Browse Definitions :

kras99 - stock.adobe.com

8 cybersecurity conferences to attend in 2023

Cybercriminals create new ways to steal information regularly, creating cybersecurity challenges. Attending conferences is one way learn about these trends for the best defense.

Cybersecurity is a constant problem in today's digital age. Attending cybersecurity conferences is one way companies can learn to keep their organizations safe.

In recent years there have been many cyberattacks. Two large breaches include SolarWinds and Colonial Pipeline. In late 2019 into 2020, threat actors sent malicious code through a patch to SolarWinds' Orion IT monitoring software, affecting government and enterprise users. The SolarWinds breach was a supply chain attack that compromised the data, networks and systems of thousands of users, including the U.S. government.

The Colonial Pipeline breach was a ransomware attack in May 2021, causing the pipeline to shut down. President Joe Biden declared this attack a state of emergency, as it affected U.S. infrastructure and caused a fuel shortage.

As threat actors develop new plans to get into systems and steal information, it's vital that companies learn about the latest trends and plan a defense. Here are some cybersecurity conferences in 2023 to help organizations stay in the know.

1. Secure World

When and where: Multiple locations and dates

  • Philadelphia -- April 19-20.
  • Kansas City, Kan. -- May 3.
  • Houston -- May 18.
  • Atlanta -- May 24.
  • Chicago -- June 8.
  • Virtual -- June 14.
  • St. Louis -- Sept. 14.
  • Detroit -- Sept. 28.
  • New York -- Oct. 5.
  • Denver -- Oct. 19.
  • Dallas -- Oct. 26.
  • Seattle -- Nov. 8-9.
  • Virtual -- Nov. 15.
  • Virtual -- Dec. 13.

Cost: $45-$795

Where to register: https://www.secureworld.io/events

Secure World's conferences target information security professionals. There will be breakout sessions, industry panels of experts and networking opportunities with both vendors and local security association chapters.

Speakers vary by date and location, but some speakers include the following:

  • Antonio Andrews -- chief information security and privacy officer, Bed Bath and Beyond.
  • Ravi Monga -- director of cybersecurity, Children's Mercy Kansas City Hospital.
  • Kathleen Moriarty -- CTO, Center for Internet Security.
  • Harvey Perriot -- regional director, Cybersecurity and Infrastructure Security Agency.

2. RSA Conference

When: April 24-27

Where: San Francisco and virtual event

Cost: $495-$2,095

Where to register: https://www.rsaconference.com/usa

RSA covers emerging technologies, hidden security vulnerabilities and other cybersecurity challenges from keynote speakers. Breakout sessions include topics such as the following:

  • Analytics, intelligence and response.
  • Cloud security and CloudSecOps.
  • DevSecOps and application security.
  • Hackers and threats.
  • Machine learning and AI.
  • Professional development and personnel management.
  • Risk management and governance.
  • Security strategy and architecture.
  • Technology infrastructure and operations.

Speakers include the following:

  • Poet Ali -- performer.
  • Sumit Dhawan -- president, VMware.
  • Mary O'Brien -- general manager, IBM Security.
  • Jeetu Patel -- executive vice president and general manager of security and collaboration, Cisco.
  • Wendi Whitmore -- senior vice president, Palo Alto Networks.

3. CyberSecurity Festival

When: May 10-11

Where: Surrey, United Kingdom

Cost: Free for IT professionals

Where to register: https://cybersecurityfestival.com

Keynote presentations, panel discussions and fireside chats will touch on many topics:

  • Emerging cyber threat landscape.
  • Improving diversity in cyber sector.
  • Cyber insurance.
  • Cybersecurity in the humanitarian sector.
  • Remote work experience optimization without security compromises.
  • Automation and zero trust.

Speakers include the following:

  • Joseph Da Silva -- chief information security officer, RS Group PLC.
  • Holly Foxcroft -- head of neurodiversity in cyber research and consulting, Stott and May Consulting.
  • Nick Ioannou -- information security manager, Goodlord.
  • Joanna Smith -- CTO, StepChange.
  • Andrew Vautier -- information security lead, technology client services, Accenture.

