.

EVENTS

home.aspx
   
African Blockchain and Cyber Security Conference Tour 2018
AFRICAN BLOCKCHAIN AND CYBER SECURITY CONFERENCE TOUR 2018
November 05-24, 2018
The African Blockchain and Cyber Security Conference Tour 2018 create a platform for the exchange of knowledge and experience in the cyber security, blockchain, cryptocurrency universe with regulation topics. The conferences series will open its doors for banks, government organizations, universitie...

Enterprise Security & Risk Management Summit 2018
ENTERPRISE SECURITY & RISK MANAGEMENT SUMMIT 2018
November 21-21, 2018
Cyber security is fast becoming one of the most critical issues in the IT world. As an increasing number of businesses are going digital and with cyber criminals becoming far more prolific and dangerous, the need for steadfast cyber security solutions has never been so important.

AINS 2018 IEEE CONFERENCE ON APPLICATIONS, INFORMATION & NETWORK SECURITY
AINS 2018 IEEE CONFERENCE ON APPLICATIONS, INFORMATION & NETWORK SECURITY
November 21-22, 2018
5G promises to deliver enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable low latency communication (URLLC). To support mMTC and URLLC, 5G needs to carry out computations closer to subscribers at the “edge” instead of the cloud. This turns 5G ...

CYBER SECURITY AND CLOUD EXPO 2018
CYBER SECURITY AND CLOUD EXPO 2018
November 28-29, 2018
The Cyber Security & Cloud Expo North America 2018 will host two days of top-level discussion around cyber security and cloud, and the impact they are having on industries including government, energy, financial services, healthcare and more. Arriving in the heart of Silicon Valley on November 2...

Los Angeles Cyber Security Summit
LOS ANGELES CYBER SECURITY SUMMIT
November 29-29, 2018
The Los Angeles Cyber Security Summit, organized by the Cyber Security Summit will take place on 29th November 2018 at the in Beverly Hills, United States. The conference has been designed for exclusively invited C-Suite & Senior Level Executives in need of innovative solutions to protect their ...

Phoenix Cybersecurity Conference 2018 in Phoenix
PHOENIX CYBERSECURITY CONFERENCE 2018 IN PHOENIX
November 29-29, 2018
Click here for a full agenda Event Sponsors/Vendors include: Program Description: This is a one-day conference. There will be 8-13 educational cybersecurity speaker sessions with 30-60 tabletop exhibitors. Speaking sessions will be in one main room with breaks in between speaker sessions to browse t...

Black Hat EUROPE 2018
BLACK HAT EUROPE 2018
December 03-06, 2018
Black Hat provides attendees with the very latest in research, development, and trends in Information Security. Here the brightest professionals and researchers in the industry will come together for a total of four days—two or four days of deeply technical hands-on Trainings, followed by two ...

Towards A Cyber-Secured Indonesia
TOWARDS A CYBER-SECURED INDONESIA
December 05-07, 2018
A comprehensive 3-day single-stream conference programme bringing together Indonesian policy makers, leading security experts from around the globe, cyber & information security practitioners, vendors etc. to address current issues and trends, examine case studies and discuss on securing the 3 k...

Cyber Security Conference & Expo
CYBER SECURITY CONFERENCE & EXPO
December 06-06, 2018
The Cyber Security Conference & Expo, organized by the Data Connectors LLC will take place on 6th Dec 2018 at the Ronald Reagan Building and International Trade Center in Washington, United States Of America. The conference will cover areas like from mobile devices and social media to virtualiza...

KC CYBER SECURITY CONFERENCE
KC CYBER SECURITY CONFERENCE
December 06-06, 2018
As technology continues to redefine business, geographic regions, and create borderless digital environments, it has become essential for IT executives to stay aware of global trends in order to integrate strategies into their operations. This allows your team to stay agile while maintaining your co...

The 12th WISTP International Conference on Information Security Theory and Practice (WISTP
THE 12TH WISTP INTERNATIONAL CONFERENCE ON INFORMATION SECURITY THEORY AND PRACTICE (WISTP'2018)
December 10-11, 2018
Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems, and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capab...

CYBER SECURITY EXCHANGE | US
CYBER SECURITY EXCHANGE | US
December 10-12, 2018
The cybersecurity landscape remains vulnerable to a wide range of physical and cyber threats. Sophisticated cyber criminals, nation states and some insiders take information and deliberately disrupt the delivery of services and information. True cyber resiliency requires a proactive synergy of peopl...

