🚀 Be The First To Know: Cyber Events Alerts in Your State or Country


Get Early-Bird Discounts | Exclusive Offers | Recommended Events

Specific to cyber events in the Benelux Region!

You can unsubscribe at any time. We are fully compliant with GDPR regulations.


RECOMMENDED | Gartner Security & Risk Management Summit | 22 - 24 September, 2025

Best Cybersecurity Events in Netherlands

These are some of the more notable cyber events taking place in Netherlands.

Heads Up! It's free to submit your security event to this list.

  • One Conference, The Hague
  • BSides Amsterdam, Amsterdam
  • NLSecure[ID], Utrecht
  • Amsterdam Cyber Security Conference, Amsterdam
  • Infosecurity Netherlands, Utrecht
  • Hague Cyber Security Week, The Hague
  • ISACA Netherlands Chapter Events, Amsterdam
  • Cyber Security in the Netherlands, Rotterdam
  • Hack in the Box Security Conference, Amsterdam
  • Global Conference on Cyber Security (GCCS), The Hague

The Netherlands is emerging as a global leader in cyber security, with continued efforts to protect against malicious data threats and cybercrime. As one of the most digitally connected countries in Europe, the nation has long acknowledged the necessity of robust security strategies to protect both businesses and citizens alike.

The Netherlands is home to a multitude of corporate technology companies, many of which focus on cyber security. As such, numerous cybersecurity conferences, events, and summits are hosted in the country each year. Notably, the cybersecurity conferences KilalaSec, Usenix, and Black Hat all take place annually in Amsterdam.

On a global scale, the Netherlands is ranked as one of the safest countries for cyber security. It is one of the first countries to adopt the European Network Information Security Directive, as well as one of the earliest adopters of the EU’s General Data Protection Regulation.

The nation values strong collaboration and public-private partnerships, which are seen as essential in addressing cybersecurity issues as well as developing the latest solutions. The National Cyber Security Center (NCSC) works closely with government, industry leaders, and academia to detect and respond to threats in real-time, as well as to test network security systems before they go live.

To promote cyber security innovation, the Netherlands also hosts an annual cybersecurity challenge, inviting developers from all over the world to participate in this unique competition. In addition, the government has allocated funds in recent years to deter cybercrime, emphasizing investment in research and action towards cyber defense.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

To see today's events, scroll past this table.

Event Name Event Date Event Type Country Region US State City Event Format Event URL
2025-12-09 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-12-08 Training Netherlands EMEA Hague Hybrid (both)
2025-11-27 Conference Netherlands EMEA Bussum Physical
2025-11-25 Conference Netherlands EMEA Nieuwegein Physical
2025-11-24 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-11-24 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-11-20 Conference Netherlands EMEA Amsterdam Physical
2025-11-18 Conference Netherlands EMEA Amsterdam Physical
2025-11-13 Conference Netherlands EMEA Amsterdam Physical
2025-11-13 Conference Netherlands EMEA Amsterdam Physical
2025-11-08 Conference Netherlands EMEA Amsterdam Physical
2025-10-30 Conference Netherlands EMEA Haarlem Physical
2025-10-25 Conference Netherlands EMEA Nieuwegein Physical
2025-10-21 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-10-15 Conference Netherlands EMEA Utrecht Physical
2025-10-02 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-10-02 Conference Netherlands EMEA Eidhoven Physical
2025-10-01 Training Netherlands EMEA Amsterdam Physical
2025-09-23 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-09-23 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-09-15 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-09-15 Training Netherlands EMEA Hague Hybrid (both)
2025-09-09 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-09-05 Conference Netherlands EMEA Amsterdam Physical
2025-09-01 Training Netherlands EMEA Amsterdam Hybrid (both)
2025-08-28 Conference Netherlands EMEA Amsterdam Physical
2025-08-28 Conference Netherlands EMEA Amsterdam Physical
2025-08-25 Conference Netherlands EMEA Amsterdam Physical
2025-08-08 Conference Netherlands EMEA Geestmerambacht Physical

