.

EVENTS

home.aspx
   
DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY
DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY
January 28-29, 2020
IN DISCUSSION. Protecting your business through ai and automation. The impact of geopolitics on your security strategy. From guardian to companion of digitization - developing the ciso's role. Developing employee awareness or is trust your best defence? Do we need the cloud and how to use it saf...

Phoenix Cyber Security Conference
PHOENIX CYBER SECURITY CONFERENCE
January 29-29, 2020
Phoenix Cyber Security Conference brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber A...

Cybernetix.world 2020
CYBERNETIX.WORLD 2020
February 04-05, 2020
The image of our future is changing rapidly. The technological advancements of the last decade offer unique opportunities for business growth and make the inclusion of societies which are left behind possible. But, it also presents society with security and ethical challenges. We witness the rise of...

The award-winning 9th Annual European Information Security Summit
THE AWARD-WINNING 9TH ANNUAL EUROPEAN INFORMATION SECURITY SUMMIT
February 12-13, 2020
The European Information Security Summit is now the largest and most comprehensive cyber security summit in Europe. It features parallel streams focusing on Culture & Education, Data & Technology, and the Threat Landscape – giving you three conferences in one. In addition, TEISS also f...

15th International Conference on Cyber Warfare and Security
15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY
March 12-13, 2020
ICCWS uniquely addresses cyber security, cyber warfare and information warfare. For the past 15 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings ...

IT-SECURITY CONFERENCE TROOPERS20
IT-SECURITY CONFERENCE TROOPERS20
March 16-20, 2020
This security conference is based in beautiful Heidelberg, Germany, and for us, merely visiting the city would be enough of a reason to check out TROOPERS. As luck would have it, this valuable conference consists of two-day training and a two-day conference where many IT and security experts from al...

Cybersecurity and Cloud Expo global 2020
CYBERSECURITY AND CLOUD EXPO GLOBAL 2020
March 17-18, 2020
The conference agenda will tackle the real issues facing CISOs and security professionals today as modern enterprises evolve, as well as showcasing the most innovative and important developments in the security solutions market.

Cyber Security for Critical Assets
CYBER SECURITY FOR CRITICAL ASSETS
March 24-25, 2020
While cybercrime steadily increases in the U.S., organizations still perceive cybersecurity as exceedingly complex and feel like they’re chronically late to the party – trying to learn the lessons from past incidents while malicious hackers continually innovate. CS4CA USA, returning for ...

BSides Atlanta
BSIDES ATLANTA
March 28-28, 2020
Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an inti...

Infosec World
INFOSEC WORLD
March 30-01, 2020
The cybersecurity community is diligent when it comes to continuous learning and refining their expert knowledge, but the task is daunting when emerging technologies keep changing what it means to be secure.

Black Hat Asia 2020
BLACK HAT ASIA 2020
March 31-03, 2020
Black Hat returns to Marina Bay Sands in Singapore, March 31 - April 3, 2020. The information security community comes together for esteemed Trainings taught by industry experts, innovative research presentations at Briefings, the latest open-source tool demos in Arsenal, and the Business Hall featu...

RICHMOND CYBER SECURITY FORUM
RICHMOND CYBER SECURITY FORUM
April 01-01, 2020
The Richmond Cyber Security Forum in London will include a first class, CPD accredited conference programme of keynotes, interactive workshops, think tanks and personal development sessions. The opportunity to connect and engage with industry peers in a relaxed informal setting and the chance to dis...

 Aprimo Sync! 2020 (Global)
APRIMO SYNC! 2020 (GLOBAL)
April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!

Bsides Seattle 2020
BSIDES SEATTLE 2020
April 18-18, 2020
Bsides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, Bsides Seattle continues to provide space for the open sharing of ideas, concepts and debates.

ContentTECH Summit
CONTENTTECH SUMMIT
April 20-22, 2020
Our ContentTECH mission is clear: We want to show how the effective use of technology and better processes can help your strategic efforts to create, manage, deliver and scale your enterprise content and provide your customers with better digital experiences. Come to the ContentTECH Summit to learn ...

 ICS cyber security conference
ICS CYBER SECURITY CONFERENCE
April 28-30, 2020
As the most established Industrial Control Systems Cyber Security Event in Europe, the ICS cyber security conference brings together leading practitioners, operators and decision makers form across Europe to share a wealth of  practical experience in implementing cyber security in organisations...

2020 Cybersecurity and Privacy Protection Conference
2020 CYBERSECURITY AND PRIVACY PROTECTION CONFERENCE
April 30-30, 2020
A truly cross-sector event now in its 5th year, Cleveland-Marshall’s Cybersecurity and Privacy Protection Conference is one of the leading educational and networking events in the Great Lakes Region, and features rich content of interest to legal and compliance professionals, information techn...

Global Cyber Innovation Summit 2020
GLOBAL CYBER INNOVATION SUMMIT 2020
May 13-14, 2020
The Global Cyber Innovation Summit brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. This unique, invitati...

CISO Exchange for Healthcare
CISO EXCHANGE FOR HEALTHCARE
May 17-19, 2020
The CISO Healthcare Exchange is an exclusive forum designed to create an environment of true peer-to-peer collaboration and networking among senior level executives from some of the nation’s leading healthcare organizations. As the cyber security function continues to evolve with the emerging ...

41st IEEE Symposium on Security and Privacy
41ST IEEE SYMPOSIUM ON SECURITY AND PRIVACY
May 18-20, 2020
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2020 Symposium will mark the 41st annual meeting of this flagship confe...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 02-04, 2020
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

33rd IEEE Computer Security Foundations Symposium
33RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM
June 22-26, 2020
The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad...

