Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2025, 2026, and beyond. This carefully curated list caters to chief information security officers (CISOs), cybersecurity leaders, technology executives, and anyone passionate about the field.
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.
15th December 2025 | International Conference on AI and Materials for Sustainability - AIMS 2025
AIMS 2025 is a global conference focused on leveraging artificial intelligence and materials science to address sustainability challenges. Scheduled for 15–17 December 2025 at Fairmont Bab Al Bahr, Abu Dhabi, the conference brings together researchers, industry leaders, and policymakers to explore innovations in water, energy, and climate.
Key themes include carbon capture, hydrogen technologies, sustainable energy materials, AI-driven material design, digital sustainability, and circular energy transitions. The conference also emphasizes collaboration between academia and industry, and the integration of science, engineering, and policy.
Abstract submissions are open until 20 September 2025 via https://www.aims2025.com/abstractportal.
For details, contact aims@iitdabudhabi.ac.ae or call +971 (2) 495 8510.
Physical • Paid • Part of MCI Middle East LLC
15th December 2025 | International Conference on AI and Materials for Sustainability - AIMS 2025
AIMS 2025 is a global conference focused on leveraging artificial intelligence and materials science to address sustainability challenges. Scheduled for 15–17 December 2025 at Fairmont Bab Al Bahr, Abu Dhabi, the conference brings together researchers, industry leaders, and policymakers to explore innovations in water, energy, and climate. Key themes include carbon capture, hydrogen technologies, sustainable energy materials, AI-driven material design, digital sustainability, and circular energy transitions. The conference also emphasizes collaboration between academia and industry, and the integration of science, engineering, and policy.
Abstract submissions are open until 20 September 2025 via https://www.aims2025.com/abstractportal.
For details, contact aims@iitdabudhabi.ac.ae or call +971 (2) 495 8510.
Physical • Paid • Part of MCI Middle East LLC
16th December 2025 | Threat Watch Live - December
This session reviews the most significant cyber incidents of 2025 and highlights the lessons security teams should carry forward into the new year. Heimdal founder Morten Kjaersgaard joins the discussion to break down what these events revealed about attacker behavior, organizational weaknesses and the trends reshaping the threat landscape.
The webinar also looks ahead to the major risks expected in 2026, outlining which shifts are likely to matter most and what actions security leaders can take now to strengthen readiness. Attendees receive practical guidance for adapting their strategy, anticipating emerging threats and preparing their organization for the challenges of the coming year.
Company_Webinar • Part of Heimdal
16th December 2025 | QCon AI 2025 | December 16-17
QCon AI (Dec 16-17, 2025): The AI software conference for senior practitioners using AI to accelerate the SDLC. Learn practical patterns from peers to build faster, avoid missteps, manage MLOps, and scale reliably. No hype, just real-world takeaways.
Physical • Paid • Part of QCon
16th December 2025 | The Future of DAST
The discussion focuses on how dynamic application security testing must evolve as AI generated code accelerates development and widens the gap between speed and security. The session examines why traditional approaches struggle to keep pace and what a modern, production ready DAST strategy looks like as organizations move into 2026. Experts share practical insight into current market trends, customer experiences and the role unified AppSec platforms play in bringing context and prioritization to testing.
Attendees will hear why DAST is seeing renewed relevance in the AI era, how runtime security expectations are shifting and what tactics organizations are using to strengthen coverage without slowing development. The webinar offers guidance for teams building an updated application security strategy that matches today’s rapid release cycles.
Company_Webinar • Part of Checkmarx
16th December 2025 | Rubrik Holiday Lunch & Learn: Sleigh Your Cyber Recovery
Rubrik is hosting a technical deep-dive on Isolated Recovery Environments and how to achieve the fastest possible cyber RTO through automated orchestration and strategic architecture. If you're finalizing 2025 disaster recovery plans or evaluating ways to improve your recovery posture, this session on December 10th at noon is designed exactly for that.
You'll see a live demo of the platform, learn about IRE architecture options including partnerships with Rackspace and Iron Mountain, and walk away with actionable insights. Plus, they're sending all attendees a $50 UberEats card as a holiday thank you, and anyone who books a follow-up meeting gets a $150 gift card for holiday shopping.
