.

EVENTS

home.aspx
   
DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY
DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY
January 28-29, 2020
IN DISCUSSION. Protecting your business through ai and automation. The impact of geopolitics on your security strategy. From guardian to companion of digitization - developing the ciso's role. Developing employee awareness or is trust your best defence? Do we need the cloud and how to use it saf...

Phoenix Cyber Security Conference
PHOENIX CYBER SECURITY CONFERENCE
January 29-29, 2020
Phoenix Cyber Security Conference brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber A...

Cybernetix.world 2020
CYBERNETIX.WORLD 2020
February 04-05, 2020
The image of our future is changing rapidly. The technological advancements of the last decade offer unique opportunities for business growth and make the inclusion of societies which are left behind possible. But, it also presents society with security and ethical challenges. We witness the rise of...

The award-winning 9th Annual European Information Security Summit
THE AWARD-WINNING 9TH ANNUAL EUROPEAN INFORMATION SECURITY SUMMIT
February 12-13, 2020
The European Information Security Summit is now the largest and most comprehensive cyber security summit in Europe. It features parallel streams focusing on Culture & Education, Data & Technology, and the Threat Landscape – giving you three conferences in one. In addition, TEISS also f...

15th International Conference on Cyber Warfare and Security
15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY
March 12-13, 2020
ICCWS uniquely addresses cyber security, cyber warfare and information warfare. For the past 15 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings ...

Cyber Security for Critical Assets
CYBER SECURITY FOR CRITICAL ASSETS
March 24-25, 2020
While cybercrime steadily increases in the U.S., organizations still perceive cybersecurity as exceedingly complex and feel like they’re chronically late to the party – trying to learn the lessons from past incidents while malicious hackers continually innovate. CS4CA USA, returning for ...

RICHMOND CYBER SECURITY FORUM
RICHMOND CYBER SECURITY FORUM
April 01-01, 2020
The Richmond Cyber Security Forum in London will include a first class, CPD accredited conference programme of keynotes, interactive workshops, think tanks and personal development sessions. The opportunity to connect and engage with industry peers in a relaxed informal setting and the chance to dis...

 Aprimo Sync! 2020 (Global)
APRIMO SYNC! 2020 (GLOBAL)
April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!

ContentTECH Summit
CONTENTTECH SUMMIT
April 20-22, 2020
Our ContentTECH mission is clear: We want to show how the effective use of technology and better processes can help your strategic efforts to create, manage, deliver and scale your enterprise content and provide your customers with better digital experiences. Come to the ContentTECH Summit to learn ...

 ICS cyber security conference
ICS CYBER SECURITY CONFERENCE
April 28-30, 2020
As the most established Industrial Control Systems Cyber Security Event in Europe, the ICS cyber security conference brings together leading practitioners, operators and decision makers form across Europe to share a wealth of  practical experience in implementing cyber security in organisations...

Global Cyber Innovation Summit 2020
GLOBAL CYBER INNOVATION SUMMIT 2020
May 13-14, 2020
The Global Cyber Innovation Summit brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. This unique, invitati...

41st IEEE Symposium on Security and Privacy
41ST IEEE SYMPOSIUM ON SECURITY AND PRIVACY
May 18-20, 2020
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2020 Symposium will mark the 41st annual meeting of this flagship confe...

SPOTLIGHT

DDoS attacks are evolving both in frequency and volume. Staying ahead of the evolving threat landscape requires preemptive intel and visibility into today’s threats attack vectors. Join us for an informative webinar about the upcoming threat landscape, what we have seen, what you will face and

