Conferences and Meetings on Information Security and Information Privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.
 
Spring School on Lattice-Based Cryptography
ID
866489
Dates
20 Mar 2017 - 24 Mar 2017
Location
Oxford, United Kingdom
2.
 
SANS Tysons Corner Spring 2017
ID
859646
Dates
20 Mar 2017 - 25 Mar 2017
Location
McLean, United States
Abstract
Information security training in Tysons Corner from SANS Institute the global leader in cybersecurity training. Securing and defending your network has never been more important as attacks and breaches make the news daily. Gain the skills and tools you need to win the battle against the wide range of cyber adversaries who want to harm your environment by attending SANS Tysons Corner Spring 2017 (March 20-25). Choose from several hands-on, intensive cyber security training courses. Multiple courses are aligned with GIAC certifications and several will prepare you or your technical staff for DoDD 8570. SANS is the most trusted source in computer security training, certification, and research. Come see for yourself - register today for SANS Tysons Corner Spring 2017.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, network penetration testing, critical security controls, forensics, digital forensics, malware, reverse-engineering malware, malware analysis, management, leadership
3.
 
SANS ICS Security Summit & Training - Orlando 2017
ID
825827
Dates
20 Mar 2017 - 27 Mar 2017
Location
Orlando, United States
Abstract
Join us for the 12th Annual ICS Security Summit where you'll participate in briefings by the industry's most seasoned practitioners as well as live demonstrations, the largest collection of hands-on challenges and simulations, and ICS focused immersion courses taught by the nation's best instructors. Learn what qualifies as an attack, what does not, and get hands-on with the challenges and skills required to bridge the IT/OT gap and respond to threats at the ICS Security Summit. Industry leaders and in-the-field practitioners will share their experience covering a wide topic of ICS forensics, attack demos, industry trends, and more.
Contact
Lacee Santos;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber attacks, ICS, ICS security, industrial control systems, hacking, hacker tools, hacking techniques, exploits, incident handling, risk management, active defense, incident response, critical infrastructure
4.
 
SANS Pen Test Austin 2017
ID
845169
Dates
27 Mar 2017 - 01 Apr 2017
Location
Austin, United States
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, incident handling, exploits, penetration testing, web app penetration testing, cyber deception, active defense, network penetration testing, CyberCity, exploit writing
5.
 
APKC'17 — The 4th ACM ASIA Public-Key Cryptography Workshop
ID
866466
Start date
01 Apr 2017
Location
Abu Dhabi, United Arab Emirates
6.
 
IoTPTS'17 — 3rd International Workshop on IoT Privacy, Trust, and Security
ID
852171
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
Abstract
The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning.
Topics
Privacy and IoT data, Privacy attacks for IoT, Trust management and device discoverability for IoT, Usability of privacy and security systems in IoT, User risk perceptions and modeling for IoT, Policy Management and enforcement for IoT, Authentication and access control for users for IoT, Cryptography for IoT, Attack detection and remediation for IoT, Security architectures for IoT systems and applications
7.
 
CPSS?17 — 3rd ACM Cyber-Physical System Security Workshop
ID
866454
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
8.
 
BCC'17 — First ACM Workshop on Blockchain, Cryptocurrencies and Contracts
ID
866442
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
9.
 
SCC'17 — The Fifth International Workshop on Security in Cloud Computing
ID
866507
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
10.
 
AsiaCCS 2017 — 2017 ACM Asia Conference on Computer and Communications Security
ID
866495
Dates
02 Apr 2017 - 06 Apr 2017
Location
Abu Dhabi, United Arab Emirates
Event website
11.
 
TPMPC2017 — Theory and Practice of Multi-Party Computation Workshop
ID
866471
Dates
03 Apr 2017 - 07 Apr 2017
Location
Bristol, United Kingdom
12.
 
FC '17 — Financial Cryptography and Data Security 2017
ID
866450
Dates
03 Apr 2017 - 07 Apr 2017
Location
Sliema, Malta
Event website
13.
 