Company_Webinar • Part of Rubrik
16th December 2025 | Turning Your Tech Stack into Profit: Market Your MSP to Win Clients
This webinar focuses on helping MSPs bring their security stack to market with a clear and compelling message. CyberFOX experts Wes Spencer and Bill Morgan walk through practical approaches for presenting security services in a way that resonates with business decision makers. The session explains how to position an MSP’s security strategy as essential protection, not an optional add on, and how to frame its value in language prospects immediately understand.
Attendees will hear guidance on strengthening credibility, showcasing expertise and creating messaging that supports confident sales conversations. The webinar also includes access to customizable marketing materials that MSPs can use to promote their services and reinforce the importance of a well built security offering.
Company_Webinar • Part of CyberFOX
16th December 2025 | App-Centric Security: How Mobile App Vetting Fits Into Your Security Stack
This session focuses on the security risks that remain inside mobile applications even when organizations rely on MDM and MTD tools. The webinar explains why mobile app vetting has become a necessary layer in enterprise protection and how evaluating apps for security, privacy and compliance issues helps close gaps that traditional controls miss.
Quokka walks through the core elements of an effective app vetting program and shows where this approach fits within a modern security stack without disrupting users. The presentation includes a demo of Q scout and how it integrates with platforms such as Microsoft and Hexnode to support app centric security across the enterprise.
Company_Webinar • Part of Quokka
16th December 2025 | The 2026 Identity Threat Outlook: Secrets, NHIs, AI Agents and What’s Next
The webinar examines the identity security threats expected to shape 2026 and outlines the attack vectors that matter most for security teams. Speakers from Akeyless and KuppingerCole Analysts break down how AI, automation and new offensive techniques are accelerating attacks on both human and non human identities. The session also highlights how secrets sprawl and unmanaged machine identities are expanding the internal attack surface across modern enterprises.
Security leaders will get a clear view of the trends that will influence identity programs in the coming year, including the rise of AI driven threats and the growing pressure to secure machine level access. The discussion provides guidance on the risks that require urgent attention and the areas where organizations need to strengthen their defenses before 2026.
Company_Webinar • Part of Akeyless
16th December 2025 | The 2026 Guide to Securing AI-Generated Code at Scale
The webinar examines why AI generated code has quickly become a major security concern for engineering and AppSec teams and outlines what organizations must change as they move into 2026. James Berthoty and Boaz Barzel break down the risks that appear when AI driven development scales and explain how those risks can go unnoticed without the right policies and controls. The session gives a clear picture of the security gaps created by high velocity coding workflows powered by AI assistants.
Attendees will hear practical guidance on defining guardrails, managing Shadow AI and embedding modern application security checks directly into fast moving development pipelines. The speakers also show how AI powered security tools can analyze code, enforce policy and remediate issues at the pace development teams now operate. This webinar is built for CISOs, AppSec leaders and engineering managers who need structured frameworks to secure AI driven development without slowing innovation.
Company_Webinar • Part of OX Security
16th December 2025 | Navigating Privacy Regulations Without Losing Fraud Visibility
This session focuses on how rising privacy protections are reshaping fraud detection and why many organizations are struggling to maintain visibility in a privacy first world. The webinar examines the real impact of regulations like GDPR, CPRA and DMA on identification accuracy and shows how reduced insight creates opportunities for more sophisticated attackers. Participants will also see why so many teams are now exploring persistent, privacy compliant identification methods to close these new gaps.
Speakers break down the common misunderstandings that product, fraud and security teams face when navigating modern privacy rules and explain how organizations can balance user protection with effective detection. The discussion covers how AI agents may influence future privacy policy, how regulatory changes could affect fraud workflows and the principles behind building a compliant, low friction identification strategy that still delivers the visibility teams need.
Company_Webinar • Part of Fingerprint
16th December 2025 | Mac in 2026: Secure by Design Meets the Enterprise
This session looks at how Apple’s Secure by Design approach is evolving inside the enterprise and why Mac devices are becoming a stronger option for organizations focused on Zero Trust security. The discussion explains how integrated hardware and software protections support modern security outcomes while fitting smoothly into existing enterprise environments and management workflows.
Attendees will hear the key reasons behind rising Mac adoption in large organizations, the challenges teams face when applying Zero Trust principles to Apple endpoints and the innovations that improve security and performance for Mac fleets. The webinar also highlights how Jamf works with Microsoft, CrowdStrike, Palo Alto Networks, Zscaler and Okta to support enterprise workflows and addresses the most common issues that appear as Mac usage expands.