08 August 2025

Netherlands

WHY2025


WHY2025 is an international non-profit outdoor hacker camp/conference taking place in The Netherlands in the summer of 2025. It is the successor of a string of similar events happening every four years: GHP, HEU, HIP, HAL, WTH, HAR, OHM, SHA and MCH. Similar events are EMF in the UK and CCC Camp in Germany. The camp is organised for and by volunteers from and around all facets of the international hacker community. It attracts over 3500 hackers from all around the globe. Knowledge sharing, technological advancement, experimentation, connecting with your hacker peers and of course hacking are some of the core values of this event. During the camp there are hundreds of talks and activities to participate in. The name WHY2025 stands for What Hackers Yearn 2025

Tag

Upto 40% OFF Tickets! See All Offers

25 August 2025

Netherlands

Open Source Summit Europe 2025


The Open Source Summit Europe 2025 will be a premier event dedicated to the growth and development of open-source technologies. As one of the largest conferences in the open-source community, this summit will bring together innovators, developers, industry leaders, and enthusiasts from around the globe to explore the latest trends, tools, and challenges in the open-source ecosystem. Attendees will have the opportunity to participate in technical sessions, hands-on workshops, and networking events, all designed to foster collaboration and inspire new projects and solutions. The event will cover a wide range of topics including cloud computing, artificial intelligence, cybersecurity, and data privacy within the open-source domain. With contributions from top-tier organizations and thought leaders, participants will gain valuable insights into the future of open-source software development and how it is shaping industries worldwide. Open Source Summit Europe 2025 promises to be an engaging and transformative experience for professionals looking to stay ahead in this rapidly evolving field.

Tag

Upto 40% OFF Tickets! See All Offers

28 August 2025

Netherlands

Linux Security Summit (LSS) Europe 2025


The Linux Security Summit (LSS) Europe 2025 is a premier event focusing on the latest developments in Linux security. Organized for security professionals, developers, and IT experts, the summit brings together industry leaders and contributors to discuss pressing security issues within the Linux ecosystem. With cybersecurity threats evolving at a rapid pace, the event offers a vital platform for attendees to stay ahead of potential risks and vulnerabilities. This summit covers a wide range of topics, from kernel security improvements to innovative security tools, ensuring that participants leave with actionable insights that can be applied directly to their work. Participants can expect engaging discussions, workshops, and presentations led by top-tier experts in the field. The event not only fosters knowledge sharing but also provides a unique opportunity for networking, collaboration, and future collaborations. Linux Security Summit Europe 2025 promises to be an essential gathering for anyone working with Linux systems, helping attendees strengthen their security practices and improve overall system resilience. By attending, professionals will gain invaluable expertise, staying at the forefront of Linux security advancements and mitigating emerging threats in the ever-changing landscape of cybersecurity.

Tag

Upto 40% OFF Tickets! See All Offers

28 August 2025

Netherlands

AI_dev: Open Source GenAI & ML Summit Europe 2025


The AI_dev: Open Source GenAI & ML Summit 2025 is a premier event bringing together leading experts, developers, and researchers in the fields of Artificial Intelligence (AI), Machine Learning (ML), and open-source technologies. This highly anticipated summit offers a platform for sharing knowledge and exploring cutting-edge advancements in generative AI and machine learning. Attendees will gain insights into the latest trends, best practices, and open-source tools that are shaping the future of AI technology. Throughout the summit, thought leaders and innovators will discuss key topics ranging from the ethical implications of AI to the evolving landscape of machine learning frameworks and algorithms. Attendees can expect in-depth sessions, interactive workshops, and networking opportunities with like-minded professionals. The event also provides a unique space for collaboration, where developers and researchers can connect and explore the latest open-source contributions to GenAI and ML. With an emphasis on community-driven progress, AI_dev 2025 is the go-to event for anyone looking to stay ahead in the fast-moving world of AI and open-source development.

