: The Two Pillars of Payment Success
AI driven payments are reshaping how merchants manage risk, trust, and control across the payment stack. This webinar focuses on architecting agentic payments safely, with a clear look at how increasing agent autonomy changes validation, liability, and resiliency. The discussion centers on the realities merchants face as agent driven transactions become more common and why reliability and security must be designed in from the start.
The session dives into two core pillars of success in the agentic payments era: AI payments intelligence and universal tokens. Speakers explain how better visibility into payment data supports safer automation, stronger compliance, and more confident decision making. Attendees will gain a practical framework for building payment architectures that remain adaptable and controlled while reducing operational and fraud risk as agent based commerce scales.
Company_Webinar • Part of IXOPAY
11th February 2026 | Navigating AI Risk
Explore how organizations can approach AI risk in a structured and practical way while balancing innovation, governance, and investment decisions. This webinar looks at how AI risk fits within existing data and software risk frameworks and helps clarify what is genuinely new versus what builds on long established security and governance practices.
Taking a Nordic perspective, the discussion draws on real experience from regulated industries and private enterprises to show how AI and data related risks are being evaluated today. Attendees will gain practical frameworks and best practices for governing AI initiatives, aligning investments with business value, and moving forward with confidence while maintaining strong oversight and responsible risk management.
Company_Webinar • Part of ServiceNow
11th February 2026 | CISO Middle East Summit 2025: Riyadh, KSA
The CISO Middle East Summit 2026 is scheduled to take place in Riyadh, Saudi Arabia, on February 11, 2026. This premier cybersecurity event will serve as a vital platform for over 100 Chief Information Security Officers (CISOs) and senior cybersecurity leaders from various sectors, including leading companies, government agencies, and policymakers.
As the Middle East continues its rapid digital transformation, the summit will focus on securing critical infrastructure, managing emerging cyber threats, and navigating the evolving landscape of cyber risks and compliance requirements.
Attendees can expect a comprehensive program featuring expert-led keynotes, in-depth panel discussions, and practical workshops designed to foster knowledge sharing and collaboration. In addition to the informative sessions, the summit offers ample networking opportunities, allowing professionals to connect with peers, potential partners, and solution providers, thereby fostering valuable relationships that can drive their cybersecurity initiatives forward.
Whether you're looking to refine your current security strategy, learn about the latest cybersecurity technologies, or exchange insights with fellow professionals, the CISO Middle East Summit is an essential gathering for anyone serious about securing the future of their business.
Physical • Free • Part of Executive Excellence Events
11th February 2026 | Inside the 2026 Software Supply Chain Security Report
Software supply chains have become one of the most targeted attack surfaces, forcing security leaders to rethink how risk is managed going into 2026. This webinar centers on findings from RL’s 2026 Software Supply Chain Security Report and examines how attackers exploited trust, automation, and scale across open source, commercial software, and AI ecosystems.
The roundtable discussion reviews the most significant compromises of the past year, new techniques adopted by threat actors, and the risk areas CISOs should prioritize next. Report authors and product leaders will walk through real world observations from the research and answer audience questions live, offering clear insight into how the software supply chain threat landscape is evolving.
Company_Webinar • Part of ReversingLabs
11th February 2026 | Modernizing VMware & Storage Encryption for Zero Trust
Federal agencies running mission workloads on VMware and enterprise storage face growing pressure to modernize encryption while meeting Zero Trust and federal compliance requirements. This webinar focuses on how organizations can upgrade VMware and storage encryption to align with current mandates while avoiding the scalability limits of legacy hardware HSMs.
The session explains how Fortanix Data Security Manager delivers software based, HSM level protection using confidential computing, enabling runtime encryption and centralized key management across hybrid environments. Attendees will see how to secure data at rest, in motion, and in use, support enclave segmentation, and gain unified visibility across VMware, databases, and storage systems as part of a broader Zero Trust strategy.
Company_Webinar • Part of Fortanix
11th February 2026 | Government Innovation Showcase: Georgia 2026
The Government Innovation Showcase Georgia brings together leaders from across the state to share ideas and explore practical solutions that enhance public services. This event focuses on how agencies can use technology and collaboration to build a stronger, more connected government. Attendees will hear about current modernization efforts, data use, and digital transformation strategies shaping the state’s public sector. The setting encourages open discussion on what works, what challenges remain, and where to focus next.