Company_Webinar • Part of Jamf
17th December 2025 | Data-First Forum: Holiday Cheer for Your Cybersecurity Career
This webinar highlights how professionals at every stage of their career can grow and succeed in the rapidly expanding cybersecurity field. Melissa Rappl, CISO at Children’s Nebraska, and Matt Radolec, VP of Incident Response at Varonis, share guidance on developing the skills and mindset needed to advance, whether someone is new to the industry or working toward leadership roles. The session focuses on how the talent landscape is shifting and what opportunities are emerging as cybersecurity continues to evolve.
Attendees will gain practical insights on navigating career growth, understanding modern expectations in security teams and positioning themselves for long term success. The discussion also offers encouragement for those entering the field and direction for experienced professionals aiming to take the next step.
Company_Webinar • Part of Varonis
17th December 2025 | When Cyber Threats Feel Human: The 2026 Identity Wake-Up Call
This session examines the growing pressure on digital identity security as credential theft, weak authentication and AI driven phishing continue to dominate attack patterns. The discussion focuses on why identity protection must be strengthened across organizations and how the next wave of cyber threats is becoming more humanlike and harder to detect.
Participants will hear insights from Yubico’s Global State of Authentication research along with practical steps to improve identity resilience. The webinar highlights key trends, regulatory expectations and the actions both individuals and enterprises can take to reduce risk and reinforce trust in a rapidly shifting threat landscape.
Company_Webinar • Part of Yubico
17th December 2025 | AI SOC Fact vs. Fiction
Cut through the AI noise and get a clear reality check on what AI can and cannot do in the security operations center, straight from Simbian’s hands on experience building some of the largest AI SOCs. The discussion separates genuine capabilities from vendor hype and gives practical guidance teams can apply immediately.
Attendees will get a fact versus fiction view of AI SOCs so they understand where human expertise remains essential, a set of evaluation questions to spot chatbox wrappers and operational blind spots, and a practical roadmap for evolving from today’s overloaded SOC to more proactive, AI-augmented security operations.
Company_Webinar • Part of Simbian
17th December 2025 | AI SOC: Fact vs Fiction
Cut through the AI hype in security operations with Simbian, as experts separate fact from fiction about AI in the SOC. Drawing on hands-on experience building some of the largest AI-enabled SOCs, the session delivers practical tools and a clear framework to plan and evolve your security operations.
You will learn what AI SOC tools can and cannot do and how they extend, not replace, human teams, which questions reveal hidden vendor limitations, and a phased roadmap from today’s reactive SOC to proactive, AI-powered SecOps. Register for the live session to get actionable guidance for your AI SOC strategy.
Company_Webinar • Part of Simbian
17th December 2025 | Why code quality is a compliance accelerator
The webinar explains how strong code health works as the technical foundation for a compliant software environment. The session connects everyday development practices with broader compliance goals and shows why improving code quality has a direct impact on meeting regulatory and internal standards. Speakers will demonstrate how SonarQube automates key steps in the compliance journey by identifying issues early and supporting consistent, verifiable code practices.
Attendees will get a clear view of the difference between what a team builds and the underlying quality it is built on, along with practical examples of how healthier code leads to a more compliant codebase. The discussion also highlights how automation simplifies the process of proving compliance and makes it a natural outcome of well managed development workflows.
Company_Webinar • Part of Sonar
17th December 2025 | CPE | NIST 2.0: Common Failures and Their Impact on Cybersecurity Resilience
The session examines the most common mistakes organizations make when adopting the NIST Cybersecurity Framework 2.0 and shows how those gaps weaken overall resilience. The panel breaks down where implementations typically fall short, including misaligned risk assessments, poor governance structures and inconsistent supply chain oversight. Real world examples illustrate how these issues lead to measurable security failures.
Attendees receive clear guidance on strengthening their approach to NIST 2.0, with a review of the framework’s key updates and what they mean for modern security programs. The webinar provides practical steps for improving risk management, tightening compliance processes and building a more resilient posture that aligns with NIST’s updated expectations.
Company_Webinar • Part of Anchore
17th December 2025 | VPN Replacement Made Simple: How SMEs Can Modernize Secure Access with ZTNA
Small and midsize enterprises are facing growing security gaps as legacy VPNs reach end of life and struggle to support modern remote and hybrid work. This webinar shows how ZTNA provides a more secure and reliable access model by removing the latency, connection issues and management overhead that come with traditional VPNs. The session explains how ZTNA improves user experience, strengthens verification and reduces the risks created by outdated remote access tools.
