Event Place From To
Episode 3 - Thwarting Ransomware: A Technical Deep Dive Jul. 1, 2025 Jul. 1, 2025
Live Webinar | Vibe Check: The Future of Security in the AI-Coding Era Jul. 1, 2025 Jul. 1, 2025
US - Upcoming Webinar: Aquatic Invasive Species (AIS) Alert Jul. 1, 2025 Jul. 1, 2025
Safeguarding risky data in SharePoint and OneDrive Jul. 3, 2025 Jul. 3, 2025
ACM Designing Interactive Systems (DIS) Conference - July 5-9, 2025 Funchal, Madeira, Portugal Jul. 5, 2025 Jul. 9, 2025
Watch LIVE - Securing AI Agents and Preventing Data Exposure in GenAI Workflows Jul. 7, 2025 Jul. 7, 2025
DEF CON 32, Nevada, US: 7-10 August, 2025 Nevada, US Jul. 7, 2025 Jul. 10, 2025
Webibar - Scaling DevOps in the Enterprise: Speed Without Sacrificing Control - Tuesday, July 8 - 11:00 AM ET Jul. 8, 2025 Jul. 8, 2025
Roundtable Talk | Securing Identities in Manufacturing Jul. 8, 2025 Jul. 8, 2025
Webinar - The Unified Pipeline: Database & App CI/CD Jul. 8, 2025 Jul. 8, 2025
From AI to Scalability: 2025 Trends in Artifact Management - July 08, 2025 Jul. 8, 2025 Jul. 8, 2025
Webinar - Accelerating Enterprise DevOps: Governance, Velocity, and Real-World Impact Jul. 8, 2025 Jul. 8, 2025
"Secure Your Cloud Databases: Unified Protection for AWS & Azure" Jul. 9, 2025 Jul. 9, 2025
Preparing for the Inevitable: Strengthening Incident Response in a Rapidly Evolving Threat Landscape Jul. 9, 2025 Jul. 9, 2025
Webinar - Modernizing Healthcare Connectivity - Jul 9, 2025 11:00am ET Jul. 9, 2025 Jul. 9, 2025
SANS 2025 SOC Survey Webcast & Forum - Wednesday, 09 Jul 2025 Jul. 9, 2025 Jul. 9, 2025
#RISK New York - Exclusive Invite Fordham Law School, New York, NY 10023 Jul. 9, 2025 Jul. 10, 2025
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each Jul. 9, 2025 Jul. 9, 2025
Stolen credentials: The New Front Door to Your Network Jul. 9, 2025 Jul. 9, 2025
From Exploits to Forensics Evidence - Unraveling the Unitronics Attack - July 10, 2025 Jul. 10, 2025 Jul. 10, 2025
Lenovo’s Hybrid AI Factory & Platforms: Strategy and Introduction to Lenovo AI Jul. 10, 2025 Jul. 10, 2025
Webinar - Outdated and Outmatched: Why Legacy AV Can’t Keep Up Jul. 10, 2025 Jul. 10, 2025
Podcast: US - Airlines Sold Your Flight Data to DHS—And Covered It Up Jul. 10, 2025 Jul. 10, 2025
Webinar | A Google Threat Intelligence Deep Dive Jul. 10, 2025 Jul. 10, 2025
"Secrets of Securing Code in the AI Age" Jul. 10, 2025 Jul. 10, 2025
Entra ID security for your Microsoft 365 environment Jul. 10, 2025 Jul. 10, 2025
Cloud compliance unlocked: Rethinking GRC for data resiliency - June 10, 2025 Jul. 10, 2025 Jul. 10, 2025
Pittsburgh Cybersecurity Conference Pittsburgh Marriott City Center 112 Washington Place, Pittsburgh, Pennsylvania, USA, 15219 Jul. 11, 2025 Jul. 11, 2025
Cyber Security Training at SANSFIRE 2025 - Washington, DC, US - Mon, Jul 14 - Sat, Jul 19, 2025 Jul. 14, 2025 Jul. 19, 2025
Non-Human Identity (NHI) Summit 2025 Jul. 15, 2025 Jul. 16, 2025
How to Use Legitimate Interest to Comply With EU GDPR - 15 July 2025 Jul. 15, 2025 Jul. 15, 2025
Maritime Border Security Technology Workshop - Wednesday, July 16, 2025 · 3:00 p.m. Amsterdam (GMT +2:00) Jul. 16, 2025 Jul. 16, 2025
Beyond legacy defenses: How AI is reshaping security operations for the modern enterprise Jul. 16, 2025 Jul. 16, 2025
How to Spot and Stop Security Risks From Unmanaged AI Tools Jul. 16, 2025 Jul. 16, 2025
New Research: Machine Learning Classifiers Don't Need Negative Labels - July 16,2025 Jul. 16, 2025 Jul. 16, 2025
Live Webinar | Beyond Patching: Understanding Web Exposure and Why It Matters Jul. 16, 2025 Jul. 16, 2025
Webinar - Leveraging AI for Cybersecurity Workflow Augmentation Jul. 17, 2025 Jul. 17, 2025
Live Webinar | Next-Gen Cloud Security: Advanced Detection & Response : Jul. 17, 2025 Jul. 17, 2025 Jul. 17, 2025
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance - 17 Jul 2025 Jul. 17, 2025 Jul. 17, 2025
Business Application Security – Not to be Overlooked When in Your Security Posture Jul. 17, 2025 Jul. 17, 2025
From fragmented to unified: Rethinking network security operations in the AI era Jul. 17, 2025 Jul. 17, 2025
Webinar - The Future of AI-Powered Email Security Jul. 17, 2025 Jul. 17, 2025
Abnormal Innovate: See the Future of AI Email Security. Build It with Abnormal - July 17 , 2025 Jul. 17, 2025 Jul. 17, 2025
See bad actors coming - Secure the flavor. Control the brew. Chill with confidence. Jul. 18, 2025 Jul. 18, 2025
CIOs, Confidently Create Your GenAI Business Case - July 18, 2025 Jul. 18, 2025 Jul. 18, 2025
SANS 2025 Government Security Forum Jul. 22, 2025 Jul. 22, 2025
How AI is Affecting the Speed, Scale, and Sophistication of the Threat Landscape Jul. 22, 2025 Jul. 22, 2025
Microsoft Cloud & AI Bootcamp - 22 July 2025 – 25 July 2025 Jul. 22, 2025 Jul. 25, 2025
CISO Melbourne Jul. 22, 2025 Jul. 23, 2025
Webinar - Think Like a Cybercriminal to Stop the Next Potential Attack Jul. 22, 2025 Jul. 22, 2025