Phoenix CyberSecurity Conference

September 21, 2022 | USA

Phoenix CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Spotlight

"Today’s attacks have evolved in volume, complexity and duration. In 2014, 50% of the attacks lasted more
than 1-2 days and included more than 5 different attack vectors. This characteristic, which originates in the
shifting attack motivation and targets, entails various challenges to organizations trying to protect them. The
main challenge is that each attack can now include vectors/tools with very different characteristics, ultimately
threatening a different infrastructure element. Each vector is associated with a different optimal location in the network for detection and another for mitigation. For examples and more details on this trend"


OTHER PAST CONFERENCES

Cyber Security Asia 2022

August 15-16, 2022 | Malaysia

Cyber Security Asia 2022 will be taking place on 15-16 August 2022 at the Sheraton Imperial Hotel Kuala Lumpur– bringing together top experts and practitioners for in-depth talks, and exclusive networking opportunities. It’s a platform for the development of partnerships and strategies and highlights the latest technologies that are ensuring the safety and security of government, industry and individuals.

Threat Hunting Summit

November 16, 2022 | USA

SecurityWeek’s 2022 Threat Hunting Summit will present innovative strategies and tools that security teams use to detect, contain, and eliminate attackers present in or attempting to infiltrate enterprise networks. Attendees will learn how continually monitoring with a fine-tuned threat hunting strategy can help incident response teams detect attacks that may have bypassed enterprise defenses and reduce attacker dwell time.

2022 ICS Cyber Security Conference

October 24-27, 2022 | USA

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Since its first edition in 2002, the conference has attracted a continually rising interest as both the stakes of critical infrastructure protection and the distinctiveness of securing ICSs become increasingly apparent.

Cloud Security Summit

June 15, 2022 | USA

SecurityWeek’s Cloud Security Summit will address the use of cloud-based security technologies to protect enterprise IT assets and company data.

Spotlight

"Today’s attacks have evolved in volume, complexity and duration. In 2014, 50% of the attacks lasted more
than 1-2 days and included more than 5 different attack vectors. This characteristic, which originates in the
shifting attack motivation and targets, entails various challenges to organizations trying to protect them. The
main challenge is that each attack can now include vectors/tools with very different characteristics, ultimately
threatening a different infrastructure element. Each vector is associated with a different optimal location in the network for detection and another for mitigation. For examples and more details on this trend"

resources