.

EVENTS

home.aspx
   
Bsides Seattle 2020
BSIDES SEATTLE 2020
April 18-18, 2020
Bsides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, Bsides Seattle continues to provide space for the open sharing of ideas, concepts and debates.

ContentTECH Summit
CONTENTTECH SUMMIT
April 20-22, 2020
Our ContentTECH mission is clear: We want to show how the effective use of technology and better processes can help your strategic efforts to create, manage, deliver and scale your enterprise content and provide your customers with better digital experiences. Come to the ContentTECH Summit to learn ...

ICS cyber security conference
ICS CYBER SECURITY CONFERENCE
April 28-30, 2020
As the most established Industrial Control Systems Cyber Security Event in Europe, the ICS cyber security conference brings together leading practitioners, operators and decision makers form across Europe to share a wealth of practical experience in implementing cyber security in organisations, and ...

2020 Cybersecurity and Privacy Protection Conference
2020 CYBERSECURITY AND PRIVACY PROTECTION CONFERENCE
April 30-30, 2020
A truly cross-sector event now in its 5th year, Cleveland-Marshall’s Cybersecurity and Privacy Protection Conference is one of the leading educational and networking events in the Great Lakes Region, and features rich content of interest to legal and compliance professionals, information techn...

Global Cyber Innovation Summit 2020
GLOBAL CYBER INNOVATION SUMMIT 2020
May 13-14, 2020
The Global Cyber Innovation Summit brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. This unique, invitati...

The Fifth Annual Dallas Cyber Security Summit
THE FIFTH ANNUAL DALLAS CYBER SECURITY SUMMIT
May 15-15, 2020
The Fifth Annual Dallas Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive...

CISO Exchange for Healthcare
CISO EXCHANGE FOR HEALTHCARE
May 17-19, 2020
The CISO Healthcare Exchange is an exclusive forum designed to create an environment of true peer-to-peer collaboration and networking among senior level executives from some of the nation’s leading healthcare organizations. As the cyber security function continues to evolve with the emerging ...

41st IEEE Symposium on Security and Privacy
41ST IEEE SYMPOSIUM ON SECURITY AND PRIVACY
May 18-20, 2020
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2020 Symposium will mark the 41st annual meeting of this flagship confe...

Cyber Security for Advanced Manufacturing Conference
CYBER SECURITY FOR ADVANCED MANUFACTURING CONFERENCE
May 26-28, 2020
Defence iQ’s Cyber Security for Advanced Manufacturing Conference is the first sector-specific opportunity to tackle these issues. The conference offers a unique opportunity for advanced manufacturers to learn from and connect with cyber security specialists, technology leaders and policymaker...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 02-04, 2020
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

33rd IEEE Computer Security Foundations Symposium
33RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM
June 22-26, 2020
The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad...

Cyber Security Leaders Exchange 2020
CYBER SECURITY LEADERS EXCHANGE 2020
August 10-12, 2020
Strategies and peer led insights to address the operational risks, workforce challenges and technology decisions faced by cyber security leaders from top tier Australasian organisations.

USENIX Security 2020 : USENIX Security Symposium
USENIX SECURITY 2020 : USENIX SECURITY SYMPOSIUM
August 12-14, 2020
USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks.

BsidesPhilly2020
BSIDESPHILLY2020
December 04-04, 2020
BSidesPhilly seeks to create awareness and improve upon the conversation and research of security topics within the Philadelphia region for researchers, professionals, and practitioners alike. The conference aims to give these various groups a chance to meet, engage in conversation through scheduled...