ISPIT 2017 — Information Security and Protection of Information Technologies 2017
ID
866470
Dates
06 Apr 2017 - 07 Apr 2017
Location
Saint-Petersburg, Russia
14.
 
TA'17 — Targeted Attacks 2017
ID
866524
Start date
07 Apr 2017
Location
Sliema, Malta
15.
 
SANS 2017
ID
842150
Dates
07 Apr 2017 - 14 Apr 2017
Location
Orlando, United States
Abstract
Information security training in Orlando, FL from SANS Institute, the global leader in information security training. SANS 2017 returns to Orlando, Florida offering more than 40+ hands-on, intensive cyber security training courses all taught by the industry's top instructors. Regardless of the course you select, SANS promises that you will be able to use what you learn as soon as you return to your office. Nothing beats the SANS live training experience. Don't delay as many courses sold out last year. Register today to guarantee your seat and to lay a strong foundation for a successful year!
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident response, incident handling, Windows, PowerShell, Linux, Unix, continuous monitoring, security operations, security ops, penetration testing, web apps, web app penetration testing, network penetration testing, critical security controls, auditing, mobile devices, mobile devices security, virtualization, cloud security, exploit writing, forensics, digital forensics, Windows forensics, Mac forensics, network forensics, cyber threat intelligence, smartphone forensics, malware, malware analysis, CISSP, security leadership, management, strategic planning, project management, cyber defense, secure coding, coding, .NET, auditing, data security, law
16.
 
2nd Annual - GCC ICS Cyber Security Forum Dubai 2017
ID
870271
Dates
09 Apr 2017 - 11 Apr 2017
Location
Dubai, United Arab Emirates
Abstract
Following on form of success of the first Forum Sept 2015 ICS Cyber Security Forum Has Been called to examine the issues of concern here in region together with the growing number of international Partnership being formed around the world to tackle and address the increasing number of cyber-attacks. The ICS Cyber Security forum is the event where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber incidents, analyze their causes and cooperate on solutions. The ICS Cyber Security forum, Dubai is the must attend event which brings together cyber security expert and control system to meet a common goal, securing the control systems. This year conference is designed to arm you with the pertinent and mission critical information on SCADA and industrial control systems which will help you to create tactics, techniques, and procedures to improve the security of ICS System
Contact
Aqeel Ahmed;     Phone: [+91 8884600884];     Email: aqeel@imnbi.com
Topics
ICS Cyber Security, SCADA Security, industrial control systems, cyber defense, data protection, security priorities, IT Compliance, cyber security, cyber security threat, Endpoint security, Threat base security, Security intelligence, future cyber strategies
17.
 
C2SI 2017 — International Conference in "Codes, Cryptology and Information Security"
ID
866512
Dates
10 Apr 2017 - 12 Apr 2017
Location
Rabat, Morocco
18.
 
4th Annual Kingdom Cyber Security Conference
ID
850471
Dates
18 Apr 2017 - 19 Apr 2017
Location
Riyadh, Saudi Arabia
Contact
Sonika Mendjoge;     Email: sonika.mendjoge@fleming.events
Topics
cyber security, security management, cyber threats, cyber attacks, cyber security solutions, cyber security conference, social engineering, ransomware, cyber incident response, securing critical infrastructure, information security, cyber intelligence, cyber security in Middle East, cyber security Saudi Arabia
19.
 
