Cybersecurity Conferences 2026 - 2027

All Security Conference Niches | Upcoming Cybersecurity Events

Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.

Enter at least 3 characters...
Loading...
No results found.

Today’s Cybersecurity Conferences & Events

Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.

24th January 2026 | Generative AI for Privacy Professionals Workshop 2026

The Generative AI for Privacy Professionals Workshop is a focused one-day session designed to help participants understand how emerging AI tools intersect with privacy, compliance, and data protection. Led by ISACA Greater Washington D.C. Chapter, the program explores the growing use of generative AI in organizations and the privacy implications that follow. It offers a structured approach to applying privacy-by-design principles and managing risk in AI deployments.

Participants can expect clear, practical instruction that connects theory to real use cases. The workshop includes guided exercises that show how to align privacy frameworks with AI tools while meeting global regulatory requirements. It is ideal for privacy officers, compliance managers, and IT professionals seeking a deeper grasp of how AI shapes privacy practices in day-to-day operations.

Online • Paid • Part of ISACA

united_states_flag

24th January 2026 | DCG9144: DEF CON Chennai Group 2026

DCG9144: DEF CON Chennai Group Main Event 0x1 is a community-focused cybersecurity gathering taking place in Chennai, India. The event brings the ethos of the global DEF CON hacker culture to the local tech scene, offering a two-day in-person experience packed with talks, practical sessions, and community interaction. It is organized by the DEF CON Chennai Group, a local chapter of the wider DEF CON network that welcomes programmers, hackers, and cyber security enthusiasts of all levels.

The event is free and provides a platform for participants to share insights in offensive security, defense strategies, capture the flag competitions, and other hacking-related topics. With an active call for papers open and a strong focus on collaboration and learning, DCG9144 aims to foster knowledge exchange and build a vibrant security community in the region. The format encourages both newcomers and seasoned practitioners to engage in hands-on sessions and network with peers passionate about digital security.

Physical • Free • Part of DEF CON Chennai DCG9144

india_flag

24th January 2026 | DistrictCon 2026

DistrictCon returns to the nation's capital with a mission to merge technical hacker culture with meaningful policy discussion. This event prioritizes technical excellence and novel research, moving away from the standard corporate conference model to focus on what organizers call hacking magic. Attendees can explore a diverse range of activities including a unique zero-day pwn contest and an intensive twenty-four hour hackathon aimed at combating digital authoritarianism. The conference serves as a vital bridge between those who build or break technology and the individuals responsible for regulating it.

The gathering features eight distinct villages covering specialized fields like biohacking, maritime security, and aerospace defense. These villages collaborate for a comprehensive capture the flag competition that accommodates both entry level enthusiasts and seasoned professionals. Exclusive closed door sessions provide a rare platform for policymakers to learn directly from the hacker community in a candid environment. By emphasizing open source tool releases and spicy research, the event fosters an authentic atmosphere that champions curiosity and defensive innovation. It is an essential stop for those looking to engage with the modern cybersecurity landscape in Washington.

Physical • Paid • Part of DistrictCon

united_states_flag

26th January 2026 | NDC Security: London 2026

NDC Security London brings developers, security engineers, and architects together to focus on secure software development. The sessions cover topics like threat modeling, identity, cloud security, and secure coding practices. Each talk is led by practitioners who share lessons learned from real-world projects. The event’s format makes it easy to learn from others without the usual sales pitch. Attendees can explore current security tools and methods that fit into day-to-day development work.

The London edition is known for its strong technical community and friendly atmosphere. Attendees get access to valuable discussions that link security with software design, testing, and operations. It’s a practical environment where developers improve their understanding of security and return to their teams with clear ideas to implement right away.

Physical • Paid • Part of NDC Conferences

united_kingdom_flag

26th January 2026 | Application management with Targeted Application Install for Victoria Experience

This session focuses on how Targeted Application Install improves application management within Splunk Cloud Platform Victoria Experience. It explains how teams can now control which search head groups run specific apps, instead of deploying apps across every search head by default. This change allows better isolation of workloads and more precise alignment of apps with user groups and use cases.

The webinar also covers why this enhancement was highly requested by customers and how it brings Splunk Cloud Platform Victoria Experience closer to feature parity with Splunk Enterprise and Classic Experiences. Attendees will gain a clear understanding of how targeted installs simplify operations, reduce unnecessary exposure and improve overall platform efficiency.

