{"id":12617,"date":"2026-04-13T18:53:47","date_gmt":"2026-04-13T18:53:47","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/04\/22\/conference-radar-2026-where-ciso-budgets-meet-substance\/"},"modified":"2026-04-22T06:38:04","modified_gmt":"2026-04-22T06:38:04","slug":"conference-radar-2026-where-ciso-budgets-meet-substance","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2026\/04\/13\/conference-radar-2026-where-ciso-budgets-meet-substance\/","title":{"rendered":"Conference Radar 2026: Where CISO Budgets Meet Substance"},"content":{"rendered":"<p style=\"color:#69d8ed;font-size:0.9em;margin:0 0 16px;padding:0;\">6 min read<\/p>\n<p><strong>Security conferences in 2026 have become a two-tier system. On one side are events delivering hard-hitting substance to engineers and CISOs: verified zero-days, clean detection engineering tracks, peer-level exchange. On the other, formats whose agendas barely differ from vendor roadshows. Both cost five figures per person in 2026\u2014flight, hotel, ticket, and work hours included. Anyone allocating travel budgets needs a clear-eyed radar.<\/strong><\/p>\n<div style=\"background:#003340;color:#fff;padding:28px 32px;margin:32px 0;border-radius:8px;\">\n<p style=\"margin:0 0 14px 0;font-size:0.78em;font-weight:700;text-transform:uppercase;letter-spacing:0.18em;color:#69d8ed;\">Key Takeaways<\/p>\n<ul style=\"margin:0;padding-left:22px;color:rgba(255,255,255,0.92);line-height:1.55;\">\n<li style=\"margin-bottom:8px;\">RSAC takes place from March 23\u201326, 2026, in San Francisco\u2014shifting from its usual April slot (Source: RSA Conference, Moscone Center).<\/li>\n<li style=\"margin-bottom:8px;\">The it-sa Expo&amp;Congress runs from October 27\u201329 in Nuremberg\u2014the must-attend DACH event for compliance-focused security teams (Source: N\u00fcrnbergMesse).<\/li>\n<li style=\"margin-bottom:8px;\">Black Hat Europe returns to London from December 7\u201310, 2026\u2014trainings remain the real value; the Business Hall has clearly lost substance in 2026.<\/li>\n<li style=\"margin-bottom:8px;\">DEF CON 34 takes place in Las Vegas from August 6\u20139\u2014village-focused content outweighs the main stage; those attending only keynotes miss the point entirely.<\/li>\n<li style=\"\">Regional and specialized events (OffensiveCon Berlin, Troopers Heidelberg, FIRSTCON) are gaining market share in 2026\u2014smaller audiences, higher signal density.<\/li>\n<\/ul>\n<\/div>\n<p style=\"font-size:0.88em;color:#666;margin:20px 0 32px 0;border-top:1px solid #e5e5e5;border-bottom:1px solid #e5e5e5;padding:10px 0;\"><span style=\"color:#004a59;font-weight:700;text-transform:uppercase;font-size:0.72em;letter-spacing:0.14em;margin-right:14px;\">Related<\/span><a href=\"https:\/\/www.securitytoday.de\/2026\/03\/25\/copilot-sicherheitsrisiko-2026-prompt-injection-oversharing-dsgvo-bsi\/\" style=\"color:#333;text-decoration:underline;\">Copilot Security Risks 2026<\/a> &nbsp;&nbsp;<span style=\"color:#ccc;\">\/<\/span>&nbsp;&nbsp;<a href=\"https:\/\/www.securitytoday.de\/2026\/04\/08\/claude-mythos-lagebewertung-fuer-security-teams\/\" style=\"color:#333;text-decoration:underline;\">Claude Myth: Situation Assessment for Security Teams<\/a><\/p>\n<h2>What is a robust CFP process?<\/h2>\n<p>A Call for Papers (CFP) is a conference\u2019s open invitation for researchers to submit presentations. The key to quality lies in who evaluates these submissions. A technical review board consists of active security researchers who assess submissions for originality, reproducibility, and relevance\u2014and reject proposals whose core findings have already been published or whose methodology doesn\u2019t hold up. Conferences without a visible review board, without a stated rejection rate, and without named reviewers lack this quality control. This is the single most important indicator of an event\u2019s editorial standard.<\/p>\n<p>As of April 2026, major security conferences (RSAC, Black Hat, DEF CON) publish the names and roles of their review board members. Those that don\u2019t carry the burden of proof.<\/p>\n<h2>Guidelines: When an Event Is Truly Worth It<\/h2>\n<p>The first question before any booking isn&#8217;t &#8220;who&#8217;s speaking there,&#8221; but &#8220;what operational value do I gain.