AnnualSec2017 — 16th Annual Security Conference
ID
850089
Dates
18 Apr 2017 - 20 Apr 2017
Location
Las Vegas, United States
Abstract
The nature and scope of the Information Security field is evolving. We are no longer are we just concerned with protecting the technical edifice. Our emphasis has become more holistic, and we tend to consider both the organizational and technical aspects of information protection to be equally important. The 16th Annual Security Conference provides a forum for discourses in Security, Assurance and Privacy that enhance the understanding of current events, but also nurture future dialogues related to cybersecurity. The conference is scheduled for April 18-20, 2017, in Las Vegas, NV, USA. The 16th Annual Security Conference is part of the Vegas Conferences organized by the Information Institute. Co-organizers for the 2017 event are Virginia Commonwealth University, Plymouth University, The University of South Carolina and DePaul University. Administrative offices for the conference are at Virginia Commonwealth University. Conference theme for 2017 is: Discourses in Cybersecurity
Contact
Sergio Nunes;     Email: esc@iseg.ulisboa.pt
Topics
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome participation in the 16th Annual Security Conference. Topic areas covered in the conference include, but are not limited to the following: Cyber security in specific sectors (healthcare, banking, government etc) Cyber terrorism Digital forensics Electronic espionage Ethical and legal aspects of security Intrusion detection and prevention IT audit and control Risky habits risky behaviors Security and BYOD Security breaches and data analytics Security governance Security in social media and online communities Security policies Socio-technical aspects of security System vulnerabilities and risk exposure Technology enabled crime Publishing opportunity: All submissions are considered for possible fast tracking in the following academic journals: Journal of Information System Security, European Journal of Management Studies, Information and Computer Security. If your paper is not fast tracked, it will still get published in an edited book.
20.
 
SANS Threat Hunting and Incident Response Summit 2017
ID
846535
Dates
18 Apr 2017 - 25 Apr 2017
Location
New Orleans, United States
Abstract
Join SANS for the Threat Hunting & Incident Response Summit in New Orleans! This year's Summit features industry talks filled with the most advanced methodologies used by top cyber defense practitioners. Additionally, choose from seven courses taught by experienced instructors who are actively hunting for threats and stopping the most sophisticated, and dangerous attacks against organizations.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, network security, data breach, cyber-attacks, cyber threats, cyber threat intelligence, incident response, security operations, security ops, active defense, cyber deception, digital forensics, memory forensics, network forensics, malware, malware analysis
21.
 
SANS Baltimore Spring 2017
ID
878259
Dates
24 Apr 2017 - 29 Apr 2017
Location
Baltimore, United States
Abstract
SANS' instructors are innovative thought leaders and industry experts teaching constantly updated, practical cybersecurity techniques. Join us for SANS Baltimore Spring 2017, April 24-29, and learn how to out-think and out-maneuver cyber adversaries with cutting-edge cybersecurity tactics. Choose from nine courses in IT security, penetration testing, forensics, and security management. Register today.
Contact
Lacee Santos;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, intrusion detection, hacking, hacker tools, hacking techniques, incident handling, continuous monitoring, security operations, security ops, web apps, web app penetration testing, penetration testing, network penetration testing, pen testing, exploit writing, forensics, digital forensics, incident response, management, security leadership
22.
 
EuroS&P — 2nd IEEE European Symposium on Security and Privacy
ID
866511
Dates
26 Apr 2017 - 28 Apr 2017
Location
Paris, France
23.
 
ISDFS2017 — International Symposium on Digital Forensics and Security
ID
866532
Dates
26 Apr 2017 - 28 Apr 2017
Location
Mures, Romania
Related subject(s)
Event website
24.
 
IEEE S&B — IEEE Security and Privacy on the Blockchain
ID
866597
Start date
29 Apr 2017
Location
Paris, France
25.
 
WCS 2017 — The second international Workshop on Communication Security
ID
866585
Start date
30 Apr 2017
Location
Paris, France
26.
 
SEMS — Workshop on Security for Embedded and Mobile Systems
ID
866639
Start date
30 Apr 2017
Location
Paris, France
27.
 
Eurocrypt 2017
ID
866583
Dates
30 Apr 2017 - 04 May 2017
Location
Paris, France
28.
 
HOST'17 — IEEE International Symposium on Hardware-Oriented Security and Trust
ID
866604
Dates
01 May 2017 - 05 May 2017
Location
McLean, United States
Related subject(s)
29.
 