Speakers will outline the essential capabilities to look for in an enterprise ready ZTNA solution and share practical steps for migrating without downtime. The discussion also highlights how unified ZTNA brings continuous posture checks, inline threat defense and smoother performance for cloud and SaaS access. The webinar is designed for security and network leaders preparing to modernize secure access before VPN EOL forces rushed changes.
Company_Webinar • Part of Versa Networks
17th December 2025 | PCI DSS 4.0.1 Controls are Not Stopping eSkimming
This session focuses on the growing gap between PCI DSS 4.0.1 requirements and the realities of eSkimming threats on modern websites. The discussion outlines why common controls like CSP, SRI and homegrown script monitoring fail to keep pace with dynamic scripts, frequent third party changes and the scale of client side activity in every customer session. Speakers explain how these shortcomings create openings for eSkimming, credential theft and silent data leakage that PCI programs often underestimate.
Attendees will hear what card brands and QSAs are now expecting in PCI reviews, how browser side risks are evaluated and what a modern, behavior based defense looks like in practice. The session shows how organizations can build a reliable script inventory, close client side security gaps and reduce the effort required to stay compliant. Practical guidance is included for eliminating sitewide vulnerabilities and strengthening protection against real world eSkimming attacks.
Company_Webinar • Part of Source Defense
17th December 2025 | Live Debate: Which Cyber Trends, Threats & Techniques Will Dominate 2026?
This debate brings together cybersecurity leaders to examine which emerging threats are most likely to shape 2026. The speakers compare identity based attacks, cloud misconfigurations and AI driven offensive techniques, outlining why each vector is becoming more dangerous as environments expand and attackers move faster. Their discussion draws heavily on evidence from ongoing investigations and industry wide intelligence.
Participants will hear competing viewpoints on the trends and tactics that demand the most immediate attention and what organizations should do now to prepare. The session offers a clear look at the attacker behaviors that are gaining momentum and highlights the operational weaknesses businesses need to close before these threats intensify. Attendees will also have the opportunity to vote on which perspective best outlines the dominant risk for the coming year.
Company_Webinar • Part of Blackpoint
17th December 2025 | RENEWSEC 2025
RENEWSEC 2025 (A Premier OT Cybersecurity Summit in Renewable Energy Sector) scheduled to be held in 17th - 18th Dec 2025 at Pride Plaza Hotel, Aerocity, New Delhi.
This is one of India’s first dedicated summit focusing on cybersecurity challenges and solutions in the renewable energy ecosystem. This event will bring together CISOs, OT Cybersecurity Leaders, Regulators & Policy Makers, RE Producers (Solar, Wind, Hydro, Biomass, Geothermal & Green Hydrogen), Nuclear, NLDC, RLDCs, SLDCs, DISCOMs, TRANSCOs and Technology Innovators to collaborate, share insights, and drive security transformation in Renewable Energy Sector.
Physical • Paid • Part of CONFEX Exhibition & Conference Pvt Ltd
17th December 2025 | File System Scanning, BYOS Policy, and Vulnerability Search
This webinar highlights the newest Anchore Enterprise capabilities that strengthen security for both container and non container assets. The session introduces expanded file system scanning so teams can analyze items like VMDKs, source archives and individual packages within the same platform that manages their container security. Attendees will see how these updates improve visibility, compliance validation and overall software supply chain assurance.
The discussion also covers real time compliance checks for imported SBOMs, faster vulnerability searches to help identify zero day exposure and broader STIG profile support for configuration hardening. A live demo shows how these features work together to give security teams clearer insight into risk and stronger control over complex environments.
Company_Webinar • Part of Anchore
17th December 2025 | San Diego Cyber Group Meetup (December 2025)
This is a fun meetup for the cyber community in San Diego. Hosted by David Spark of the CISO Series. We'll have conversation about cyber, a few silly games, and a guided discussion.
We're open to your suggestions. And we're looking for help. Message us if you'd like to get involved in the event.
We'll have food and drink for the first 60 people who show up!
This event is ONLY for people who work in cybersecurity or who are studying cybersecurity.
HUGE thanks to our sponsors Anvilogic and Check Point.