Company_Webinar • Part of Splunk

_flag

26th January 2026 | Insider Risk Management Program Evaluation & Optimization Training Course

INSIDER RISK MANAGEMENT PROGRAM (IRMP) EVALUATION & OPTIMIZATION TRAINING COURSE IRMP Evaluator & Optimization Specialist Certificate / Credential Offered By: Insider Threat Defense Group (ITDG)

LOCATION University Of Maryland, College Park 4600 River Road, College Park, Maryland, 20740

DATES / TIMES January 26-27, 2025 (8:30am-5pm)

Other Dates Offered: February 25-26, 2025 April 27-28, 2025 May 18-19, 2025 June 15-16, 2025

Training Course Brochure https://www.insiderthreatdefense.us/wp-content/uploads/2025/06/Insider-Risk-Management-Program-Evaluation-Optimization-Training-Course-Brochure-6-28-25.pdf

Cost / Registration (Discounts For 2+ Students - Money Back Training Guarantee) https://stats.slimcd.com/soft/showsession.asp?sessionid=D186C5F69E960F6D57AFD21C466B626BB3421A76

VIRTUAL ATTENDANCE OPTION Attending virtually provides the same expert instruction and training materials as the classroom experience. Course materials will be available for download ahead of time, ensuring you’re fully prepared. The training will be delivered live via Go To Meeting, allowing for real-time interaction, questions, and engagement with other students and the instructors.

TRAINING COURSE OVERVIEW Is your organization developing an Insider Risk Management (IRM) Program (IRMP), but needs additional expert guidance to further the development of the program?

Has your organization established an IRMP, but are looking to perform a gap analysis / assessment to mature and optimize it?

Who Should Attend? This highly sought after 2 day very comprehensive training course is designed for anyone managing or supporting an Insider Threat Program (ITP) or an IRMP. (ITP Manager, ITP Senior Official, Insider Risk Program Manager, Insider Threat Investigator- Analyst, FSO, CSO, CISO, Human Resources, CIO – IT, Network Security, Governance, Risk & Compliance Professionals, Counterintelligence Investigators, Mental Health / Behavioral Science Professionals, Legal Etc.),

This Training Course Provide Students With The Core & Advanced Knowledge And Resources To: ✓ Develop, Implement & Manage a robust IRMP.

✓ Evaluate the organization's security foundations / controls and maturity levels from both from a Technical and Non-Technical perspective.

✓ Evaluate an IRMP and the many critical cross departmental interconnected components, activities and business processes that support it. (IRMP Gap Analysis)

✓ Optimize the IRMP, by ensuring that key stakeholders are universally aligned from an enterprise / holistic perspective to proactively identify, prevent or mitigate employee risks / threats.

✓ Conduct Comprehensive Insider Threat Investigations & Evaluate Existing Detection Capabilities (Technical, Non-Technical)

✓ Conduct an Insider Risk / Threat Assessment to identify any weaknesses and vulnerabilities that could enable a malicious or opportunistic employee to take actions that could have a negative impact to the organization.

TRAINING COURSE BROCHURE Additional information on the training course can be found in the brochure. https://www.insiderthreatdefense.us/wp-content/uploads/2025/06/Insider-Risk-Management-Program-Evaluation-Optimization-Training-Course-Brochure-6-28-25.pdf

IRMP TOOLKIT This training provides students a hardcopy handbook and an abundance of training materials, educational resources, templates and checklists needed for IRM. This will save many hours of documentation creation and makes developing or optimizing the IRM Program almost as easy as 1,2,3. The training course materials and toolkit will be provided to the students via a USB thumb drive for the classroom training, or a download link for remote students.

The handbook provides guidance and checklists to conduct an Insider Threat Vulnerability Assessment, to review, tweak and enhance the security controls of the organization (Physical Security, Human Resources, IT-Network Security, Etc.). It will also help with identifying any vulnerabilities related to the Malicious Insider Playbook Of Tactics. (Information & Data Exfiltration As Easy As 1,2,3)

IRMP EVALUATOR & OPTIMIZATION SPECIALIST CERTIFICATE / CREDENTIAL The benefits if obtaining the IRMP Certificate / Credential are outlined in the training course brochure.

CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS Students attending this training will earn 16 CPE Credits towards CPE requirements for security certifications they have obtained.

TRAINING RECOGNITION / STUDENT SATISFACTION & COMMENTS Over 1000+ individuals have attended our training courses and received certificates / credentials as an Insider Threat Program Manager, IRMP Evaluator & Optimization Specialist and Insider Threat Investigator – Analyst.

