DIB SCC Supply Chain Cyber Academy
Virtual ConferenceThe DIB SCC is conducting its Supply Chain Cyber Academy, with a 2-hour training webinar being held once per month through the end of calendar year 2025. The intent of […]
The DIB SCC is conducting its Supply Chain Cyber Academy, with a 2-hour training webinar being held once per month through the end of calendar year 2025. The intent of […]
The DIB SCC is conducting its Supply Chain Cyber Academy, with a 2-hour training webinar being held once per month through the end of calendar year 2025. The intent of […]
The DIB SCC is conducting its Supply Chain Cyber Academy, with a 2-hour training webinar being held once per month through the end of calendar year 2025. The intent of […]
The DIB SCC is conducting its Supply Chain Cyber Academy, with a 2-hour training webinar being held once per month through the end of calendar year 2025. The intent of […]
FISSEA Forums are designed to provide opportunities for policy and programmatic updates, the exchange of best practices, and discussion and engagement among members of the Federal Information Security Educators (FISSEA) […]
In 2026, cybersecurity predictions point to AI driving a major shift in human risk: threat actors will use AI to scale highly believable social engineering and accelerate exploitation, while rapid […]
The Defense Industrial Base Sector Coordinating Council (DIBSCC) is hosting the Supply Chain Cyber Academy webinar series, with a 2-hour training webinar series being held through calendar year 2026. Note […]
Subscribe for Updates or to get invites here: https://cyberab.org/Get-Updates
Organizations increasingly depend on vast ecosystems of thirdparty vendors, expanding their operational capacity—but also their attack surface and risk exposure. This talk challenges trustby-default approaches to vendor relationships and makes […]
NIST’s Information Technology Laboratory (ITL) AI Program invites you to join an interactive webinar on the international AI standards landscape and ITL’s role, priorities, and progress. The webinar will include […]
Accelerating AI and agentic AI adoption, an increasingly volatile threat landscape, and mounting regulatory pressures are stretching cybersecurity programs to their limits — and redefining the role of the CISO. […]
Identity has become the new battleground. From SaaS to cloud to legacy Active Directory, it is now the central control point—and attackers know it. Credential theft, token hijacking, and consent […]
Would you like for your event to be displayed on the events calendar? Submit cybersecurity related events using our event submission form.