SANS Automotive Cybersecurity Summit 2017
ID
838972
Dates
01 May 2017 - 08 May 2017
Location
Detroit, United States
Abstract
The automotive industry is in an era of exciting change and innovation. Vehicles are more connected than ever and feature technologies that dramatically enhance user experience and safety. However, this unprecedented wave of automation presents new and unique cybersecurity challenges. Recent high-profile car hacking demonstrations highlight the fact that modern automobiles are inherently vulnerable and connected computing platforms, and as a result, automotive cybersecurity professionals are dealing with new and difficult challenges in an ever-evolving security landscape. SANS will hold its inaugural Automotive Cybersecurity Summit to address the specific issues and challenges around securing automotive organizations and their products. Join us for a comprehensive look at automotive assembly, industry suppliers, embedded systems, and safeguarding extended customer and product data. The Summit will include two-days of in-depth presentations from top security experts and seasoned practitioners, hands-on learning exercises, and exclusive networking opportunities.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, ICS, industrial control systems, SCADA, automotive cybersecurity
30.
 
RuhrSec
ID
868987
Dates
02 May 2017 - 05 May 2017
Location
Bochum, Germany
Abstract
RuhrSec is the non-profit security conference at the Ruhr University Bochum. As one of the organizers of the famous lecture called HackPra, we are hosting a high-quality and low-priced security conference in the heart of Bochum near the river Ruhr. We provide awesome academic and industry talks from smart international speakers, the typical Ruhr University feeling and the highly recommended HackPra social event.
Contact
Marcus Niemietz;     Phone: [+49 234 45930961];     Email: ruhrsec@hackmanit.de
Topics
Security, Attacks, Side-Channel, Ruhr-Universität Bochum, Security Community, non-profit, security conference, Pentest, OWASP, IT-Security
31.
 
SANS Security West 2017
ID
870189
Dates
09 May 2017 - 18 May 2017
Location
San Diego, United States
Abstract
Cybersecurity skills and knowledge are in high demand. Cyber attacks and data breaches are more frequent and sophisticated than ever, and organizations are grappling with how to best defend themselves. As a result, cybersecurity is more vital, crucial, and important to the growth of your organization than ever before. Now is the perfect time to take the next step to protect your organization and advance your career. Join us at Security West 2017 (May 9-18) in beautiful San Diego, CA to gain the skills and knowledge to help your organization succeed. You will learn cutting-edge content about the hottest information security topics across penetration testing, digital forensics and incident response (DFIR), security operations, audit, application security, and security management.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, PowerShell, continuous monitoring, security operations, SecOps, penetration testing, pen testing, web app penetration testing, network penetration testing, critical security controls, auditing, mobile device security, virtualization, cloud security, exploit writing, digital forensics, Windows forensics, threat hunting, Mac forensics, cyber threat intelligence, IT management, security leadership, strategic planning, DevOps
32.
 
Cyber Security North Africa Summit
ID
850514
Dates
15 May 2017 - 16 May 2017
Location
Cairo, Egypt
Contact
Sonika Mendjoge;     Email: sonika.mendjoge@fleming.events
Topics
cyber security, security management, cyber threats, cyber attacks, cyber security solutions, cyber security conference, social engineering, ransomware, cyber incident response, securing critical infrastructure, information security, cyber intellience, cyber security in Egypt
33.
 
Global Cybersecurity Innovation Summit
ID
884955
Dates
16 May 2017 - 17 May 2017
Location
London, United Kingdom
Abstract
SINET – London creates a forum to build and maintain international relationships required to foster vital information sharing, broad awareness and the adoption of innovative Cybersecurity technologies
Contact
theresa princi;     Email: tprinci@security-innovation.org
34.
 
SANS Northern Virginia - Reston 2017
ID
870111
Dates
21 May 2017 - 26 May 2017
Location
Reston, United States
Abstract
We are pleased to invite you to SANS Reston 2017, May 21-26. This event features comprehensive hands-on technical training from some of the best instructors in the industry and includes courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans now to attend SANS Reston 2017.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, Python, hacking, hacker tools, hacking techniques, exploits, incident handling, Windows, PowerShell, security operations, SecOps, Continuous Monitoring, web applications, web app penetration testing, pen testing, penetration testing, network penetration testing, digital forensics, strategic planning, IT management
35.
 
