Browse Definitions :

kras99 -

8 cybersecurity conferences to attend in 2022

Cybercriminals create new ways to steal information regularly, creating cybersecurity challenges. Attending conferences is one way learn about these trends for the best defense.

Cybersecurity is a constant problem in today's digital age, and attending cybersecurity conferences is one way companies can learn to keep their organizations safe.

In the past two years, there have been many cyber attacks. Two large breaches include SolarWinds and Colonial Pipeline. In late 2019 into 2020, threat actors sent malicious code through a patch to SolarWinds' Orion IT monitoring software, affecting government and enterprise users. 

The Colonial Pipeline breach was a ransomware attack in May 2021, causing the pipeline to shut down. President Joe Biden declared this attack a state of emergency, as it affected U.S. infrastructure and caused a fuel shortage.

As threat actors develop new plans to get into systems and steal information, it's vital that companies learn about the latest trends and plan a defense. Here are some cybersecurity conferences in 2022 to help organizations stay in the know.

1. Secure World

When and where: Multiple locations and dates

  • Chicago -- June 15
  • Virtual -- June 23
  • Virtual -- Aug. 3
  • Louis -- Sept. 15
  • Detroit -- Sept. 28-29
  • Denver -- Oct. 6
  • New York -- Oct. 13
  • Dallas -- Oct. 20
  • Virtual -- Nov. 3
  • Seattle -- Nov. 9-10
  • Virtual -- Dec. 8

Cost: $25-$630

Where to register:

Secure World's conferences target information security professionals. Both virtual and in-person options offer six to 12 continuing professional education (CPE) credits. There will also be breakout sessions, industry panels of experts and networking opportunities with both vendors and local security association chapters.

Speakers vary by date and location, but some highlighted keynote speakers include the following:

  • Tamika Bass, cybersecurity technology director at Gannett Fleming
  • Stephen Dougherty, financial fraud investigator at U.S. Secret Service's Global Investigative Operations Center
  • Lynn Dohm, executive director of Women in CyberSecurity
  • Danny Jenkins, CEO and co-founder of ThreatLocker
  • Retired Col. Cedric Leighton, CNN military analyst and CEO and founder of Cedric Leighton Associates

2. RSA Conference

When: June 6-9

Where: San Francisco and virtual event

Cost: $50-$2,595

Where to register:

Learn about emerging technologies, hidden security vulnerabilities and other cybersecurity challenges from keynote speakers. Breakout sessions include topics such as the following:

  • privacy threats
  • risk scorecards
  • end-to-end encrypted service
  • penetration testing at scale
  • mitigating legal risks of supply chain attacks
  • data protection
  • deepfake tech
  • bot attacks
  • preventing ransomware attacks

Attendees can also earn continuing education (CE) credits.

Speakers include the following:

  • Edward Adams, president and CEO of Security Innovation
  • Jean-Ian Boutin, director of threat research at ESET
  • John Elliott, consultant and author at Pluralsight
  • Julie Haney, computer scientist and usable security researcher at the National Institute of Standards and Technology
  • Martin Smolar, malware researcher at ESET

3. Gartner Security & Risk Management Summit

When: June 7-10

Where: National Harbor, Md.

Cost: $3,375-$3,975

Where to register:

The Gartner Security & Risk Management Summit will address various security areas including the following:

  • creating a security-aware culture;
  • identifying risk ownership;
  • creating a risk management process;
  • creating a human-centered secure environment; and
  • establishing the cybersecurity architecture to protect and defend against attackers.

The audience for this conference includes chief information security officers (CISOs), security executives, risk management leaders, security architects, and network and data security managers.

Speakers include the following:

  • Retired Gen. Keith Alexander, founder and co-CEO of IronNet Cybersecurity
  • Jamil Farshchi, CISO at Equifax
  • John McKinley, founder of Great Falls Ventures
  • Alex Stamos, professor at Stanford and former chief security officer at Facebook
  • Katell Thielemann, research vice president at Gartner

4. CyberSecurity Festival

When: June 9 (in-person, London); June 15-16 (virtual)

Cost: complimentary for IT professionals

Where to register:

All attendees are invited to the virtual portion of CyberSecurity Festival whether they went to the in-person London event or not. The digital experience will be live and will include industry discussions and cybersecurity case studies. Keynote presentations, panel talks, roundtables and experimental workshops will discuss the human part of cybersecurity, how IoT affects security and embracing neurodiversity.

Speakers include the following:

  • Anna Brailsford, CEO of Code First Girls
  • Hanah-Marie Darley, head of threat research at Darktrace
  • Mark Healey, senior cyber security engineer of South Yorkshire Police
  • Christelle Heikkila, member of the board of directors at
  • Ciaran Martin, first CEO of the National Cyber Security Centre

5. Black Hat USA 2022

When: Aug. 6-11

Where: Las Vegas and virtual

Cost: $0-$3,700

Where to register:

Black Hat USA starts with four days of training. It then moves to the main two-day conference that features briefings and training classes. Training choices include malware, pen testing, risk, network, IoT and crypto. Classes are available for beginner, intermediate and advanced skill levels. Attendees can earn 14, 16 or 32 CPE credits for the briefings, two-day training and four-day training courses respectively.

The arsenal provides an interactive forum to present new tools and products.

6. Blue Team Con

When: Aug. 27-28

Where: Chicago

Cost: $60-$200

Where to register:

Blue Team Con attendees include executives, sales personnel, IT professionals and students to discuss current cybersecurity trends. Tracks for this conference include presentations on building security metrics, hacking and defending, cloud security design, defending against ransomware trends, improving security with Azure AD, starting a vulnerability management team and developing attack detection capabilities.

Speakers include the following:

  • Corey Ball, cybersecurity consulting manager at Moss Adams
  • R. Bard, senior manager of application security at United Airlines
  • Karishma Dixit, senior security data scientist at Microsoft
  • Tazin Khan Norelius, founder and CEO of Cyber Collective and multicultural content and community engagement specialist at Cisco
  • Joe Slowik, senior manager of threat intelligence and detections engineering at Gigamon

7. InfoSec World

When: Sept. 26-28

Where: Lake Buena Vista, Fla.

Cost: $1,295-$2,995

Where to register:

The InfoSec World conference brings together security employees and executives with industry expert keynotes and interactive sessions. Discussion topics at this event include cloud security, security awareness, risk mitigation, leadership and budgeting, critical infrastructure and identity.

Keynote speakers include the following:

  • Robert Herjavec, CEO at Herjavec Group
  • Tomás Maldonado, CISO with the NFL
  • Ron Ross, a fellow at the National Institute of Standards and Technology

8. (ISC)2 Security Congress

When: Oct. 10-12

Where: Las Vegas and virtual

Cost: $245-$1,995

Where to register:

The (ISC)2 Security Congress conference is a three-day event offering CP credit opportunities, career guidance and more than 100 educational sessions. Cybersecurity topics include security automation, IoT, risk and compliance, industrial control systems, cloud security and zero trust.

Dig Deeper on Security management

  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.