CYBERTECH THE EVENT FOR THE CYBER INDUSTRY
CYBERTECH THE EVENT FOR THE CYBER INDUSTRY
January 28-30, 2019
Cybertech is the cyber industry’s foremost B2B networking platform conducting industry-related events all around the globe. From Tel Aviv and Rome, to Tokyo, Singapore, Panama, and more, our conferences and exhibitions serve as the go-to place to learn all about the latest technological innova...

Cybersecurity Leadership Summit 2019 USA
CYBERSECURITY LEADERSHIP SUMMIT 2019 USA
February 11-11, 2019
Cybersecurity is about humans, skills, and knowledge. So is the KuppingerCole's Cybersecurity Leadership Summit in Washington, DC, USA (#CSLSUS19). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared ...

4th annual Rail Cyber Security Summit 2019
4TH ANNUAL RAIL CYBER SECURITY SUMMIT 2019
February 19-20, 2019
Leveraging key insight from the Cyber Senate portfolio of vertical conferences from throughout 2016, 2017 and 2018, this year’s event will be dominated by the best global Technology and Information Security experts across the Rail supply chain, including executive leadership from Rolling Stock...

InfoSecWorld Conference & Expo 2019
INFOSECWORLD CONFERENCE & EXPO 2019
April 01-03, 2019
Cybersecurity has come a long way in 25 years, and InfoSec World has been there through it all. That's right, InfoSec World 2019 Conference & Expo is returning to Disney's Contemporary Resort on April 1-3, 2019, and we're celebrating 25 years of being the business of security confere...

3rd BOSPHORUS INTERNATIONAL CONFERENCE ON CYBERPOLITICS, CYBERSECURITY AND INTERNATIONAL RELATIONS
3RD BOSPHORUS INTERNATIONAL CONFERENCE ON CYBERPOLITICS, CYBERSECURITY AND INTERNATIONAL RELATIONS
April 25-28, 2019
The Istanbul Bosphorus International Cyberpolitics, Cyberlaw and Cybersecurity Conference is an annual four-day event presented jointly by Cyberpolitik Journal and Centre for Cyber Politics Research of Association for Human Rights Education (AHRE) in conjunction with academia, government and private...

ASIA CYBERSECURITY INNOVATION SUMMIT
ASIA CYBERSECURITY INNOVATION SUMMIT
May 13-14, 2019
From the rules and regulations of the China’s Cybersecurity Law and Cybersecurity Graded Protection System 2.0, the importance of cybersecurity has been risen from the national strategic level to an unprecedented height. The official release of the European GDPR also clarifies the role of ente...

Cyber Security Summit Belgium
CYBER SECURITY SUMMIT BELGIUM
June 12-12, 2019
The Cyber Securtiy Summit will bring together a diverse group of ICT & Cyber Professionals to discuss the most pertinent issues affecting the security and safety of the digital space. This Summit is an unique event at which interaction and learning from the experiences of others is key. In addit...

Arab Security Conference
ARAB SECURITY CONFERENCE
September 08-09, 2019
The Arab World generally and Egypt specifically, faces great challenges concerning cyber-crimes and threats. As information security is becoming the biggest concern of today’s world, Arab Security Consultants, Firm operating in the field of Information security in Egypt & the middle East, ...

ManuSec: Cyber Security for Critical Manufacturing
MANUSEC: CYBER SECURITY FOR CRITICAL MANUFACTURING
October 08-09, 2019
As the manufacturing sector continues to embrace innovation in technology, it exposes itself to a widening array of cyber threats. To properly face cyber risk in the 21st century, organisations must fully engage all levels from the executive board down, to collaborate and establish best practice pol...

ATM & Cyber Security 2019
ATM & CYBER SECURITY 2019
October 08-09, 2019
ATM & Cyber Security 2019 is the world’s leading conference focused on physical and logical ATM security. The event comprises a high-quality speaker programme containing important contributions from leading banks, government and law enforcement agencies, solutions providers and a range of ...

