
Cybersecurity Conferences & Information Security Events
Upcoming Security Conferences
Information Security Events Calendar
Join Team Cymru at premier cybersecurity conferences around the world. Network with industry leaders, gain threat intelligence insights, and advance your security expertise.






Sign Up
Flagship Events
Premier Team Cymru Cybersecurity Conferences
Discover our signature information security events designed to bring together the brightest minds in cybersecurity, threat intelligence,
and digital defense.

Regional Information Security Events
RISE brings together regional cybersecurity leaders, practitioners, and innovators for focused, high-impact information security events. Each RISE conference delivers actionable threat intelligence, hands-on workshops, and unparalleled networking opportunities tailored to local security challenges and emerging cyber threats.
Designed for CISOs, security architects, threat analysts, and IT security professionals seeking to strengthen their organization's cyber defense posture through regional collaboration and knowledge sharing.
.png)
Underground Economy Conference
The Underground Economy Conference is the premier cybersecurity event focused on cybercrime ecosystems, adversary economics, and dark web threat intelligence. This elite information security conference brings together top researchers, law enforcement, and security professionals to dissect the financial motivations and operational tactics of threat actors.
Gain exclusive insights into ransomware operations, cryptocurrency laundering, underground marketplaces, and emerging cyber threats that drive the global underground economy. Perfect for threat intelligence analysts, fraud investigators, and security leaders combating sophisticated cybercriminal networks.
What you Won't Get Anywhere Else.
Built by practitioners who couldn't find what they needed,
so they built it themselves.
Unpublished Intel
Gain access to sessions driven by active threat tracking and original research shared under the Chatham House Rule. The IOCs and TTPs presented here won't hit your commercial feeds for weeks, even months.
Defender Community
Our vetted community serves as the entry point to an active, year-round community of defenders who collaborate on investigations and share intelligence long after the event ends.
Actionable Intelligence
Every session is built around takeaways your team can act on to strengthen your security posture. Leave with detection logic, defensive posture changes, and threat context you can brief up immediately.
Operator Labs
Participate in practitioner-led workshops covering threat hunting, live incident response, and applied AI for defenders. These are high-signal sessions built by operators, not trainers, with limited seats available.
CPE Credits
Earn continuing education credits for certifications like CISSP and CISM while working through material that actually advances your practice. Credits are earned through hands-on work, not passive lectures.
Sharper Room
Experience an invite-only environment with no vendors and no pitches. You will be in the room with CISOs, threat intelligence leads, critical infrastructure defenders, and law enforcement investigators.