AI Security | Our Content Hub
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2026, 2027, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
16th April 2026 | CyberScape Summit 2026
CyberScape Summit 2026 is a focused cybersecurity conference bringing together federal and industry leaders to discuss pressing security priorities and evolving threat landscapes. The event centers on practical strategies for staying ahead of modern cyber risks, with sessions covering artificial intelligence, zero trust frameworks, identity management, cloud security, and supply chain protection. Its government focused audience makes it particularly relevant for professionals involved in public sector security and critical infrastructure protection.
The summit offers attendees a structured environment for learning and collaboration through expert led discussions and real world use cases. Emphasis is placed on securing data, strengthening incident response, and protecting essential systems against emerging threats. With opportunities to earn continuing professional education credits, the event supports both professional development and knowledge sharing for cybersecurity practitioners working across government and industry sectors.
Physical • Paid • Part of GovCIO Media & Research
16th April 2026 | IMPACT Conference USA 2026
IMPACT Conference USA 2026 is a focused cybersecurity event that brings leading academics and industry experts together to explore the human aspect of cybersecurity. Hosted by CybSafe and held in McLean, Virginia, this in-person conference highlights research that improves understanding of how human behavior influences security outcomes in real-world environments.
The event attracts practitioners, policymakers, and researchers who are interested in breakthroughs in human cyber risk research and its practical application to secure organizations. With sessions covering academic insights and collaborative discussions, IMPACT USA offers a unique platform for those seeking to connect research with actionable cybersecurity practice in a collaborative setting. Attendees gain exposure to thought leadership and peer networking that informs future security strategies based on human-focused research.
Physical • Free • Part of CybSafe
16th April 2026 | ERTL-YANG Leader Summit 2026: Frankfurt
The Frankfurt ERTL-YANG Leader Summit 2026 focuses on cybersecurity governance and executive accountability. Designed for senior leaders, the summit highlights the importance of strategic oversight in managing cyber risk and regulatory compliance.
Discussions center on leadership roles in security investment, resilience planning, and crisis response. The event provides a peer driven environment for sharing perspectives on strengthening enterprise security at the executive level.
Physical • Paid • Part of ERTL-YANG
16th April 2026 | BFSI IT Summit: Indonesia 2026
The BFSI IT Summit brings together technology leaders who are shaping the future of digital finance in a landscape that depends heavily on cybersecurity. As banks and financial institutions modernize their operations, strong security foundations are critical for protecting transactions, customer data, and digital infrastructure. The summit focuses on real world challenges that affect the sector, including fraud prevention, secure automation, cloud governance, and the role of emerging technologies in reducing operational risks. This creates an environment where cybersecurity strategy becomes central to every conversation.
Participants explore how customer centric innovation, automation, and advanced analytics can be implemented safely without exposing institutions to systemic vulnerabilities. The event also highlights regulatory expectations and security practices that support resilience in high risk financial environments. By connecting senior technology leaders from across the region, the summit provides practical insight into strengthening security culture, improving incident preparedness, and designing future ready digital systems. Cybersecurity remains at the core of every discussion because it is essential for trust and stability in the BFSI ecosystem.
Physical • Paid • Part of Exito Media Concepts Pvt Ltd
16th April 2026 | Oracle AI World Tour 2026: Tokyo
Oracle AI World Tour 2026 brings free one-day events to major cities worldwide. These gatherings let participants hear from Oracle leaders, technology partners, and local business professionals about the newest breakthroughs in AI-powered cloud applications, databases and infrastructure. Attendees will get a firsthand look at the latest Oracle AI capabilities, real world use cases and practical strategies for integrating AI into business operations across sectors.
The tour encourages networking with peers, sharing ideas with Oracle’s partner community and seeing how companies around the world apply AI for competitive advantage. For organizations focused on security and compliance, sessions on cloud infrastructure and identity-and-access management are especially relevant. The event offers a chance to learn how AI may accelerate transformation while keeping data and workloads secure and well governed.
Physical • Free • Part of Oracle
Protecting converged IT and OT environments in critical infrastructure requires a different security model than traditional enterprise IT. This session examines how operators in water, energy and transport sectors can build effective security operations that safeguard industrial control systems, SCADA networks and safety critical systems while maintaining uptime and meeting regulatory demands.
