BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Cybersecurity Advisors Network - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Cybersecurity Advisors Network
X-ORIGINAL-URL:https://cybersecurityadvisors.network
X-WR-CALDESC:Events for Cybersecurity Advisors Network
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Helsinki
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Australia/Melbourne
BEGIN:STANDARD
TZOFFSETFROM:+1100
TZOFFSETTO:+1000
TZNAME:AEST
DTSTART:20250405T160000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1000
TZOFFSETTO:+1100
TZNAME:AEDT
DTSTART:20251004T160000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1100
TZOFFSETTO:+1000
TZNAME:AEST
DTSTART:20260404T160000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1000
TZOFFSETTO:+1100
TZNAME:AEDT
DTSTART:20261003T160000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1100
TZOFFSETTO:+1000
TZNAME:AEST
DTSTART:20270403T160000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1000
TZOFFSETTO:+1100
TZNAME:AEDT
DTSTART:20271002T160000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260204
DTEND;VALUE=DATE:20260206
DTSTAMP:20260522T000154
CREATED:20250916T201312Z
LAST-MODIFIED:20250916T201312Z
UID:101236-1770163200-1770335999@cybersecurityadvisors.network
SUMMARY:Third Party & Supply Chain Cyber Security Summit: Middle East Edition
DESCRIPTION:Learn the latest case studies on the end-to-end cyber security implementation practices when working with third parties to ensure a truly resilient and secure supply chain network at the Third Party & Supply Chain Cyber Security Summit. \n\n\n\n\nLed by 30+ TOP Information Security professionals from leading companies\, the discussion will allow you to see the issue from the perspective of diﬀerent industries & angles and identify the complex solution to implement in your company. \n\n\n\n\nJoin us in Dubai and build your end-to-end strategy!
URL:https://cybersecurityadvisors.network/event/third-party-supply-chain-cyber-security-summit-middle-east-edition/
CATEGORIES:Community Partners
ATTACH;FMTTYPE=image/png:https://cybersecurityadvisors.network/wp-content/uploads/2025/09/Screenshot-2025-09-17-at-6.09.05-am.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Helsinki:20260212T000000
DTEND;TZID=Europe/Helsinki:20260213T235959
DTSTAMP:20260522T000154
CREATED:20260211T204215Z
LAST-MODIFIED:20260211T205109Z
UID:101946-1770854400-1771027199@cybersecurityadvisors.network
SUMMARY:Munich Cybersecurity Conference 2026
DESCRIPTION:The Munich Cyber Security Conference (MCSC) is one of the world’s most prestigious forums on cybersecurity\, bringing together senior leaders and decision-makers from the public and private sectors. \n\n\n\nThis invitation-only event provides a unique platform to exchange ideas\, discuss solutions to complex challenges\, and explore effective strategies for strengthening digital resilience. Hosted in the heart of Munich\, the MCSC fosters strategic dialogue\, knowledge exchange\, and collaboration across government\, industry\, and academia. By emphasizing the role and responsibility of decision-makers\, the conference promotes international\, cross-industry cooperation and interdisciplinary engagement between policy\, business\, and research. The MCSC empowers leaders to shape the future of global cyber resilience\, building a secure and sustainable digital future for all. \n\n\n\nCyAN is represented this year by Jean-Christophe Le Toquin\, President and board member\, and Sarah Jane Mellor.