SPOTLIGHT

Financial services firms are consistently working to make their mobile user experiences more cost-efficient and user-friendly. While security and fraud have always been important to financial institutions, mobile apps used by customers create a security challenge. Firms have no visibility into the s

NOV 19, 2018
5 CRITICAL REASONS TO REPLACE AV
Traditional endpoint security can’t keep up with the ever-evolving threat landscape. It’s complicated, costly, and puts stress on already overworked security staff. In fact, 67% of security staff say that they’re too busy to keep up with their trainings. More and more, companies ar...
NOV 27, 2018 | 11 AM
2018 BLACK HAT HACKER SURVEY REPORT: WHAT HACKERS REALLY THINK ABOUT YOUR CYBER DEFENSES
Curious about what hackers really think of your cyber defenses? Thycotic’s new 2018 Black Hat Conference survey conducted in Las Vegas in August reveals some disturbing answers. 75% hackers say companies fail at applying the principle of least privilege. 50% of hackers say they easily compromi...
NOV 27, 2018 | 1:30 PM
CYBERCRIME 2.0: A NEW ERA FOR THE IDENTITY AND AUTHENTICATION CHALLENGE
You don't have to be a bank to serve customers online, and even if your customer accounts do not hold money, they still hold value - one that cybercriminals will take advantage of. As customers come to expect services to be available online as the standard, more businesses will have to learn to ...
NOV 27, 2018 | 3:00 PM
DESTRUCTIVE CYBERATTACKS ARE ON THE RISE
According to the world’s top incident response (IR) professionals, politically motivated cyberattacks from nation-state actors have contributed to an ominous increase in destructive attacks: attacks that are tailored to specific targets, cause system outages, and destroy data in ways designed ...
NOV 29, 2018 | 8:00 AM
IDENTITY VERIFICATION & AUTHENTICATION MADE EASY
Astonishingly, a vast number of businesses still follow an “inside-out” approach when it comes to shaping the customer journey. They look at this from their internal perspective, “inside-out”, focusing on an approach that works well for them. However, to serve a customer perf...
NOV 29, 2018 | 10:00 AM
PROTECTING FINANCE MOBILE APPS AGAINST HACKERS & REDUCING FRAUD
Financial services firms are consistently working to make their mobile user experiences more cost-efficient and user-friendly. While security and fraud have always been important to financial institutions, mobile apps used by customers create a security challenge. Firms have no visibility into the s...
NOV 29, 2018
3 SECURITY MUST HAVES FOR SMALL BUSINESSES
IT and security teams at small businesses wear many hats. The last thing you need keeping you up at night is the fear of a security breach, but with limited resources and budget a breach is a real possibility. Learn about the three must haves for an endpoint security solution so that your IT and sec...
DEC 04, 2018
SECURITY VS. INNOVATION: WHY NOT CHOOSE BOTH?
In a world where businesses compete and succeed on the basis of application-driven innovation, enterprises are challenged to deliver software to market faster than ever before. Simultaneously, they're grappling with insider and outsider cybersecurity threats, as well as stringent data privacy re...
DEC 05, 2018
BEST PRACTICES FOR USING VPNS FOR EASY NETWORK-TO-NETWORK PROTECTION
Learn how VPNs can secure your network-to-network communication. Different implementations will be discussed, with real industry applications demonstrating how the solutions work in practice. There will also be advice on what to look for in terms of threats, and pitfalls. Don’t miss your chanc...
DEC 05, 2018
CYBERSECURITY FUNDAMENTALS FOR YOUR INDUSTRIAL NETWORKS
In today’s increasingly connected world, where the IIoT and Industry 4.0 is redefining the industrial landscape, the implementation of appropriate cyber security has become more important than ever. When a wide variety of devices used within a typical industrial control system are connected, t...
DEC 06, 2018 | 10:00 AM
CYBER SECURITY IN THE IOT ERA
Consumers are increasingly embracing smart homes, equipped with multiple smart devices and sensors. By analysing usage data smart homes can provide personalised experience to intelligently predict and meet user needs. Meanwhile, connected home environment is also becoming attractive targets for atta...
DEC 06, 2018
WILMERHALE CYBERSECURITY, PRIVACY AND COMMUNICATIONS WEBINAR: EMERGING PRIVACY AND CYBERSECURITY LAWS IN LATIN AMERICA AND ASIA
Join WilmerHale for the next session of our 2018 Cybersecurity, Privacy and Communications Webinar Series. While corporations have been focused on coming into compliance with the EU’s GDPR, keeping up with EU developments in the process of coming to a final EU ePrivacy Regulation, and beginnin...
TOP SECURITY TRENDS FOR 2016-2017
During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational tech...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communica...
2015 FACES OF FRAUD - LONDON
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobile payment...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discu...