open padlock on keyboard

Top Cybersecurity Conferences


As information assurance becomes increasingly important to the stability of organizations of every size, professionals working in the industry should consistently take steps to improve their knowledge and skillsets. One way to accomplish this is by regularly attending top cybersecurity conferences hosted by respected leaders in the field. Cybersecurity conferences represent a great opportunity to learn from colleagues, network with talented professionals and share valuable information security knowledge with peers. Below are some of the most widely attended cybersecurity conferences in the world.

The Exchange Community Conference (TEC)

The TEC Conference is a highly informative event that features in-depth educational resources for systems integrators and cybersecurity professionals. Hosted this past May 7-8, attendees had the opportunity to attend high-quality educational programs that focused on hands-on exercises with risk management procedures, advanced reporting techniques, and the proper utilization of the WDesk platform. While networking with like-minded professionals, attendees were also able to derive value from the diverse array of learning tracks offered during the conference, including:

  • Audio-visual Systems Integrators
  • Procurement/Purchasing Professional Training
  • Cybersecurity Training
  • Certifications
  • Management Training
  • Operations Training
  • Sales & Marketing Training
  • Technical Professional Training

Apart from the educational opportunities, this year’s event featured a welcome speech by Bill Bozeman, the president and CEO of PSA Security Network, the TEC Conference’s leading sponsor. A keynote presentation was also delivered by Matt Rosenquist, a Cybersecurity Strategist for Intel Corporation. As someone who has had the privilege of strategizing the cybersecurity plans for one of the largest technology companies in the world, Rosenquist’s key observations from his own experiences allowed him to provide the audience with constructive new perspectives on the cybersecurity industry. The annual TEC Conference also provided opportunities for obtaining marketable certifications.

RSA Conference

As an international ev ent that leads the way for cybersecurity events all over the world, the RSA Conference allows information assurance professionals the opportunity to engage in conversations that can lead to the development of new solutions to common industry problems. The 2017 RSA Conference had several iterations globally, including the United States RSA Conference in San Francisco, California, which took place in February 2017; the RSAC Unplugged Conference in London, England, which took place on June 8, 2017; and a conference at the Emirates Palace in Abu Dhabi, November 7-8, 2017.

At all of the listed RSA Conference events, attendees had the opportunity to learn innovative new cybersecurity strategies and techniques. The London event, RSAC Unplugged, featured a single day dedicated to providing insight into the most important trends of cybersecurity today through roundtable discussions and speeches from several experienced professionals. The Asian Pacific event was geared more towards high-quality education and networking between information assurance professionals. Attendees were exposed to new concepts and technologies that may have been less accessible elsewhere. The last RSA event of the year in Abu Dhabi invited information assurance professionals to experience new technologies, network with international colleagues and expand their knowledge of the industry by attending keynote presentations, group discussions and educational sessions.

BlackHat USA

This year, BlackHat USA held its 20th annual event from July 22-27 in Las Vegas, Nevada and included four days of technical training. The training events included a diverse range of information assurance topics, and attendees had access to educational resources geared toward advanced malware training, hacking a variety of platforms, reverse engineering code, learning from previous exploits and more.

Following the technical training was the main conference, a two-day event that featured industry updates, briefings on the latest research, exposure to new tools and technology, and informative speaking events like keynote presentations and discussion panels. The discussions featured leading minds in the cybersecurity field who overviewed the current state of the cybersecurity profession, as well as discussed projections for the future of the industry in an effort to provide new value to the cybersecurity industry.

Gartner Security & Risk Management Summit

The Gartner Security & Risk Management Summit took place on June 12-15, 2017, in National Harbor, Maryland. This event featured more than 300 sessions dedicated to providing information assurance professionals with opportunities for the development of professional skills through workshops, training sessions and discussions. While participating in the core programs, attendees discussed a variety of topics that are currently trending in the world of cybersecurity, including safe cloud computing, data security, mobile security for digital businesses, risk governance, adaptive security architecture and security strategies that focus on people rather than products. The 2017 summit featured six major programs:

  • Chief Information Security Officer (CISO) Program: Paving the Way for Algorithmic Business
  • Security Trends and Capabilities Program: Building Trust and Resilience with Agile Security
  • TechInsights: Security Architecture Program — Real-World Tactics to Enable Secure Digital Business
  • Business Continuity Management (BCM) Program: Transitioning from Recovery to Resilience
  • Risk Management and Compliance Program: Managing Risk on the Road to Digital
  • Marketplace for Security Program: Understanding Market Forces, Trends and Disruptors


Sponsored by the SANS Institute, the SANS 2017 conference was held April 7-14 in Orlando, Florida and featured more than 40 hands-on information assurance courses, all taught by leading instructors in the industry. The conference’s main event was a keynote presentation by Eric Conrad, a Senior Instructor at the SANS Institute. He delivered a compelling presentation titled, “Quality not Quantity: Continuous Monitoring’s Deadliest Events,” which discussed some of the most critical moments in the history of continuous monitoring software and what cybersecurity professionals have learned from these incidences. Outside of their training sessions, attendees were also privy to multiple networking opportunities, and many had the chance to interact with knowledgeable vendors on successful cybersecurity solutions.

Staying ahead of the curve can prove to be difficult in any industry. For cybersecurity professionals, the problems that they face are constantly evolving, warranting the ongoing study of new ideas and strategies that have been developed to aid in maintaining secure online networks. To assist with this, information assurance professionals can benefit from attending industry conferences, helping to ensure that they are consistently up to date on the latest trends and best methods of defending the vital company data that they are tasked with protecting.

Learn More

As the nation’s oldest private military college, Norwich University has been a leader in innovative education since 1819. Through its online programs, Norwich delivers relevant and applicable curricula that allow its students to make a positive impact on their places of work and their communities.

At Norwich University, we extend a tradition of values-based education, where structured, disciplined, and rigorous studies create a challenging and rewarding experience. Online programs, such as the Master of Science in Cybersecurity, have made our comprehensive curriculum available to more students than ever before.

Norwich University has been designated as a Center for Academic Excellence in Cyber Defense Education by the National Security Agency and Department of Homeland Security. Through the program, you can choose from the five unique concentrations that are designed to provide an in-depth examination of policies, procedures, and overall structure of an information assurance program.

Recommended Readings
Why the U.S. Needs More Cyber Security Professionals
Cyber Liability: What Every Business Needs to Know
7 Books on Information Assurance & Cyber Security


TEC Conference, PSA
RSA Conference, RSA Conference
Welcome to Black Hat USA 2017,
Gartner Security & Risk Management Summit,
Welcome to SANS 2017,

Learn More Today

Complete the form on the next page to request more information about our online programs.

Request Info