Skip to main content

Cybersecurity Events for 2022

You received this information as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party.
Don't miss SecurityWeek's lineup of topic-specific virtual cybersecurity events for 2022
SecurityWeek Subscriber,

As we enter the New Year, mark your calendar for SecurityWeek's lineup of virtual cybersecurity events for 2022.

SecurityWeek’s Security Summits series was designed to allow participants from around the globe to immerse in a virtual environment to discuss the latest cybersecurity threats and challenges facing enterprise organizations.

Through an immersive 3D platform, these virtual experiences enable thousands of security professionals to interact with other attendees, speakers, and sponsors, and visit networking lounges and expo halls with live technical demos.

“Virtual events continue to be an incredibly valuable experience for attendees and sponsors alike, and we look forward to building on the tremendous success we have had executing the industry’s top virtual events over the past two years,” said Mike Lennon, Managing Director at SecurityWeek. “As leaders in the space, we continue to innovate using leading digital technologies, combined with best of breed content, to offer a fantastic experience for attendees.”

Online registration is currently open for all 2022 events.
2022 Virtual Event Calendar
• Ransomware Resilience & Recovery Summit | Jan. 26, 2022
• Attack Surface Management Summit | Feb. 23, 2022
• Supply Chain Security Summit | March 23, 2022
• Threat Intelligence Summit | May 18, 2022
• Cloud Security Summit | June 15, 2022
• Cyber Solutions Summit and Expo | July 19-20, 2022
• CISO Forum | Sept. 13-14, 2022
• ICS Cybersecurity Conference – Oct. 24-27, 2022 | Atlanta + Virtual (Hybrid)
• Threat Hunting Summit | Nov. 16, 2022
• Security Operations Summit | Dec. 6, 2022
Participating sponsors can be part of an engaging experience with delegates and showcase industry knowledge and solutions, while reaching a large online audience through the virtual conference center.
For more information on SecurityWeek’s Security Summit virtual event series visit www.securitysummits.com.
You received this information as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party.

Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

US National Cyber Strategy Pushes Aggressive Hack-Back Operations

Wiz Raises $300 Million at $10B Valuation| News Corp Discloses New Details of Data Breach SecurityWeek News Briefing | Monday, February 27, 2023 US National Cyber Strategy Pushes Aggressive Hack-Back Operations Cloud Security Firm Wiz Raises $300 Million at $10 Billion Valuation Cyberattack on Boston Union Results in $6.4M Loss US Sanctions Several Entities Aiding Russia’s Cyber Operations ‘PureCrypter’ Downloader Used to Deliver Malware to Governments QNAP Offering $20,000 Rewards via New Bug Bounty Program News Corp Discloses New Details of Data Breach Palo Alto Networks Unveils Zero Trust OT Security Solution A Year of Conflict: Cybersecurity Industry Assesses Impact of Russia-Ukraine War - On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their. (...