The discussion explores the key differences between IT and OT security, recent threat activity including nation state groups such as Volt Typhoon and ransomware targeting critical national infrastructure, and why unified monitoring across both domains is essential. Attendees will see how to design a converged SOC model that blends security and engineering expertise, aligns with frameworks such as CAF v4.0, NIS2 and NIST, and supports phased implementation from quick wins to longer term transformation.
Company_Webinar • Part of Bridewell
Open source ecosystems are under sustained attack, and the tactics are getting more targeted, stealthy, and developer-focused.
In this Threat Research Round-Up, ReversingLabs Threat Researchers break down real-world campaigns uncovered in Q1 2026, including npm packages delivering remote access trojans, malicious VS Code extensions stealing secrets, and NuGet-based attacks targeting financial workflows and developer environments.
Join us for a behind-the-scenes look at how these attacks work, how they evade traditional controls and how your team can leverage Spectra Assure Community like our research team does to detect threats.
Attendees will receive an attendance certificate to be used towards CPE credit.
Company_Webinar • Part of ReversingLabs
16th April 2026 | IDC: FutureTech Summit 2026
IDC: FutureTech Summit 2026 is a strategic European event focused on the convergence of cloud, data, and infrastructure to support large scale AI adoption. Designed for CTOs, IT architects, and senior technology leaders, the summit addresses how enterprises can move beyond isolated AI pilots and build secure, resilient, and scalable digital foundations. The event highlights the growing importance of trusted systems, governance, and architecture as AI becomes central to business operations.
The summit emphasizes cybersecurity as a core enabler of AI driven transformation, particularly in protecting data, infrastructure, and autonomous operations. Attendees gain insight into how organizations are aligning technology investments with long term risk management, compliance, and resilience goals. Through IDC research and expert analysis, the event provides guidance on preparing systems, teams, and leadership for secure AI innovation at scale.
Physical • Paid • Part of IDC
16th April 2026 | Vulnerable KVMs Give Attackers Remote Access: New Threat Research
KVM devices provide remote physical access to enterprise systems but can introduce significant security risks if not properly secured. This webinar explores newly identified vulnerabilities in modern KVM devices, particularly lower cost models that may lack robust protections. The session focuses on how compromised KVMs can become a critical attack vector within enterprise environments.
Attendees will learn how attackers can exploit vulnerable KVM devices to perform keystroke injection, modify BIOS and firmware, and bypass security tools such as endpoint detection and vulnerability management systems. The discussion also covers practical strategies for mitigating these risks while maintaining the operational benefits of KVM technology. The webinar provides insight into identifying and addressing hardware level security blind spots.
Company_Webinar • Part of Eclypsium
16th April 2026 | Next IT Security Benelux: April 2026
The Next IT Security Nordics conference series brings together experts from public institutions, private organizations, and financial sectors to strengthen the region’s collective cyber defense. Each edition focuses on practical ways to bridge collaboration gaps, improve information sharing, and align with evolving regulations that shape the cyber landscape. With a strong emphasis on cloud security and AI readiness, these events help leaders adopt secure architectures and prepare for emerging risks. Attendees gain access to real world insights from industry leaders, law enforcement specialists, and security practitioners who manage high stakes environments.
The conference highlights topics that are central to cyber resilience in the Nordic region. This includes strengthening communication between government and enterprise, improving compliance strategies, and reducing fragmentation in security operations. Keynotes from senior experts provide guidance on identifying threats across borders and responding to incidents that affect national and organizational continuity. Through these sessions, participants build a clearer understanding of cyber risk and gain tools to strengthen their own security programs.
Physical • Paid • Part of Next IT Security
16th April 2026 | BFSI IT Summit Indonesia 2026
The 34th Edition of the BFSI IT Summit by Exito is an in-person conference bringing together 150+ top technology leaders from the community. The summit is a learning and networking platform curated to deep dive into the imminent challenges faced by the BFSI sector and identify best practices to overcome the same.
Physical • Free • Part of Exito Media Concepts
16th April 2026 | Next Generation ZTNA: The Last Mile of Zero Trust
Many zero trust initiatives address VPN replacement, SaaS access, and authentication, but often leave critical access paths unprotected. This webinar examines how tools such as SSH, RDP, and database clients can fall outside consistent zero trust enforcement, creating hidden security gaps. The session focuses on why these overlooked access points present significant risk and how attackers exploit them.