Our very high levels of client satisfaction are the result of the ITDG being experts at building IRM Programs, as we do more than just provide training. We also provide consulting services and incorporate lessons learned from our consulting engagements.

This training has been endorsed by our students as the most affordable, next generation and value packed training for IRM, that is taught from a real world, practical, strategic, operational and tactical perspective.

Our student satisfaction levels are in the EXCEPTIONAL range, which you can read on the link below. https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-evaluations-comments.pdf

COMPANY RECOGNITION The ITDG Has Provided IRMP Training / Consulting Services To An Impressive List Of 700+ Clients: White House, U.S. Government Agencies, Department Of Homeland Security, TSA, Department Of Defense (U.S. Army, Navy, Air Force & Space Force, Marines) Intelligence Community (DIA, NSA, NGA) FBI, U.S. Secret Service, DEA, Law Enforcement, Critical Infrastructure Providers, Universities, Fortune 100 / 500 companies and others; Microsoft Corporation, Walmart, Home Depot, Nike, Tesla Automotive Company, Dell Technologies, Nationwide Insurance, Discovery Channel, United Parcel Service, FedEx Custom Critical, Visa, Capital One Bank, BB&T Bank, HSBC Bank, American Express, Equifax, TransUnion, JetBlue Airways, Delta Airlines, Royal Canadian Mounted Police and many more.

Full Client Listing: https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-listing.pdf

ON-SITE TRAINING AT YOUR LOCATION Some of the most engaging and collaborative training and consulting engagements the ITDG have had, have been with companies that bring the ITP Manager / Insider Risk Program Manager and all key stakeholders to the table.

The 2 day training course and workshop can be taught at your company’s location to ensure that the everyone managing and supporting an IRMP are universally aligned from an enterprise / holistic perspective to detect, prevent and mitigate Insider Risks and Threats. This on-site training will also help with alleviating any negative or preconceived notions that some stakeholders may have about the program, to ensure all stakeholders are working together and contributing to the success of the program.

Table top exercises will be conducted using a variety of employee risk and threat scenarios. Using these employee threat scenarios will show the importance of collecting, integrating and analyzing various sources of employee risk and threat information, to detect, prevent and mitigate Insider risks and threats from a proactive perspective.

Questions? Please Contact

Questioms Jim Henderson, CISSP, CCISO CEO Insider Threat Defense Group, Inc. Insider Risk Management Program Training Course Instructor / Consultant Insider Threat Investigations & Analysis Training Course Instructor / Analyst Insider Risk / Threat Vulnerability Assessor james.henderson@insiderthreatdefense.us www.insiderthreatdefensegroup.com LinkedIn Company Profile: https://www.linkedin.com/in/insiderthreatdefense Follow Us On X / Twitter: @InsiderThreatDG Phone: 561-809-6800

Hybrid (Both) • Paid • Part of Insider Threat Defense Group

united_states_flag

26th January 2026 | CYBERTECH Global Tel Aviv 2026

CYBERTECH Global Tel Aviv 2026 is a leading international cybersecurity conference that brings together the global cyber ecosystem in one of the world’s most active technology hubs. The event attracts government officials, security leaders, researchers, startups, and enterprise decision makers, creating a high-level environment for collaboration and knowledge sharing. Its scale and international reach make it a central meeting point for discussing the evolving cyber threat landscape.

The conference program focuses on real-world cybersecurity challenges, emerging technologies, and strategic defense approaches across both public and private sectors. Attendees gain exposure to expert-led discussions, advanced solutions showcased in the exhibition area, and meaningful networking with global peers. With its strong emphasis on innovation, policy, and applied security practices, CYBERTECH Global Tel Aviv remains a key destination for professionals shaping the future of cybersecurity.

Physical • Paid • Part of Cybertech

israel_flag

26th January 2026 | The Future of Privileged Access: Universal Authorization for Any Identity

Join Nishad Sankaranarayanan, Head of IAM at Genuine Parts Company (GPC), and StrongDM to discuss why static credentials can’t survive cloud speed, and how the control plane you build for developers today becomes the security foundation for Agentic AI tomorrow.

Why Join: The "Front Door" is Broken: Discover why modern breaches bypass static credentials and "login-based" security, and why the math of cloud access demands a shift to continuous Runtime Authorization.

