Cybersecurity Conferences in Maryland

Discover Security Events in Maryland

Get Maryland Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Maryland is considered one of the most advanced and innovative states when it comes to cybersecurity. It offers several conferences and events every year meant for members of the information security community, both online and in-person.

With the rise of ransomware, DDoS attacks, and sophisticated malware attacks, Maryland is taking the necessary steps to ensure that its citizens’ data is secure and that their interactions over the Internet remain safe.

The University of Maryland, Baltimore County, is home to the Maryland Cybersecurity Center (MC2), which was founded in 2014.

The MC2 focuses on research and education concerning cybersecurity. Additionally, the Maryland Business Roundtable for Education (MBRT) has developed and implemented a world-class curriculum for cybersecurity to be used in secondary schools across the state.

Most major metropolitan areas in Maryland host conferences and other events related to cybersecurity every year. Baltimore, for example, is home to the highly anticipated annual Security Analyst Summit (SANS).

This event provides in-depth security training and attracts security professionals from around the world. Other events include the Baltimore InfoSec Summit and the Maryland Information Security & Privacy Day Conference held annually in Hunt Valley.

The state also offers numerous initiatives related to cybersecurity. The Maryland Cybersecurity Council was formed in July 2016 to develop strategies to strengthen and protect the state’s cyber infrastructure from threats. Additionally, the Maryland Cyber Challenge is a program designed to encourage students to explore the field of information security. It offers students an immersive experience that includes online competitions, training modules, and hands-on instruction.

The State of Maryland is committed to ensuring that its citizens can use the Internet and share sensitive information safely and securely. With its many conferences, events, initiatives, and organizations, it is clear that Maryland is on the leading edge of cybersecurity.

View an all-encompassing index of cybersecurity events across the USA.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

11th March 2026 | Women in Cybersecurity (WiCys) 2026

The Women in Cybersecurity (WiCyS) 2026 Annual Conference is a major cybersecurity event that brings together women, allies, students, professionals, academics, and industry leaders to support the recruitment, retention, and advancement of women in cybersecurity. The in-person portion is held at the Gaylord National Harbor Resort and Convention Center in the Washington DC area, while a separate virtual conference takes place later in the spring. This hybrid approach ensures greater accessibility and broad participation from around the world.

WiCyS 2026 offers a rich agenda of keynote presentations, technical sessions, workshops, panel discussions, lightning talks, and interactive activities designed to build skills, foster collaboration, and empower attendees in their cybersecurity careers. The event also includes networking opportunities, a career fair where employers and job seekers can connect, and community-driven discussions that address trends, challenges, and opportunities in cybersecurity. With its emphasis on diversity, inclusion, and professional growth, WiCyS remains one of the most influential conferences advancing women in the field of cybersecurity.

Hybrid (Both) • Paid • Part of Women in CyberSecurity (WiCyS)

united_states_flag

14th March 2026 | Loyola Blakefield Cyber Challenge 2026

The Loyola Blakefield Cyber Challenge is a hands on cybersecurity competition designed to introduce participants to core technical skills through a Capture the Flag format. The event focuses on practical learning across areas such as cryptography, digital forensics, and systems hardening, making it accessible for beginners while still offering meaningful challenges for more experienced competitors. Participants are grouped into divisions based on prior CTF experience, allowing each competitor to learn at an appropriate pace.

The competition emphasizes learning over prior expertise, welcoming students with little or no background in cybersecurity. By working through realistic technical challenges, participants gain exposure to common security tools and problem solving approaches used in real world environments. The event supports skill building, teamwork, and curiosity, making it a strong entry point for students exploring cybersecurity as a future academic or career path.

Physical • Free • Part of Loyola Blakefield

united_states_flag

17th March 2026 | Homeland Security Week 2026

Homeland Security Week 2026 is a major summit that brings together senior officials from government agencies, law enforcement, and private industry to explore next-generation solutions for protecting the nation. The summit covers critical areas such as artificial intelligence, cloud security, cybersecurity, biometrics, counter-unmanned aircraft systems, border security, and infrastructure resilience. Sessions include keynote briefings, expert panels, and networking opportunities that allow participants to engage directly with thought leaders and decision makers shaping the future of homeland protection.

Cybersecurity is an important part of the summit agenda as attendees focus on emerging threats, secure technologies, and strategies to strengthen cyber resilience across federal and critical infrastructure environments. The event’s mix of strategic discussion and practical insights makes it valuable for professionals seeking to enhance national security while staying informed on evolving cyber risks.

Physical • Paid • Part of IQPC

united_states_flag

30th March 2026 | Insider Threat Investigations & Analysis Training Course W/ Legal Guidance From Attorney

INSIDER THREAT INVESTIGATIONS & ANALYSIS TRAINING COURSE W/ LEGAL GUIDANCE FROM ATTORNEY Insider Threat Investigator / Analyst Certificate - Credential Provided By: Insider Threat Defense Group (ITDG)

DATES / TIMES March 30-31, 2025 / 8:30am to 5pm

LOCATION (Classroom Or Virtual) University Of Maryland, College Park

Virtual Attendance Option This course is also offered virtually, providing the same expert instruction and training materials as the classroom experience. Course materials will be available for download ahead of time, ensuring you’re fully prepared. The training will be delivered live via Go To Meeting, allowing for real-time interaction, questions, and engagement.

