Tag: conference
-
ServiceNow’s New Platform Also Governs Everyone Else’s AI
ServiceNow Takes Aim at Enterprise AI Sprawl at Knowledge 2026. At its Knowledge 2026 conference, ServiceNow announced artificial intelligence control tower expansions, an autonomous workforce across every business function and a platform play to become the operating layer for all enterprise AI solutions. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/servicenows-new-platform-also-governs-everyone-elses-ai-a-31631
-
ServiceNow Knowledge 2026: McDermott proclaims fully automated cyber defence
Chief executive’s conference keynote launches agentic artificial intelligence cyber security features for enterprise software player’s centralised platform First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642708/ServiceNow-Knowledge-2026-McDermott-proclaims-fully-automated-cyber-defence
-
Microsoft Teams on Android Now Lets Users Join External Meetings Through SIP
Microsoft is set to bridge the gap in enterprise unified communications with a highly anticipated update to its conference room hardware. Starting in June 2026, Microsoft Teams Rooms on Android will officially support joining third-party external meetings through Session Initiation Protocol (SIP). This strategic development aims to deliver seamless cross-platform interoperability for organizations relying on…
-
CISOs step up to the security workforce challenge
Tags: ai, attack, automation, ciso, conference, control, cyber, cyberattack, cybersecurity, jobs, malicious, risk, skills, strategy, technology, threat, tool, trainingGomez-Sanchez and Turpin are speaking at the CSO Cybersecurity Awards & Conference, May 11-13. Reserve your place. And then there’s AI. When it comes to security, AI may help partially offset cyber skills shortages by automating certain tasks, but it also ramps up cyberattack volumes and expands the organizational attack surface, without fixing CISOs’ ongoing talent…
-
A Tale of Two States: The 2026 Cybersecurity Paradox
The cyber threat outlooks from CIOs and CISOs at the NASCIO Midyear Conference in Philadelphia ranged from the good to the bad to the ugly, with AI front and center. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/05/a-tale-of-two-states-the-2026-cybersecurity-paradox/
-
Just 34% of cyber pros plan to stick with their current employer
Skills development: Richard Demeny, founder and CTO at Canary Wharfian, an online finance career platform, says that graduates and early professionals know they are calling the shots because even at the entry level talent is scarce.”[New entrants] are prioritizing opportunity and learnings, as pay is pretty much standard across the board, except for maybe high-finance…
-
Zambia cancels global digital freedoms conference days before start
On Tuesday, Zambia’s Minister of Technology and Science offered the first hint that the conference would be cancelled, telling a Zambian news outlet that participants’ security clearances were incomplete and that the government has concerns about the conference’s “dialogue.” First seen on therecord.media Jump to article: therecord.media/zabia-cancels-global-digital-freedoms-conference-shortly-before-start
-
Why Enterprises Need an MCP Gateway, Not Native Connectors
Anthropic made the architectural case for MCP gateways at an AI Engineer conference recently. The talk was titled “Why Gateways Are All You Need”. It laid out exactly why enterprise MCP deployments stall and what the path forward looks like. Three specific takeaways were shared: invest in common infrastructure, treat the gateway as your root……
-
AI Governance Moves From Theory to Practice
CIOs Face Growing Pressure on Risk, Data and Board Reporting. As AI moves deeper into enterprise operations, CIOs are being pushed to turn governance principles into practical controls, board reporting and risk oversight, according to a survey by The Conference Board’s Governance and Sustainability Center. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-governance-moves-from-theory-to-practice-a-31534
-
AI Governance Moves From Theory to Practice
CIOs Face Growing Pressure on Risk, Data and Board Reporting. As AI moves deeper into enterprise operations, CIOs are being pushed to turn governance principles into practical controls, board reporting and risk oversight, according to a survey by The Conference Board’s Governance and Sustainability Center. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-governance-moves-from-theory-to-practice-a-31534
-
AI Governance Moves From Theory to Practice
CIOs Face Growing Pressure on Risk, Data and Board Reporting. As AI moves deeper into enterprise operations, CIOs are being pushed to turn governance principles into practical controls, board reporting and risk oversight, according to a survey by The Conference Board’s Governance and Sustainability Center. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-governance-moves-from-theory-to-practice-a-31534
-
What CISOs need to get right as identity enters the agentic era
Tags: access, ai, ciso, conference, control, credentials, cybersecurity, defense, governance, identity, jobs, least-privilege, malicious, mfa, monitoring, phishing, risk, technology, toolWilcox and Adams are speaking at the CSO Cybersecurity Awards & Conference, May 1113. Reserve your place.As a result, Adams says CISOs will increasingly need to adopt an identity-centric security architecture and there are several key tenets to consider.Build a strong foundation before layering on complexity. The instinct when modernizing an identity program, says Adams, is…
-
NCSC chief warns of ‘perfect storm’ as cyber threats intensify at CyberUK
At this week’s CyberUK conference in Glasgow, National Cyber Security Centre (NCSC) CEO Richard Horne delivered a stark assessment of the evolving cyber threat landscape, warning that organisations are facing a “perfect storm” driven by rapid advances in artificial intelligence and rising geopolitical tensions. In his keynote, Horne highlighted how emerging technologies are fundamentally reshaping…