AFRICACRYPT 2017 — 9th International Conference on Cryptology and Information Security
ID
866592
Dates
24 May 2017 - 26 May 2017
Location
Dakar, Senegal
36.
 
Security in Times of Surveillance
ID
866602
Start date
29 May 2017
Location
Eindhoven, Netherlands
37.
 
IFIP SEC 2017 — 32nd IFIP TC-11 International Information Security and Privacy Conference
ID
866678
Dates
29 May 2017 - 31 May 2017
Location
Rome, Italy
Event website
38.
 
CyCon — 2017 9th International Conference on Cyber Conflict
ID
853728
Dates
30 May 2017 - 02 Jun 2017
Location
Tallinn, Estonia
Abstract
International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation
Event website
39.
 
SANS Atlanta 2017
ID
870165
Dates
30 May 2017 - 04 Jun 2017
Location
Atlanta, United States
Abstract
We are pleased to invite you to attend SANS training in the capital of the State of Georgia! We are bringing our top courses and top instructors to Atlanta on May 30- June 4. With only one in 1,200 candidates qualifying globally to join our faculty, SANS instructors are the foremost experts and the best at ensuring you will not only learn the material, but that you can also apply it immediately when you return from your training. All of our courses at SANS Atlanta 2017 are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join nearly 73,000 GIAC credentialed Information Security professionals worldwide.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, hacking, hacker tools, hacking techniques, exploits, incident handling, continuous monitoring, security operations, cyber threat intelligence, CISSP, security leadership, IT management
40.
 
EuropeanSeC2017 — 2017 European Security Conference
ID
849911
Dates
05 Jun 2017 - 06 Jun 2017
Location
Lisbon, Portugal
Abstract
The 2017 European Security Conference is scheduled for June 5-6, 2017, in Lisbon, Portugal. The Conference is the European extension of the Annual Security Conference that has been held in Las Vegas (USA) for over a decade. The conference attracts a nice mix of participants from academia, government and industry. Organizers for the 2017 event is ISEG, University of Lisbon (Portugal). Administrative offices for the conference are at ISEG, University of Lisbon. Conference theme for 2017 is: Cybersecurity Analytics
Contact
Email: esc@iseg.ulisboa.pt
Topics
Cybersecurity, security, Information security
41.
 
CTCrypt 2017 — 6th Workshop on Current Trends in Cryptology
ID
866622
Dates
05 Jun 2017 - 07 Jun 2017
Location
Saint Petersburg, Russia
Event website
42.
 
Summer school on real-world crypto and privacy
ID
866621
Dates
05 Jun 2017 - 09 Jun 2017
Location
Sibenik, Croatia
43.
 
SANS Houston 2017
ID
870175
Dates
05 Jun 2017 - 10 Jun 2017
Location
Houston, United States
Abstract
Information security training in Houston from SANS Institute, the global leader in security training. At SANS Houston 2017, SANS offers hands-on, immersion-style security, security management, and pen testing training courses taught by real-world practitioners. The site of SANS Houston 2017, June 5-10, is Royal Sonesta Hotel Houston, located in the heart of the Galleria area of Uptown Houston. We have selected some of our top information security courses to provide you with the training and certification that you need to boost your career by learning from the best! SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, intrusion detection, hacking, hacker tools, hacking techniques, ethical hacking, penetration testing, pen testing, network penetration testing, IT management, strategic planning
44.
 
