Browse Definitions :

kras99 - stock.adobe.com

8 cybersecurity conferences to attend in 2022

Cybercriminals create new ways to steal information regularly, creating cybersecurity challenges. Attending conferences is one way learn about these trends for the best defense.

Cybersecurity is a constant problem in today's digital age, and attending cybersecurity conferences is one way companies can learn to keep their organizations safe.

In the past two years, there have been many cyber attacks. Two large breaches include SolarWinds and Colonial Pipeline. In late 2019 into 2020, threat actors sent malicious code through a patch to SolarWinds' Orion IT monitoring software, affecting government and enterprise users. 

The Colonial Pipeline breach was a ransomware attack in May 2021, causing the pipeline to shut down. President Joe Biden declared this attack a state of emergency, as it affected U.S. infrastructure and caused a fuel shortage.

As threat actors develop new plans to get into systems and steal information, it's vital that companies learn about the latest trends and plan a defense. Here are some cybersecurity conferences in 2022 to help organizations stay in the know.

1. Secure World

When and where: Multiple locations and dates

  • Chicago -- June 15
  • Virtual -- June 23
  • Virtual -- Aug. 3
  • Louis -- Sept. 15
  • Detroit -- Sept. 28-29
  • Denver -- Oct. 6
  • New York -- Oct. 13
  • Dallas -- Oct. 20
  • Virtual -- Nov. 3
  • Seattle -- Nov. 9-10
  • Virtual -- Dec. 8

Cost: $25-$630

Where to register: https://www.secureworld.io/events

Secure World's conferences target information security professionals. Both virtual and in-person options offer six to 12 continuing professional education (CPE) credits. There will also be breakout sessions, industry panels of experts and networking opportunities with both vendors and local security association chapters.

Speakers vary by date and location, but some highlighted keynote speakers include the following:

  • Tamika Bass, cybersecurity technology director at Gannett Fleming
  • Stephen Dougherty, financial fraud investigator at U.S. Secret Service's Global Investigative Operations Center
  • Lynn Dohm, executive director of Women in CyberSecurity
  • Danny Jenkins, CEO and co-founder of ThreatLocker
  • Retired Col. Cedric Leighton, CNN military analyst and CEO and founder of Cedric Leighton Associates

2. RSA Conference

When: June 6-9

Where: San Francisco and virtual event

Cost: $50-$2,595

Where to register: https://www.rsaconference.com/usa

Learn about emerging technologies, hidden security vulnerabilities and other cybersecurity challenges from keynote speakers. Breakout sessions include topics such as the following:

  • privacy threats
  • risk scorecards
  • end-to-end encrypted service
  • penetration testing at scale
  • mitigating legal risks of supply chain attacks
  • data protection
  • deepfake tech
  • bot attacks
  • preventing ransomware attacks

Attendees can also earn continuing education (CE) credits.

Speakers include the following:

  • Edward Adams, president and CEO of Security Innovation
  • Jean-Ian Boutin, director of threat research at ESET
  • John Elliott, consultant and author at Pluralsight
  • Julie Haney, computer scientist and usable security researcher at the National Institute of Standards and Technology
  • Martin Smolar, malware researcher at ESET

3. Gartner Security & Risk Management Summit

When: June 7-10

Where: National Harbor, Md.

Cost: $3,375-$3,975

Where to register: https://www.gartner.com/en/conferences/na/security-risk-management-us

The Gartner Security & Risk Management Summit will address various security areas including the following:

  • creating a security-aware culture;
  • identifying risk ownership;
  • creating a risk management process;
  • creating a human-centered secure environment; and
  • establishing the cybersecurity architecture to protect and defend against attackers.

The audience for this conference includes chief information security officers (CISOs), security executives, risk management leaders, security architects, and network and data security managers.

Speakers include the following:

  • Retired Gen. Keith Alexander, founder and co-CEO of IronNet Cybersecurity
  • Jamil Farshchi, CISO at Equifax
  • John McKinley, founder of Great Falls Ventures
  • Alex Stamos, professor at Stanford and former chief security officer at Facebook
  • Katell Thielemann, research vice president at Gartner

4. CyberSecurity Festival

When: June 9 (in-person, London); June 15-16 (virtual)

Cost: complimentary for IT professionals

Where to register: https://cybersecurityfestival.com

All attendees are invited to the virtual portion of CyberSecurity Festival whether they went to the in-person London event or not. The digital experience will be live and will include industry discussions and cybersecurity case studies. Keynote presentations, panel talks, roundtables and experimental workshops will discuss the human part of cybersecurity, how IoT affects security and embracing neurodiversity.

Speakers include the following:

  • Anna Brailsford, CEO of Code First Girls
  • Hanah-Marie Darley, head of threat research at Darktrace
  • Mark Healey, senior cyber security engineer of South Yorkshire Police
  • Christelle Heikkila, member of the board of directors at TechSkills.org
  • Ciaran Martin, first CEO of the National Cyber Security Centre

5. Black Hat USA 2022

When: Aug. 6-11

Where: Las Vegas and virtual

Cost: $0-$3,700

Where to register: https://www.blackhat.com/us-22/

Black Hat USA starts with four days of training. It then moves to the main two-day conference that features briefings and training classes. Training choices include malware, pen testing, risk, network, IoT and crypto. Classes are available for beginner, intermediate and advanced skill levels. Attendees can earn 14, 16 or 32 CPE credits for the briefings, two-day training and four-day training courses respectively.

The arsenal provides an interactive forum to present new tools and products.

6. Blue Team Con

When: Aug. 27-28

Where: Chicago

Cost: $60-$200

Where to register: https://blueteamcon.com/

Blue Team Con attendees include executives, sales personnel, IT professionals and students to discuss current cybersecurity trends. Tracks for this conference include presentations on building security metrics, hacking and defending, cloud security design, defending against ransomware trends, improving security with Azure AD, starting a vulnerability management team and developing attack detection capabilities.

Speakers include the following:

  • Corey Ball, cybersecurity consulting manager at Moss Adams
  • R. Bard, senior manager of application security at United Airlines
  • Karishma Dixit, senior security data scientist at Microsoft
  • Tazin Khan Norelius, founder and CEO of Cyber Collective and multicultural content and community engagement specialist at Cisco
  • Joe Slowik, senior manager of threat intelligence and detections engineering at Gigamon

7. InfoSec World

When: Sept. 26-28

Where: Lake Buena Vista, Fla.

Cost: $1,295-$2,995

Where to register: https://www.infosecworldusa.com/

The InfoSec World conference brings together security employees and executives with industry expert keynotes and interactive sessions. Discussion topics at this event include cloud security, security awareness, risk mitigation, leadership and budgeting, critical infrastructure and identity.

Keynote speakers include the following:

  • Robert Herjavec, CEO at Herjavec Group
  • Tomás Maldonado, CISO with the NFL
  • Ron Ross, a fellow at the National Institute of Standards and Technology

8. (ISC)2 Security Congress

When: Oct. 10-12

Where: Las Vegas and virtual

Cost: $245-$1,995

Where to register: https://congress.isc2.org/event/

The (ISC)2 Security Congress conference is a three-day event offering CP credit opportunities, career guidance and more than 100 educational sessions. Cybersecurity topics include security automation, IoT, risk and compliance, industrial control systems, cloud security and zero trust.

Dig Deeper on Security management

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close