Tag

Upto 40% OFF Tickets! See All Offers

01 September 2025

Netherlands

Certified Cloud Security Professional (CCSP)


Get global Cloud Security recognition with the Certified Cloud Security Professional (CCSP) title! CCSP - IMF AcademyMany companies have concerns about adopting cloud architecture due to the inherent security risks. This Cloud Security training and certification - developed by the leading information security organization (ISC)2 in cooperation with the Cloud Security Alliance (CSA) - will prove your Cloud Security expertise at a global level. You will get the Cloud Security skills you need to manage cloud environments and purchase cloud services. Training overview The 5-day CCSP training provides a comprehensive review of Cloud Security concepts and industry best practices, covering the 6 domains of the Certified Cloud Security Professional (CCSP) Common Body of Knowledge (CBK): Architectural Concepts and Design Requirements Cloud Data Security Cloud Platform and Infrastructure Security Cloud Application Security Operations Legal and Compliance The training will help you review and refresh your Cloud Security knowledge and help you identify areas you need to study for the CCSP exam. Who should attend? The Certified Cloud Security Professional (CCSP) credential will be appropriate for midlevel to advanced professionals involved with IT architecture, web and Cloud Security engineering, information security, governance, risk and compliance (GRC) and IT auditing. Certified Cloud Security Professional (CCSP) – exam information The (ISC)2 exam to become a Certified Cloud Security Professional (CCSP) consists of 125 multiple choice questions. The exam takes 4 hours. The passing grade is 700 out of 1,000 points. The delivery is computer based and proctored by Pearson Vue at over 4,000 global testing centers. Learning objectives of the CCSP training After completing the Certified Cloud Security Professional (CCSP) training, you will be able to: Describe the building blocks necessary to develop cloud based systems, including concepts with regard to customer, provider, partner, measured services, scalability, virtualization, storage, and networking. You will also be able to understand the Cloud reference architecture based on activities defined by including standard documents. Identify the types of controls necessary to administer various levels of confidentiality, integrity and availability, with regard to securing data in the cloud. You will gain knowledge on topics of data discovery and classification techniques, digital risk management, privacy of data, data retention, detection, archiving, data event logging, chain of custody and non-repudiation, and the strategic use of Security Information and Event Management (SIEM). Identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. In addition to risk analysis, you will gain an understanding in how to prepare and maintain business continuity and disaster recovery plans, including techniques and concepts for identifying critical systems and lost data recovery. Demonstrate an understanding of the software development lifecycle. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments with regard to program interfaces, cloud application architecture, and how to ensure data and application integrity, confidentiality, and availability through identity and access management solutions. Demonstrate an ability to develop, plan, implement, run and manage the physical and logical cloud infrastructure through an understanding of the necessary controls and resources, best practices in monitoring and auditing, and the importance of risk assessment in both the physical and logical cloud infrastructures. Identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Topics covered include ethical behaviour and required compliance within regulatory frameworks, which includes investigative techniques for crime analysis and evidence gathering methods.

Tag

Upto 40% OFF Tickets! See All Offers

05 September 2025

Netherlands

OrangeCon Amsterdam


Experience the Hackers Community in The Netherlands! OrangeCon is a community driven, non-profit Cybersecurity Conference in the heart of The Netherlands. Meet old and new friends, listen to talks of Dutch leading cybersecurity experts, and level up your knowledge in one of our trainings. Expand your knowledge in one of the trainings Meet old and new friends at our vibrant community villages Experience talks of the leading cybersecurity experts in The Netherlands