SANS Security Operations Center Summit & Training 2017
ID
846490
Dates
05 Jun 2017 - 12 Jun 2017
Location
Arlington, United States
Abstract
In light of numerous recent high-profile attacks and data breaches, Security Operations Centers are taking on a more prominent role in organizations as executives aim to improve their security programs. While a Security Operations Center (SOC) is capable of improving security, effectively implementing and managing the many functions of a SOC can be a major challenge. Information security managers must balance people, process, and procedure in order to operate a SOC that is effective and works within the constraints of the organization. The Security Operations Center Summit will bring together top experts for two days of in-depth talks and panel discussions around building, operating, and growing a SOC. Attendees will hear from and interact with top experts who have faced many of the same challenges SOCs encounter within their organizations.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, security operations, SecOps, intrusion detection, network forensics, digital forensics, security operations center
45.
 
SECITC 2017 — The 10th International Conference on IT and Communications Security
ID
866708
Dates
08 Jun 2017 - 09 Jun 2017
Location
Bucharest, Romania
Event website
46.
 
Cyber Incident — 2017 International Conference On Cyber Incident Response, Coordination, Containment & Control
ID
856159
Dates
19 Jun 2017 - 20 Jun 2017
Location
London, United Kingdom
Abstract
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control. The aim of the Cyber Incident 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.
Event website
47.
 
Cyber Security — 2017 International Conference On Cyber Security And Protection Of Digital Services
ID
856179
Dates
19 Jun 2017 - 20 Jun 2017
Location
London, United Kingdom
Abstract
The International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.
48.
 
SANS Digital Forensics Summit & Training 2017
ID
872870
Dates
22 Jun 2017 - 29 Jun 2017
Location
Austin, United States
Abstract
DFIR Superheroes aren't born; they're made... and you've got what it takes. The SANS Annual DFIR Summit is the only event of its kind that gathers the most influential group of experts, the highest quality of training & the greatest opportunities to network with others in the field of Digital Forensics & Incident Response, all in one place! Every year, DFIR Professionals around the world attend the DFIR Summit with a common goal; to learn how to overcome the latest obstacles and share with others what has proven to be effective in their day-to-day investigations. No matter if you just started your career or if you are a seasoned forensicator, the Summit will give you the investigative skills you know you need and the ones you never knew you needed. Don't miss the opportunity to attend the most comprehensive DFIR event of the year! Learn how to defeat your enemy and become a DFIR Superhero in 8 days!
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, forensics, digital forensics, network forensics, Windows forensics, security operations, SecOps, incident response, threat hunting, Mac forensics, memory forensics, cyber threat intelligence, smartphone forensics, malware, reverse-engineering malware
49.
 
CSCloud — 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing
ID
853581
Dates
26 Jun 2017 - 28 Jun 2017
Location
New York, NY, United States
Abstract
The increasing usages of Web-based technologies have enabled numerous benefits in people’s daily life, from mobile social applications to heterogeneous high performance computing. The implementations of the Internet-related solutions are considered one of the important approaches for enterprises to grow their businesses. However, novel mechanisms using networking techniques also introduce new threats harming users’ privacy information and operations. Two critical aspects in Web security are cyber security and cloud computing. IEEE CSCloud 2017 focuses on these two aspects and aims to gather recent achievements in cyber security and cloud computing fields. The conference invites those papers that concentrate on new paradigms, algorithms, and applications in cyber security or cloud computing. We also encourage researchers and practitioners to build up the connections between academia and industry.
50.
 
MILSATCOM — 2nd MilSatCom USA 2017
ID
875769
Dates
28 Jun 2017 - 29 Jun 2017
Location
Arlington, Virginia, United States
Abstract
The event will explore key topics such as the USA's acquisition process, alongside contemporary and crucial issues such as the Wideband AoA and utilisation of ComSatCom, as well as assessment of threats facing the space domain such as space congestion and debris, EW, jamming, anti-satellite capabilities and cyber.
Contact
Honey de Gracia;     Phone: [+442078276102];     Email: hdegracia@smi-online.co.uk
Topics
MilSatCom USA, Global MilSatCom, Satellite, MilSatCom, Wideband AoA, Satellite Resilience, High Throughput Satellites, Capability, WGS, SatCom Arlington, Space and Cyberspace, Space Threats, Military Communication, Army Communications, Defence Events, Tactical Operations, C4iSR, C4i
51.
 
