.

EVENTS

home.aspx
   
15th International Conference on Cyber Warfare and Security
15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY
March 12-13, 2020
ICCWS uniquely addresses cyber security, cyber warfare and information warfare. For the past 15 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings ...

IT-SECURITY CONFERENCE TROOPERS20
IT-SECURITY CONFERENCE TROOPERS20
March 16-20, 2020
This security conference is based in beautiful Heidelberg, Germany, and for us, merely visiting the city would be enough of a reason to check out TROOPERS. As luck would have it, this valuable conference consists of two-day training and a two-day conference where many IT and security experts from al...

Cybersecurity and Cloud Expo global 2020
CYBERSECURITY AND CLOUD EXPO GLOBAL 2020
March 17-18, 2020
The conference agenda will tackle the real issues facing CISOs and security professionals today as modern enterprises evolve, as well as showcasing the most innovative and important developments in the security solutions market.

Cyber Security for Critical Assets
CYBER SECURITY FOR CRITICAL ASSETS
March 24-25, 2020
While cybercrime steadily increases in the U.S., organizations still perceive cybersecurity as exceedingly complex and feel like they’re chronically late to the party – trying to learn the lessons from past incidents while malicious hackers continually innovate. CS4CA USA, returning for ...

BSides Atlanta
BSIDES ATLANTA
March 28-28, 2020
Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an inti...

Infosec World
INFOSEC WORLD
March 30-01, 2020
The cybersecurity community is diligent when it comes to continuous learning and refining their expert knowledge, but the task is daunting when emerging technologies keep changing what it means to be secure.

Black Hat Asia 2020
BLACK HAT ASIA 2020
March 31-03, 2020
Black Hat returns to Marina Bay Sands in Singapore, March 31 - April 3, 2020. The information security community comes together for esteemed Trainings taught by industry experts, innovative research presentations at Briefings, the latest open-source tool demos in Arsenal, and the Business Hall featu...

RICHMOND CYBER SECURITY FORUM
RICHMOND CYBER SECURITY FORUM
April 01-01, 2020
The Richmond Cyber Security Forum in London will include a first class, CPD accredited conference programme of keynotes, interactive workshops, think tanks and personal development sessions. The opportunity to connect and engage with industry peers in a relaxed informal setting and the chance to dis...

Aprimo Sync! 2020 (Global)
APRIMO SYNC! 2020 (GLOBAL)
April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!

Bsides Seattle 2020
BSIDES SEATTLE 2020
April 18-18, 2020
Bsides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, Bsides Seattle continues to provide space for the open sharing of ideas, concepts and debates.

ContentTECH Summit
CONTENTTECH SUMMIT
April 20-22, 2020
Our ContentTECH mission is clear: We want to show how the effective use of technology and better processes can help your strategic efforts to create, manage, deliver and scale your enterprise content and provide your customers with better digital experiences. Come to the ContentTECH Summit to learn ...

ICS cyber security conference
ICS CYBER SECURITY CONFERENCE
April 28-30, 2020
As the most established Industrial Control Systems Cyber Security Event in Europe, the ICS cyber security conference brings together leading practitioners, operators and decision makers form across Europe to share a wealth of practical experience in implementing cyber security in organisations, and ...

2020 Cybersecurity and Privacy Protection Conference
2020 CYBERSECURITY AND PRIVACY PROTECTION CONFERENCE
April 30-30, 2020
A truly cross-sector event now in its 5th year, Cleveland-Marshall’s Cybersecurity and Privacy Protection Conference is one of the leading educational and networking events in the Great Lakes Region, and features rich content of interest to legal and compliance professionals, information techn...

Global Cyber Innovation Summit 2020
GLOBAL CYBER INNOVATION SUMMIT 2020
May 13-14, 2020
The Global Cyber Innovation Summit brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. This unique, invitati...

The Fifth Annual Dallas Cyber Security Summit
THE FIFTH ANNUAL DALLAS CYBER SECURITY SUMMIT
May 15-15, 2020
The Fifth Annual Dallas Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive...

CISO Exchange for Healthcare
CISO EXCHANGE FOR HEALTHCARE
May 17-19, 2020
The CISO Healthcare Exchange is an exclusive forum designed to create an environment of true peer-to-peer collaboration and networking among senior level executives from some of the nation’s leading healthcare organizations. As the cyber security function continues to evolve with the emerging ...

41st IEEE Symposium on Security and Privacy
41ST IEEE SYMPOSIUM ON SECURITY AND PRIVACY
May 18-20, 2020
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2020 Symposium will mark the 41st annual meeting of this flagship confe...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 02-04, 2020
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

33rd IEEE Computer Security Foundations Symposium
33RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM
June 22-26, 2020
The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad...

Cyber Security Leaders Exchange 2020
CYBER SECURITY LEADERS EXCHANGE 2020
August 10-12, 2020
Strategies and peer led insights to address the operational risks, workforce challenges and technology decisions faced by cyber security leaders from top tier Australasian organisations.