Tag

Upto 40% OFF Tickets! See All Offers

09 September 2025

Netherlands

SpecterOps EU 2025 Trainings


On September 9 we start our four days of intensive training at the Marriott Hotel in Amsterdam, with both IDOT and TA in hybrid format. Adversary Tactics: Identity-Driven Offensive Tradecraft (AT:IDOT) As modern architecture increasingly shifts services and data from on-premises infrastructure to the cloud, Identity becomes the thread that ties everything together. Our Adversary Tactics: Identity-driven Offensive Tradecraft course is a follow-on to our Adversary Tactics: Red Team Operations course and offers an in-depth look at identity-driven attacks, targeting both on-premises and hybrid identities. Participants will learn how to abuse the intricacies of different authentication and authorization mechanisms to traverse on-premises and cloud environments, gain access to integrated systems, and even cross tenants. Participants will also be equipped with a practical approach to identifying known attack paths and forging new ones within complex operational environments and across people, processes, and technology. Adversary Tactics: Tradecraft Analysis (AT:TA) Your organization has just implemented the leading detection and response products. Are they configured with default configuration? How much faith should you have in your ability to detect sophisticated attacks? How would you simulate attacks to ensure robust detections are in place? This course will teach the importance of understanding the inner workings of attack techniques and telemetry availability and provide a workflow for developing robust detection analytics or data driven evasion decisions. Focusing on various Windows components and attacker TTPs, you will dive deep into how software abstracts underlying capabilities and how attackers can interact with deeper layers to bypass superficial detection capabilities. In Adversary Tactics: Tradecraft Analysis, we will present and apply a general tradecraft analysis methodology for offensive TTPs, focused on Windows components. We will discuss Windows attack techniques and learn to deconstruct how they work underneath the hood. For various techniques, we will identify the layers of telemetry sources and learn to understand potential detection choke points. Finally, the course will culminate with participants creating their own technique evasion and detection strategy. You will be able to use the knowledge gained to both use your telemetry to create robust detection coverage across your organization, and truly assess the efficacy of that coverage. Whether you are a red team operator or detection engineer, you will have a comprehensive understanding of several attack chains. Red team operators will learn an approach to analyzing their own tools, a better understanding of which techniques to select to evade detection, and how to better describe to defenders why an evasion was successful. Detection engineers will understand how to craft a strategy to create robust detections and better detect families of attacks.

Tag

Upto 40% OFF Tickets! See All Offers

15 September 2025

Netherlands

CISSP certification training


CISSP is one of the top-paying certifications in IT CISSP - IMF AcademyCISSP is an independent and one of the top-paying certifications in IT, year after year. In the list of the highest-paying certifications worldwide, 4 of the top 20 are security-related, including CISSP. Due to its breadth of coverage, CISSP is the de facto certification to show your competence in (cyber)security. The CISSP exam is challenging, but the benefits are immense. In this 5-day CISSP certification training you will gain core knowledge and experience to successfully implement and manage security programs and you will be optimally prepared to take the official (ISC)2 CISSP exam. Who should attend? The CISSP certification training is designed for experienced security professionals who want to expand their knowledge and gain an internationally recognized accreditation. This training is a must for network security specialists, IT managers, CISOs, CIOs, security managers, security auditors, security architects, security consultants, network architects, security systems engineers, security analysts, and for anyone interested in a senior career in information security. About (ISC)2 ISC2CISSP was developed and is maintained by (ISC)2. (ISC)2 is the global, non-profit leader in educating and certifying cyber, information, software and infrastructure security professionals throughout their careers. Join this elite network with over 170,000 certified industry professionals worldwide by obtaining the CISSP title. Other highly sought-after titles of (ISC)2 are Certified Cloud Security Professional (CCSP), Certified Cyber Forensics Professional (CCFP), Certified Secure Software Lifecycle Professional (CSSLP) and Systems Security Certified Practitioner (SSCP). What will you learn? The CISSP training is a comprehensive and compact review of information security concepts and industry best practices, and focuses on the 8 domains of the CISSP CBK (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity. Earning the CISSP title proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. The 5-day training provides an intensive and complete preparation to ensure that you will pass the (ISC)2 CISSP exam at the very first attempt. Get ready for the rigorous exam by joining this 5-day CISSP training! How to qualify for the CISSP certification? To qualify for the CISSP certification, you must: Have a minimum of 5 years of experience in 2 or more of the 8 CBK domains. You may be able to substitute 1 year of required work experience with a relevant 4-year college degree or an approved credential Pass the CISSP examination Complete the endorsement process and subscribe to the (ISC)2 Code of Ethics Maintain certification through Continuing Professional Education (CPE) credits