This program also gives professionals from different departments and regions the chance to learn from each other. Sessions look at how innovation can strengthen operations, improve service delivery, and make public administration more efficient. It’s a day built for exchanging ideas, forming partnerships, and understanding the real impact of technology in government.
Physical • Paid • Part of Public Sector Network (Certified B Corp)
11th February 2026 | The Next Big Breach: What Threat Intelligence Is Telling Us About 2026
Threat intelligence is revealing clear signals about where major breaches are headed in 2026 and how attackers are preparing long before incidents make headlines. This webinar examines real threat actor activity and dark web intelligence to show how behavior, tooling, and targeting patterns point to the next wave of high impact attacks. The session focuses on intelligence that appears weeks or months before traditional alerts surface.
The discussion highlights early warning indicators that many SOCs overlook and explains how intelligence led teams turn raw data into timely action. Using real operational examples, the webinar shows how threat intelligence can be embedded into day to day security operations to anticipate attacks and reduce response time.
Company_Webinar • Part of CYJAX
This masterclass focuses on how a Zero Trust architecture can reduce security costs while simplifying operations across users, branches, and cloud environments. Using Zscaler’s own internal Zero Trust journey, the session shows how moving to a cloud native approach helped eliminate unnecessary tools, streamline workflows, and improve overall security posture without adding complexity.
The discussion highlights practical strategies for applying Zero Trust in real environments, including ways to improve efficiency, strengthen protection, and scale securely as organizations grow. Attendees will gain clear insight into how Zero Trust can improve agility, reduce operational overhead, and deliver stronger returns by aligning security investments with business priorities.
Company_Webinar • Part of Zscaler
11th February 2026 | Threat Hunting Workshop 17: Hunting for Privilege Escalation – Level 2
This Level 2 threat hunting workshop focuses on identifying and investigating privilege escalation techniques that attackers use to expand control inside an environment. The session centers on real world telemetry, showing how escalation activity blends into normal administrative behavior and why it is difficult to detect at scale.
Participants will work through realistic datasets to analyze process behavior, permission changes, authentication artifacts, and system modifications that indicate privilege abuse. The workshop emphasizes intelligence driven investigation, using threat intelligence to guide hypotheses and validate findings rather than relying on isolated alerts. Designed for defenders with some hunting experience, this hands on session builds confidence in tracing escalation paths and applying consistent investigative methods in production environments.
Company_Webinar • Part of Intel 471
11th February 2026 | Pulse Conferences: CSO 360 Americas 2026
The CISO 360 Global Congress 2026 in Lisbon gathers cybersecurity leadership from around the world for a multi‑day deep dive into the future of information security, resilience and digital trust. Run by Pulse Conferences, this flagship event presents a rich mixture of global plenary keynotes, expert panels and networking sessions designed to align strategy across geography and industry. CISOs, senior security executives and influential practitioners will engage in dialogue around trending issues such as cyber‑geopolitics, supply chain risk, AI in security and organisational resilience.
With the international scale of the event, delegates can expect an experience that both broadens and deepens their perspective. Beyond the sessions, the congress provides structured interaction, global benchmarking opportunities and exposure to cross‑industry innovation. Attendees leave not only with new strategic frameworks but also with a strengthened peer community spanning multiple countries and sectors.
Physical • Paid • Part of Pulse Conferences
11th February 2026 | Corinium: AppSec & DevSecOps Sydney 2026
AppSec & DevSecOps Sydney 2026 brings together some of New South Wales’ most senior developers, security engineers, and technology leaders to explore the evolving intersection of software development and cybersecurity. The event emphasizes how security can be transformed from a reactive safeguard into a forward-looking business enabler. Attendees can expect hands-on sessions, real-world case studies, and expert-led discussions designed to strengthen their technical capabilities and strategic understanding of embedded application and program security.
The 2026 edition will be co-located with CISO Sydney, Cloud Security Sydney, and OT Security Sydney at the Royal Randwick Racecourse, creating a powerful cross-disciplinary environment for collaboration. Participants will have a unique opportunity to connect with senior professionals across cloud, infrastructure, and operational technology sectors, ensuring every conversation contributes to stronger, more resilient security architectures.
Physical • Paid • Part of Corinium Global Intelligence
11th February 2026 | Corinium: Cloud Security Sydney 2026
Cloud Security Sydney 2026 will unite cybersecurity, cloud, and digital transformation leaders to explore the next phase of secure cloud infrastructure. The event focuses on emerging technologies and strategies designed to counter evolving cloud threats, including AI-driven security frameworks and advanced risk mitigation for third-party integrations. Attendees will gain access to in-depth discussions and technical case studies that uncover how leading organizations are modernizing their cloud security posture.