Cyber Security Leaders Exchange 2020
CYBER SECURITY LEADERS EXCHANGE 2020
August 10-12, 2020
Strategies and peer led insights to address the operational risks, workforce challenges and technology decisions faced by cyber security leaders from top tier Australasian organisations.

USENIX Security 2020 : USENIX Security Symposium
USENIX SECURITY 2020 : USENIX SECURITY SYMPOSIUM
August 12-14, 2020
USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks.

BsidesPhilly2020
BSIDESPHILLY2020
December 04-04, 2020
BSidesPhilly seeks to create awareness and improve upon the conversation and research of security topics within the Philadelphia region for researchers, professionals, and practitioners alike.  The conference aims to give these various groups a chance to meet, engage in conversation through sch...

SPOTLIGHT

Security Orchestration, Automation and Response tooling is intended to increase efficiency and consistency. These tools also promise to diminish the cost of operating a Security Operations Center (SOC) for most organizations. If used properly, these tools can do all of these things. The challenge is

JAN 29, 2020 | 1:00 PM
SPENDS AND TRENDS: RESULTS OF THE SANS 2020 CYBERSECURITY SPENDING SURVEY
CISOs and security operations managers need information on the areas of security in which their peers plan to increase or decrease their investment. Boards of directors often lack essential benchmarking data when CISOs present security status and strategic plans to them. This survey explores what or...
JAN 29, 2020 | 11:30 PM
THE ROLE OF SCHOOL LEADERSHIP IN MITIGATING CYBERSECURITY RISK
Independent schools reported a 90% increase in negative impacts as a result of cybersecurity incidents between 2017 and 2018. While the IT department can be an important ally, this work must be managed by senior leadership and should be part of a broader risk management strategy. Hear about challeng...
JAN 29, 2020 | 11:00 AM
2019-2020 DDOS THREAT INTELLIGENCE; KNOW WHAT’S COMING
DDoS attacks are evolving both in frequency and volume. Staying ahead of the evolving threat landscape requires preemptive intel and visibility into today’s threats attack vectors. Join us for an informative webinar about the upcoming threat landscape, what we have seen, what you will face and...
JAN 30, 2020 | 3:30 PM
SPENDS AND TRENDS: SANS 2020 CYBERSECURITY SPENDING SURVEY PANEL DISCUSSION
This webcast will more closely examine the results of the SANS 2020 Cybersecurity Spending Survey. A panel of sponsor representatives, led by survey author Barbara Filkins and survey advisor John Pescatore, will explore themes that emerged during the survey. Register for this webcast to be among the...
JAN 30, 2020 | 8:30 AM
SANS AUTOMATION & ORCHESTRATION SOLUTIONS
Security Orchestration, Automation and Response tooling is intended to increase efficiency and consistency. These tools also promise to diminish the cost of operating a Security Operations Center (SOC) for most organizations. If used properly, these tools can do all of these things. The challenge is...
FEB 05, 2020 | 1:00 PM
SECURING ICS USING THE NIST CYBERSECURITY FRAMEWORK AND FORTINET: BEST PRACTICES FOR THE REAL WORLD
Security challenges continue to mount for industrial control systems environments dealing with legacy systems scattered across remote locations, long equipment life cycles and adoption of new technologies. The integration of operational and IT networks adds to the challenge. In this new webcast, SAN...
FEB 06, 2020 | 10:00 AM
MAKING A SOAR STRATEGY WORK FOR YOU
Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them? In this webina...
FEB 06, 2020 | 1:00 PM
IMPLEMENTER'S GUIDE TO DECEPTION TECHNOLOGIES
In today’s digital environment, organizations tend to have difficulty detecting attackers on their networks in a reasonable time frame. The reason: Traditional detective technologies focus on finding evil, and attackers have learned to avoid looking evil to penetrate defenses. It’s time ...
FEB 11, 2020 | 3:30 PM
TOP FIVE VULNERABILITY MANAGEMENT FAILURES
We have had tools and technology to help us identify vulnerabilities for over 20 years. The Nessus project began in 1998. Qualys and Rapid7 released products shortly thereafter. Tools for identifying vulnerabilities in code were made available around the same time with AppScan, Fortify, WebInspect, ...
FEB 11, 2020 | 1:00 PM
2020 SANS CYBER THREAT INTELLIGENCE (CTI) SURVEY RESULTS
Over the past several years, SANS has seen a gradual maturation of cyber threat intelligence (CTI) and its applications in information security. The 2019 CTI survey saw an increase in usage of and interest in CTI, along with a diversification in how the intelligence is being used by organizations. W...
FEB 12, 2020 | 10:30 AM
DISCOVER AND ELIMINATE CYBERATTACK PATHWAYS TO CRITICAL ASSETS WITH ILLUSIVE NETWORKS ATTACK SURFACE MANAGER
As organizations work to reduce such risks from their attack surface, most have a vulnerability management program in place to proactively remediate software weaknesses and system configuration issues before attackers can exploit thembut even with such a program, security teams struggle to discover ...
FEB 12, 2020 | 3:30 PM
HOW TO IMPROVE SECURITY VISIBILITY AND DETECTION RESPONSE OPERATIONS IN AWS
Security teams often handle a large stream of alerts, creating noise and impairing their ability to determine which incidents to prioritize. By aggregating security information from various sources and automating incident response, organizations can increase visibility into their environment and foc...
TOP SECURITY TRENDS FOR 2016-2017
During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational tech...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communica...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discu...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the so...