&#8221; Security events make sense according to a simple formula: learning impact plus verifiable contacts, divided by total cost per attendee. Everything else is just travel expense prose.<\/p>\n<p>Three guidelines separate essentials from luxuries. First: Does the conference have a CFP process whose review board consists of practicing security researchers? Second: Are there technical tracks without sponsor keywords in the title? Third: Does knowledge exchange happen in small formats (villages, workshops, birds-of-a-feather), or only in exhibition halls?<\/p>\n<p>If two out of three questions are answered with &#8220;no,&#8221; it&#8217;s likely a marketing fair with a security label. That&#8217;s not inherently bad\u2014such formats can work well for vendor screening or analyst discussions. But then the travel expense request should reflect that purpose.<\/p>\n<div class=\"evm-stat evm-stat-highlight\" style=\"text-align:center;background:#f0f9fa;border-radius:12px;padding:32px 24px;margin:32px 0;\">\n<div style=\"font-size:48px;font-weight:700;color:#004a59;letter-spacing:-0.03em;\">3<\/div>\n<div style=\"font-size:15px;color:#444;margin-top:8px;\">Key questions before every conference booking: technical review board, sponsor-free tracks, small-format sessions<\/div>\n<div style=\"font-size:12px;color:#888;margin-top:8px;\">Editorial heuristic SecurityToday 2026<\/div>\n<\/div>\n<h2>The Must-Attend Events \u2013 Where Substance Still Delivers<\/h2>\n<p>Four dates are already on the calendars of many CISO teams in 2026. They aren&#8217;t automatically relevant every year, but each delivers at least two tracks per edition that justify the travel effort.<\/p>\n<p><strong>RSAC<\/strong> in San Francisco is scheduled for March 23\u201326, 2026\u2014three weeks earlier than its traditional April slot. Those who habitually book tickets, flights, and hotels late should adjust their calendars early. RSAC remains mandatory for strategy discussions, analyst meetings, and international peer conversations. Technical content is widely scattered; those seeking depth should aggressively filter for the Cryptographers&#8217; Track and Implementer Sessions.<\/p>\n<p><strong>it-sa Expo&amp;Congress<\/strong> in Nuremberg, October 27\u201329, is the anchor event for the DACH region. It&#8217;s a trade show, not a conference\u2014this distinction matters. But for three days, nearly every relevant German security vendor is under one roof, complemented by congress tracks on NIS2, KRITIS, and BSI-Grundschutz. For procurement decisions and compliance orientation, this format is hard to beat.<\/p>\n<p><strong>Black Hat Europe<\/strong> in London, December 7\u201310, delivers substance primarily through its training sessions and briefings, less so in the Business Hall. Anyone attending only the expo floor could save their ticket. The trainings\u2014Red Team Operations, Reverse Engineering, Cloud Attack Paths\u2014reach a level many internal training programs fail to match. That part pays off.<\/p>\n<p><strong>DEF CON 34<\/strong>, August 6\u20139 in Las Vegas, remains the hacker conference that cares least about corporate agendas. That\u2019s its value. Those who take villages seriously (ICS Village, AppSec Village, AI Village) gain insights unavailable on any vendor stage. Main-stage keynotes are secondary. When sending SOC or Red Team staff, define clear learning objectives per village\u2014otherwise, it becomes expensive entertainment.<\/p>\n<h2>Overrated Formats: Where ROI Has Shifted<\/h2>\n<p>Without naming names: Several mid-tier European security events noticeably lost editorial substance in 2025 and 2026. Agendas increasingly consist of sponsor keynotes, unmoderated panels, and executive roundtables that are essentially lead-generation exercises.<\/p>\n<p>This isn&#8217;t a judgment on organizers\u2014exhibition business is a legitimate model. It&#8217;s a judgment on usefulness for technical security teams. When more than 60 percent of the agenda consists of vendor slots and the share of independent researchers drops below ten percent, the learning density required for a full conference day simply isn&#8217;t there.<\/p>\n<p>Pragmatic consequence: Such formats are suitable as one-day scouting visits for marketing teams, not as three-day technical training. Adjust budgets accordingly.