{"id":5049,"date":"2025-07-29T16:10:04","date_gmt":"2025-07-29T16:10:04","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=5049"},"modified":"2025-07-29T16:10:04","modified_gmt":"2025-07-29T16:10:04","slug":"8-cybersecurity-conferences-to-attend-in-2025","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=5049","title":{"rendered":"8 cybersecurity conferences to attend in 2025"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"content-body\">&#13;<\/p>\n<p>Cybersecurity is a continuing downside in right this moment&#8217;s digital age. Attending cybersecurity conferences is a technique firms can study to maintain their organizations secure.<\/p>\n<p>In recent times there have been many cyberattacks. One of the vital current breaches within the information is the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/whatis\/feature\/The-Change-Healthcare-attack-Explaining-how-it-happened\">Change Healthcare ransomware assault<\/a>. This primarily shut down the Change Healthcare community, which prevented many physicians, hospitals and pharmacies from billing insurance coverage firms for prescriptions and healthcare procedures.<\/p>\n<p>Different breaches in recent times embrace <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\">SolarWinds<\/a> and Colonial Pipeline. In late 2019 into 2020, menace actors despatched malicious code by way of a patch to SolarWinds&#8217; Orion IT monitoring software program, affecting authorities and enterprise customers. The SolarWinds breach was a provide chain assault that compromised the info, networks and techniques of hundreds of customers, together with the U.S. authorities.<\/p>\n<p>The <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/whatis\/feature\/Colonial-Pipeline-hack-explained-Everything-you-need-to-know\">Colonial Pipeline<\/a> breach was a ransomware assault in Might 2021, inflicting the pipeline to close down. President Joe Biden declared this assault a state of emergency, because it affected U.S. infrastructure and induced a gas scarcity.<\/p>\n<p>As menace actors develop new plans to get into techniques and steal data, it is vital that firms study concerning the newest traits and plan a protection. Listed here are some cybersecurity conferences in 2025 to assist organizations keep within the know.<\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"1. SecureWorld\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>1. SecureWorld<\/h2>\n<p><b>When and the place: <\/b>A number of areas and dates<\/p>\n<ul class=\"default-list\">\n<li>Boston &#8212; March 12-13<\/li>\n<li>Charlotte &#8212; April 2<\/li>\n<li>Toronto &#8212; April 8<\/li>\n<li>Philadelphia &#8212; April 9-10<\/li>\n<li>South Florida &#8212; April 17<\/li>\n<li>Kansas Metropolis, Kan. &#8212; Might 8<\/li>\n<li>Houston &#8212; Might 15<\/li>\n<li>Chicago &#8212; Might 21<\/li>\n<li>Detroit &#8212; Sept. 11<\/li>\n<li>St. Louis &#8212; Sept. 17<\/li>\n<li>Dallas &#8212; Oct. 2<\/li>\n<li>Denver &#8212; Oct. 9<\/li>\n<li>Atlanta &#8212; Oct. 16<\/li>\n<li>New York Metropolis \u2013 Oct. 29<\/li>\n<li>Seattle &#8212; Nov. 5-6<\/li>\n<\/ul>\n<p><b>Value: <\/b>$50-$795<\/p>\n<p>SecureWorld&#8217;s conferences goal data safety professionals. There will likely be breakout classes, business panels of specialists and networking alternatives with each distributors and native safety affiliation chapters.<\/p>\n<p>Audio system fluctuate by date and site, however some audio system embrace the next:<\/p>\n<ul class=\"default-list\">\n<li>Rick Doten \u2013 vp of knowledge safety, Centene Company.<\/li>\n<li>Michelle Garcia \u2013 director of knowledge safety and compliance, Carnival Cruise Line.<\/li>\n<li>Carol Glennon \u2013 international director of cybersecurity operations, McDonald\u2019s.