Zero Standing Privilege is Possible: See how to eliminate the trade-off between speed and security by authorizing actions in real-time, enforcing policies at the query level rather than the network level.

Prepare for the Agentic Future: Learn why non-deterministic AI agents will break traditional access models, and how to future-proof your architecture to handle machine-speed authorization securely.

When: Monday, January 26, 2026 | 9:00 am PT

Company_Webinar • Part of StrongDM

_flag

26th January 2026 | CU Intersect Conference 2026

CU Intersect 2026 brings together credit union leaders, IT staff, and security experts to address the growing challenges in cybersecurity, resiliency, and technology for the credit union sector. The conference offers keynote sessions, panel discussions, and breakout tracks focused on risk management, IT, security, and CISO-level concerns. Attendees learn about defending member data, managing third-party risk, deploying secure IT infrastructure, and adopting emerging technologies like AI while preserving security and compliance. The event gives institutions actionable strategies to stay ahead of threats and build robust security programs.

This conference is strongly relevant for professionals working in credit unions, especially those responsible for security and risk, offering practical insights, peer discussion, and exposure to vendor security solutions that can improve resilience and protect members.

Physical • Paid • Part of CU Intersect Conference

united_states_flag

26th January 2026 | Data Privacy Week 2026

Data Privacy Week 2026 encourages individuals and organizations to make data protection a daily habit. It highlights how personal information travels across the internet and why controlling it matters. The campaign focuses on practical actions, such as reviewing privacy settings, limiting data sharing, and being mindful of what is stored online. Participants are reminded that privacy is not only a personal right but also a shared responsibility among users and the companies that serve them.

This annual initiative unites cybersecurity professionals, educators, and citizens in promoting safer digital practices. By raising awareness and offering clear guidance, it helps people understand how their online behavior shapes their privacy footprint. Organizations are also encouraged to respect user data and strengthen transparency. Data Privacy Week 2026 serves as a timely reminder that protecting personal information starts with small, consistent choices made by everyone.

Hybrid (Both) • Free • Part of National Cybersecurity Alliance

united_states_flag

26th January 2026 | Forecasting Future Fortifications: Leadership Insights on Cyber-Physical Systems Security in 2026

Cyber physical systems security is entering a period of rapid change as economic pressure, geopolitics, nation state activity and accelerated AI adoption reshape risk across critical operations. This executive webinar focuses on how these forces intersect and why security and operations leaders must adjust strategy now to avoid defending outdated threats with misaligned resources.

The fireside discussion brings together senior leadership perspectives on preparing CPS environments for 2026 and beyond. Attendees will gain forward looking insight into AI driven risk, supply chain shifts and practical approaches for balancing security staffing, processes and technology investments. The session is designed for CISOs and business leaders who need clarity to make high impact decisions that protect operations, sustain resilience and preserve competitive advantage.

Company_Webinar • Part of Claroty

_flag

26th January 2026 | Dynatrace Perform 2026

Dynatrace Perform 2026 is an annual global technology conference that highlights the intersection of observability, security, and AI-driven innovation. Hosted at The Venetian in Las Vegas, it brings together IT leaders, engineers, and cybersecurity professionals from around the world to explore how AI and automation can simplify complexity and enhance digital performance. Attendees will gain actionable insights from top industry experts, learn new methods to secure cloud environments, and discover how agentic AI can be harnessed to drive smarter, more resilient operations. The event emphasizes hands-on learning, featuring deep technical workshops and live platform demonstrations that showcase practical approaches to optimizing digital ecosystems.

Known for its dynamic sessions and high-level networking opportunities, Dynatrace Perform 2026 offers a mix of keynote addresses, breakout sessions, and certification training through Dynatrace University. Participants can expect thought-provoking discussions on emerging cybersecurity challenges, scalable cloud management, and the future of AI observability. With thousands of professionals from DevOps, IT, and cybersecurity in attendance, the event provides an ideal space to exchange expertise and shape the next era of intelligent digital transformation.

Physical • Paid • Part of Dynatrace

united_states_flag

26th January 2026 | High Performance, Edge And Cloud Computing (HiPEAC) 2026

HiPEAC 2026 brings together researchers, engineers, and industry professionals working on the future of high-performance and edge computing. The event explores how hardware, software, and system design converge to deliver scalable, efficient, and secure solutions. Sessions and papers cover computer architecture, programming models, compilers, and operating systems that power both embedded and large-scale computing environments.

