Cybersecurity Virtual Conferences Events Calendar | SC Media

March
26
10:45 AM ET
Virtual Conference
In this virtual event, delve into the art of optimizing existing threat intelligence tools to fortify your organization’s cyber defenses. Our experts will guide you through strategies to extract maximum value from the tools you already possess, enhancing their efficiency and efficacy. From fine-tuning data collection and analysis to leveragi...
More info
April
Virtual Conference
Few events have had a greater impact on how cybersecurity is currently practiced than the rapid adoption of cloud-based services, especially after many corporate workforces went remote during the pandemic. These days, everything a business needs is available via the cloud – emails and communication platforms, data storage, application development,...
More info
May
Virtual Conference
Incident response is a game where speed is everything. Automation, the key to speed, has long been a Holy Grail for many organizations: just beyond reach. But there have been breakthroughs in the past year that make it more achievable than ever. This virtual event will communicate the critical steps that an attacked organization must take in order...
More info
June
Virtual Conference
The ever-rising tide of ransomware attacks in 2023 showed how entire companies — and countries — can be thrown into disarray as life-sustaining services become disabled. The stakes keep getting higher and the potential for major collateral damage – both financial and physical – continues to grow in severity. This virtual event will exp...
More info
July
Virtual Conference
Regardless of how securely your data resides within your internal organization, you are left exposed by your third-party business relationships. Upstream supply chain partners, cloud-based service providers, third-party programming code – these are all sources of risk. This virtual event will demonstrate solutions, policies and strategies that com...
More info
August
Virtual Conference
During this virtual event, we will dissect the ever-evolving landscape of application security, explore key trends driving innovation, from the rise of DevSecOps to the integration of AI and machine learning. We will cover cutting-edge techniques designed to thwart sophisticated cyber threats, emphasizing secure coding practices and proactive defe...
More info
September
Virtual Conference
Cybersecurity is the stage for AI’s next big breakthrough. Generative AI like ChatGPT and other large language models are blurring the lines between authentic sources and their imposters. But AI can also be a powerful tool that helps organizations analyze and process incredible volumes of data. During this virtual event, we will examine a central ...
More info
October
Virtual Conference
Patch Tuesday? More like Patch Every Day. There’s always something in your network environment that needs fixing, whether it’s an actively exploited zero-day bug that was just identified in a critical advisory or a longstanding vulnerability that you’ve been meaning to get around to eventually. Unfortunately, even the less dangerous flaws can even...
More info
November
Virtual Conference
In an era dominated by digital communication, email security stands at the forefront of safeguarding sensitive information against an evolving threat landscape. This virtual event delves into the intricate web of challenges that define the current email security scenario and unveils the latest tools and techniques designed to fortify defenses. Foc...
More info
December
Virtual Conference
In the rapidly evolving landscape of digital connectivity, the practice of securing networks has become an increasingly complex and critical art. This virtual event brings together industry leaders, cybersecurity experts, and innovators to explore the dynamic intersection of tradition and innovation in network security. Topic areas include: An...
More info
Virtual Conference
In this virtual event, delve into the art of optimizing existing threat intelligence tools to fortify your organization’s cyber defenses. Our experts will guide you through strategies to extract maximum value from the tools you already possess, enhancing their efficiency and efficacy. From fine-tuning data collection and analysis to leveragi...
More info
Virtual Conference
Zero trust remains a major challenge for many organizations. But those who have been successful have valuable lessons to share. Explore the real-world challenges, success stories, and practical insights that have emerged from the trenches — from overcoming initial hurdles to optimizing ongoing processes. This virtual event will equip you wit...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Artificial intelligence, machine learning, analytics and automation… For years, cyber thought leaders have predicted that these technologies would be game-changing in both beneficial and deleterious ways. And yet the sudden emergence of tools like ChatGPT still caught many experts by s...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Cyber threats come in all shapes and sizes. They may be the work of financially motivated actors, or foreign nation-states. They can be designed to be destructive and traumatic, or subtle and clandestine. Without having access to the relevant threat intelligence you need, it can be dif...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. A hospital is forced to divert patients. A school cancels classes. A city is unable to access local residents’ utility accounts… Ransomware can cause all sorts of disruption. Just how severe may depend on what you do both before and after a ransomware actor strikes. This eSummit wil...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. While the concept of zero trust has increasingly been embraced in cyber circles, there is still a lot of work that needs to be done so that organizations can speed up their adoption rates and mature their ZTA models. This eSummit virtual conference will examine how to hopefully inci...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. In the scramble to migrate their assets, services and applications to the cloud over the last few years, organizations have no doubt stumbled through their share of missteps along the way. But we have all collectively learned from these errors, and thus have come to a better understand...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. For every vendor, service provider or supply-chain partner your company does with, you are potentially introducing risk into your ecosystem. And so as these relationships mature through the third-party lifecycle, it’s important that your business responsibly assesses and minimizes the ...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Identity is the new perimeter. So don’t be a “Woulda Coulda Shoulda.” It’s time to innovate in IAM before you fall behind the curve. Inaction and inertia are your enemy. This eSummit virtual conference will look at the promising opportunities that await those organizations that stra...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Don’t leave your devices to their own devices. After all, cyber adversaries turn any endpoint – phones, computers, virtual machines, embedded devices, servers, printers, POS terminals, etc. – into an entry point into your organization. This eSummit will examine the ins and outs of e...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. The phrase “Ignorance is bliss” does not apply to cybersecurity. The more you know about the risks that threaten your organization, the better. Which means you need reliable sources, credible feeds and collaborative industry partners willing to share. You also need to be able to fil...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Whatever ransomware groups can do to ratchet up the pressure even more on their victims, they’ll do it. That might mean contacting individuals directly about their breached data, making stolen data searchable on their extortion websites, or adding a data wiping or DDoS component to the...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Patch Tuesday? More like Patch Every Day. There’s always something in your network environment that needs fixing, whether it’s an actively exploited zero-day bug that was just identified in a critical advisory or a longstanding vulnerability that you’ve been meaning to get around to ev...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Arguably no event in recent memory has had a greater impact on how cybersecurity is currently practiced than the rapid adoption of cloud-based services, especially after many corporate workforces went remote in 2020. These days, everything a business needs is available via the cloud...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. In a perfect world, we’d only ever need a prevention strategy, because it would work 100 percent of the time. But reality is far from perfect, and so incident response has become an equally important counterpart to prevention. And there’s plenty that goes into it: digital forensics ...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. The identity and access management solutions market has seen a dizzying array of activity over the last year. IAM is hot and adoption rates are soaring. And some companies have truly taken IAM to the next level, excelling at incorporating IAM technologies and policies into their day-to...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. The 2022 ransomware attacks against Costa Rica and Montenegro showed how entire countries can now be thrown into disarray as life-sustaining services become disabled. And the Colonial Pipeline incident demonstrated how critical infrastructure is not even out of bounds for attackers. Th...
More info
Virtual Conference
Earn up to 6.5 CPE credits by attending this virtual event. Depending on whom you ask, zero trust appears to be passing the credibility test. Despite continued misconceptions around zero trust architectures, the principles of “least privilege” and “never trust, always verify” have caught on as a bona fide approach to minimizing the risk of a da...
More info