<\/li>\n<li>Derek Fisher, government director of product safety, JP Morgan Chase &amp; Co.<\/li>\n<li>Jennifer Fite &#8212; knowledge technique and knowledge data architect, Financial institution of America.<\/li>\n<li>Lisa Plaggemier &#8212; government director, Nationwide Cybersecurity Alliance.<\/li>\n<li>Steven Powers \u2013 vp of product safety, LPL Monetary.<\/li>\n<li>Ken Weeks &#8212; chief data safety officer, state of New Hampshire.<\/li>\n<\/ul>\n<p>Register for SecureWorld conferences <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.secureworld.io\/events\" rel=\"noopener\">right here<\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"2. RSA Conference\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>2. RSA Convention<\/h2>\n<p><b>When:\u00a0<\/b>April 28 &#8211; Might 1<\/p>\n<p><b>The place: <\/b>San Francisco and digital occasion<\/p>\n<p><b>Value: <\/b>$99-$2,395<\/p>\n<p>RSA covers rising applied sciences, hidden safety vulnerabilities and different cybersecurity challenges from keynote audio system. Breakout classes embrace subjects reminiscent of the next:<\/p>\n<ul class=\"default-list\">\n<li>AI and safety.<\/li>\n<li>Analytics and intelligence.<\/li>\n<li>Cloud safety.<\/li>\n<li>C-suite views.<\/li>\n<li>Client and industrial applied sciences.<\/li>\n<li><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cryptography\">Cryptography<\/a>.<\/li>\n<li>DevSecOps and software safety.<\/li>\n<li>Governance danger and compliance.<\/li>\n<li>Hackers and threats.<\/li>\n<li>Community and infrastructure safety.<\/li>\n<li>Privateness and knowledge safety.<\/li>\n<\/ul>\n<p>Keynote audio system embrace the next:<\/p>\n<ul class=\"default-list\">\n<li>Vijay Bolina, chief data safety officer, Google DeepMind.<\/li>\n<li>Vasu Jakkal, company vp, Microsoft Safety.<\/li>\n<li>Earvin \u201cMagic\u201d Johnson, NBA Corridor of Famer, entrepreneur and philanthropist.<\/li>\n<li>Sandra Joyce, vp of Google menace intelligence group, Google Cloud.<\/li>\n<li>George Kurtz, CEO and founding father of CrowdStrike.<\/li>\n<li>Jeetu Patel, government vp and chief product officer, Cisco.<\/li>\n<li>Jim Routh, chief belief officer, Saviynt.<\/li>\n<li>Tomer Weingarten, CEO and co-founder, SentinelOne.<\/li>\n<\/ul>\n<p>Register for the RSA convention <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.rsaconference.com\/usa\" rel=\"noopener\">right here<\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"3. Gartner Security &amp; Risk Management Summit\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>3. Gartner Safety &amp; Threat Administration Summit<\/h2>\n<p><b>When: <\/b>June Sept. 11<\/p>\n<p><b>The place: <\/b>Nationwide Harbor, Md.<\/p>\n<p><b>Value: <\/b>$4,025-$4,325<\/p>\n<p>The <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/366626138\/News-brief-Gartner-Security-and-Risk-Management-Summit-recap\">Gartner Safety &amp; Threat Administration Summit<\/a> will embrace the next matter tracks:<\/p>\n<ul class=\"default-list\">\n<li>Cybersecurity management.<\/li>\n<li>Cyber danger administration.<\/li>\n<li>Infrastructure safety.<\/li>\n<li>Utility and knowledge safety.<\/li>\n<li>Cybersecurity operations.<\/li>\n<li>CISO circle.<\/li>\n<\/ul>\n<p>The viewers for this convention contains chief data safety officers (CISOs), safety executives, danger administration leaders, safety architects, and community and knowledge safety managers.<\/p>\n<p>Keynote audio system embrace the next:<\/p>\n<ul class=\"default-list\">\n<li>Adam Grant &#8212; organizational psychologist, Wharton.<\/li>\n<li>Chiara Girardi \u2013 director of analysis, Gartner.<\/li>\n<li>Eric Grenier &#8212; director analyst, Gartner.<\/li>\n<li>Christine Lee &#8212; VP analysis, Gartner.<\/li>\n<li>Leigh McMullen &#8212; distinguished VP analyst, Gartner.<\/li>\n<li>Christopher Mixter \u2013 VP analyst, Gartner.