ACISP2017 — 22nd Australasian Conference on Information Security and Privacy 2017
ID
866641
Dates
03 Jul 2017 - 05 Jul 2017
Location
Auckland, New Zealand
52.
 
ACNS'17 — 15th International Conference on Applied Cryptography and Network Security
ID
866695
Dates
10 Jul 2017 - 12 Jul 2017
Location
Kanazawa, Japan
53.
 
ICCCF — 2017 5th International Conference on Cybercrime and Computer Forensic
ID
843431
Dates
16 Jul 2017 - 18 Jul 2017
Location
Gold Coast, Australia
Abstract
This is a well established international conference for technologists and social scientists to gather and shares their forefront research outcome, to disseminate their research experience, to make the society for better place for humanity.
54.
 
i-Society — 2017 International Conference on Information Society
ID
874595
Dates
17 Jul 2017 - 19 Jul 2017
Location
Dublin, Ireland
Abstract
The i-Society is a global knowledge-enriched collaborative effort that has its roots from both academia and industry.
Event website
55.
 
SECRYPT 2017 — 14th International Conference on Security and Cryptography
ID
866683
Dates
26 Jul 2017 - 28 Jul 2017
Location
Madrid, Spain
56.
 
WCSF 2017 — 3rd IEEE International Workshop on Cloud Security and Forensics
ID
884904
Dates
01 Aug 2017 - 04 Aug 2017
Location
Sydney, Australia
Abstract
The 3rd IEEE International Workshop on Cloud Security and Forensics is held as part of the the 16th IEEE International Conference on Trust, Security And Privacy In Computing And Communications (TrustCom2017). Cloud computing offers utility oriented Information and Communications Technology (ICT) services to corporate and consumer-level users all over the world. The evolution of cloud computing is driving the design of datacenters by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cyber security and digital forensic practitioners.
Topics
Digital Forensics, Computer Security, Cloud Computing
57.
 
UBICNET 2017 — EAI International Conference on Ubiquitous Communications and Network Computing
ID
845340
Dates
03 Aug 2017 - 05 Aug 2017
Location
Bangalore, India
Abstract
Ubiquitous Communications and Network Computing (UBICNET) are revolutionary concept that aim to provide pervasive and reliable communication and computing services available anytime and anywhere. UBICNET has drawn significant interests from both academia and industry and continues to attract tremendous research efforts due to its promising new business opportunity in information technology and engineering. Ubiquitous communication and computing is the growing trend and became one of the requirements for most of the people around the globe. While ubiquitous communication ensures communication anywhere with anyone, ubiquitous computing devices are completely connected and constantly available. Ubiquitous network computing relies on the convergence of wireless technologies, advanced electronics and Internet and what we can call it as Internet of Things (IoT). This emerging technology is built upon a wide range of key areas including wireless and sensor networks, mobile and distributed computing, embedded systems, IoT, agent technologies, autonomic communication, and information security.
Contact
European Alliance for Innovation;     Email: lenka.oravska@eai.eu
Topics
Topics: Advanced Communications Next Generation Networks Wireless Access Technologies Networked Sensing, and Applications Heterogeneous Networks Cognitive radio Software Defined Networks Virtualization Soft Computing Sensor Networks Mobile Systems and Applications Mobile Data Management and Analytics Mobile Multimedia Mobile User Interfaces and Interaction Technologies Energy Aware Mobile Computing Mobile Cloud Computing Smart and Intelligent Devices Networks Computing Distributed Computing Localization and Tracking Internet of Things – Systems, Data Analytics, and Applications Crowdsourcing – Platforms and Applications Wearable Computing Body Area Networks Security and Privacy
58.
 
DSC — 2017 IEEE Conference on Dependable and Secure Computing
ID
837798
Dates
07 Aug 2017 - 10 Aug 2017
Location
Taipei, Taiwan
Abstract
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems.
Related subject(s)
59.
 
