- Our Mission -

To provide the Cybersecurity Community with a useful and constantly updated conference directory.


About Us

Since 2013 we've published a Cybersecurity Conference directory which has become the 'go-to' place to discover where, when and what events are taking place in your community. We list all possible kind of events by Cybersecurity Niches, for a list click here.

Marketing Opportunities/ Conference Promotion

We specialize in creating leads and generate ticket sales for Cybersecurity Conferences. We've been indexing and promoting InfoSec events for the last six yearsand in that time we've established our brand and presence within the Search Engines which has had the result of generating a database of over 50K Cybersecurity Professionals that want to hear about events!

How Do I List My Event(s)?

As long as your event has Cybersecurity content then you're all good! Click here to upload a single event or for multiple conferences you'll need this link.

Is It Free?

Always has been, always will be.

Past, Present and Future Cybersecurity Events Directories

IT Security Events We Cover:

Aside from 'general' Cybersecurity Content we tend to list information on the following subjects:


As a result of our popular InfoSec Events listing directory (which is 100% free to list) we've become friends with literally every major event organizer in the community. We work with leaders in the space including SANS Institute, SC Magazine, IPExpo and a bunch more.

Imitation is the sincerest form of flattery definition (Oscar Wilde). Our content is regularly scraped by a bunch of other InfoSec community websites which we take as flattery so if you see another mega list be sure to remember where the data likely came from!

There are three main InfoSec event styles, Structured, Unconference, and hybrid.

A Structured event is by far the most common type of Cybersecurity Conference that we list. This format follows the traditional conference model and often times happens in tandem with other larger conferences such as Black Hat, RSA, etc. Attendees typically intermingle and attend one or more events. Talks are submitted to the local event ahead of time, (following a 'Call For Papers'), selected, and scheduled prior to the start of the conference.

In the Unconference event style it's completely attendee driven. Attendees appear at a predetermined time, discuss ideas, and collaboratively agree upon what the schedule will look like for that day. Talks that get the most attention and conversation get added to the schedule.