2025 Advanced Counter-Terrorism Summer Programme: Terrorism, Counter-Terrorism and the Rule of Law |
R.J. Schimmelpennincklaan 20-22, 2517 JN The Hague, Netherlands |
Aug. 25, 2025 |
Aug. 29, 2025 |
Webinar - Beyond The Data Center: Understanding Flexible Cloud Access Security Management |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
Discover New Tools and Solutions to Protect Your Company from Cyber Attacks |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
TECHSPO - August 26, 2025 |
London, UK |
Aug. 26, 2025 |
Aug. 26, 2025 |
Webinar - August's Business Continuity and IT Disaster Recovery Demo |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
Webinar - Become a Master of Disaster Recovery |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
Kong Konnect Automations 101: Introduction to API Platform-as-a-Service Concepts and Delivery Methods |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
2025 Navy Summit | Potomac Officers Club |
Hilton-McLean 7920 Jones Branch Drive McLean, VA 22102 |
Aug. 26, 2025 |
Aug. 26, 2025 |
Applying AI To Water And Wastewater Operations |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
How CIOs Can Lead Strategic IT Cost Optimization - August 26, 2025 |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
Webinar - Practical Considerations for Implementing Liquid Biopsies in Oncology Clinical Practice |
|
Aug. 26, 2025 |
Aug. 26, 2025 |
How Scammers Engineer Trust On Digital Platforms |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
Live Webinar | Navigating AI-Optimized Search: Key Criteria, Benefits, and Deployment Challenges |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
Webinar - Inside the Top 10 OT Cyber Threats Since 2010 — Join Us Aug 27 |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
Application Technical Professionals, Get to the Next Level With Multimodal GenAI - August 27, 2025 |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
Creating an IT Strategy in Times of Disruption; Pitfalls and Best Practices - August 27, 2025 |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
Blended Threats, Broken Controls: How DPRK Cyber-Fraud Schemes Are Evolving and Spreading - August 27, 2025 |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
NIST NCCoE Secure Software DevSecOps Practices Publication & Virtual Event |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
Thai Cyber, August 26, Bangkok,Thailand |
|
Aug. 27, 2025 |
Aug. 27, 2025 |
Discover the Future of Mining—On Earth and Beyond ($$$) |
|
Aug. 27, 2025 |
Aug. 29, 2025 |
SecureWorld Critical Infrastructure Virtual Conference - August 28, 2025 | 10:30 AM to 5 PM Eastern |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
Webinar - CISO's Guide to Providing Data in the Cloud - Thu, Aug 28, 1pm EST |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
Webinar - Inside the Next Generation of SBOMs |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
The ROI of Cyber Asset Management: Unpacking the Forrester TEI Study |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
Linux Security Summit Europe - 28-29 August 2025, Amsterdam, Netherlands |
Amsterdam |
Aug. 28, 2025 |
Aug. 29, 2025 |
Monda Data & AI Summit 2025 - Thursday, August 28 · 4 - 11pm CEST |
Maaya Berlin Revaler Straße 99 10245 Berlin |
Aug. 28, 2025 |
Aug. 28, 2025 |
Webinar - Harnessing agentic AI: Catching the CISO pulse - Thursday,28 Aug, 01:30 p.m. ET - 30 min. |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
Governing AI risk: Tools, frameworks and real-world implementation with Protecht. |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
"CISO's Guide to Providing Data in the Cloud" |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
Smart Home as a Security Differentiator |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
AI Engineering: The Foundation of Successful AI Factories - August 28, 2025 |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
Tracking Scattered Spider |
|
Aug. 28, 2025 |
Aug. 28, 2025 |
Top 10 Emerging Technologies for Executives to Monitor for Business Disruption - August 29, 2025 |
|
Aug. 29, 2025 |
Aug. 29, 2025 |
Webinar - MasterClass on Implementation of DPDPA’23 |
|
Aug. 30, 2025 |
Aug. 30, 2025 |
A Security Studies Masters course investigating the key issues and emerging paradigms of security, intelligence analysis and criminology |
|
Sep. 1, 2025 |
Sep. 1, 2025 |
Nullcon International Security Conference and Training - Berlin 2025 |
Axel-Springer-Straße 55 10117 Berlin Germany |
Sep. 1, 2025 |
Sep. 5, 2025 |
Webinar - Ubuntu 20.04 LTS: End of Standard Support for Devices |
|
Sep. 2, 2025 |
Sep. 2, 2025 |
Contextualizing Risk in the Age of AI Development - Sep 02 2025 |
|
Sep. 2, 2025 |
Sep. 2, 2025 |
10 Powerful Tips & Techniques to Optimize Your Vendor Deals - September 02, 2025 |
|
Sep. 2, 2025 |
Sep. 2, 2025 |
How to Craft an Award Winning Splash Awards Submission - Sep 3, 2025 |
|
Sep. 3, 2025 |
Sep. 3, 2025 |
INFOSEK, Nova Gorica, Slovenia: 3-5 September |
INFOSEK, Nova Gorica, Hotel Perla |
Sep. 3, 2025 |
Sep. 5, 2025 |
CEDIA Expo -September 3-6, 2025 |
Denver, CO |
Sep. 3, 2025 |
Sep. 6, 2025 |
Webinar - What have we learnt from recent UK cyberattacks |
|
Sep. 3, 2025 |
Sep. 3, 2025 |
Identity-Centric Security: Leveraging AI for scalable, Future-Ready Programs |
|
Sep. 3, 2025 |
Sep. 3, 2025 |
Talking Trends: How to Turn Challenges Into Opportunities in 2025 and Beyond - September 4, 2025 |
|
Sep. 4, 2025 |
Sep. 4, 2025 |
DevOps 101: Modern Package and Artifact Management |
|
Sep. 4, 2025 |
Sep. 4, 2025 |
Live Webinar | Bot or Not Isn’t Good Enough: Rethinking Bot Protection for the Age of AI Agents |
|
Sep. 4, 2025 |
Sep. 4, 2025 |
Webinar - From Risk to Revenue: How Insurers Can Lead in Predict-and-Prevent Services |
|
Sep. 4, 2025 |
Sep. 4, 2025 |
Software Under Siege: What Every Security Leader Needs to Know About Application Defense - September 4th, 2025 |
|
Sep. 4, 2025 |
Sep. 4, 2025 |
CIOs, Elevate the Strategic Role of IT With Multiple Views of IT Spend - September 04, 2025 |
|
Sep. 4, 2025 |
Sep. 4, 2025 |