DEF CON 32, Nevada, US: 7-10 August, 2025 |
Nevada, US |
Jul. 7, 2025 |
Jul. 10, 2025 |
#RISK New York - Exclusive Invite |
Fordham Law School, New York, NY 10023 |
Jul. 9, 2025 |
Jul. 10, 2025 |
Webinar - Outdated and Outmatched: Why Legacy AV Can’t Keep Up |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Heads Up - Visualize Risks, Strengthen Controls, and Communicate with Clarity: The Story of Bowtie - 10 juli - 17:00 until 18:00 Europe |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Podcast: US - Airlines Sold Your Flight Data to DHS—And Covered It Up |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Webinar | A Google Threat Intelligence Deep Dive |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Webinar - Industry Update - Global Freight and Trade War Outlook – July 2025 |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
From Exploits to Forensics Evidence - Unraveling the Unitronics Attack - July 10, 2025 |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Lenovo’s Hybrid AI Factory & Platforms: Strategy and Introduction to Lenovo AI |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
"Secrets of Securing Code in the AI Age" |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Entra ID security for your Microsoft 365 environment |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Cloud compliance unlocked: Rethinking GRC for data resiliency - June 10, 2025 |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Beyond the Buzz: How Enterprise AI Can Drive Real Results - 10th July 2025 |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Pittsburgh Cybersecurity Conference |
Pittsburgh Marriott City Center 112 Washington Place, Pittsburgh, Pennsylvania, USA, 15219 |
Jul. 11, 2025 |
Jul. 11, 2025 |
Cyber Security Training at SANSFIRE 2025 - Washington, DC, US - Mon, Jul 14 - Sat, Jul 19, 2025 |
|
Jul. 14, 2025 |
Jul. 19, 2025 |
Nursing Educator Dr. Randolph Rasch Urges Overhaul of Healthcare Student Compliance Training as Exxat and ComplianceJunction Launch Partners |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
How to Use Legitimate Interest to Comply With EU GDPR - 15 July 2025 |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Non-Human Identity (NHI) Summit 2025 |
|
Jul. 15, 2025 |
Jul. 16, 2025 |
Webinar - Secure by Design: Threat Modeling for Developers |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
The New Normal of Energy: Using flexible energy solutions to de-risk energy security and manage market volatility |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Harden your cyber resilience with Rubrik Identity Recovery Services - 15th July 2025 |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Live webinar: Taking Control of SaaS Sprawl |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Webinar - Cost-efficient cloud infrastructures for AI workloads |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
CIOs, Use Your Executive Skills to Reduce Friction in the C-Suite |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
New Research: Machine Learning Classifiers Don't Need Negative Labels - July 16,2025 |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Why the Zero-Click AI Vulnerability in Microsoft 365 is a Game-Changer for Email Security - July 16th, 2025 |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar - Why Smarter Third Party Risk Management (TPRM) Starts with Better Data - Wednesday, 16 July, 1:00 PM CET / 12:00 PM BST |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar - New Research: Machine Learning Classifiers Don't Need Negative Labels Wed, July 16,2025 at 1pm EST |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Beyond Belief: Who owns the fightback against deepfakes and disinformation? |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar : When the Leak Hits: Managing Data Leaks and Cyber Extortion |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
GenAI Compute Infrastructure Under Siege: Defending the Foundation of AI |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
"New Research: Machine Learning Classifiers Don't Need Negative Labels" |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Live Webinar | Beyond Patching: Understanding Web Exposure and Why It Matters |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Maritime Border Security Technology Workshop - Wednesday, July 16, 2025 · 3:00 p.m. Amsterdam (GMT +2:00) |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Beyond legacy defenses: How AI is reshaping security operations for the modern enterprise |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
How to Spot and Stop Security Risks From Unmanaged AI Tools |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar - Threat Actors Unveiled Nation State versus Cyber Crime |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Best Practices for Cloud Detection and Response: Real-World Lessons from Multi-Cloud Attacks |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Three Game-Changing Cloud-Native AI Use Cases You Can Implement Now |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
See the Future of AI Email Security. Build It with Abnormal. |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Navigating M&A: What Every Security Leader Needs to Know - July 17th, 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Secure Hybrid AI: How to Responsibly use AI |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Abnormal Innovate: See the Future of AI Email Security. Build It with Abnormal - July 17 , 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Leveraging AI for Cybersecurity Workflow Augmentation |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Live Webinar | Next-Gen Cloud Security: Advanced Detection & Response : Jul. 17, 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance - 17 Jul 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Business Application Security – Not to be Overlooked When in Your Security Posture |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
From fragmented to unified: Rethinking network security operations in the AI era |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - The Future of AI-Powered Email Security |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Ransomware Reality Check: Busting Cybersecurity Myths |
|
Jul. 17, 2025 |
Jul. 17, 2025 |