While the focus spans many technical domains, cybersecurity and safety remain core themes. Discussions address how to build dependable systems that maintain performance without compromising protection or energy efficiency. Alongside workshops, tutorials, and poster sessions, HiPEAC serves as a collaborative space for academics and practitioners shaping the next generation of computing technologies.

Physical • Paid • Part of HiPEAC

poland_flag

26th January 2026 | G[P]RC Summit Riyadh 2026

The G[P]RC Summit Riyadh 2026 explores how governance, risk, and compliance intersect with performance and strategy. The event gathers leaders who shape policies and frameworks that sustain long-term business health. Sessions examine the pressures of new regulations, digital disruption, and sustainability, while focusing on how integrated GRC can improve decision-making and strengthen organisational culture. Attendees gain clear, actionable insights from experts driving transformation in both private and public sectors.

This year’s theme, “Driving Success: Integrating GRC with Strategy Execution in a Hyperconnected World,” highlights the growing need for alignment between compliance and innovation. With sustainability and ESG now central to many regional strategies, the summit encourages collaboration between regulators, boards, and industry innovators. Riyadh provides a fitting backdrop for these conversations, as the region advances its vision for accountable, resilient, and future-ready governance.

Physical • Paid • Part of Ejtemaat Events MENA

saudi_arabia_flag

26th January 2026 | SANS Cyber Threat Intelligence Summit & Training 2026

The 14th Annual SANS Cyber Threat Intelligence Summit focuses on cyber threat analysis and intelligence, featuring insights from leading practitioners through real-world case studies, innovative techniques, and practical solutions. A key highlight is the curated networking, providing opportunities for CTI professionals to connect, share ideas, and build lasting relationships, enhancing their understanding and challenging existing assumptions in the field.

Hybrid (Both) • Paid • Part of SANS Institute

united_states_flag

27th January 2026 | Start Selling Open MDR with Confidence

This webinar focuses on how partners can position and sell WatchGuard Open MDR as a managed detection and response service built for mixed security environments. The session explains how Open MDR delivers 24/7 detection and response using existing tools such as endpoint, identity, network, and cloud data sources, without forcing customers to migrate platforms.

Participants will see how the service operates, what partners and customers experience in the portal, and how onboarding works from start to go live. The discussion also covers how to communicate value to SMB and midmarket buyers, identify new revenue opportunities, and confidently introduce Open MDR to current customers.

Company_Webinar • Part of WatchGuard

_flag

27th January 2026 | Fast-Track and Future-Proof NIS2 Compliance

Security leaders navigating NIS2 enforcement will get a clear, practical view of how to accelerate compliance while preparing for future regulatory demands. This webinar focuses on the controls that matter most under NIS2 and explains how organizations can show measurable progress without overcomplicating their security programs. The discussion cuts through regulatory complexity and centers on scalable approaches that support long term resilience.

The session highlights how microsegmentation and identity based access controls help deliver the containment and visibility required for NIS2 compliance. It also looks ahead to expected regulatory evolution and explains why some organizations are already preparing for NIS3. Attendees will leave with a realistic blueprint for strengthening compliance, prioritizing critical controls, and building a security architecture that can adapt to future requirements without major rework.

Company_Webinar • Part of Zero Networks

_flag

27th January 2026 | API Security for the AI Era

API security is entering a new phase as AI reshapes how applications are built and exposed. This webinar focuses on how rapid API development, AI coding assistants, and embedded LLM capabilities are creating new risks that traditional security programs struggle to manage. The discussion draws on insights from GigaOm’s API Security Radar to explain how real world breaches are emerging from these expanding attack surfaces.

The session looks at how API security has evolved, where it is heading next, and what organizations need to do to stay ahead rather than react. Attendees will gain clarity on how to adapt their API security strategy for the AI era and prepare for the operational and security challenges that come with faster, AI driven development.

Company_Webinar • Part of StackHawk

_flag

27th January 2026 | AI Symposium 2026

The 2026 AI Symposium brings together professionals exploring how agentic AI will influence security and operational decision making. The program highlights how advanced reasoning systems can support cyber defense workflows, automate multi step problem solving, and improve the speed and accuracy of security operations. Attendees will hear from experts who study how emerging AI models shape threat response, incident handling, and the protection of complex digital environments.

