Browse Definitions :

Getty Images

Post-pandemic cybersecurity conferences not to miss

In the shadows of the pandemic, threat actors got even more brazen. Security pros can fight back with the aid of expert insights and training at these upcoming conferences.

In the evolving cyberthreat landscape, most cybersecurity professionals and organizational leaders are aware of the need for greater vigilance and better risk management.

These professionals also know that their organizations need strategic insights, objective guidance, proven best practices and practical tools to complete tasks such as:

  • securing enterprise networks;
  • modernizing security ecosystems;
  • transforming IT and security into a strategic business function;
  • transitioning from reactive threat response to proactive threat monitoring and detecting; and
  • finding the right balance between security, risk and innovation.

In the wake of the COVID-19 pandemic, threat actors are launching bigger attacks against organizations with even more impunity. To protect themselves, organizational leaders need to understand who these threat actors are and what kind of risks they pose. A good way to do this is by tapping into the "wisdom of the crowd" by attending cybersecurity conferences.

In the post-pandemic era, professionals will be able to attend many conferences -- both in person and virtually -- to update their knowledge; glean insights about the latest risks, trends, tools and processes; and even network with industry experts and thought leaders. If you are a cybersecurity professional, here are the five cybersecurity conferences you should attend. 

1. Gartner Security & Risk Management Summit 2021

Organizer: Gartner

Who should attend: Chief information security officers (CISOs) and other security executives, cybersecurity professionals, governance and risk executives, security architects and planners.

Where: Orlando, Fla., and London

When:

  • U.S.: Sept. 20 - 22
  • U.K.: Nov. 29 - Dec. 1

Conference links:

Gartner's research into cybersecurity risks, trends and developments enables organizations worldwide to manage risk, prevent data breaches and strengthen their security profile.

At this cybersecurity conference, professionals and leaders can explore the latest insights and recommendations from Gartner. They will learn about key trends, practical tools and emerging technologies in areas such as:

  • cloud security
  • privacy
  • threat management
  • infrastructure protection
  • application security
  • cybersecurity mesh

2. SecureWorld Virtual Conferences

Organizer: SecureWorld

Who should attend: Cybersecurity and infosec researchers, professionals and leaders; compliance or governance officers; industry influencers and thought leaders; students.

Where: Virtual

When: June 10, Sept. 23, Oct. 14, Nov. 17 and Dec. 2

Conference link: SecureWorld Virtual Conferences

There will be a variety of keynote speeches, panel discussions and breakout sessions. There will also be ample opportunity for networking, learning from others and exploring prospects for collaboration. Attendees, particularly those at managerial or senior levels, can also evaluate vendors and their security offerings, and meet with local chapters of security associations.

Professionals looking to earn continuing professional education (CPE) credits online can do so by attending at least 20 educational elements -- approximately six hours of learning -- delivered by nationally recognized industry leaders. They can also earn six CPE credits to maintain their cybersecurity certifications.

3. Cybersecurity Festival

Organizer: Computing magazine

Who should attend: IT professionals, business owners, C-suite leaders, web developers, security analysts, architects, managers and financial controllers.

Where: Virtual

When: June 16, 23 and 30

Conference link: Cybersecurity Festival

Registration is free.

This three-day festival will include presentations, panel sessions, fireside chats and workshops to help attendees understand:

  • their vulnerability to cyberthreats and other risks;
  • which tools are the best fit for their organization;
  • how they can use training to build a stronger organization-wide security culture;
  • how to link tools and training to the company's KPIs and broader strategy; and
  • how to avoid information overload.

In a virtual exhibition area, attendees can network with other guests to discuss best practices and explore collaboration or business-building opportunities. They can also network with event speakers -- leaders in the fields of IT, information security and cybersecurity.

This list of events is by no means exhaustive. But if you are a cybersecurity professional or enterprise leader, you should find them useful.

4. Black Hat USA 2021

Organizer: Black Hat

Who should attend: Cybersecurity and infosec pros; CISOs and other C-suite leaders focused on security.

Where: Las Vegas

When: July 31 - Aug. 5

Conference link: Black Hat

Black Hat USA will bring together the cybersecurity community for in-depth training and conference events like keynote speeches and expert panels. In 2021, this cybersecurity conference will be a combination of virtual and in-person events. It opens with four days of virtual trainings -- July 31 - Aug. 3 -- conducted online in real time. On Aug. 3, the Black Hat CISO Summit will bring together more than 200 CISOs from global corporations and government agencies to discuss risks, best practices and more.

The main conference -- Aug. 4 - 5 -- will be a hybrid of virtual and in-person briefings by security experts on an array of topics such as open source tools, IoT and network defense.

5. (ISC)2 Security Congress 2021

Organizer: (ISC)2

Who should attend: Cybersecurity professionals interested in continuing education, including those interested in an opportunity to earn CPE credits.

Where: Orlando, Fla., and virtual

When:

  • Pre-conference training: Oct. 16 - 17
  • Congress: Oct. 18 - 20

Conference link: (ISC)2 Security Congress 2021

Focused on continuing cybersecurity education, the (ISC)2 Congress draws cybersecurity experts from around the world. Professionals in the field can earn two CPE credits and hear top experts on key topics such as cloud security, DevSecOps, governance, risk management, compliance and privacy.

Dig Deeper on IT Career Management

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close