DEC 17, 2019 | 3:00 PM
SMART BUILDING CYBERSECURITY AS A SERVICE
The advent of IoT technologies is accelerating the collection of data, enabling greater insights into how buildings operate. Comprehensively interpreting data can highlight possible failure points, identify where opportunities may lay to improve the indoor environment, reduce absenteeism, improve pr...
DEC 17, 2019 | 11:00 AM
PRIORITIES AND PREDICTION
2019 saw more breaches than the previous year – 54% more to be exact. Experts estimate cybersecurity risks and threats will increase in 2020 as hackers continue to follow the path of least resistance: abusing privileged credentials to access sensitive systems and data.
DEC 18, 2019 | 7:00 PM
HOW TO THINK LIKE A HACKER?
Computer security is a very unique field. Unlike other fields in which the challenge is to overcome the scale of a problem or the complexity of an algorithm, in computer security the challenge is the wit of another human being who is trying to carry out an attack in order to compromise and disrupt a...
DEC 18, 2019 | 11:00 AM
2020'S TOP CYBERSECURITY CHALLENGES
The increasing move from local databases to cloud allows for more opportunities for human error and hacker ingenuity to result in breaches. Your cell phone is the next frontier in cyber crime. Techniques to infect mobile devices are becoming more common.
DEC 18, 2019 | 11:30 PM
SECURING ONLINE PAYMENT AND WEB BANKING PLATFORMS
Industry-wide breakthroughs like open banking have prompted a digital banking race, with a growing wave of Neobanks and traditional banks fighting for their share of the retail banking market. However, organizations are placing important logic in unsafe environments (the client-side). Exposed JavaSc...
DEC 18, 2019 | 12:30 AM
CYBERPREPARED: CYBERSECURITY BEST PRACTICES FOR 2020
Join us for a 60-minute, live webinar presentation on December 17th to hear from Scott regarding how YOU can be CyberPrepared for 2020. He will scare you and make you laugh and provide you with a number of no-cost quick fixes to prevent you and your organization from becoming victims.
DEC 18, 2019 | 2:00 PM
RANSOMWARE WHAT TO DO IF DISASTER STRIKES
Since cybercriminals often target MSPs and small/medium-sized businesses it’s critical to be fully prepared and know what to do (or what not to) when a ransomware attack happens. Typically, the only answer to a ransomware attack has been solid backup (assuming it was done properly) or to pay t...
DEC 19, 2019 | 2:30 PM
HOW MSPS CAN FIGHT RANSOMWARE AND GROW THEIR BUSINESS WITH CYBER PROTECTION SERVICES?
Acronis – the world’s leading cyber security solutions provider, with ZNet Technologies is organizing a webinar on how service providers can fight ransomware, protect their customer’s data and grow their business with cyber protection services.
DEC 19, 2019 | 3:00 PM
2019 CYBERSECURITY HEADLINES IN REVIEW
Infosecurity Magazine will host its annual end of year webinar. Moderated by Michael Hill, editor, and Dan Raywood, deputy editor, the webinar will bring together a panel of experts to reflect on the key topics, trends and headlines that impacted the information security industry over the course of ...
DEC 19, 2019
PENETRATION TESTING: ZERO TO HERO
An innovative avant-garde cyber security professional, Nikhil is currently working as Manager – Cyber Risk Advisory at Deloitte, He is a Senior level cybersecurity executive lead in driving high-profile and high-impact projects and providing subject matter expertise across all Technical, Opera...
JAN 09, 2020 | 10:00 AM
NEW YEAR, NEW DECADE, NEW THREATS AND CHALLENGES
In this webinar, we will look at the various trends that have been predicted for the cybersecurity industry by the vendor and research communities, and evaluate what has come true in the past, and what we can genuinely expect the future to look like.
JAN 29, 2020 | 11:30 PM
THE ROLE OF SCHOOL LEADERSHIP IN MITIGATING CYBERSECURITY RISK
Independent schools reported a 90% increase in negative impacts as a result of cybersecurity incidents between 2017 and 2018. While the IT department can be an important ally, this work must be managed by senior leadership and should be part of a broader risk management strategy. Hear about challeng...
TOP SECURITY TRENDS FOR 2016-2017
During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational tech...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communica...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discu...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the so...