Virtual Cybersecurity Events - 100% Online
February 22, 2023
In this focused  summit, SecurityWeek brings together experts in the field of bug bounties, pen-testing, webapp security assessments, network defenders and cloud security specialist to share best practices around reducing attack surfaces in modern computing. As security teams look to...
March 8, 2023
SecurityWeek's Ransomware Resilience and Recovery Summit will help businesses to plan, prepare, and recover from a ransomware incident.
March 22, 2023
This virtual summit will examine the current state of supply chain attacks, the weakest links along the way, the biggest supply chain hacks in history, and best practices for managing this massive attack surface.
Zero trust is more than a marketing buzzword. As defenders look to holistic approaches to securing corporate assets, the concept of ZTNA (Zero Trust Network Access) takes on added importance to help simplify and strengthen access controls for all users,...
The SecurityWeek Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and the murky world of high-end ransomware attacks. Attendees can expect high-quality presentations and sessions on...
June 15, 2022
2022 Conference Presented by As enterprises adopt cloud-based services to leverage benefits such as scalability, increased efficiency, and as cost savings, security has remained a top concern. SecurityWeek’s 2022 Cloud Security Summit, Presented by Palo Alto Networks,  will help organizations...
Cyber Insurance & Liability Summit
November 15, 2023
As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change. Amidst this turmoil, CISOs and risk management leaders must understand clearly the role of cyber insurance in a robust security program, ongoing changes to...
November 16, 2022
SecurityWeek’s Threat Hunting Summit is a virtual conference that presents strategies and tools that security teams use to detect, contain, and eliminate attackers present in or attempting to infiltrate enterprise networks.