Cyber Security for Critical Assets (CS4CA) Europe 2025
Europe is confronting a rapidly evolving cyber threat landscape, shaped by intensifying geopolitical tensions, the ongoing war in Ukraine, and an increasingly uncertain transatlantic relationship. From state-sponsored cyber attacks to relentless ransomware campaigns, the pressure on critical infrastructure to bolster cyber defences has never been greater. In response, CS4CA Europe 2025 will centre around the theme: “Ensuring Security Through an Unstable Threat Landscape” — tackling today’s most pressing cybersecurity challenges head-on. A staggering 95% of … More
Hacker Halted 2025: Order from Chaos
This year’s theme for Hacker Halted, Order from Chaos, builds on the exploration of last year’s theme, Cyber Dystopia, which looked into the dark realities of unchecked digital threats. Moving forward from that cautionary vision, Order from Chaos emphasizes the need to bring clarity and structure to the challenges in cybersecurity. As threats grow more sophisticated and unpredictable, security professionals must navigate the chaos to build resilient and adaptive systems. This theme invites participants to … More
ENISA Cyber Threat Intelligence Conference 2025
Thsi is an annual event dedicated to exploring the latest advancements, best practices, and challenges in the field of cyber threat intelligence (CTI). It brings together cybersecurity professionals, researchers, industry experts, government officials, and practitioners to exchange knowledge, insights, and experiences related to identifying, analysing, and mitigating cyber threats. The conference features lightning talks and panel discussions gathering EU Member States representatives, EU institutions, and private companies, as well as networking opportunities designed to cater … More
HACKTIVITY 2025
Renowned for bringing together cybersecurity experts, enthusiasts, and professionals from around the globe, Hacktivity offers a unique platform for knowledge sharing, networking, and showcasing the latest trends in cybersecurity. This year’s conference will feature a diverse lineup of presentations, hands-on workshops, and interactive sessions designed to engage participants at all levels. Attendees can look forward to insights from leading figures in the cybersecurity field, opportunities to participate in comprehensive workshops, and the chance to connect … More
c0c0n Security and Hacking Conference 2025
This event is designed to create opportunities for knowledge sharing, awareness, and discussion around information security, data protection, and privacy. It also serves as a space for collaboration among stakeholders from the corporate sector, government agencies, investigative bodies, academia, research institutions, and industry professionals, with the goal of improving coordination and enhancing cybersecurity practices. The conference begins with three days of in-depth, practical workshops led by experienced cybersecurity professionals. These sessions cover a variety of … More
Navigate – Toronto 2025
Navigate is an annual event dedicated to sharing knowledge, practical expertise, and diverse perspectives on identity security. This year’s program explores new possibilities in the field, with an emphasis on helping attendees address current challenges and plan for the future of their organizations. Sessions will highlight emerging approaches and technologies that are changing the way identities are protected and managed. Why attend? Address the identity shift: As machine and agent identities grow faster than human … More
Cyber Security World Asia 2025
This is a two-day event that brings together professionals, researchers, and industry practitioners in the cybersecurity space. The program focuses on emerging trends, current challenges, and opportunities for dialogue around the development of digital security strategies and technologies.
FinnSec 2025
This event brings together professionals in security technology and services, as well as corporate leaders, to explore new industry trends and solutions, update their knowledge, and network. Attendees will have the opportunity to discover the latest security technologies and services, hear presentations on current topics from industry leaders, and network effectively.
Uniting Women in Cyber 2025
The event includes keynote talks from nationally recognized experts, panel discussions with experienced speakers, and interactive sessions that encourage audience participation and questions. There are also opportunities for attendees to connect with others in the field and build professional relationships. Participants can expect to hear updates on current cybersecurity issues and their real-world implications, and take away practical insights and strategies relevant to both technology and workforce development in the cybersecurity sector.
California Cybersecurity Education Summit 2025
The Summit focuses on addressing the unique cybersecurity challenges faced by the public sector. The event brings together government leaders and IT security professionals to discuss strategies for safeguarding sensitive information, enhancing cybersecurity infrastructure, and staying ahead of evolving threats. Attendees can expect expert insights, collaborative discussions, and practical solutions tailored to the needs of public sector organizations.
GITEX GLOBAL 2025
This event will examine the evolving landscape of digital infrastructure, covering topics such as hyperscale and edge data centres, cloud integration, sustainable design practices, and the growing role of virtualisation. The program will also highlight the emergence of AI factories—specialised data hubs increasingly central to modern computing and artificial intelligence workloads. The event will feature case studies of upcoming data centre projects, expert perspectives on capacity planning and scalability, and discussions addressing critical issues in … More
Authenticate 2025
The focus of the program for the conference is “achieving usable security across the account lifecycle,” with a focus on deeper dives on how to achieve phishing-resistant authentication with passkeys and the adjacent areas necessary to achieve end-to-end account security with usability in mind. Content will include passkey implementation case studies, best practices, and platform-specific masterclasses, and sessions on: account onboarding remote identity verification and proofing authorization biometrics session security device onboarding and authentication cybersecurity/fraud … More
Featured news
Resources
Don't miss
- Five ways OSINT helps financial institutions to fight money laundering
- DevOps in the cloud and what is putting your data at risk
- Russian threat actors using old Cisco bug to target critical infrastructure orgs
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
- Using lightweight LLMs to cut incident response times and reduce hallucinations