Physical • Free • Part of San Diego Cyber Group
17th December 2025 | CyberRisk CISO Dinner: Portland 2025
The CyberRisk CISO Dinner in Portland offers cybersecurity executives a private environment for meaningful discussions on emerging risks and defense strategies. Attendees engage in peer-to-peer exchanges that highlight practical solutions for evolving security challenges.
The dinner fosters community building and equips leaders with new ideas to strengthen organizational resilience against modern threats.
Physical • Free • Part of CyberRisk Alliance
17th December 2025 | Level Up Your Defense: Reduce Risk Across Your Network
This event takes a straightforward look at how security teams can reduce network risk as environments grow more complex. FireMon specialists outline practical ways to gain real time visibility across hybrid networks and show how stronger control over firewall policies helps teams cut down noise, focus on real issues, and stay ahead of emerging threats.
The session highlights key use cases that demonstrate how faster issue discovery, smarter cleanup of outdated rules, and continuous policy tuning improve both security posture and compliance. Attendees also see how integrated change tracking and contextual insights support quicker response and more confident decision making across the network.
Company_Webinar • Part of FireMon
17th December 2025 | AuditBoard Live: IT Compliance and Risk Management
This webinar gives a clear look at how organizations can strengthen IT compliance, third party risk programs and overall cyber resilience using AuditBoard’s platform. The session explains how modern businesses can manage growing regulatory demands, vendor complexity and evolving risks by adopting a unified approach to compliance and governance. Presenters walk through practical methods for scaling a multi framework program and improving visibility across the IT environment.
Attendees will see how to evaluate vendors more effectively, assess risk across the supply chain and apply governance controls that support responsible AI adoption. The walkthrough also highlights new capabilities within AuditBoard and provides guidance on understanding the threat landscape and quantifying risk. The event includes an interactive segment where participants can ask questions and explore real use cases.
Company_Webinar • Part of AuditBoard
17th December 2025 | Taming Tool Sprawl: How Portnox Unifies Security Through Smarter Integrations
Security teams are facing growing risk as disconnected tools create gaps in visibility and overwhelming alert noise. This webinar examines how Portnox reduces tool sprawl by unifying device intelligence and security controls through smarter integrations, giving teams a clearer and more reliable view of their environment. The session explains why fragmented stacks lead to missed threats and operational blind spots, and how consolidation strengthens overall security posture.
Attendees will see how centralized insights help cut through alert overload, improve detection accuracy and streamline daily workflows. The discussion highlights practical ways to bring order to complex security environments and shows how a unified approach lowers risk while making teams more effective.
Company_Webinar • Part of Portnox
18th December 2025 | 2025 CTO Global Summit: Chapter 8
CTO Global Summit 2025 is a premier executive program designed specifically for technology leaders mastering the challenges and opportunities of AI transformation. Structured across multiple chapters from September to December, the summit provides an immersive learning experience where CTOs explore emerging technologies, exchange real-world implementation insights, and develop best practices for guiding their organizations through AI-driven change. Each chapter features focused sessions with thought leaders, practical frameworks, and opportunities for peer-to-peer knowledge sharing.
Beyond the executive track, the event includes the DevTool Arena, where developer tool teams compete live to showcase products directly to over 1,000 tech decision-makers, driving rapid adoption and visibility. Investors benefit from early access to rising companies through live pitches and market feedback, while service providers connect with executives to identify genuine client needs. With live demos, keynote presentations, interactive voting, and high-value networking, CTO Global Summit 2025 is positioned as a must-attend global platform for decision-makers shaping the future of AI transformation and digital innovation.
Online • Paid • Part of Geekle.us
18th December 2025 | Simplifying everyday Active Directory operations.
The "Simplifying Everyday Active Directory Operations" webinar provided valuable insights into streamlining Active Directory management. Attendees appreciated the expert-led sessions that covered automation techniques, best practices, and troubleshooting tips. The event was well-organized, with clear presentations and interactive Q&A sessions. Participants found the practical demonstrations particularly useful for real-world application. Overall, the webinar was highly informative, equipping IT professionals with tools to enhance efficiency in Active Directory operations.
Online • Part of ManageEngine
Discover today’s top cybersecurity conferences, seminars, and industry events happening globally. Stay updated with the latest infosec trends, expert speakers, and networking opportunities—all in one place.