Event Place From To
Cyber Security Training at SANSFIRE 2025 - Washington, DC, US - Mon, Jul 14 - Sat, Jul 19, 2025 Jul. 14, 2025 Jul. 19, 2025
Webinar - Secure by Design: Threat Modeling for Developers Jul. 15, 2025 Jul. 15, 2025
Nursing Educator Dr. Randolph Rasch Urges Overhaul of Healthcare Student Compliance Training as Exxat and ComplianceJunction Launch Partners Jul. 15, 2025 Jul. 15, 2025
How to Use Legitimate Interest to Comply With EU GDPR - 15 July 2025 Jul. 15, 2025 Jul. 15, 2025
Live webinar: Taking Control of SaaS Sprawl Jul. 15, 2025 Jul. 15, 2025
Webinar - Cost-efficient cloud infrastructures for AI workloads Jul. 15, 2025 Jul. 15, 2025
CIOs, Use Your Executive Skills to Reduce Friction in the C-Suite Jul. 15, 2025 Jul. 15, 2025
The New Normal of Energy: Using flexible energy solutions to de-risk energy security and manage market volatility Jul. 15, 2025 Jul. 15, 2025
Non-Human Identity (NHI) Summit 2025 Jul. 15, 2025 Jul. 16, 2025
Harden your cyber resilience with Rubrik Identity Recovery Services - 15th July 2025 Jul. 15, 2025 Jul. 15, 2025
Webinar - Why Smarter Third Party Risk Management (TPRM) Starts with Better Data - Wednesday, 16 July, 1:00 PM CET / 12:00 PM BST Jul. 16, 2025 Jul. 16, 2025
Webinar - New Research: Machine Learning Classifiers Don't Need Negative Labels Wed, July 16,2025 at 1pm EST Jul. 16, 2025 Jul. 16, 2025
Beyond Belief: Who owns the fightback against deepfakes and disinformation? Jul. 16, 2025 Jul. 16, 2025
Webinar : When the Leak Hits: Managing Data Leaks and Cyber Extortion Jul. 16, 2025 Jul. 16, 2025
Beyond legacy defenses: How AI is reshaping security operations for the modern enterprise Jul. 16, 2025 Jul. 16, 2025
The Cybersecurity Training Platform Serious Professionals Are Switching To - Jul 16 2025 Jul. 16, 2025 Jul. 16, 2025
GenAI Compute Infrastructure Under Siege: Defending the Foundation of AI Jul. 16, 2025 Jul. 16, 2025
"New Research: Machine Learning Classifiers Don't Need Negative Labels" Jul. 16, 2025 Jul. 16, 2025
New Research: Machine Learning Classifiers Don't Need Negative Labels - July 16,2025 Jul. 16, 2025 Jul. 16, 2025
Live Webinar | Beyond Patching: Understanding Web Exposure and Why It Matters Jul. 16, 2025 Jul. 16, 2025
How to Spot and Stop Security Risks From Unmanaged AI Tools Jul. 16, 2025 Jul. 16, 2025
Maritime Border Security Technology Workshop - Wednesday, July 16, 2025 · 3:00 p.m. Amsterdam (GMT +2:00) Jul. 16, 2025 Jul. 16, 2025
Live Webinar | Vulnerability Management 2.0: Addressing Web Exposure Before It’s Exploited Jul. 16, 2025 Jul. 16, 2025
Webinar - AI Agents for CIOs: Practical Criteria, Alternatives and Best Practices Jul. 16, 2025 Jul. 16, 2025
Why the Zero-Click AI Vulnerability in Microsoft 365 is a Game-Changer for Email Security - July 16th, 2025 Jul. 16, 2025 Jul. 16, 2025
Webinar - The Future of AI-Powered Email Security Jul. 17, 2025 Jul. 17, 2025
Webinar - Navigating the Security Risks of M&A Jul. 17, 2025 Jul. 17, 2025
The GCP Jenga Tower: Hacking Millions of Google's Servers With a Single Package Jul. 17, 2025 Jul. 17, 2025
Webinar - Threat Actors Unveiled Nation State versus Cyber Crime Jul. 17, 2025 Jul. 17, 2025
Webinar - Ransomware Reality Check: Busting Cybersecurity Myths Jul. 17, 2025 Jul. 17, 2025
Webinar - Best Practices for Cloud Detection and Response: Real-World Lessons from Multi-Cloud Attacks Jul. 17, 2025 Jul. 17, 2025
Three Game-Changing Cloud-Native AI Use Cases You Can Implement Now Jul. 17, 2025 Jul. 17, 2025
See the Future of AI Email Security. Build It with Abnormal. Jul. 17, 2025 Jul. 17, 2025
Navigating M&A: What Every Security Leader Needs to Know - July 17th, 2025 Jul. 17, 2025 Jul. 17, 2025
Webinar - Secure Hybrid AI: How to Responsibly use AI Jul. 17, 2025 Jul. 17, 2025
Abnormal Innovate: See the Future of AI Email Security. Build It with Abnormal - July 17 , 2025 Jul. 17, 2025 Jul. 17, 2025
Webinar - Leveraging AI for Cybersecurity Workflow Augmentation Jul. 17, 2025 Jul. 17, 2025
Live Webinar | Next-Gen Cloud Security: Advanced Detection & Response : Jul. 17, 2025 Jul. 17, 2025 Jul. 17, 2025
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance - 17 Jul 2025 Jul. 17, 2025 Jul. 17, 2025
Business Application Security – Not to be Overlooked When in Your Security Posture Jul. 17, 2025 Jul. 17, 2025
From fragmented to unified: Rethinking network security operations in the AI era Jul. 17, 2025 Jul. 17, 2025
CIOs, Confidently Create Your GenAI Business Case - July 18, 2025 Jul. 18, 2025 Jul. 18, 2025
See bad actors coming - Secure the flavor. Control the brew. Chill with confidence. Jul. 18, 2025 Jul. 18, 2025
Achieving Migration Success - 18th July 2025 Jul. 18, 2025 Jul. 18, 2025
Live Webinar | Translating Cyber Risk for the Board: Making Human Security a C-Suite Priority Jul. 22, 2025 Jul. 22, 2025
Unmasking a VS Code Supply Chain Attack Jul. 22, 2025 Jul. 22, 2025
Tech Field Day Insider Webinar — AI, Hyperscale & Mission-Critical: The Next Chapter in Enterprise Storage Jul. 22, 2025 Jul. 22, 2025
Practical AI for IT Series : Session 1: Virtual Technician - July 22, 2025 Jul. 22, 2025 Jul. 22, 2025
SANS 2025 Government Security Forum Jul. 22, 2025 Jul. 22, 2025
Webinar - Think Like a Cybercriminal to Stop the Next Potential Attack Jul. 22, 2025 Jul. 22, 2025