USENIX Security 2020 : USENIX Security Symposium
USENIX SECURITY 2020 : USENIX SECURITY SYMPOSIUM
August 12-14, 2020
USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks.

BsidesPhilly2020
BSIDESPHILLY2020
December 04-04, 2020
BSidesPhilly seeks to create awareness and improve upon the conversation and research of security topics within the Philadelphia region for researchers, professionals, and practitioners alike. The conference aims to give these various groups a chance to meet, engage in conversation through scheduled...

SPOTLIGHT

Authentication works to ensure that you’re you. As technology evolves and business needs change, authentication methods need to be more dynamic. Today’s workforce demands flexibly in areas such as device choice, work location, and levels of access so that they can deliver in their role.

FEB 19, 2020 | 3:30 PM
WILL THAT BE ONE LOG OR TWO? LOGGING BEFORE, DURING, AND AFTER AN ATTACK
In this webcast Craig will present pros and cons of each option and discuss some of the current standards for configuring logging on workstations, explain what types of attacks leave no, or minimal traces with regards to those configurations, and suggest additional logs to enable or collect when a h...
FEB 19, 2020 | 2:00 PM
WHY TRANSPORTATION IS A TOP TARGET FOR CYBER ATTACK
Did you know that transportation was one of the top five most cyber-attacked industries over the past five years? As the sector becomes increasingly reliant on internet-based controls (e.g. autonomous vehicles, telematics, IoT, etc.) cyber risk will continue to grow. During this webinar, we will exp...
FEB 20, 2020 | 10:00 AM
AUTOMATION IN DATA FILE TRANSFER: IMPROVING SECURITY AND SAVING YOU TIME
Are you manually transferring numerous files in your workplace? If so, you may be opening your organization up to various security risks and threats, not to mention potentially wasting valuable time and resources. Although there are a plethora of file transfer tools available, many rely on outdated ...
FEB 25, 2020 | 10:00 AM
DO YOU NEED TO KEEP UP WITH THE AI TREND?
AI has been predicted to be a future technology to keep a close eye on, bringing benefits for both a reduction in demands upon staff and better endpoint protection detection. However, is it something that your business can consider as we move into a new decade, and how can use you AI and predictive ...
FEB 27, 2020 | 2:00 PM
THALES TRUSTED CYBER TECHNOLOGIES: THE FUTURE OF ENCRYPTING NETWORK DATA
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) network...
MAR 05, 2020 | 10:00 AM
MAKE YOUR OWN SECURITY SUPERSTARS: SCALE AND UPSKILL YOUR SECURITY TEAM
Businesses these days face two main challenges: they have too much technology, and they don’t have the people to run and manage it. This has led organizations to come up with new ways to make their existing security resources more effective, and scale their existing human and technology resour...
MAR 11, 2020 | 1:00 PM
KNOCK, KNOCK: IS THIS SECURITY THING WORKING?
Let's face facts: despite security awareness training, significant advancements in technology and increased security resources, the security problem remains unsolved. Breaches are more successful than ever. Why aren't the current solutions working? In this new webcast, SANS analyst Matt Brom...
MAR 11, 2020 | 1:00 PM
HOW TO CREATE A SCALABLE AND REPEATABLE THREAT HUNTING PROGRAM
According to SANS, 82% of all SOCs are investing in advanced Threat Hunting programs, but that is no simple task. Many organizations struggle with incorporating threat hunting into their security operations efforts due to a lack of expertise. Creating an effective threat hunting program requires a c...
MAR 17, 2020 | 1:00 PM
WOMEN IN CYBERSECURITY: A SANS SURVEY
Today, women are entering and rising through the ranks of cybersecurity experts, with more expected to join these ranks in coming years. By the end of 2019, women are expected to represent 20% of the global cybersecurity workforce, up dramatically from 2013, when only 11% of the workforce was female...
MAR 18, 2020 | 3:30 PM
FASTER, BETTER, AND CHEAPER: IMPROVING SECURITY OPERATIONS USING OPEN SOURCE TOOLS
Let's face it, a well-run cyber defense operation doesn't often meet the definition of inexpensive by any standards, but does it necessarily require many thousands of dollars in fancy vendor tools? With the maturation of open source tools, the answer to that question is now a definite "...
MAR 19, 2020 | 1:00 PM
HOW TO BECOME A CYBER-THREAT INTELLIGENCE ANALYST
The U.S. Bureau of Labor Statistics projects that employment in Information Security will grow 32% from 2019 to 2028, which is swifter than the average for all professions. Cyber-threat Intelligence is a crucial part of the cybersecurity dilemma. Threat Intelligence Analysts are experts capable of f...
MAR 24, 2020 | 1:00 PM
WOMEN IN CYBERSECURITY: A SANS SURVEY PANEL DISCUSSION
In this webcast, sponsor representatives and survey author, forensic examiner and SANS instructor Heather Mahalik will discuss results from our Women in Cybersecurity survey.
TOP SECURITY TRENDS FOR 2016-2017
During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational tech...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communica...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discu...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the so...