As part of the co-located series with CISO Sydney, AppSec & DevSecOps Sydney, and OT Security Sydney, this event offers a uniquely connected experience for security leaders. It provides the perfect platform for meaningful collaboration across the cloud and cybersecurity communities, ensuring participants leave with both actionable insights and valuable professional connections to shape their 2026 security strategies.
Physical • Paid • Part of Corinium Global Intelligence
11th February 2026 | Empowering IT leaders to manage their SaaS ecosystem
IT teams are under growing pressure to secure and manage sprawling SaaS environments they did not choose and often cannot fully see. This webinar focuses on how IT leaders can regain control of SaaS usage, access, and risk as shadow IT, unused licenses, and over-permissioned accounts continue to grow across organizations.
The session walks through how visibility, governance, and automation can reduce security gaps while freeing IT from constant access requests and manual cleanup. Using real world examples, the speakers show how teams can track SaaS usage in real time, manage access throughout the employee lifecycle, optimize license spend, and stay ahead of contract renewals. The discussion is designed for IT leaders looking to strengthen SaaS security, improve compliance, and shift their focus from reactive tasks to strategic initiatives.
Company_Webinar • Part of 1Password
AI governance is becoming a commercial opportunity for service providers as customers face growing regulatory pressure and rising third party AI risk. This webinar focuses on how MSPs, MSSPs, and consultancies can turn governance requirements driven by the EU AI Act, NIST AI RMF, and ISO standards into scalable, revenue generating services that customers are actively seeking.
The session presents a practical roadmap based on real delivery experience from Cynomi and Intercity. It covers how to package AI governance into managed and advisory offerings, identify and manage AI usage and third party risk, and enable safe AI adoption without slowing the business. Attendees will also hear what is resonating with customers in the field and how to position AI governance as a business enabler rather than a compliance blocker.
Company_Webinar • Part of Cynomi
11th February 2026 | Passwordless in Practice: Comparing Enterprise Deployment Architectures
Passkeys and phishing-resistant authentication are no longer experimental, but deploying them across real enterprise environments is still a hard architectural problem.
Large organizations rarely start from a greenfield. They operate a mix of legacy applications, modern web platforms, on-prem and cloud identity systems, and multiple authentication protocols. Choosing how to deploy passwordless authentication often matters more than choosing which standard to use.
In this session, Bartosz Cieszewski will provide a clear, practical comparison of the main enterprise architectures used to deploy passwordless authentication at scale.
What this webinar covers:
This is a technical, vendor-agnostic discussion focused on decision-making - not product demos.
Who should attend:
Please note: a company (business) email address is required to confirm registration. Registrations submitted with personal or non-business email domains will be declined.
Company_Webinar • Part of Secfense
11th February 2026 | Pulse Conferences: CISO 360 Americas 2026
CISO 360 Americas 2026 gathers senior security executives to discuss leadership, resilience, and strategy. The sessions blend practical cases with open dialogue on threat trends and governance challenges shaping the Americas. The focus remains on peer-driven exchange rather than formal presentations, keeping conversations authentic and grounded in shared experience.
Attendees use the event to compare leadership models, refine security governance, and strengthen executive collaboration. The format allows meaningful discussions without the noise of large expos. By combining regional insights with global relevance, the conference helps CISOs explore solutions for evolving risks while building long-term professional connections that last beyond the sessions.
Physical • Paid • Part of Pulse Conferences
11th February 2026 | FutureCIO Conference Thailand 2026
FutureCIO Conference Thailand 2026 is a leadership focused technology and cybersecurity event designed for senior IT decision makers navigating an increasingly complex digital environment. The conference addresses how CIOs and CTOs can respond to rising cyber threats, regulatory pressure, and rapid AI adoption while still delivering measurable business value. With cybersecurity positioned as a core leadership responsibility, sessions explore how trust, resilience, and compliance intersect with innovation.
The event brings together technology leaders across Thailand to share practical insights on AI integration, enterprise resilience, and workforce readiness. Discussions emphasize balancing security with agility, strengthening governance, and aligning IT investment with organizational outcomes. By focusing on real world leadership challenges, the conference supports executives looking to turn cybersecurity and technology change into long term strategic advantage.