URL:https://cybersecurityadvisors.network/event/munich-cybersecurity-conference-2026/
LOCATION:Munich Chamber of Commerce (IHK)\, Max-Joseph-Str. 2\, Munich\, Germany
ATTACH;FMTTYPE=image/jpeg:https://cybersecurityadvisors.network/wp-content/uploads/2026/02/MCSC-2026_Website_Banner.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260215
DTEND;VALUE=DATE:20260218
DTSTAMP:20260522T000154
CREATED:20250910T223213Z
LAST-MODIFIED:20260211T204921Z
UID:101208-1771113600-1771372799@cybersecurityadvisors.network
SUMMARY:WAM World Advanced Manufacturing & Logistics - Saudi
DESCRIPTION:Save the date: @WAMSaudi is where industrial ambition will meet real-world impact from 15–17 Feb 2026 in Riyadh Front\, Saudi Arabia. \n\nBe there as the Kingdom’s advanced manufacturing\, logistics and tech leaders come together to power Vision 2030. \n\nWAM Saudi will be the ultimate launchpad for opportunity\, innovation and serious business growth.\n\nRegister at https://visit.wamsaudi.com/
URL:https://cybersecurityadvisors.network/event/wam-world-advanced-manufacturing-logistics/
CATEGORIES:Community Partners
ATTACH;FMTTYPE=image/png:https://cybersecurityadvisors.network/wp-content/uploads/2025/09/2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Helsinki:20260218T170000
DTEND;TZID=Europe/Helsinki:20260218T200000
DTSTAMP:20260522T000154
CREATED:20260119T232928Z
LAST-MODIFIED:20260119T233029Z
UID:101814-1771434000-1771444800@cybersecurityadvisors.network
SUMMARY:Beyond the Firewall: Why Stories Shape Cyber Decisions
DESCRIPTION:Overview\n\n\n\n\n\n\n\nFirewalls don’t persuade. Stories do. Join us for a fascination keynote and discussion on how narrative shapes cyber decisions and behaviour \n\n\n\nBeyond the Firewall: Why Stories Shape Cyber Decisions\n\n\n\nCybersecurity decisions are rarely driven by frameworks\, policies\, or tools alone. They are shaped by people\, experience\, context\, and the stories we tell ourselves and others about risk\, responsibility\, and consequence. \n\n\n\nBeyond the Firewall brings together senior cyber and technology leaders to explore why storytelling plays such a powerful role in shaping cyber decisions. From boardrooms and incident response rooms to public narratives and media headlines\, the stories that land are often the ones that influence behaviour\, funding\, trust\, and action. \n\n\n\nThis evening’s keynote presentation and panel discussion will move past technical controls and compliance checklists to focus on lived experience. Expect thoughtful reflections on moments that changed perspectives\, stories that helped bridge the gap between technical teams and decision makers\, and why the ability to communicate risk clearly and credibly is now a core cyber capability. \n\n\n\nDesigned for cybersecurity professionals\, business leaders\, risk and governance practitioners\, and anyone responsible for influencing cyber outcomes\, this event will offer practical insight into how stories can clarify complexity\, humanise risk\, and ultimately lead to better decisions. \n\n\n\nJoin the Cybersecurity Advisors Network (CyAN) for an engaging evening of conversation\, insight\, and connection as we kick off the 2026 events calendar in Sydney. \n\n\n\nA small thank you to early arrivals: the first 15 guests on the night will receive a complimentary gift\, with further door prizes announced after the panel. \n\n\n\n\n\n\n\nAgenda\n\n\n\n17:15 – 18:00 \n\n\n\nCheck-in & Networking \n\n\n\n18:00 – 18:15 \n\n\n\nKeynote: Firewalls Don’t Persuade. Stories Do \n\n\n\nIn cyber security\, laws and logic alone don’t change behaviour—stories do. This keynote presentation by Melanie Farmer explores the power of effective storytelling to influence decisions\, build trust\, and move people to act before a breach\, not after it. \n\n\n\n18:15 – 19:15 \n\n\n\nPanel Discussion and Q&A \n\n\n\nFollowing her keynote\, Melanie Farmer will join Jay Hira and Ned Farhat for a panel conversation exploring how stories\, lived experience\, and communication shape cyber judgement\, leadership decisions\, and organisational behaviour. Moderated by Kim Chandler McDonald. \n\n\n\n19:15 – 19:30 \n\n\n\nClosing Remarks & Door Prizes \n\n\n\n19:30 – 20:00 \n\n\n\nNetworking and Drinks
URL:https://cybersecurityadvisors.network/event/beyond-the-firewall-why-stories-shape-cyber-decisions/
LOCATION:Peoplebank Sydney IT Recruitment  345 George Street  #Level 13 Sydney\, NSW 2000 Australia
ATTACH;FMTTYPE=:
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Australia/Melbourne:20260218T173000
DTEND;TZID=Australia/Melbourne:20260218T200000
DTSTAMP:20260522T000154
CREATED:20250828T215654Z
LAST-MODIFIED:20260119T232023Z
UID:101138-1771435800-1771444800@cybersecurityadvisors.network
SUMMARY:CyAN APAC Event - February 2026
DESCRIPTION:
URL:https://cybersecurityadvisors.network/event/cyan-apac-event-february-2026/
CATEGORIES:CyAN Featured Event
ATTACH;FMTTYPE=image/png:https://cybersecurityadvisors.network/wp-content/uploads/2025/08/Save-the-Date-Banner-Feb-2026-scaled.png
END:VEVENT
END:VCALENDAR