DACHsec IT Security Summit

November 15-16, 2022 | Germany

DACHsec IT Security Summit
DACH organisations have a history of combining new digital technologies with industrial ingenuity while maintaining a strong focus on security and data protection. Though the COVID-19 pandemic has accelerated digital transformation, the region has, however, struggled to keep pace with the technological evolution of cyber risks.

Spotlight

When an information security event occurs, companies frequently use computer forensics to investigate what happened. It's also the key to confirming the presence of PII or PHI in the exposed data, and determining if - and who - to notify about the data breach. Bottom line: telling too many OR too few can drive costs up and confidence down.


OTHER PAST CONFERENCES

San Diego CyberSecurity Conference

November 16, 2022 | USA

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

The Norfolk Cyber Conference

December 8, 2022 | UK

Cyber crimes are evolving past basic defences. Your organisation needs to keep up to date with the latest threats to prevent a breach. That’s why we hold this annual conference. It is designed to educate, inform, and inspire change in the way you approach cyber security. We’ll be joined by professionals in the field who will share their stories and expertise.

Security Operations Summit

December 6, 2022 | USA

In order to defend against today’s agile threat actors, efficient and effective Security Operations (SecOps) is essential. SecurityWeek’s Security Operations Summit will help address common security operations challenges and demonstrate how efficient workflow and collaboration can lead to improved decision making throughout the threat detection, analysis and incident response processes.

Chicago Cybersecurity Conference

July 14, 2022 | USA

Join your fellow cybersecurity professionals at the Chicago Cybersecurity Conference to gain insights to help you better navigate whatever cyber threats that 2022 may bring! You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers.

Spotlight

When an information security event occurs, companies frequently use computer forensics to investigate what happened. It's also the key to confirming the presence of PII or PHI in the exposed data, and determining if - and who - to notify about the data breach. Bottom line: telling too many OR too few can drive costs up and confidence down.

resources