Skip to content
     

    6 Top Cybersecurity Conferences to Attend and Top Tips to Survive Travel in 2022

    Cybersecurity professionals began 2022 just like we started 2021, with many unknowns and travel disruptions. Events are once again being rescheduled, shifted to hybrid and online formats, or canceled. We must accept constant change, even as we plan our 2022 conference calendar.

    In 2022 I plan to do the things I need to do to contribute to making the world safer online and helping organizations protect and defend against continuous cyberattacks.

    Attending conferences, where we can listen to amazing speakers and security researchers, is part of continuous learning. During the pandemic, I have missed in-person events—they were a way to meet with so many amazing, talented industry experts and share experiences while enjoying a good chat and laughing together. It’s those moments that help all of us through the tough times working in cybersecurity.

    Opportunities for collaboration and sharing knowledge are vital to cybersecurity success

    With the hope that we can continue to attend events in 2022—whether in person or online—we must continue to plan. Yes, the event experience will be different in 2022 from what we experienced before COVID, but these opportunities for collaboration and sharing knowledge are vital to cybersecurity success.

    Learning to be Social Again and Discovering New Forms of Greetings

    As I’ve recently been getting back to in-person conferences (some, but nowhere near previous years), one new norm I’ve discovered is that the traditional greetings have changed from a hug or handshake to elbow tapping, fist bumps, foot taps, or the simple head nod from a safe distance. It’s been kind of weird. Learning to identify the right greeting has been interesting. I’ve found myself sometimes putting my hand out to shake the person’s hand and holding their fist instead, which, in all honesty, is an interesting way to say hello to someone.

    The new human perimeter

    There’s a New Human Perimeter

    We must rediscover how to be social and respect the new human perimeter. That means checking to see what the other person’s safe zone is. I call this the “red light, yellow light, and green light” social challenge.

    It would be great if conferences would introduce a way of indicating what the new safe human perimeter is, perhaps by adding something like a ribbon for vendors, speakers, attendees, and media—different colors or labels would identify what greetings are acceptable to different individuals, let’s say:

    • Red Light – Stay a safe distance, don’t invade my space
    • Yellow Light – Fist bumps, elbow taps, or foot taps are welcome
    • Green Light – I’m back and handshakes are good
    New greeting protocols at conferences

    Re-learning how to be social at the conference – colors would identify the new “handshakes”

    As we get back to society, let’s respect each other’s boundaries and rediscover old greetings along with the new. It’s important to stay safe and healthy, and, at the same time, ensure we aren’t pushing on “unauthorized access.” That said, let’s dive into . . .

    The 6 Top Cybersecurity Conferences for 2022

    As a person who has attended around 40 to 60 conferences and events each year, I thought I would put together a list of some of my top-recommended cybersecurity events you should have on your must-attend list.

    1 | European Identity and Cloud Conference 2022 

    Location: Berlin, Germany

    Dates: May 10 – 13, 2022

    Format: Hybrid Event

    Link: https://www.kuppingercole.com/events/eic2022 

    2 | Qubit Conference – Prague 

    Location: Prague, Czech Republic (Czechia)

    Dates: May 25 – 26, 2022

    Format: In-Person with additional virtual pass option

    Link: https://prague.qubitconference.com/ 

    3 | RSA Conference 

    Location: San Francisco, USA

    Dates: June 6– 9, 2022

    Format: In-Person and Digital Pass

    Link: https://www.rsaconference.com/usa 

    If you attend RSA do make sure to come and join me for my session:

    Zero to Full Domain Administrator: Real-World Ransomware Incident

    Following in the footsteps of an attacker and uncovering their digital footprints, this session will show attendees the attacker’s techniques used and how they went from zero to full domain admin compromise, which resulted in a nasty ransomware incident. 

    4 | Infosecurity Europe 2022 

    Location: London, UK

    Dates: June 21 – 23, 2022

    Format: Hybrid Event

    Link: https://www.infosecurityeurope.com/ 

    5 | Blackhat and Defcon (2 cons in 1 go) 

    Blackhat USA

    Location: Mandalay Bay Convention Center, Las Vegas, USA

    Dates: August 6th – 11th, 2022

    Format: In-Person plus virtual

    Link: https://www.blackhat.com/upcoming.html#usa 

    DefCon 30

    Location: Las Vegas, USA

    Dates: August 11 – 14, 2022

    Format: TBA

    Link: https://defcon.org/ 

    6 | ISC2 Security Congress 

    Location: Las Vegas, USA

    Dates: October 10 – 12, 2022

    Format: Hybrid

    Link: https://congress.isc2.org/event/ddd188c4-b9cd-4eb0-bd9a-2c7810df496e/summary

     Notable conference mentions from me and my peers:

    If you have recommendations for other top security conferences, please add them to the comments as we would love to hear about other awesome conferences around the world.

    My Top Tips to Survive Conference Travel in 2022

    There are several tips for those attending any cybersecurity conference in person. They’ll help you stay safe and reduce the risk of becoming compromised. I follow these practices on my frequent travels.

    Here’s a helpful list to keep in mind:

    • Many restrictions are in place due to COVID-19. Check and double-check before you go to make sure you are up to date on mandatory requirements.
    • Check which documents you need for travel, including transit countries, as you might need to complete traveler locator forms.
    • Keep extra masks at hand as you never know when you might need them.
    • Check your passport or travel document expiration dates as it might have been a while since you last used them
    • Keep valuables in your hotel room locked in your suitcase or hotel safe.
    • Update, patch, and back up your devices before you leave home.
    • Power off any devices that you aren’t using.
    • Leave sensitive data at home.
    • Keep your contactless cards in an RFID-protected wallet.
    • Always assume someone is watching and monitoring you—you’re going to be caught on camera and tracked, so accept it.
    • Avoid Public WIFI and use mobile data always with a VPN.

    Learn more in our recent podcast Cybersecurity Conference Survival Tips with Chris Roberts

    Call for Speakers and Speaker Mentoring

    Also, if you’re looking to speak at any of these events, submit your ideas and session suggestions as many of them offer call for papers or speakers. It’s always great to hear new ideas and experiences to share with the world.

    If you’re interested in me mentoring you, please feel free to reach out and contact me.