<\/p>\n<h2>Mandatory or opportunistic: What sets the categories apart<\/h2>\n<div style=\"display:grid;grid-template-columns:1fr 1fr;gap:16px;margin:32px 0;\">\n<div style=\"background:#f0f9fa;border-radius:8px;padding:20px 24px;border-top:3px solid #69d8ed;\">\n<h3 style=\"margin-top:0;font-size:1.05em;color:#004a59;\">Mandatory<\/h3>\n<ul style=\"margin:0;padding-left:20px;color:#444;\">\n<li>CFP with Technical Review Board<\/li>\n<li>Practitioner-level training<\/li>\n<li>Peer exchange in small formats<\/li>\n<li>Independent research tracks<\/li>\n<li>Documented zero-days or new techniques<\/li>\n<\/ul><\/div>\n<div style=\"background:#f8f9fa;border-radius:8px;padding:20px 24px;border-top:3px solid #888;\">\n<h3 style=\"margin-top:0;font-size:1.05em;color:#444;\">Opportunistic<\/h3>\n<ul style=\"margin:0;padding-left:20px;color:#444;\">\n<li>Sponsor-heavy agenda (&gt;60 percent)<\/li>\n<li>Panels without challenging moderation<\/li>\n<li>Executive roundtables without Chatham House rules<\/li>\n<li>Keynotes primarily on strategic narratives<\/li>\n<li>Analyst briefings behind closed doors<\/li>\n<\/ul><\/div>\n<\/div>\n<p>The table is deliberately not a quality judgment. Some opportunistic formats are ideal for market observation or nurturing existing vendor relationships. They just shouldn\u2019t be booked under your training budget.<\/p>\n<h2>Smaller formats with substance \u2013 the 2026 winners<\/h2>\n<p>A clear pattern has emerged over the past two years: specialized and regional conferences are gaining ground, while the biggest trade shows are becoming broader and more superficial. Three formats stand out for 2026.<\/p>\n<p><strong>OffensiveCon Berlin<\/strong> has long been the European hub for exploit developers and vulnerability researchers. Small, pricey relative to attendance, but editorially unmatched. If you\u2019re serious about offensive security, OffensiveCon is on your radar.<\/p>\n<p><strong>Troopers<\/strong> in Heidelberg remains one of the few European conferences that consistently prioritizes depth over breadth. Tracks on Active Directory security, industrial control systems, and cryptographic engineering are at a level rarely seen at major expos.<\/p>\n<p><strong>FIRSTCON<\/strong>, the annual conference of the Forum of Incident Response and Security Teams, is the most relevant international event for CERTs and SOC leads. The rotating location makes planning trickier, but the content justifies it.<\/p>\n<p>NULLCON in Goa, traditionally the Asian counterpart to OffensiveCon, stays on the radar for 2026 as a spring event with a strong research focus. Only approve travel budgets for it if your team includes researchers whose work will resonate there.<\/p>\n<h2>Event Calendar 2026: Verified Dates<\/h2>\n<div style=\"margin:32px 0;padding:0;\">\n<div style=\"display:flex;gap:16px;padding:16px 20px;background:#f0f9fa;border-left:4px solid #69d8ed;margin-bottom:12px;border-radius:0 8px 8px 0;\">\n<div style=\"min-width:140px;font-weight:700;color:#004a59;\">23-26 March<\/div>\n<div style=\"color:#444;\"><strong>RSAC 2026<\/strong> &#8211; San Francisco, Moscone Center. Strategy, analyst discussions, international peer networking.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;padding:16px 20px;background:#f0f9fa;border-left:4px solid #69d8ed;margin-bottom:12px;border-radius:0 8px 8px 0;\">\n<div style=\"min-width:140px;font-weight:700;color:#004a59;\">6-9 August<\/div>\n<div style=\"color:#444;\"><strong>DEF CON 34<\/strong> &#8211; Las Vegas Convention Center. Villages, hands-on sessions, hacker community.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;padding:16px 20px;background:#f0f9fa;border-left:4px solid #69d8ed;margin-bottom:12px;border-radius:0 8px 8px 0;\">\n<div style=\"min-width:140px;font-weight:700;color:#004a59;\">27-29 October<\/div>\n<div style=\"color:#444;\"><strong>it-sa Expo&amp;Congress 2026<\/strong> &#8211; Nuremberg Exhibition Centre. Mandatory for procurement and compliance in the DACH region.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;padding:16px 20px;background:#f0f9fa;border-left:4px solid #69d8ed;margin-bottom:12px;border-radius:0 8px 8px 0;\">\n<div style=\"min-width:140px;font-weight:700;color:#004a59;\">7-10 December<\/div>\n<div style=\"color:#444;\"><strong>Black Hat Europe 2026<\/strong> &#8211; ExCeL London. The real value lies in the trainings and briefings\u2014not the expo.