Event Place From To
DEF CON 32, Nevada, US: 7-10 August, 2025 Nevada, US Jul. 7, 2025 Jul. 10, 2025
#RISK New York - Exclusive Invite Fordham Law School, New York, NY 10023 Jul. 9, 2025 Jul. 10, 2025
Webinar - Outdated and Outmatched: Why Legacy AV Can’t Keep Up Jul. 10, 2025 Jul. 10, 2025
Heads Up - Visualize Risks, Strengthen Controls, and Communicate with Clarity: The Story of Bowtie - 10 juli - 17:00 until 18:00 Europe Jul. 10, 2025 Jul. 10, 2025
Podcast: US - Airlines Sold Your Flight Data to DHS—And Covered It Up Jul. 10, 2025 Jul. 10, 2025
Webinar | A Google Threat Intelligence Deep Dive Jul. 10, 2025 Jul. 10, 2025
Webinar - Industry Update - Global Freight and Trade War Outlook – July 2025 Jul. 10, 2025 Jul. 10, 2025
From Exploits to Forensics Evidence - Unraveling the Unitronics Attack - July 10, 2025 Jul. 10, 2025 Jul. 10, 2025
Lenovo’s Hybrid AI Factory & Platforms: Strategy and Introduction to Lenovo AI Jul. 10, 2025 Jul. 10, 2025
"Secrets of Securing Code in the AI Age" Jul. 10, 2025 Jul. 10, 2025
Entra ID security for your Microsoft 365 environment Jul. 10, 2025 Jul. 10, 2025
Cloud compliance unlocked: Rethinking GRC for data resiliency - June 10, 2025 Jul. 10, 2025 Jul. 10, 2025
Beyond the Buzz: How Enterprise AI Can Drive Real Results - 10th July 2025 Jul. 10, 2025 Jul. 10, 2025
Pittsburgh Cybersecurity Conference Pittsburgh Marriott City Center 112 Washington Place, Pittsburgh, Pennsylvania, USA, 15219 Jul. 11, 2025 Jul. 11, 2025
Cyber Security Training at SANSFIRE 2025 - Washington, DC, US - Mon, Jul 14 - Sat, Jul 19, 2025 Jul. 14, 2025 Jul. 19, 2025
Nursing Educator Dr. Randolph Rasch Urges Overhaul of Healthcare Student Compliance Training as Exxat and ComplianceJunction Launch Partners Jul. 15, 2025 Jul. 15, 2025
How to Use Legitimate Interest to Comply With EU GDPR - 15 July 2025 Jul. 15, 2025 Jul. 15, 2025
Non-Human Identity (NHI) Summit 2025 Jul. 15, 2025 Jul. 16, 2025
Webinar - Secure by Design: Threat Modeling for Developers Jul. 15, 2025 Jul. 15, 2025
The New Normal of Energy: Using flexible energy solutions to de-risk energy security and manage market volatility Jul. 15, 2025 Jul. 15, 2025
Harden your cyber resilience with Rubrik Identity Recovery Services - 15th July 2025 Jul. 15, 2025 Jul. 15, 2025
Live webinar: Taking Control of SaaS Sprawl Jul. 15, 2025 Jul. 15, 2025
Webinar - Cost-efficient cloud infrastructures for AI workloads Jul. 15, 2025 Jul. 15, 2025
CIOs, Use Your Executive Skills to Reduce Friction in the C-Suite Jul. 15, 2025 Jul. 15, 2025
New Research: Machine Learning Classifiers Don't Need Negative Labels - July 16,2025 Jul. 16, 2025 Jul. 16, 2025
Why the Zero-Click AI Vulnerability in Microsoft 365 is a Game-Changer for Email Security - July 16th, 2025 Jul. 16, 2025 Jul. 16, 2025
Webinar - Why Smarter Third Party Risk Management (TPRM) Starts with Better Data - Wednesday, 16 July, 1:00 PM CET / 12:00 PM BST Jul. 16, 2025 Jul. 16, 2025
Webinar - New Research: Machine Learning Classifiers Don't Need Negative Labels Wed, July 16,2025 at 1pm EST Jul. 16, 2025 Jul. 16, 2025
Beyond Belief: Who owns the fightback against deepfakes and disinformation? Jul. 16, 2025 Jul. 16, 2025
Webinar : When the Leak Hits: Managing Data Leaks and Cyber Extortion Jul. 16, 2025 Jul. 16, 2025
GenAI Compute Infrastructure Under Siege: Defending the Foundation of AI Jul. 16, 2025 Jul. 16, 2025
"New Research: Machine Learning Classifiers Don't Need Negative Labels" Jul. 16, 2025 Jul. 16, 2025
Live Webinar | Beyond Patching: Understanding Web Exposure and Why It Matters Jul. 16, 2025 Jul. 16, 2025
Maritime Border Security Technology Workshop - Wednesday, July 16, 2025 · 3:00 p.m. Amsterdam (GMT +2:00) Jul. 16, 2025 Jul. 16, 2025
Beyond legacy defenses: How AI is reshaping security operations for the modern enterprise Jul. 16, 2025 Jul. 16, 2025
How to Spot and Stop Security Risks From Unmanaged AI Tools Jul. 16, 2025 Jul. 16, 2025
Webinar - Threat Actors Unveiled Nation State versus Cyber Crime Jul. 17, 2025 Jul. 17, 2025
Webinar - Best Practices for Cloud Detection and Response: Real-World Lessons from Multi-Cloud Attacks Jul. 17, 2025 Jul. 17, 2025
Three Game-Changing Cloud-Native AI Use Cases You Can Implement Now Jul. 17, 2025 Jul. 17, 2025
See the Future of AI Email Security. Build It with Abnormal. Jul. 17, 2025 Jul. 17, 2025
Navigating M&A: What Every Security Leader Needs to Know - July 17th, 2025 Jul. 17, 2025 Jul. 17, 2025
Webinar - Secure Hybrid AI: How to Responsibly use AI Jul. 17, 2025 Jul. 17, 2025
Abnormal Innovate: See the Future of AI Email Security. Build It with Abnormal - July 17 , 2025 Jul. 17, 2025 Jul. 17, 2025
Webinar - Leveraging AI for Cybersecurity Workflow Augmentation Jul. 17, 2025 Jul. 17, 2025
Live Webinar | Next-Gen Cloud Security: Advanced Detection & Response : Jul. 17, 2025 Jul. 17, 2025 Jul. 17, 2025
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance - 17 Jul 2025 Jul. 17, 2025 Jul. 17, 2025
Business Application Security – Not to be Overlooked When in Your Security Posture Jul. 17, 2025 Jul. 17, 2025
From fragmented to unified: Rethinking network security operations in the AI era Jul. 17, 2025 Jul. 17, 2025
Webinar - The Future of AI-Powered Email Security Jul. 17, 2025 Jul. 17, 2025
Webinar - Ransomware Reality Check: Busting Cybersecurity Myths Jul. 17, 2025 Jul. 17, 2025