Tag

Upto 40% OFF Tickets! See All Offers

15 September 2025

Netherlands

IMF Academy: Cost Estimating Foundation September 2025


A successful project starts with a well-founded estimate of the costs. The 4-day Cost Estimating Foundation training will teach you the basics of cost estimation. You will learn approaches for different aspects of the estimating profession and how to apply them in your daily work. During this training, we emphasize practical experience as well as theoretical knowledge. Several small cases will be prepared during the training. This helps you familiarize yourself with the knowledge you have just gained and apply it to real-world situations. At the end of the Cost Estimating Foundation training you will have: An understanding of cost estimation, cost control, and planning definitions. You will also be able to read cost engineering reports and put it in the perspective of your project The knowledge to prepare and evaluate estimates quicker and more accurately. This will immediately affect the control you have over the cost of your project The ability to make your factor estimates and validate factor estimates prepared by others The knowledge to identify major cost risks of engineering. Together with the estimating methods, this means you will be able to estimate the engineering involved in your projects

Tag

Upto 40% OFF Tickets! See All Offers

23 September 2025

Netherlands

Certified Cost Technician (CCT)


The Certified Cost Technician (CCT) training is a 9-day program aimed at equipping participants with practical skills in total cost management, covering areas such as cost estimating, planning, scheduling, and risk management. It is designed for early-career professionals or those seeking to enhance their cost engineering skills. The training prepares attendees for the AACE Certified Cost Technician certification, requiring 4 years of industry experience or equivalent education.

Tag

Upto 40% OFF Tickets! See All Offers

23 September 2025

Netherlands

Certified Cost Professional (CCP)


The Certified Cost Professional (CCP) training, recognized globally, equips participants with skills in estimating, planning, and cost control for industrial projects, adhering to AACE International standards. It targets professionals involved in project execution, such as cost controllers and project managers. The CCP certification, requiring a technical paper and a rigorous exam, signifies advanced expertise in Total Cost Management, enhancing career prospects and earning potential.

Tag

Upto 40% OFF Tickets! See All Offers

01 October 2025

Netherlands

Identity Management & Access Control


The Identity Management & Access Control conference provided invaluable insights into the latest trends and technologies in cybersecurity. Attendees praised the expert-led sessions on multi-factor authentication, zero trust architecture, and identity governance. Networking opportunities were abundant, fostering collaboration among industry professionals. The event's comprehensive agenda and interactive workshops equipped participants with practical strategies to enhance their organization's security posture. Overall, it was a highly informative and engaging experience for all involved.

Tag

Upto 40% OFF Tickets! See All Offers

02 October 2025

Netherlands

Business Process Management (BPM) training


4-day training plus the AIIM Process Automation Certificate of Specialization to become a Business Process Management (BPM) Master. Learn from the global best practices for BPM and join the BPM Master training!

Tag

Upto 40% OFF Tickets! See All Offers

02 October 2025

Netherlands

DevOpsDays: Eidhoven 2025


DevOpsDays is a globally recognized series of community-driven conferences that bridges the gap between software development and IT operations. These events, hosted in various cities worldwide, bring together professionals from diverse industries to discuss critical topics like automation, continuous delivery, security, and the evolving DevOps culture. Each event provides a unique opportunity for attendees to engage with industry leaders, participate in interactive sessions, and share real-world experiences, challenges, and best practices. The conferences typically feature keynote presentations, ignite talks, and open spaces encouraging collaboration and in-depth discussions. Topics range from improving deployment pipelines and enhancing team collaboration to addressing emerging cybersecurity threats and incorporating AI in DevOps workflows. DevOpsDays events empower organizations to accelerate their digital transformation by fostering knowledge-sharing and networking while maintaining a strong focus on reliability and innovation. Whether you are a seasoned DevOps professional or a newcomer exploring the field, DevOpsDays offers a welcoming environment to learn, contribute, and connect with like-minded peers committed to driving technological excellence. These events are tailored for those who value continuous improvement and seek to stay ahead in an ever-changing tech landscape.