Attendees will learn how next generation ZTNA extends zero trust principles across all access channels. The discussion explores how to enforce consistent security controls, improve visibility, and reduce exposure across environments. The webinar provides practical insight into closing last mile gaps and achieving a more complete zero trust architecture.
Company_Webinar • Part of Portnox
16th April 2026 | CIO Inspired Summit Dubai 2026
The CIO Inspired Summit Dubai 2026 connects technology leaders from across the region to examine cybersecurity, digital transformation, and innovation at enterprise scale. The event addresses the growing intersection of cloud adoption, AI, data governance, and cyber risk, helping CIOs understand how to protect critical assets while driving modernization. Discussions focus on securing complex digital ecosystems in fast moving and highly regulated environments.
Attendees engage with peers and industry experts to explore strategies for improving cyber resilience, managing emerging threats, and supporting business continuity. The summit emphasizes practical leadership insights, regional perspectives, and global best practices. CIOs leave better equipped to balance security, performance, and innovation while guiding their organizations through ongoing digital evolution.
Physical • Paid • Part of Inspired Business Media
16th April 2026 | Database Monitoring in Splunk Observability Cloud
Modern cloud environments rely on observability tools to monitor application and database performance across distributed systems. This webinar explores how integrated database monitoring within Splunk Observability Cloud helps teams gain visibility into query performance, resource utilization, and system behavior. The session focuses on improving troubleshooting by correlating database activity with application and infrastructure performance.
Attendees will learn how to identify inefficient queries, analyze execution patterns, and accelerate issue resolution using AI driven recommendations. The discussion also highlights how centralized monitoring reduces reliance on siloed tools and improves operational efficiency. The webinar provides practical insight into enhancing observability practices in cloud environments, with limited relevance to broader security considerations.
Company_Webinar • Part of Splunk (a Cisco Company)
16th April 2026 | How an AI Agent Hacked McKinsey’s AI Platform
Join our webinar to discover how a security firm deployed an autonomous AI agent against McKinsey’s internal AI platform., and learn about AI-driven attacks, prompt exploitation, and the tools to protect your business from being the next in line.
Learn what security teams need to know about AI-driven attacks, prompt exploitation, and the emerging need for AI pentesting.
Company_Webinar • Part of Outpost24
16th April 2026 | eSkimming Q1 2026 Threat Briefing
eSkimming has developed into a persistent and adaptive threat that operates within the browser, often bypassing traditional security controls and compliance assumptions. Attackers are increasing both the scale and sophistication of these campaigns, targeting digital supply chains and exploiting trusted scripts and services to steal sensitive data.
Findings from Q1 2026 research highlight how techniques such as silent skimming, modular infrastructure, and reinfection strategies enable attackers to evade detection and maintain access. The content examines why common defenses like CSP, SRI, and WAFs are becoming less effective, and outlines how security and compliance teams can respond. It also addresses the impact on PCI DSS alignment, data protection, and reducing the risk of undetected client-side attacks.
Company_Webinar • Part of Source Defense
16th April 2026 | OpenText Summit London 2026
OpenText Summit London 2026 explores how organizations can unlock new potential by combining AI powered digital knowledge workers with secure and governed information. The event focuses on agentic AI and intelligent automation as tools that enhance human work, not replace it. Attendees learn how organizations are reducing repetitive tasks, improving decision making, and strengthening cybersecurity while scaling AI across the enterprise.
Supported by real world examples and practical demonstrations, the summit shows how sovereign cloud solutions help organizations keep data secure, compliant, and locally governed while operating globally. Sessions emphasize the importance of a unified information layer in building responsible AI and resilient digital operations. Participants gain clear guidance on architecting systems that support innovation, security, and a limitless digital workforce.
Physical • Paid • Part of OpenText
16th April 2026 | Security First: Cape Town 2026
Security First: Cape Town 2026 explores the evolving role of cybersecurity in an AI driven world. With its 2026 theme, "Resilience Redefined: Securing the Human AI Era," the event examines how artificial intelligence is changing threat detection, identity management, and regulatory compliance.
This event offers a practical forum for cybersecurity professionals seeking clarity amid rapid technological change. Attendees gain insight into aligning human capability with intelligent systems while maintaining accountability and trust. Security First in Cape Town supports organizations aiming to build resilient security programs that can adapt to new risks while staying grounded in strong human oversight.
Physical • Paid • Part of Integrity360
16th April 2026 | CrowdTour: Montreal 2026
CrowdTour Montreal offers a full-day cybersecurity event designed to help organizations strengthen their defenses against modern threats. The program is tailored for security professionals seeking practical insights into improving detection, response, and overall resilience.