4. Gartner Security & Risk Management Summit

When: June 5-7

Where: National Harbor, Md.

Cost: $3,650-$4,300

Where to register: https://www.gartner.com/en/conferences/na/security-risk-management-us

The Gartner Security & Risk Management Summit will address various security areas:

  • Cybersecurity leadership.
  • Cyber and IT risk management.
  • Infrastructure security.
  • Application and data security.
  • Cybersecurity operations.
  • Technical insights for security practitioners.
  • Cybersecurity market dynamics for product leaders.

The audience for this conference includes chief information security officers (CISOs), security executives, risk management leaders, security architects, and network and data security managers.

Speakers include the following:

  • Haben Girma -- disability rights lawyer and author.
  • Leigh McMullen -- vice president and analyst, Gartner.
  • Mary Mesaglio -- managing vice president, Gartner.
  • Arthur Sivanathan -- senior director, CISO Advisory, Gartner.
  • Henrique Teixeira -- senior director and analyst, Gartner.

5. Black Hat USA 2023

When: Aug. 5-10

Where: Las Vegas and virtual

Cost: $0-$3,095

Where to register: https://www.blackhat.com/us-23

Black Hat USA starts with four days of training. It then moves to the main two-day conference that features briefings and training classes. Training choices include malware, pen testing, risk, network, IoT and crypto. Classes are available for beginner, intermediate and advanced skill levels. Those who are certified through ISC2 can earn 14 continuing professional education (CPE) credits for two-day briefings.

Briefings include several different topic tracks, including the following:

  • AI, machine learning and data science.
  • Cloud security.
  • Cryptography.
  • Data forensics and incident response.
  • Exploit development.
  • Malware.
  • Platform security.
  • Reverse engineering.

The arsenal provides an interactive forum to present new tools and products. 

6. Blue Team Con

When: Aug. 25-27

Where: Chicago

Cost: TBA

Where to register: https://blueteamcon.com/

Blue Team Con attendees include executives, sales personnel, IT professionals and students to discuss current cybersecurity trends. The agenda and speakers have not yet been announced, and registration will open in April.

7. InfoSec World

When: Sept. 25-27

Where: Lake Buena Vista, Fla.

Cost: $1,295-$3,995

Where to register: https://www.infosecworldusa.com/

The InfoSec World conference brings together security employees and executives with industry expert keynotes and interactive sessions. Several different topics will be covered, including the following:

  • Cloud security.
  • Cyber crime.
  • Data protection.
  • DevSecOps.
  • Governance, regulation and compliance.
  • Incident response.
  • Information security management.
  • Internet of Things.
  • Malware.
  • Mobile security.
  • Network security.
  • Ransomware.
  • Remote workforce security.
  • Quantum computing.
  • Virtualization.
  • Zero trust.

Speakers have not yet been announced.

8. (ISC)² Security Congress

When: Oct. 25-27

Where: Nashville and virtual

Cost: $100-$1,595

Where to register: https://congress.isc2.org/event/

The Security World Congress conference is a three-day event offering up to 18 CPE credit opportunities, career guidance and educational sessions.

Topics include the following:

  • Governance, risk and compliance.
  • Cyber leadership.
  • Cloud security.
  • Security operations.
  • Software security.
  • Network security.
  • Emerging technologies.

Speakers include the following:

  • Rumman Chowdhury -- former director of AI ethics, Twitter.
  • Nita A. Farahany -- professor of law and philosophy and founding director of the Duke Initiative for Science and Society, Duke University.
  • Andy Greenberg -- senior writer for WIRED and author of Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency.
  • Richard Harris -- Australian anesthetist.
  • Jenny Radcliffe – people hacker and social engineer.

Next Steps

10 hot topics to look for at RSA Conference 2023

Dig Deeper on IT career paths

Networking
  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can ...

  • User Datagram Protocol (UDP)

    User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections...

  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

Security
  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ...

  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close