<\/div>\n<\/p><\/div>\n<div style=\"display:flex;gap:16px;padding:16px 20px;background:#f8f9fa;border-left:4px solid #888;margin-bottom:12px;border-radius:0 8px 8px 0;\">\n<div style=\"min-width:140px;font-weight:700;color:#666;\">Spring 2026<\/div>\n<div style=\"color:#444;\"><strong>NULLCON<\/strong> &#8211; Goa. Held annually in spring; check official sources for exact dates.<\/div>\n<\/p><\/div>\n<\/div>\n<p style=\"font-size:12px;color:#888;margin-top:-8px;\">Sources: RSA Conference, N\u00fcrnbergMesse, Black Hat (Informa), DEF CON. As of April 2026.<\/p>\n<h2>Budget Planning Implications<\/h2>\n<p>The sober calculation for 2026: two global must-attend events per CISO each year (RSAC plus either Black Hat Europe or DEF CON), plus it-sa as the DACH anchor, and one specialised conference per core topic (OffensiveCon, Troopers, or FIRSTCON). This covers strategy, procurement, technical insights, and community engagement\u2014without burning your budget on events with questionable learning outcomes.<\/p>\n<p>If you send team members, brief them with clear learning objectives per track and require a concise report. Three pages are enough: which techniques are new, which vendor claims can be independently verified, and which contacts are relevant. This discipline sharpens event selection and turns conference trips into measurable professional development.<\/p>\n<p>A second lever: rotate attendance. If three team members take turns attending RSAC instead of sending the same person every year, knowledge transfer improves. Otherwise, conference insights stay trapped in one person\u2019s head and never reach the operational level. Adding 30-minute internal debriefings for each returnee multiplies the learning effect\u2014at no extra cost.<\/p>\n<p>Third lever: strategic abstinence. Not every conference needs to be attended every year. If you skip one major event in 2026 and instead send two team members to OffensiveCon or Troopers, you invest the same budget for a significantly higher learning return. The assumption that you &#8220;have to be there&#8221; is often just habit\u2014not a deliberate decision.<\/p>\n<h2>Virtual, hybrid, or in-person \u2013 what works in 2026?<\/h2>\n<p>By 2026, many organisers will offer hybrid formats with more affordable online tickets. For pure lecture consumption, this works well \u2013 talks can often be watched in the media library weeks later, at a fraction of the cost. What online can\u2019t replace is the hallway exchange: those chance conversations between sessions that often prove more valuable to a SOC team than the booked track itself.<\/p>\n<p>A pragmatic split: senior roles attend in person, where networking and peer discussions justify the effort. Junior roles use online tickets selectively for specific tracks, supplemented by team-based media library reviews. This combination often delivers clearer economic benefits than the familiar &#8220;everyone attends&#8221; approach.<\/p>\n<p>As of April 2026, a pattern is emerging: conferences that make their media libraries available quickly and in full signal confidence in their content. Those who artificially restrict access or delay releases for months often have less to offer than their on-site marketing suggests.<\/p>\n<p>Key takeaway for the year: the security conference market is diversifying more sharply in 2026 than in previous years. Teams that set clear criteria, define learning objectives, and rotate attendance will extract far more value from the same travel budget. The rest is just calendar management.<\/p>\n<h2>Frequently Asked Questions<\/h2>\n<h3>How do you realistically assess the ROI of a security conference?<\/h3>\n<p>A robust approach involves setting concrete learning goals before booking, documenting implemented insights post-event, and comparing costs (ticket, travel, working time) against operational outcomes for the team. Not every conference needs to deliver measurable output every year, but without this discipline, the line between professional development and calendar management blurs.