Browse Definitions :

Getty Images

Post-pandemic cybersecurity conferences not to miss

In the shadows of the pandemic, threat actors got even more brazen. Security pros can fight back with the aid of expert insights and training at these upcoming conferences.

In the evolving cyberthreat landscape, most cybersecurity professionals and organizational leaders are aware of the need for greater vigilance and better risk management.

These professionals also know that their organizations need strategic insights, objective guidance, proven best practices and practical tools to complete tasks such as:

  • securing enterprise networks;
  • modernizing security ecosystems;
  • transforming IT and security into a strategic business function;
  • transitioning from reactive threat response to proactive threat monitoring and detecting; and
  • finding the right balance between security, risk and innovation.

In the wake of the COVID-19 pandemic, threat actors are launching bigger attacks against organizations with even more impunity. To protect themselves, organizational leaders need to understand who these threat actors are and what kind of risks they pose. A good way to do this is by tapping into the "wisdom of the crowd" by attending cybersecurity conferences.

In the post-pandemic era, professionals will be able to attend many conferences -- both in person and virtually -- to update their knowledge; glean insights about the latest risks, trends, tools and processes; and even network with industry experts and thought leaders. If you are a cybersecurity professional, here are the five cybersecurity conferences you should attend. 

1. Gartner Security & Risk Management Summit 2021

Organizer: Gartner

Who should attend: Chief information security officers (CISOs) and other security executives, cybersecurity professionals, governance and risk executives, security architects and planners.

Where: Orlando, Fla., and London

When:

  • U.S.: Sept. 20 - 22
  • U.K.: Nov. 29 - Dec. 1

Conference links:

Gartner's research into cybersecurity risks, trends and developments enables organizations worldwide to manage risk, prevent data breaches and strengthen their security profile.

At this cybersecurity conference, professionals and leaders can explore the latest insights and recommendations from Gartner. They will learn about key trends, practical tools and emerging technologies in areas such as:

  • cloud security
  • privacy
  • threat management
  • infrastructure protection
  • application security
  • cybersecurity mesh

2. SecureWorld Virtual Conferences

Organizer: SecureWorld

Who should attend: Cybersecurity and infosec researchers, professionals and leaders; compliance or governance officers; industry influencers and thought leaders; students.

Where: Virtual

When: June 10, Sept. 23, Oct. 14, Nov. 17 and Dec. 2

Conference link: SecureWorld Virtual Conferences

There will be a variety of keynote speeches, panel discussions and breakout sessions. There will also be ample opportunity for networking, learning from others and exploring prospects for collaboration. Attendees, particularly those at managerial or senior levels, can also evaluate vendors and their security offerings, and meet with local chapters of security associations.

Professionals looking to earn continuing professional education (CPE) credits online can do so by attending at least 20 educational elements -- approximately six hours of learning -- delivered by nationally recognized industry leaders. They can also earn six CPE credits to maintain their cybersecurity certifications.

3. Cybersecurity Festival

Organizer: Computing magazine

Who should attend: IT professionals, business owners, C-suite leaders, web developers, security analysts, architects, managers and financial controllers.

Where: Virtual

When: June 16, 23 and 30

Conference link: Cybersecurity Festival

Registration is free.

This three-day festival will include presentations, panel sessions, fireside chats and workshops to help attendees understand:

  • their vulnerability to cyberthreats and other risks;
  • which tools are the best fit for their organization;
  • how they can use training to build a stronger organization-wide security culture;
  • how to link tools and training to the company's KPIs and broader strategy; and
  • how to avoid information overload.

In a virtual exhibition area, attendees can network with other guests to discuss best practices and explore collaboration or business-building opportunities. They can also network with event speakers -- leaders in the fields of IT, information security and cybersecurity.

This list of events is by no means exhaustive. But if you are a cybersecurity professional or enterprise leader, you should find them useful.

4. Black Hat USA 2021

Organizer: Black Hat

Who should attend: Cybersecurity and infosec pros; CISOs and other C-suite leaders focused on security.

Where: Las Vegas

When: July 31 - Aug. 5

Conference link: Black Hat

Black Hat USA will bring together the cybersecurity community for in-depth training and conference events like keynote speeches and expert panels. In 2021, this cybersecurity conference will be a combination of virtual and in-person events. It opens with four days of virtual trainings -- July 31 - Aug. 3 -- conducted online in real time. On Aug. 3, the Black Hat CISO Summit will bring together more than 200 CISOs from global corporations and government agencies to discuss risks, best practices and more.

The main conference -- Aug. 4 - 5 -- will be a hybrid of virtual and in-person briefings by security experts on an array of topics such as open source tools, IoT and network defense.

5. (ISC)2 Security Congress 2021

Organizer: (ISC)2

Who should attend: Cybersecurity professionals interested in continuing education, including those interested in an opportunity to earn CPE credits.

Where: Orlando, Fla., and virtual

When:

  • Pre-conference training: Oct. 16 - 17
  • Congress: Oct. 18 - 20

Conference link: (ISC)2 Security Congress 2021

Focused on continuing cybersecurity education, the (ISC)2 Congress draws cybersecurity experts from around the world. Professionals in the field can earn two CPE credits and hear top experts on key topics such as cloud security, DevSecOps, governance, risk management, compliance and privacy.

Dig Deeper on IT Career Management

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close