Physical • Paid • Part of CXOCIETY
11th February 2026 | Cyber Simulation Real-Time Workshop – Europe
A live cyber simulation workshop that places participants inside a realistic incident response scenario based on active adversaries targeting organizations today. Led by the CrowdStrike Incident Response Team, the session walks through how fast moving attacks unfold, how threat actors infiltrate mature environments, and how early decisions can change the outcome of an incident.
The interactive format allows attendees to guide the response through real time voting, with each decision influencing escalation paths, response options, and time pressure. The scenario centers on a sophisticated China nexus threat compromising a managed service provider and impacting downstream customers. Participants gain practical insight into adversary behavior, prioritization under pressure, team coordination, and the actions security leaders must be ready to take during a real cyber incident.
Company_Webinar • Part of CrowdStrike
11th February 2026 | The Official Cybersecurity Summit: Silicon Valley 2026
The Official Cybersecurity Summits 2026 is a nationwide conference series designed for senior-level cybersecurity, IT, and business leaders across multiple US markets and virtual audiences. The series includes both in-person and virtual events such as Ransomware Resilience, Healthcare Security, and city-based summits in Tampa, Seattle or Bellevue, San Diego, Atlanta, Silicon Valley, New York, and Chicago. Each summit is curated to address real-world security challenges faced by enterprises, government organizations, and critical infrastructure sectors.
Across all locations, the summits focus on practical cybersecurity strategies, emerging threats, compliance pressures, and executive-level decision making. Attendees gain insights through expert-led sessions that emphasize actionable solutions rather than theoretical discussions. By combining regional networking with nationally recognized speakers, the 2026 series creates consistent value for security leaders looking to stay informed, connected, and prepared in a rapidly evolving threat landscape.
Physical • Paid • Part of The Official Cyber Security Summit
11th February 2026 | Wild West Hackin’ Fest @ Mile High 2026
Wild West Hackin’ Fest @ Mile High 2026 is a hands on cybersecurity event designed for professionals who want practical skills they can use immediately. The conference blends technical talks, real world attack and defense scenarios, and immersive training sessions led by experienced practitioners. Attendees can expect deep dives into offensive security, defensive strategies, threat detection, and emerging risks that impact modern organizations. The event supports both in person and virtual participation, making it accessible to a broad cybersecurity audience.
In addition to the main conference, pre conference training through Antisyphon offers focused courses for beginners and seasoned professionals alike. These sessions emphasize skill building, problem solving, and applied learning rather than theory alone. The event is known for its strong community atmosphere, encouraging collaboration, networking, and shared learning among security professionals across industries and experience levels.
Physical • Paid • Part of Wild West Hackin' Fest
11th February 2026 | Snyk: Unveiling A New AI Security Foundation
AI driven development is accelerating faster than traditional security controls can keep up, creating new risks across code, models, and autonomous agents. This webinar focuses on how organizations can establish a stronger security foundation for AI powered software by embedding governance and trust directly into modern development workflows.
The session explores how to balance rapid innovation with effective security practices, addressing the challenges that emerge when humans and AI systems build together. Attendees will gain insight into approaches for securing AI driven creation without slowing velocity, helping teams reduce risk while maintaining confidence across the full development lifecycle.
Company_Webinar • Part of Snyk
11th February 2026 | Revolutionizing Governance, Risk, and Compliance with AI and Lean GRC
This session focuses on how AI and Lean GRC principles can modernize governance, risk, and compliance programs in an environment of rising regulatory pressure and complex risk exposure. It highlights how combining Horváth’s Lean GRC approach with MetricStream’s AI driven GRC platform helps organizations move away from rigid, fragmented frameworks toward more efficient and scalable models.
The webinar shows how AI powered GRC capabilities improve risk detection, accelerate decision making, and simplify coordination across compliance, audit, third party risk, cybersecurity, and ESG functions. Attendees will gain a clear view of how a streamlined, value focused GRC framework can turn compliance into a strategic advantage while supporting long term business growth.
Company_Webinar • Part of MetricStream
A practical discussion on how an MSP strengthened customer protection and business performance through a modern data protection approach. This webinar features a real world conversation with Nerds That Care on how updating backup and recovery practices helped reduce complexity, improve resilience, and deliver measurable results for clients.
The session focuses on modern data protection in today’s threat landscape, covering cloud native backup models, immutable and encrypted backups, and the operational benefits of simplifying data protection workflows. Attendees will hear how these changes improved service reliability, customer satisfaction, and overall efficiency, while also supporting long term growth for an MSP environment.