Attendees will hear from experts and customers sharing real-world experiences, with a focus on AI-powered defense and SOC transformation. The sessions also explore the capabilities of the CrowdStrike Falcon platform, followed by a networking session that enables meaningful connections within the security community.
Physical • Free • Part of CrowdStrike
16th April 2026 | CISOXGermany 2026
CISOX Germany 2026 is a high level cybersecurity event tailored for senior security leaders responsible for safeguarding critical digital assets. The event addresses the growing importance of resilience, compliance, and trust within Germany’s regulatory and industrial environment.
Security executives attending CISOX Germany engage in meaningful dialogue around leadership, governance, and long term cyber strategy. The event encourages knowledge sharing among peers who face similar regulatory obligations and operational challenges. By focusing on practical leadership insight rather than tactical solutions, CISOX Germany supports CISOs in strengthening organizational security posture and building sustainable cyber resilience.
Physical • Paid • Part of EDS
16th April 2026 | The Networking Deep Dive Finale: Outplay the Experts in eBPF & Cilium
Modern Kubernetes environments rely on advanced networking and security technologies to manage connectivity, observability, and protection across cloud native infrastructure. This webinar explores practical applications of eBPF and Cilium for addressing complex Kubernetes networking and security challenges through real world case studies and technical examples.
As the final session in the Isovalent webinar series, the event reviews how eBPF powered networking can support improved visibility, security, and operational control in cloud native environments. Participants will also take part in an interactive Jeopardy style Kahoot game that tests knowledge of Cilium, Kubernetes networking, and related technologies. The session provides an opportunity to learn from experts while engaging with the broader Isovalent community.
Company_Webinar • Part of Isovalent (Now Part of Cisco)
16th April 2026 | Data Center & AI Infrastructure Central Asia 2026
This event gathers regional and global stakeholders at a critical moment for Central Asia’s digital infrastructure growth. It aims to examine how the region is becoming a hub for modern data centers, AI-ready infrastructure, and cloud services. With projects like the first Tier IV data center in Astana underway, attendees will discuss how these developments support scalable, secure, and high-performance computing capacity. The conference offers a forum to address infrastructure design, sustainable energy use, data sovereignty, cross-border connectivity, and the AI ecosystems that rely on robust physical and policy backbone.
Given the deep link between data centre/I A infrastructure and the security of stored, processed, and transmitted data, this event is relevant to cybersecurity professionals. Discussions around data sovereignty, energy-efficient infrastructure, AI readiness, and cross-border connectivity inevitably overlap with data protection, resilience, and risk management. As Central Asia builds out digital infrastructure at scale, events like this help shape the frameworks and best practices needed to safeguard critical infrastructure and support secure AI deployment across the region.
Physical • Paid • Part of PEAK Events
16th April 2026 | Why Websites are Driving Increasing US Privacy Litigation and How to Prevent It
Online privacy litigation in the United States has risen sharply, driven by widespread data sharing practices that conflict with user consent and regulatory requirements. Many websites and mobile apps continue to transmit personal data to third parties despite opt-outs, leading to increased legal action under laws such as CIPA and heightened enforcement of regulations like CCPA.
The discussion breaks down the key causes behind this surge in litigation and the gaps in current privacy management practices. It also explores how continuous auditing of websites and applications can improve compliance across evolving regulations. Attendees will gain a clearer understanding of how to identify risks, strengthen privacy controls, and reduce exposure to legal and regulatory action.
Company_Webinar • Part of Privado
16th April 2026 | [Live Product Demo] GitGuardian Public Monitoring
Public repositories continue to expose sensitive credentials at scale, creating real risks for organizations. This live product demo webinar presents GitGuardian Public Monitoring and shows how it detects secrets such as API keys, cloud credentials, database connection strings, and private certificates exposed on public GitHub. The session highlights how continuous monitoring helps identify past, present, and potential leaks linked to an organization.
During the 20 minute demo, two experts walk through how the platform works and how teams can collaborate with developers to remediate exposed secrets more efficiently. The webinar also introduces a free tool designed to help organizations measure their exposure on public GitHub.