Tag

Upto 40% OFF Tickets! See All Offers

15 October 2025

Netherlands

Red Hat Summit: Connect Utrecht 2025


Red Hat Summit: Connect 2025 is a global series of in-person events designed to bring the Red Hat community together to explore the latest in open-source technologies, enterprise IT, and automation. With events planned across multiple cities worldwide, attendees can expect a rich agenda featuring keynote presentations, breakout sessions, hands-on labs, and networking opportunities. The events aim to provide insights into Red Hat's product portfolio, including Red Hat Enterprise Linux, OpenShift, Ansible Automation Platform, and cloud services, offering practical knowledge to help organizations innovate and adapt in a rapidly evolving technological landscape. A significant focus of Red Hat Summit: Connect 2025 is on integrating artificial intelligence (AI) and automation into enterprise environments. Attendees will learn about Red Hat's advancements in AI, such as the Red Hat AI Inference Server and OpenShift Lightspeed, which are designed to optimize AI workloads across hybrid cloud environments. These innovations not only enhance operational efficiency but also address critical aspects of cybersecurity by providing secure, scalable, and compliant solutions for modern IT infrastructures. By participating in these events, professionals can gain valuable insights into building resilient, secure, and intelligent systems that meet the demands of today's digital enterprises.

Tag

Upto 40% OFF Tickets! See All Offers

21 October 2025

Netherlands

IMF Academy: CISSP Certification Training


The CISSP training is a comprehensive and compact review of information security concepts and industry best practices and focuses on the 8 domains of the CISSP CBK (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

Tag

Upto 40% OFF Tickets! See All Offers

25 October 2025

Netherlands

IDC Security Summit: Netherlands 2025


The Security Summit is a premier event for IT leaders and cybersecurity professionals, focusing on digital security challenges. It features sessions on optimizing security operations, securing cloud environments, AI in threat detection, and network security solutions like zero trust architecture. The summit also addresses supply chain security and offers networking opportunities with industry leaders, providing attendees with insights and tools to enhance their organization's cybersecurity defenses.

Tag

Upto 40% OFF Tickets! See All Offers

30 October 2025

Netherlands

WICCON 2025


A two-day cybersecurity conference that puts women’s technical achievements in the spotlight. WICCON recognizes and showcases women’s success in the cybersecurity field. We want to inspire the rest of the community to pursue a career in security and demonstrate how women can be successful subject matter experts. The hard stuff doesn’t scare us, and we’re ready to talk about what truly matters in the field. WICCON is organized by WICCA, the women in cybersecurity community of 1000+ members who meet monthly to discuss all things information security.

Tag

Upto 40% OFF Tickets! See All Offers

08 November 2025

Netherlands

DEATHCon: Amsterdam 2025


DEATHCon 2025 is a cutting-edge cybersecurity conference designed to spotlight the dark corners of digital defense, offensive security, and hacker culture. With multiple themed events spanning red teaming, ethical hacking, and cyber threat intelligence, it offers a gritty, high-energy environment tailored for seasoned security professionals, exploit developers, and underground researchers. It merges technical deep dives with unconventional, hacker-style workshops and contests, creating an engaging space for hands-on learning. This event stands out for its unapologetically raw take on cybersecurity, channeling the spirit of grassroots hacker conventions while also integrating structured presentations and expert-led panels. DEATHCon is more than just a conference — it’s a community-driven experience for those who live and breathe code, reverse engineering, and cyber warfare. Expect original content, bold discussions, and a relentless pursuit of truth in the digital trenches.

Tag

Upto 40% OFF Tickets! See All Offers

13 November 2025

Netherlands

Next IT Security Benelux: November 2025


Returning in November 2025, the Next IT Security Benelux event will again provide a critical platform for IT leaders and cybersecurity professionals. Participants will explore the latest trends, tools, and strategies for safeguarding digital assets. Topics of focus will include cyber-resilience, incident response planning, and securing remote work environments. With an agenda packed with actionable insights and opportunities for peer networking, the event equips attendees to tackle the region’s evolving cyber threats.

Tag

Upto 40% OFF Tickets! See All Offers

LOAD MORE +

Need help promoting your event? Contact us! | Sitemap