Company_Webinar • Part of N-Able
11th February 2026 | Powering DataOps and Gen-AI with Intelligent Orchestration
Focuses on how orchestration keeps modern data, cloud, and DevOps environments running smoothly as organizations rely on increasingly complex and time sensitive workflows. The session explains why orchestration is critical for maintaining reliability, visibility, and control while supporting DataOps and Gen AI initiatives across the enterprise.
Provides a practical look at how Control M coordinates end to end workflows, automates business critical processes, and introduces built in AI capabilities. Attendees will see a live demo and gain a clear understanding of how intelligent orchestration helps teams deliver trusted data, reduce operational friction, and manage growing complexity with confidence.
Company_Webinar • Part of BMC Software
11th February 2026 | Building cyber-resilience by protecting critical Entra ID data
Attackers are increasingly targeting Entra ID data to disrupt access, compromise identities, and cripple business operations. This webinar focuses on how corruption or deletion of Entra ID data can weaken an organization’s ability to operate and why many IT teams underestimate this risk. The discussion outlines current threat activity aimed specifically at identity data and the impact these attacks can have across cloud environments.
The session explains why stronger network security combined with modern, cloud based backup for Entra ID is critical for cyber resilience. Attendees will gain clear insight into how these attacks work and what practical steps organizations can take to protect critical identity data before damage occurs.
Company_Webinar • Part of Barracuda
11th February 2026 | Intelligence Blindness: You Bought the Feeds, But You Can’t See the Threats
Many organizations rely on threat intelligence feeds but still struggle to identify and respond to real threats. This webinar examines why threat intelligence programs often fail despite significant investment and explains what is missing when intelligence is treated as a tool rather than a capability.
The discussion focuses on common mistakes in how threat intelligence is built and used, including over reliance on technology and misaligned processes. Group IB shares practical insight into why intelligence efforts fall short and how organizations can develop intelligence that supports clearer understanding, better decision making, and more effective threat response.
Company_Webinar • Part of Group-IB
11th February 2026 | Stopping Modern Email Attacks with 99.9% Accuracy
Advanced email threats like business email compromise, phishing, and social engineering continue to bypass traditional security tools. This live webinar demonstrates how Varonis Interceptor uses a multi modal AI approach, combining vision, language, and behavioral models, to detect and stop modern email attacks that other solutions miss.
The session walks through a live demo showing how higher detection accuracy improves protection before threats reach users. Attendees will see how AI driven analysis identifies subtle attack patterns and strengthens email security against today’s most sophisticated techniques.
Company_Webinar • Part of Varonis
11th February 2026 | Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
AI driven phishing and deepfake impersonation are reshaping how social engineering attacks succeed in modern organizations. This webinar focuses on how advanced phishing emails, fake voice calls, video impersonations and collaboration platform attacks are bypassing traditional defenses, even on trusted channels like corporate messaging tools and protected domains.
The session examines modern phishing forensics techniques used to identify AI generated deception, understand the real limits of email protections like DMARC and analyze attacks across email, voice, messaging platforms and social media. Attendees will gain practical insight into spotting subtle indicators of machine crafted attacks, improving investigation skills and strengthening user awareness to reduce the risk of compromise in an evolving threat landscape.
Company_Webinar • Part of KnowBe4
11th February 2026 | Rethinking Patient Zero Security: Cyber Defense Strategies for the AI Era
This webinar focuses on why traditional patient zero detection no longer works in an AI driven threat landscape and what security teams must do instead. The discussion explains how attackers now use automation and AI to rapidly change techniques, making incident based defenses ineffective almost immediately. As a result, organizations can no longer rely on learning from the first victim and must assume they are a primary target from the start.
The session takes a technical look at how AI enabled adversaries launch large scale, polymorphic attacks and why proactive, behavior based defense models are becoming essential. Attendees will gain insight into modern research, defensive frameworks and strategies designed to improve resilience against fast evolving threats. The content is aimed at security teams looking to adapt their cyber defense approach for the AI era.
Company_Webinar • Part of Infoblox
12th February 2026 | Office Hours: AI & Automation
This session focuses on how AI and automation are shaping the way organizations use and manage N-able products. The discussion covers recent updates, new capabilities and what is coming next across the N-able platform, with a strong emphasis on real world application rather than theory.
Product specialists and practitioners will walk through practical use cases, showing how AI features and automation tools can improve daily operations. The webinar also highlights how APIs, scripting and integrations are being used to streamline workflows, followed by an open discussion where attendees can raise questions based on their own environments.
Company_Webinar • Part of N-Able
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.