Company_Webinar • Part of GitGuardian
16th April 2026 | From Autonomous Exploitation to Market Risk: The Claude Mythos Briefing
Advances in frontier AI models are reshaping the cyber risk landscape by enabling automated, scalable, and rapid exploitation capabilities. The emergence of systems like Claude Mythos highlights how vulnerability discovery and multi-step attack execution are becoming faster and more accessible, reducing the time between exposure and attack.
The briefing explores how organizations can adapt by shifting from fragmented data to a unified, AI-driven defense strategy. Key topics include the rise of automated attack pipelines, improved visibility into identity and access pathways, and prioritizing risk based on real-world exploitability rather than static scores. It also addresses how to align security efforts with business impact while keeping pace with increasingly sophisticated threats.
Company_Webinar • Part of Check Point
16th April 2026 | Defending the Modern Supply Chain: A Live Demo
Software supply chains are becoming more complex as open-source dependencies and AI-driven development introduce new vulnerabilities at scale. With a large portion of critical risks tied to third-party code, traditional security tools often struggle to keep pace with evolving threats.
A live demonstration showcases how modern approaches can identify and remediate vulnerabilities within real-world applications. It highlights techniques for blocking malicious packages, accelerating detection with software composition analysis, and applying policy-based controls. The session also explores how AI-driven tools can automate remediation and improve efficiency, helping teams reduce supply chain risk while maintaining development speed and productivity.
Company_Webinar • Part of Veracode
16th April 2026 | Zero Trust with StrongDM on AWS
Zero Trust shifts access control away from network location and toward strong identity verification and fine-grained authorization. Applying this model in cloud environments can be complex, especially when managing access across multiple services and systems.
A hands-on workshop demonstrates how to implement Zero Trust access patterns using a privileged access management platform within AWS environments. It covers applying identity-based controls to managed database services, enabling just-in-time access workflows, and securing SSH resource access. Participants will gain practical experience configuring identity-aware access, reducing unnecessary exposure, and improving control over cloud infrastructure while maintaining flexibility for teams operating across distributed systems.
Company_Webinar • Part of StrongDM
16th April 2026 | Privacy Huddle: Behind the Scenes of DROP for Data Brokers
New requirements will soon mandate that data brokers honor DROP deletion requests starting August 1, 2026, introducing important changes for privacy and compliance programs. Organizations handling personal data must prepare for evolving expectations around data broker governance and regulatory enforcement.
This privacy-focused discussion provides insight into the DROP framework and its operational impact. It explores regulatory goals, technical considerations, and what compliance teams should anticipate when implementing deletion request processes. Participants will gain a clearer understanding of expectations from regulators and how to align internal practices with emerging data privacy requirements while strengthening accountability in data handling.
Company_Webinar • Part of DataGrail
16th April 2026 | HMG Strategy: Annual New York CIO Summit of America 2026
The HMG Strategy Annual New York CIO Summit of America brings together CIOs and senior technology leaders to discuss cybersecurity as a core leadership responsibility. The event examines how executives can balance innovation with security and risk management.
Sessions explore cyber resilience, data protection, and strategic oversight of security programs. The summit offers a collaborative environment for leaders to share experiences and strengthen executive level cybersecurity decision making.
Physical • Paid • Part of HMG Strategy
AI adoption in financial services is accelerating, bringing new challenges around trust, security, and regulatory compliance. This webinar explores how organizations can deploy AI responsibly while aligning with frameworks such as the EU AI Act, GDPR, and DORA. The session focuses on balancing innovation with governance to ensure AI systems operate securely and within regulatory boundaries.
Attendees will learn how to implement explainable AI, establish effective guardrails, and design architectures that support both compliance and performance. The discussion also covers how to manage risk, improve transparency, and maintain control over AI driven decisions. The webinar provides practical guidance on building secure, compliant, and trustworthy AI systems in highly regulated environments.
Company_Webinar • Part of Elastic
Explore expert insights from leading cybersecurity conferences worldwide. Stay ahead with analysis from RSA Conference, Black Hat, DEF CON, and other premier events. Get curated coverage of keynote speeches, emerging technologies, vendor announcements, networking trends, and industry shifts—all through the lens of conference intelligence that helps you maximize your event experience and business opportunities.
Discover some of the best AI Security speakers, recommended AI Security vendors, webinars and a ton more!
See our list of IAM Frustrations - and a ton more information on IAM Vendors, Webinars etc.
Learn more on matters relating to Third-Party Risk Management in Cybersecurity GRC - i.e. in being able to manage vendor risk at scale.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.