Participants also take part in hands on workshops focused on applied AI tools that can support monitoring, analysis, and operational resilience. The in person format adds an experiential layer with access to Space Camp activities and evening networking events. This setting creates an environment where attendees can learn practical methods for integrating AI into cybersecurity planning while connecting with peers who work at the intersection of technology, engineering, and digital risk.

Physical • Paid • Part of U.S. Space & Rocket Center

united_states_flag

27th January 2026 | Cloud Storage-Layer Defense in Modern Cloud Environments

This session focuses on how data exfiltration risk appears inside real AWS environments and how security teams investigate it at the storage layer. AWS and Cloud Storage Security walk through the signals teams rely on when suspicious data movement is detected, including access trails and bulk download activity.

The discussion covers what native AWS guardrails and telemetry can reveal, where visibility gaps remain, and how added context helps investigations move faster. Attendees will see how tying activity to specific actors, objects, and timelines improves confidence during incident response. The session is practical and grounded in real world investigation workflows used in modern cloud environments.

Company_Webinar • Part of Cloud Storage Security

_flag

27th January 2026 | NHIcon 2026

NHIcon 2026 focuses on the emerging challenges of securing autonomous systems and agentic artificial intelligence. This virtual summit brings together security engineers, platform teams, and developers to explore how software behavior changes as autonomy becomes standard in enterprise infrastructure. Attendees can participate in two specialized tracks: the Builders Track for deep technical dives into agent architectures and the Guardians Track for governance and risk frameworks. The event aims to provide high signal frameworks and real world lessons for professionals navigating the intersection of identity and AI control.

The program features keynotes and panels from industry leaders who are shaping the next generation of digital identity. Participants will gain insights into how agentic AI impacts non-human identity management and access control across cloud and SaaS environments. By connecting builders with defenders, the conference facilitates a collaborative environment to discuss policy design and cross team alignment. This one day experience is designed to arm practitioners with the knowledge necessary to take immediate action against modern security risks in an increasingly automated landscape.

Online • Paid • Part of Aembit

united_states_flag

27th January 2026 | Autonomous IT in 2026: Securing Organizations in an AI-Driven Threat Landscape

A forward-looking discussion on how organizations can secure themselves as AI-driven threats reshape the risk landscape in 2026. This webinar brings together insights from Forrester research and Tanium to examine the trends, technologies, and security challenges that security and risk leaders are expected to face in the coming year.

The session focuses on how agentic AI is changing the nature of cyber risk and what organizations must do to prepare. Attendees will hear practical recommendations for building AI-native, quantum-ready, and continuously adaptive defenses, with a strong emphasis on how Autonomous IT can help teams respond faster and stay ahead of emerging threats.

Company_Webinar • Part of Tanium

_flag

27th January 2026 | FortiSASE Test Drive Xperience

Explore how FortiSASE delivers secure access for modern hybrid work environments through a guided, self paced test drive experience. This session focuses on how a unified SASE platform combines networking and security in a cloud delivered model to protect access to web, SaaS and private applications from anywhere.

Participants will step through real world scenarios from both the user and administrator perspectives, seeing how secure access works in practice and how visibility is maintained across the environment. The experience highlights intuitive dashboards, real time logging and simplified operations, showing how FortiSASE reduces complexity while improving control and security across a distributed workforce.

Company_Webinar • Part of Fortinet

_flag

27th January 2026 | Winter Edition: Getting the most out of Elastic Observability and new features

This session focuses on how IT teams can get more value from Elastic Observability by using the latest features and best practices introduced in version 9.2. The discussion centers on improving visibility, reducing troubleshooting time, and simplifying observability workflows across modern environments through practical, real world use cases.

The webinar covers recent enhancements such as Elastic Streams for faster insight from logs, new ES|QL capabilities for real time analytics, and expanded OpenTelemetry metrics support for scalable data collection. Live demonstrations show how these features work in practice, followed by a Q and A where participants can raise questions directly with Elastic experts. The content is designed for practitioners and decision makers looking to strengthen observability as part of a broader reliability and security strategy.

Company_Webinar • Part of Elastic

_flag

27th January 2026 | AI Summit: Accelerating Secure AI Adoption and Development

Security teams are facing a new challenge as AI adoption accelerates across the enterprise and introduces new forms of risk. This webinar focuses on how organizations can deploy and scale AI while maintaining strong security, governance, and control. The discussion examines how adversaries are exploiting AI through techniques such as prompt injection, data poisoning, shadow AI, and the misuse of non human identities.

