Browse Definitions :

Getty Images

Post-pandemic cybersecurity conferences not to miss

In the shadows of the pandemic, threat actors got even more brazen. Security pros can fight back with the aid of expert insights and training at these upcoming conferences.

In the evolving cyberthreat landscape, most cybersecurity professionals and organizational leaders are aware of the need for greater vigilance and better risk management.

These professionals also know that their organizations need strategic insights, objective guidance, proven best practices and practical tools to complete tasks such as:

  • securing enterprise networks;
  • modernizing security ecosystems;
  • transforming IT and security into a strategic business function;
  • transitioning from reactive threat response to proactive threat monitoring and detecting; and
  • finding the right balance between security, risk and innovation.

In the wake of the COVID-19 pandemic, threat actors are launching bigger attacks against organizations with even more impunity. To protect themselves, organizational leaders need to understand who these threat actors are and what kind of risks they pose. A good way to do this is by tapping into the "wisdom of the crowd" by attending cybersecurity conferences.

In the post-pandemic era, professionals will be able to attend many conferences -- both in person and virtually -- to update their knowledge; glean insights about the latest risks, trends, tools and processes; and even network with industry experts and thought leaders. If you are a cybersecurity professional, here are the five cybersecurity conferences you should attend. 

1. Gartner Security & Risk Management Summit 2021

Organizer: Gartner

Who should attend: Chief information security officers (CISOs) and other security executives, cybersecurity professionals, governance and risk executives, security architects and planners.

Where: Orlando, Fla., and London

When:

  • U.S.: Sept. 20 - 22
  • U.K.: Nov. 29 - Dec. 1

Conference links:

Gartner's research into cybersecurity risks, trends and developments enables organizations worldwide to manage risk, prevent data breaches and strengthen their security profile.

At this cybersecurity conference, professionals and leaders can explore the latest insights and recommendations from Gartner. They will learn about key trends, practical tools and emerging technologies in areas such as:

  • cloud security
  • privacy
  • threat management
  • infrastructure protection
  • application security
  • cybersecurity mesh

2. SecureWorld Virtual Conferences

Organizer: SecureWorld

Who should attend: Cybersecurity and infosec researchers, professionals and leaders; compliance or governance officers; industry influencers and thought leaders; students.

Where: Virtual

When: June 10, Sept. 23, Oct. 14, Nov. 17 and Dec. 2

Conference link: SecureWorld Virtual Conferences

There will be a variety of keynote speeches, panel discussions and breakout sessions. There will also be ample opportunity for networking, learning from others and exploring prospects for collaboration. Attendees, particularly those at managerial or senior levels, can also evaluate vendors and their security offerings, and meet with local chapters of security associations.

Professionals looking to earn continuing professional education (CPE) credits online can do so by attending at least 20 educational elements -- approximately six hours of learning -- delivered by nationally recognized industry leaders. They can also earn six CPE credits to maintain their cybersecurity certifications.

3. Cybersecurity Festival

Organizer: Computing magazine

Who should attend: IT professionals, business owners, C-suite leaders, web developers, security analysts, architects, managers and financial controllers.

Where: Virtual

When: June 16, 23 and 30

Conference link: Cybersecurity Festival

Registration is free.

This three-day festival will include presentations, panel sessions, fireside chats and workshops to help attendees understand:

  • their vulnerability to cyberthreats and other risks;
  • which tools are the best fit for their organization;
  • how they can use training to build a stronger organization-wide security culture;
  • how to link tools and training to the company's KPIs and broader strategy; and
  • how to avoid information overload.

In a virtual exhibition area, attendees can network with other guests to discuss best practices and explore collaboration or business-building opportunities. They can also network with event speakers -- leaders in the fields of IT, information security and cybersecurity.

This list of events is by no means exhaustive. But if you are a cybersecurity professional or enterprise leader, you should find them useful.

4. Black Hat USA 2021

Organizer: Black Hat

Who should attend: Cybersecurity and infosec pros; CISOs and other C-suite leaders focused on security.

Where: Las Vegas

When: July 31 - Aug. 5

Conference link: Black Hat

Black Hat USA will bring together the cybersecurity community for in-depth training and conference events like keynote speeches and expert panels. In 2021, this cybersecurity conference will be a combination of virtual and in-person events. It opens with four days of virtual trainings -- July 31 - Aug. 3 -- conducted online in real time. On Aug. 3, the Black Hat CISO Summit will bring together more than 200 CISOs from global corporations and government agencies to discuss risks, best practices and more.

The main conference -- Aug. 4 - 5 -- will be a hybrid of virtual and in-person briefings by security experts on an array of topics such as open source tools, IoT and network defense.

5. (ISC)2 Security Congress 2021

Organizer: (ISC)2

Who should attend: Cybersecurity professionals interested in continuing education, including those interested in an opportunity to earn CPE credits.

Where: Orlando, Fla., and virtual

When:

  • Pre-conference training: Oct. 16 - 17
  • Congress: Oct. 18 - 20

Conference link: (ISC)2 Security Congress 2021

Focused on continuing cybersecurity education, the (ISC)2 Congress draws cybersecurity experts from around the world. Professionals in the field can earn two CPE credits and hear top experts on key topics such as cloud security, DevSecOps, governance, risk management, compliance and privacy.

Dig Deeper on Security

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close