<\/li>\n<li>Evy Poumpouras \u2013 former secret service particular agent and interrogator, co-host of \u201cSpy Video games.\u201d<\/li>\n<li>Katell Thieleman &#8212; distinguished VP analyst, Gartner.<\/li>\n<\/ul>\n<p>Register for the Gartner Safety and Threat Administration Summit <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us\" rel=\"noopener\">right here<\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"4. Black Hat USA 2025\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>4. Black Hat USA 2025<\/h2>\n<p><b>When: <\/b>Aug. 2-7<\/p>\n<p><b>The place: <\/b>Las Vegas and digital<\/p>\n<p><b>Value: <\/b>$749-$3,399<\/p>\n<p>Black Hat USA begins with 4 days of coaching. It then strikes to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/conference\/Guide-to-the-latest-Black-Hat-Conference-news\">most important two-day convention<\/a> that options briefings and coaching lessons. Coaching selections embrace synthetic intelligence\/machine studying\/knowledge science, malware, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Useful-hardware-pen-testing-tools\">pen testing<\/a>, danger, community, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/Internet-of-Things-IoT\">\u00a0IoT<\/a> and crypto.<\/p>\n<p>Lessons can be found for newbie, intermediate and superior ability ranges. Those that are licensed by way of ISC2 can earn 14 persevering with skilled schooling (CPE) credit for two-day briefings.<\/p>\n<p>The arsenal supplies an interactive discussion board to current new instruments and merchandise. Audio system haven&#8217;t but been introduced.<\/p>\n<p>Register for Black Hat USA 2025 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.blackhat.com\/us-25\/registration.html\">right here<\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"5. Blue Team Con\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>5. Blue Group Con<\/h2>\n<p><b>When: <\/b>Sept. 4-7<\/p>\n<p><b>The place: <\/b>Chicago<\/p>\n<p><b>Value: <\/b>TBA<\/p>\n<p>Blue Group Con attendees embrace executives, gross sales personnel, IT professionals and college students to debate present cybersecurity traits. CPE credit are additionally out there.<\/p>\n<p>The agenda and audio system haven&#8217;t but been introduced, and registration will open within the spring.<\/p>\n<p>Register for Blue Group Con <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/blueteamcon.com\/\" rel=\"noopener\">right here<\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"6. CMMC CON 2025\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>6. CMMC CON 2025<\/h2>\n<p><b>When:<\/b> Sept. 24-25<\/p>\n<p><b>The place:<\/b> Digital<\/p>\n<p><b>Value:<\/b> Free<\/p>\n<p>The Cybersecurity Maturity Mannequin Certification (CMMC) convention is a two-day digital occasion for cybersecurity specialists who want to know and adjust to CMMC necessities. The convention guides members by way of the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchdatamanagement\/definition\/compliance\">compliance<\/a> course of, together with assessments, implementation and administration.<\/p>\n<p>Matters embrace the next:<\/p>\n<ul class=\"default-list\">\n<li>Hidden threats to nationwide safety.<\/li>\n<li>Implementation technique.<\/li>\n<li><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searcherp\/definition\/supply-chain-security\">Provide chain safety<\/a>.<\/li>\n<li>Regulatory panorama.<\/li>\n<li>Finish-to-end provider compliance visibility.<\/li>\n<\/ul>\n<p>Keynote audio system embrace the next:<\/p>\n<ul class=\"default-list\">\n<li>Erica Aldaz &#8212; techniques administrator\/architect CMMC, Spectra Aerospace &amp; Protection.<\/li>\n<li>Fernando Machado &#8212; managing principal and chief data safety officer, Cybersec Investments.