<\/p>\n<h3>How can you spot substance over marketing hype?<\/h3>\n<p>Look for technical depth in the programme, practical demos instead of keynote slides, and speakers who operate in the field. A strong indicator is a media library made promptly and fully accessible after the event. Conferences that artificially restrict content or focus solely on executive panels often have less to offer than their outward branding implies.<\/p>\n<h3>When do smaller, specialised formats pay off?<\/h3>\n<p>When a specific technical topic (Red Team, Cloud Security, OT) needs to be established or expanded within a team. Events like OffensiveCon, Troopers, or similar formats provide more actionable takeaways than broad-based trade fairs. The audience is narrower, but the value per attendee is typically higher.<\/p>\n<h3>What\u2019s the best approach to vendor halls if you\u2019re not buying?<\/h3>\n<p>Structured market research is a valid goal: approaching vendors with clear questions (current roadmap, integration depth, support quality) yields a snapshot of the state of the art\u2014useful for tenders and architecture decisions. Without a plan, the vendor hall quickly becomes a collection of freebies.<\/p>\n<h3>How should you prioritise travel budgets when funds are tight?<\/h3>\n<p>Prioritise in-person attendance for senior roles, where peer exchange and networking justify the spend. Junior roles can target online tickets for specific tracks, supplemented by team-based reviews. Rotate attendance at major trade fairs instead of blanket participation every year. This approach often delivers more substance for the same budget than the default &#8220;everyone attends&#8221; model.<\/p>\n<div style=\"margin:40px 0;padding:0;border-top:2px solid #004a59;\">\n<p style=\"margin:0;padding:16px 0 8px 0;font-size:0.78em;font-weight:700;text-transform:uppercase;letter-spacing:0.18em;color:#004a59;\">Editor\u2019s Picks<\/p>\n<ul style=\"list-style:none;margin:0;padding:0;\">\n<li style=\"padding:10px 0;border-bottom:1px solid #eee;\"><a href=\"https:\/\/www.securitytoday.de\/2026\/03\/05\/dsin-jahreskongress-2026-digitale-sicherheit-in-der-vernetzten-gesellschaft\/\" style=\"color:#1a1a1a;text-decoration:none;\">DsiN Annual Congress 2026: Digital Security<\/a><\/li>\n<li style=\"padding:10px 0;border-bottom:1px solid #eee;\"><a href=\"https:\/\/www.securitytoday.de\/2026\/03\/05\/cybersec-europe-2026-bruessels-security-konferenz-im-herzen-der-eu-regulierung\/\" style=\"color:#1a1a1a;text-decoration:none;\">Cybersec Europe 2026: Brussels\u2019 Security Conference<\/a><\/li>\n<li style=\"padding:10px 0;\"><a href=\"https:\/\/www.securitytoday.de\/category\/veranstaltungen\/\" style=\"color:#1a1a1a;text-decoration:none;\">More from the Events category<\/a><\/li>\n<\/ul>\n<\/div>\n<div style=\"margin:40px 0 24px 0;\">\n<p style=\"margin:0 0 12px 0;font-size:0.78em;font-weight:700;text-transform:uppercase;letter-spacing:0.18em;color:#666;\">More from the MBF Media Network<\/p>\n<\/div>\n<p style=\"text-align:right;font-style:italic;color:#888;font-size:0.9em;margin-top:24px;\">Source: Pexels \/ Luis Quintero (px:2833037)<\/p>\n","protected":false},"excerpt":{"rendered":"Which security conferences in 2026 deliver real value and where the ROI turns\u2014RSAC, it-sa, Black Hat Europe, DEF CON under sober editorial review.","protected":false},"author":50,"featured_media":12313,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"See which 2026 security conferences deliver real value and where ROI drops\u2014RSA, it-sa, Black Hat Europe, DEF CON reviewed objectively.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":"","footnotes":""},"categories":[4,216],"tags":[],"class_list":["post-12617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veranstaltungen","category-events"],"wpml_language":"en","wpml_translation_of":12314,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=12617"}],"version-history":[{"count":0,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/12617\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/12313"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=12617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=12617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=12617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}