The session brings together perspectives from security and business leaders on managing AI risk without slowing innovation. Attendees will hear how enterprises are operationalizing secure AI practices, adapting security strategies, and building governance models that support confident adoption. The webinar also shares real world insights on protecting custom models and AI driven workflows as AI becomes embedded across the organization.

Company_Webinar • Part of CrowdStrike

_flag

27th January 2026 | Accelerate Your AI Initiatives with Zero Trust

AI adoption is accelerating faster than traditional security models can handle, creating new risks across development and deployment. This webinar focuses on how Zero Trust principles can be applied to secure the full AI lifecycle, addressing challenges such as shadow AI, fragmented tooling and exposure of sensitive data that slow down enterprise adoption.

The session highlights how Zscaler protects AI applications by discovering AI systems and risks, automating security testing and enforcing runtime protections. Attendees will see how governance and compliance can be applied consistently across AI environments, helping organizations deploy and scale AI securely without sacrificing visibility or control.

Company_Webinar • Part of Zscaler

_flag

27th January 2026 | K-12 Data Privacy & Cybersecurity Conference 2026

The K-12 Data Privacy & Cybersecurity Conference 2026 will gather school technology leaders and educators to address the growing cybersecurity risks in education. Hosted by SecurED Schools, the online event focuses on helping institutions strengthen their security posture while continuing to innovate in digital learning. Sessions are led by practitioners who understand the challenges of protecting student data and maintaining safe, connected classrooms. Attendees will gain practical guidance on network defense, incident response, and policy planning, all customized for K-12 environments. The event encourages open discussion among peers, bridging the gap between IT teams and administrators. By combining local insight with national expertise, it provides a clear roadmap for schools seeking to improve their privacy and cybersecurity readiness in the year ahead.

Online • Paid • Part of Learning Technology Center

united_states_flag

27th January 2026 | How OT Teams Gain Visibility, Control Access, and Respond Faster with Tosi Control

OT teams are using Tosi Control to gain clear visibility across assets, manage access more effectively and respond to incidents faster in live production environments. This webinar introduces the Tosi Control platform and shows how it brings OT data into a single, searchable view while replacing manual tracking methods with structured metadata and real time monitoring.

The discussion focuses on how operators and OT leaders centralize asset visibility across sites, simplify access through enterprise SSO and integrate OT data with existing SOC and operational tools. Attendees will hear real world lessons from teams already using the platform, see new capabilities on the roadmap and join a live Q and A with customers and product experts.

Company_Webinar • Part of Tosi

_flag

27th January 2026 | IBM Technology Summit: Session 02: Digital Sovereignty & AI You Can Trust: IBM's Vision on the Future of Software

Organizations are facing growing pressure to run AI in ways that respect digital sovereignty while maintaining security, control, and compliance. This session focuses on how enterprises can manage AI workloads across borders, govern data access, and retain operational independence as adoption accelerates. The discussion centers on the evolving definition of digital sovereignty and why it now extends beyond data residency into infrastructure control and AI deployment models.

The webinar presents IBM’s vision for the future of software, highlighting a new AI ready sovereign solution designed to support secure innovation without sacrificing flexibility. Attendees will gain insight into how organizations can balance trust, governance, and adaptability while deploying AI at scale in regulated and complex environments.

Company_Webinar • Part of IBM

_flag

27th January 2026 | NHIcon: The Rise of Agentic AI Security

NHIcon 2026 is where builders and breakers, defenders and decision-makers unite to confront what agentic AI means – not just for security, but for the way software works and enterprises run. This one-day virtual experience will blaze new ground and bring together the people on the front lines of this high-stakes inflection point.

Online • Free • Part of Aembit

united_states_flag

Insights & Analysis from Security Events

Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.

Discover the best AI Security Events
AI Security Events

Discover the best AI Security Events

This blog category covers the complete AI security landscape—from understanding the market category and key vendors to emerging threats like prompt injection, the risks of shadow AI, current marketing trends, and predictions for 2026 and onwards.

Discover the best AI Security Events

Henry Dalziel

Security Blogger

Discover the best Data Security Events
Data Security Events

Discover the best Data Security Events

This blog category explains the essential pillars of data security: starting with discovery and classification, implementing access controls, preventing loss with DLP, and securing data across cloud, SaaS, and AI environments.

Discover the best Data Security Events

Henry Dalziel

Security Blogger

Stay Ahead in Cybersecurity – Explore Global Conferences Today

Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.