SPOTLIGHT

Working remotely has meant we’ve had to rethink our approach to collaboration, productivity and delivering products and services — but what about our security? Last week, news broke that Zoom is facing a huge privacy and security backlash as experts warn the video calling software isn&rs

APR 15, 2020
AI, MACHINE LEARNING, BEHAVIORAL ANALYSIS AND BLOCKCHAIN: THE NEXT GENERATION OF CYBERSECURITY
AI, machine learning, behavioral analysis, and blockchain are on the bleeding edge of security solutions technology, and may be the key to current and future threat detection and mitigation. While many companies are just beginning to explore uses for these technologies, many security technology vend...
APR 15, 2020
THE 2020 STATE OF IBM I SECURITY: THREATS, TRENDS, AND PREDICTIONS
Cyber threats are becoming more ferocious than ever. What are IBM i pros doing in 2020 to keep up? Join this live webinar for new data on the IBM i security controls deployed at organizations around the globe. Security experts Robin Tatam and Sandi Moore will reveal intelligence gathered from hundre...
APR 15, 2020 | 2:00 PM
RANSOMWARE PREPAREDNESS & RECOVERY
Ransomware is the epitome of cybersecurity threats and has proven to be one of the most prominent methods of cyberattack in 2019. In fact, the cost of an average data breach to companies worldwide is $3.86 million, according to a study by Norton Security. In addition, IDG says that total cyber-crime...
APR 16, 2020 | 12:00 AM
HOW TO REMOVE THE DATA SECURITY RISK FROM FILE TRANSFERS
Online sharing of information has accelerated collaboration, but with the need to share information comes the risk of exposing the wrong content and the use of shadow IT. Many organisations tolerate unmonitored communications over their file transfer platforms, because they do not realise that they ...
APR 16, 2020 | 2:30 PM
CORONAVIRUS UPDATE: THE LATEST CYBER SECURITY THREATS FACING CONSUMERS & SMES
In this webinar series we will be providing updates on the latest cyber security threats and how to reduce your online risks. If you missed the first webinar in this series, we covered vulnerable industries, hacking group MAZE and discussed examples of COVID-19 specific business and consumer threats...
APR 16, 2020 | 10:00 AM
ZERO TRUST: A CYBERSECURITY ESSENTIAL AND THE KEY TO SUCCESS
In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated. The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates. Tha...
APR 21, 2020 | 7:00 AM
APPLICATION SECURITY FOR DEVELOPERS - LEARNING DEFENCE BY OFFENSE
Join Rohit Salecha, Black Hat Trainer, and accredited Pen Tester, from NotSoSecure, discuss as web application vulnerabilities are on the rise, why it’s essential that developers are educated in response to the growing risk. In this webinar, we look at the increasing need for application secur...
APR 22, 2020 | 1:00 PM
THE IMPACT OF WOMEN IN CYBERSECURITY
While only 11% of cybersecurity workers worldwide are women, the few who’ve shattered the glass ceiling have made unmistakable history. Yet often as in many technology and engineering fields, they remain as “hidden figures” and hardly recognized for their achievements.Women, like t...
APR 22, 2020 | 3:00 PM
FREE CYBERSECURITY TRAINING WITH CUSTOMISED LEARNING PATHS
An increasing number of organisations and industry sectors rely on IT as they realise the benefits of digitisation. But along with these benefits come increasing risks of exposure to cyber-attacks. Financial costs from service interruption, data theft and reputational loss can be harmful, especially...
APR 22, 2020 | 12:00 PM
MANAGING THE CYBER RISK OF REMOTE WORK
Working remotely has meant we’ve had to rethink our approach to collaboration, productivity and delivering products and services — but what about our security? Last week, news broke that Zoom is facing a huge privacy and security backlash as experts warn the video calling software isn&rs...
APR 29, 2020 | 9:00 AM
COMPROMISED CREDENTIAL,ACCOUNT TAKEOVER AND INTELLIGENT DRIVEN PASSWORD POLICY
As the methods used by threat actors to steal credentials evolve and leaked data is readily available online, defenders are at an ongoing disadvantage and increasingly vulnerable to account takeover, fraud, and misuse. During this webinar, Flashpoint will examine how visibility into the illicit comm...
APR 30, 2020 | 10:00 AM
USING SIEM TO PROTECT AGAINST TOP CYBERSECURITY THREATS
There are countless ways that a businesses can make it easier for a threat actor to find their way in undetected – and the onus is on security to stop, detect and prevent the attacker from getting in the first place. This is where SIEM can enable a business, and ensure that aggregated and anal...
TOP SECURITY TRENDS FOR 2016-2017
During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational tech...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communica...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discu...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the so...