COST / REGISTRATION ($1,595 - Discounts For 2+ Students) The link to register is a Bank of America merchant services vendor: https://stats.slimcd.com/soft/multisession.asp?sessionid=DB0FED86553BBB2B0CFA6AE7389136CD3FE8A1D9

OVERVIEW This highly sought after 2 day training course is designed for anyone managing or supporting an Insider Risk Management Program (IRMP): Insider Threat Investigator- Analyst, FSO, CSO, CISO, Human Resources, CIO – IT, Network Security, Counterintelligence Investigators, Governance, Risk & Compliance Professionals, Mental Health / Behavioral Science Professionals, Legal Etc.

This very comprehensive training will provide students with the critical thinking skills and in-depth knowledge that is needed for conducting investigations from A to Z, and for collecting and analyzing various employee data sources to generate accurate employee risk and threat profiles using proven analytic principles and methodologies.

Employee investigations require a structured and repeatable approach that is legally sound and hold can hold up to legal scrutiny in court. This training will provide expert legal guidance on reporting, case management, privacy considerations, interviewing, documentation, collection and use of employee data sources, evidence, chain of custody and more.

Instructor #2 for this training is Mr. Shawn Thompson, Esq., who is a licensed and recognized attorney with extensive experience in Employment Law and Insider Threat Program’s. He will provide legal guidance on the collection, use and sharing of employee information, computer user activity monitoring and conducting investigations. Mr. Thompson built and led Google’s Global Insider Risk Management Services.

Training Course Brochure https://www.insiderthreatdefense.us/wp-content/uploads/2025/05/Insider-Threat-Investigations-Analysis-Training-Course-Brochure.pdf

IRMP TOOLKIT This training provides students a handbook and an abundance of training materials, educational resources, templates and checklists needed for an IRMP. The handbook provides guidance and checklists for Insider Threat Investigations, conducting an Insider Threat Vulnerability Assessment, and guidance to review, tweak and enhance the security controls of the organization (Physical Security, Human Resources, IT-Network Security, Etc.). They will also help with identifying any vulnerabilities related to the Malicious Insider Playbook Of Tactics. (Information & Data Exfiltration As Easy As 1,2,3) The training materials and toolkit will be provided to the students via a USB thumb drive for the classroom training, or via a download link.

EXCEPTIONAL STUDENT REVIEWS Our very high levels of client satisfaction are the result of the ITDG being experts at building IRMP's as we do more than just provide training. We also provide consulting services and incorporate lessons learned from our consulting engagements.

The ITDG has provided IRMP Program training to 1000+ students, and issued them certificates / credentials as an IRMP Manager and Insider Threat Investigator – Analyst. Even our most experienced students that attend our training courses, state that they are amazed at the depth of the training and the resources provided, and are very satisfied they took the training and learned some new concepts and techniques for IRM.

Our students have endorsed and given our training courses EXCEPTIONAL reviews for the comprehensive knowledge and resources provided. You are encouraged to read the feedback from our students on this link. https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-evaluations-comments.pdf

COMPANY RECOGNITION The ITDG Has Provided IRMP Training / Consulting Services To An Impressive List Of 700+ Clients: White House, U.S. Government Agencies, DHS, TSA, DoD, Intelligence Community Agencies, Law Enforcement, Critical Infrastructure Providers, Universities, Microsoft, Walmart, Home Depot, Nike, Tesla, Dell Technologies, Discovery Channel, UPS, FedEx, Visa, American Express, Equifax, Delta Airlines and many more.

Full Client Listing https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-listing.pdf

Questions, Please Contact

Jim Henderson, CISSP, CCISO CEO Insider Threat Defense Group, Inc. Insider Risk Management Program (IRMP) Training Course Instructor / Consultant Insider Threat Investigations & Analysis Training Course Instructor / Analyst Insider Risk / Threat Vulnerability Assessor www.insiderthreatdefensegroup.com LinkedIn Company Profile: https://www.linkedin.com/in/insiderthreatdefense Follow Us On Twitter: @InsiderThreatDG Founder / Chairman Of The National Insider Threat Special Interest Group NITSIG LinkedIn Group: https://www.linkedin.com/groups/12277699/ 561-809-6800

Hybrid (Both) • Paid • Part of Insider Threat Defense Group

united_states_flag

20th April 2026 | SANS AI Summit Solutions Track 2026

AI Summit Solutions Track 2026 focuses on the practical application of artificial intelligence within modern cybersecurity programs. Chaired by Matt Bromiley, the two day track delivers expert led sessions that examine how security teams are using AI to accelerate threat detection, automate response, and improve decision making while maintaining human oversight. Rather than promoting hype, the program highlights proven use cases, operational lessons, and real deployment strategies that reflect the realities of today’s security environments.

Sessions also address model governance, data protection, and ethical AI implementation, helping organizations integrate AI into existing workflows responsibly. Attendees gain insight into evaluating tools, managing risk, and aligning AI initiatives with broader security strategy to strengthen resilience across evolving threat landscapes.

Online • Paid • Part of SANS Institute

united_states_flag