Event Place From To
Cyber Security Training at SANS 2025 - Orlando, FL, US Orlando, FL Apr. 13, 2025 Apr. 18, 2025
Beyond the Perimeter 2025 - Unifying Security to Enhance Cyber Resilience in the AI Era Apr. 15, 2025 Apr. 17, 2025
SANS Amsterdam June 2025 - Jun 16 - Sat, Jun 21, 2025 Amsterdam, NL Apr. 16, 2025 Apr. 21, 2025
Live Webinar | From Chaos to Control: Automating Detection and Response with AI Apr. 17, 2025 Apr. 17, 2025
Webinar - From Poisoned Pickles to Bad Patches: Unpacking Q1’s Software Supply Chain Threats Apr. 17, 2025 Apr. 17, 2025
"Identifying Third-Party Risk Using Threat Intelligence" Apr. 17, 2025 Apr. 17, 2025
Webinar - CVE Program at Risk: Earthquake or simple tremor? Apr. 17, 2025 Apr. 17, 2025
Identity Defenses: How Attackers Exploit Privilege Gaps & How to Build a Layered Defense - April 17, 2025 Apr. 17, 2025 Apr. 17, 2025
Webinar - The Future is Proactive Security - EUROPE April 17 9AM BST Apr. 17, 2025 Apr. 17, 2025
Webinar - The Future is Proactive Security - AMEA April 17 9AM SGT Apr. 17, 2025 Apr. 17, 2025
Simplifying Kubernetes and Data Management at Scale With Portworx and SUSE Rancher Prime Apr. 17, 2025 Apr. 17, 2025
Live Webinar | The Future of AI-Driven SOC Apr. 17, 2025 Apr. 17, 2025
Webinar - Perfecting IT Automation in 2025: A Roadmap for CIOs Apr. 17, 2025 Apr. 17, 2025
Identifying Third-Party Risk Using Threat Intelligence Apr. 17, 2025 Apr. 17, 2025
Optimizing Hybrid Cloud Resiliency and Security Apr. 17, 2025 Apr. 17, 2025
Women Impact Tech in Chicago - April 17, 2025 Chicago Apr. 17, 2025 Apr. 17, 2025
Live Webinar | The Next Era of Secure Connectivity Apr. 17, 2025 Apr. 17, 2025
Webinar - Banking on Resilience to Defend the Financial Services Sector Apr. 17, 2025 Apr. 17, 2025
Turning Compliance into Growth by Leveraging Security Frameworks for Success - April 22nd, 2025 Apr. 22, 2025 Apr. 22, 2025
Webinar - How to Identify and Tackle SBOM Sprawl Apr. 22, 2025 Apr. 22, 2025
Webinar - How to Handle Consent Under GDPR Apr. 22, 2025 Apr. 22, 2025
Webinar - Protect Microsoft 365 & EntraID from prominent data threats Apr. 22, 2025 Apr. 22, 2025
"Building a Secure Data and AI Platform" Apr. 22, 2025 Apr. 22, 2025
Beyond Defense: Active Directory Recovery and Business Resilience Apr. 22, 2025 Apr. 22, 2025
Securing the Digital Frontier: Navigating Cyber Threats in Startups and Scaleups - Apr 22 2025 Apr. 22, 2025 Apr. 22, 2025
Live Webinar | Next-Gen Cloud Security: Advanced Detection & Response Apr. 22, 2025 Apr. 22, 2025
From hack to response to training: Unifying your security strategy with human risk management - April 22, 2025 Apr. 22, 2025 Apr. 22, 2025
Webinar - Cloudy with a Chance of Ransomware: Building Adaptive Resilience to Weather the Storm Apr. 22, 2025 Apr. 22, 2025
"Find and Fix Application Vulnerabilities … At Cyber Speed" - April 23, 2025 Apr. 22, 2025 Apr. 22, 2025
The Biggest Trends in the 2025 State of IBM i Security Study Apr. 23, 2025 Apr. 23, 2025
Live Webinar | 3 New Ways to Tackle Insider Threats in Government Organizations Apr. 23, 2025 Apr. 23, 2025
Webinar: Introduction to PACE Planning for the Emergency Communications Ecosystem Apr. 23, 2025 Apr. 23, 2025
Webinar | Zero-Standing Privileges Explained Apr. 23, 2025 Apr. 23, 2025
How to Use Security Integrations to Support Regulatory Compliance Apr. 23, 2025 Apr. 23, 2025
Webinar - Higher Ed’s New Legal Landscape - April 23, 11 am 12:15 pm ET ($) Apr. 23, 2025 Apr. 23, 2025
AI Red Teaming and the Future of LLM Security - April 23, 2025 Apr. 23, 2025 Apr. 23, 2025
From Lift-and-Shift to Click-and-Ship: The New Era of Cloud Migrations Apr. 23, 2025 Apr. 23, 2025
Webinar - Higher Ed's New Legal Landscape - April 23 11:00 a.m. ET - 8:00 a.m. PT Apr. 23, 2025 Apr. 23, 2025
Higher Ed’s New Legal Landscape - April 23, 2025 Apr. 23, 2025 Apr. 23, 2025
It's 2025 — Why Haven't We Solved Phishing Yet?! Apr. 23, 2025 Apr. 23, 2025
Webinar - DMARC made simple: protect your domain and stop cybercriminals Apr. 23, 2025 Apr. 23, 2025
"Find and Fix Application Vulnerabilities. . . At Cyber Speed" - April 23, 2025 Apr. 23, 2025 Apr. 23, 2025
Webinar | Modern Enterprises Require Comprehensive Identity Security Programs: Best Practices from the Leader in Identity Security Apr. 23, 2025 Apr. 23, 2025
Webinat - Microsoft Windows Protected Print (WPP): Are You Prepared? Apr. 23, 2025 Apr. 23, 2025
Secure Your Fortress: Building Robust and Resilient Defenses for 2025 Apr. 23, 2025 Apr. 23, 2025
AI Meets Software Supply Chain Security - What you need to know - April 24, 2025 Apr. 24, 2025 Apr. 24, 2025
Webinar - Downstream Security: NIST & C-SCRM Apr. 24, 2025 Apr. 24, 2025
The Future of AI is Containerized—Here's How to Secure It Apr. 24, 2025 Apr. 24, 2025
Certified NIS2 Professional [CN2P] - APRIL 24TH, 2025 Apr. 24, 2025 Apr. 24, 2025
Webinar - How MSPs Build Threat-Aware Cybersecurity Services Apr. 24, 2025 Apr. 24, 2025