<\/li>\n<li>Casey Lang \u2013 vp of compliance, CyberSheath.<\/li>\n<li>Manny Sahota &#8212; director, head of regulatory technique, Microsoft.<\/li>\n<li>Rachel Tobac &#8212; CEO, SocialProof Safety.<\/li>\n<\/ul>\n<p>Register for the CMMC convention <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/registration-cmmccon.cybersheath.com\/event\/95b2ee4c-5ede-493d-af32-ae0d2553f255\/summary?utm_campaign=CMMC%20CON%202025&amp;utm_content=Rachel%20Tobac%20Speaker%20Announcement&amp;utm_medium=Business%20Wire&amp;utm_source=PR\" target=\"_blank\" rel=\"noopener\">right here.<\/a><\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"7. InfoSec World\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>7. InfoSec World<\/h2>\n<p><b>When: <\/b>Oct. 27-29<\/p>\n<p><b>The place: <\/b>Lake Buena Vista, Fla.<\/p>\n<p><b>Value: <\/b>$1,495-$4,195<\/p>\n<p>The InfoSec World convention brings collectively safety workers and executives with business knowledgeable keynotes and interactive classes.<\/p>\n<p>Matters embrace the next:<\/p>\n<ul class=\"default-list\">\n<li>Assault floor administration.<\/li>\n<li>Cloud safety.<\/li>\n<li>Cybercrime.<\/li>\n<li>DevSecOps.<\/li>\n<li>Insider threats.<\/li>\n<li>Malware and ransomware.<\/li>\n<li>Cellular safety.<\/li>\n<li>Privateness.<\/li>\n<li>Distant workforce safety.<\/li>\n<li>Quantum computing.<\/li>\n<li>Safety audit.<\/li>\n<li>Provide chain safety.<\/li>\n<li><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchitoperations\/definition\/virtualization\">Virtualization<\/a>.<\/li>\n<li>Workforce traits.<\/li>\n<\/ul>\n<p>The agenda and audio system haven&#8217;t but been introduced.<\/p>\n<p>Register for InfoSec World <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.infosecworldusa.com\/\" rel=\"noopener\">right here<\/a>.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"8. (ISC)\u00b2 Security Congress\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>8. (ISC)\u00b2 Safety Congress<\/h2>\n<p><b>When: <\/b>Oct. 28-30<\/p>\n<p><b>The place: <\/b>Nashville\u00a0and digital<\/p>\n<p><b>Value: <\/b>$225-$1,795<\/p>\n<p>The Safety World Congress convention is a three-day occasion providing CPE credit score alternatives, profession steering and academic classes.<\/p>\n<p>Matters embrace the next:<\/p>\n<p>Audio system haven&#8217;t but been introduced.<\/p>\n<p>Register for the ISC2 Safety Congress <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/web.cvent.com\/event\/a5c15481-492d-4efa-bd79-a521ab73b699\/websitePage:26a84091-6c86-411e-9e16-6613ec20a219\" rel=\"noopener\">right here<\/a>.<\/p>\n<p><i>Rosa Heaton is a content material supervisor for the Studying Content material group at Informa TechTarget.<\/i><\/p>\n<p><i>Sarah Amsler is a senior managing editor for the Studying Content material staff at TechTarget.<\/i><\/p>\n<\/section>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>&#13; Cybersecurity is a continuing downside in right this moment&#8217;s digital age. Attending cybersecurity conferences is a technique firms can study to maintain their organizations secure. In recent times there have been many cyberattacks. One of the vital current breaches within the information is the Change Healthcare ransomware assault. This primarily shut down the Change [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[4352,4351,361],"class_list":["post-5049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attend","tag-conferences","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5049"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5049\/revisions"}],"predecessor-version":[{"id":5050,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5049\/revisions\/5050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/5051"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-18 19:52:26 UTC -->