Virtual Cybersecurity Events - 100% Online
February 22, 2023
As security teams look to foundational strategies to protect corporate assets, the reduction of attack surface throughout the organization takes center stage. In this focused summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in...
March 8, 2023
SecurityWeek's Ransomware Resilience and Recovery Summit will help businesses to plan, prepare, and recover from a ransomware incident.
March 22, 2023
This virtual summit will examine the current state of supply chain attacks, the weakest links along the way, the biggest supply chain hacks in history, and best practices for managing this massive attack surface.
Zero Trust is more than a marketing buzzword. As defenders look to holistic approaches to securing corporate assets, the concept of ZTNA (Zero Trust Network Access) takes on added importance to help simplify and strengthen access controls for all users,...
SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit brings together security practitioners from around the world to share war stories on breaches and the murky world of high-end cyberattacks. This event will dive into Threat hunting tools and frameworks, and...
July 19, 2023
The sheer volume of malware attacks, security incidents and data breaches have exposed major gaps in the way corporate assets are protected, especially as enterprises adopt cloud services to take advantage of scalability, efficiency and cost savings. As CISOs and...
Cyber Insurance & Liability Summit
November 15, 2023
As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change. Amidst this turmoil, CISOs and risk management leaders must understand clearly the role of cyber insurance in a robust security program, ongoing changes to...
November 16, 2022
SecurityWeek’s Threat Hunting Summit is a virtual conference that presents strategies and tools that security teams use to detect, contain, and eliminate attackers present in or attempting to infiltrate enterprise networks.