-
CyberUK 2026: UK lagging on legal protections for cyber pros
Ahead of next week’s CyberUK conference, the CyberUp Campaign for reform of the UK’s hacking laws urges the government to keep focus and proposes a four-pillar framework that would protect cyber professionals from prosecution First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros
-
How to Attend Tech Conferences and Events for Free: The Complete Guide for Cybersecurity and AI Professionals
I’ve attended over 100 tech conferences in the past decade, and I’ve paid for maybe five of them. The rest? Free tickets through speaking engagements, partnerships, volunteering, and strategic relationships. Here’s exactly how to do it. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/how-to-attend-tech-conferences-and-events-for-free-the-complete-guide-for-cybersecurity-and-ai-professionals/
-
How to Attend Tech Conferences and Events for Free: The Complete Guide for Cybersecurity and AI Professionals
I’ve attended over 100 tech conferences in the past decade, and I’ve paid for maybe five of them. The rest? Free tickets through speaking engagements, partnerships, volunteering, and strategic relationships. Here’s exactly how to do it. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/how-to-attend-tech-conferences-and-events-for-free-the-complete-guide-for-cybersecurity-and-ai-professionals/
-
ISX IT-Security Conference 2026 – So können Sie Threat Intelligence für Ihre Verteidigung nutzen
First seen on security-insider.de Jump to article: www.security-insider.de/threat-intelligence-geopolitik-schutz-vor-staatlichen-cyberangriffen-a-4109bb52e930e4577959a1759cef6081/
-
Nation states responsible for ‘nationally significant’ cyber attacks against UK, says NCSC chief
The UK is facing four nationally significant cyber attacks a week, the majority from hostile states, NCSC chief, Richard Horne, will warn at the CyberUK conference First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642032/Nation-states-responsible-for-nationally-significant-cyber-attacks-against-UK-says-NCSC-chief
-
ISX IT-Security Conference 2026 – So können Sie Threat Intelligence für Ihre Verteidigng nutzen
First seen on security-insider.de Jump to article: www.security-insider.de/threat-intelligence-geopolitik-schutz-vor-staatlichen-cyberangriffen-a-4109bb52e930e4577959a1759cef6081/
-
ISX IT-Security Conference 2026 – So können Sie Threat Intelligence für Ihre Verteidigng nutzen
First seen on security-insider.de Jump to article: www.security-insider.de/threat-intelligence-geopolitik-schutz-vor-staatlichen-cyberangriffen-a-4109bb52e930e4577959a1759cef6081/
-
CYBERUK ’26: UK lagging on legal protections for cyber pros
Ahead of next week’s CYBERUK conference, the CyberUp Campaign for reform of the UK’s hacking laws urges the government to keep focus, and proposes a four-pillar framework that would protect cyber professionals from prosecution. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641875/CYBERUK-26-UK-lagging-on-legal-protections-for-cyber-pros
-
Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits
Philadelphia, United States / Pennsylvania, April 14th, 2026, CyberNewswire GIACandISC2now recognize active participation inSRA Purple Teamexercises as an eligible Continuing Professional Education (CPE) activity. Teams can earn CPE credits while strengthening organizational detection and response capabilities! How? Some CPE activities are pretty passive webinars, conferences and online courses can check a box. An SRA […]…
-
RSAC Conference 2026 – Cisco erweitert Zero Trust auf KI-Agenten
First seen on security-insider.de Jump to article: www.security-insider.de/cisco-erweitert-zero-trust-auf-ki-agenten-a-a2bffdffe0b749c9d2855ce211bc04d4/
-
‘It reads like a spy novel’: $280 million theft from Drift involved North Korean fake companies, cutouts
Drift officials said the operation began six months ago, when they were approached at a cryptocurrency conference by members of a company claiming to focus on quantitative trading. First seen on therecord.media Jump to article: therecord.media/drift-crypto-theft-post-mortem-north-korea
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
AI Security Risks: How Enterprises Manage LLM, Shadow AI and Agentic Threats FireTail Blog
Tags: access, ai, api, attack, breach, business, ciso, cloud, compliance, conference, control, cybersecurity, data, data-breach, detection, email, endpoint, exploit, finance, framework, gartner, GDPR, governance, guide, infrastructure, injection, LLM, malicious, microsoft, monitoring, network, nvidia, office, regulation, risk, saas, software, threat, tool, training, vulnerabilityApr 08, 2026 – – Quick Facts: Enterprise AI Security Most enterprises are running AI at scale before their security teams have visibility into it. Shadow AI (unsanctioned AI tools spreading department by department) is now the most common entry point for data leakage. Agentic AI introduces a new category of risk: autonomous systems that…
-
Focusing on the People in Cybersecurity at RSAC 2026 Conference
AI dominated the RSAC 2026 Conference and showed it’s still humans in cybersecurity who matter most. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/focusing-people-cybersecurity-rsac2026
-
ISMG Editors: Vendor Breaches Expose Healthcare Risk
Also: RSAC Speakers Warn AI Is Outpacing Security, DoD’s Zero Trust Reality Check. In this week’s panel, four ISMG editors discussed growing cyber risks in healthcare following recent vendor breaches, key takeaways from RSAC Conference and whether the Pentagon’s zero trust push is delivering real security benefits or just checking off boxes. First seen on…
-
prompted 2026 Opening Words >>Research Conferences Aren’t Effective.<<
Author, Creator & Presenter: Gadi Evron, CEO, Knostic. CFP Chair, [un]prompted Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’) YouTube Channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/unprompted-2026-opening-words-research-conferences-arent-effective/