Crypto — Crypto 2017
ID
866748
Dates
20 Aug 2017 - 24 Aug 2017
Location
Santa Barbara, United States
60.
 
CSF — 2017 IEEE 30th Computer Security Foundations Symposium
ID
849102
Dates
21 Aug 2017 - 25 Aug 2017
Location
Santa Barbara, CA, United States
Abstract
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security.
61.
 
TrustBus 2017 — 14th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS
ID
883194
Dates
28 Aug 2017 - 31 Aug 2017
Location
Lyon, France
Abstract
TrustBus’17 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to security, trust and privacy.
Topics
security, privacy, trust, anonymity, business, digital, cryptography
62.
 
S-CI 2017 — International Workshop on Securing Critical Infrastructures to be held in conjunction with the ARES EU Projects Symposium 2017, held at ARES 2017
ID
883147
Start date
29 Aug 2017
Location
Reggio Calabria, Italy
Abstract
Critical Infrastructures (Communication, Transportation, Banking, e-Commerce, Utilities etc) increasingly and inextricably depend on IT-technologies to provide for both functionality and efficiency. However, the cost of the IT-reliance is the consequent exposure of the Critical Infrastructure (CI) to IT-based security vulnerabilities. The state of the practice often has different CI’s developing customized security solutions to meet their specific needs. While this is judicious, the CI’s can benefit from sharing approaches to intrusion detection, threat classification, diagnostics, mitigation schema, security architectures and many others. The workshop aims to bring together viewpoints from diverse CI’s to explore the commonalities of security problems and solutions for advancing the collective science and practice of CI security protection.
Contact
Apostolos Fournaris;     Email: apofour@ece.upatras.gr
Topics
Security requirements, Threat models for critical infrastructures and communication networks, Threat detection, classification and profiling, Incident management, Security architectures and frameworks for critical infrastructures, Risk assessment – co-mingling of safety and security, Security validation, Experience reports and best practices from different infrastructure domains, Data sharing
63.
 
ARES 2017 — The 12th International Conference on Availability, Reliability and Security
ID
875996
Dates
29 Aug 2017 - 01 Sep 2017
Location
Reggio Calabria, Austria
Abstract
The 12th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
Contact
Bettina Bauer;     Email: bbauer@sba-research.org
Topics
Authorization, Authentication, and Access Control Availability, Dependability, and Resilience Botnets and Botnet Monitoring Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications Dependability Aspects of e-Government Dependability and Resilience in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding and Steganograhpy Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues related to Security and Privacy Mobile Security Network and Organizational Vulnerability Analysis Network Security Privacy-Enhancing Technologies Process based Security Models and Methods Resilience and Security for Critical Infrastructures Resilience of Computing Systems Resilience, Security, and Privacy for Smart Grids Resilience, Security, and Privacy for the Internet of Things RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security and Privacy for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management Wireless Security
64.
 
IWSEC 2017 — The 12th International Workshop on Security
ID
854590
Dates
30 Aug 2017 - 01 Sep 2017
Location
Hiroshima, Japan
Abstract
IWSEC (International Workshop on Security) is organized by ISEC (Information Security) and CSEC (Computer Security Group). ISEC is a technical group on information security of IEICE (The Institute of Electronics, Information and Communication Engineers) and CSEC is SIG (Special Interest Groups) of IPSJ (Information Processing Society of Japan).
Contact
Email: iwsec2017-inquiry@klab.is.sci.toho-u.ac.jp
Topics
Big Data Analysis for Security, Critical Infrastructure Security, Cryptanalysis, Cryptographic Protocols, Cybersecurity Economics, Digital Forensics, Enriched Cryptography, Financial Security, Formal Methods, Information Law and Ethics, IoT security, Machine Learning for Security, Malware Countermeasures, Measurements for Cybersecurity, Multiparty Computation, Post Quantum Cryptography, Privacy Preserving, Rational Cryptography, Real World Cryptography, Security Management, Visualization for Security
65.
 
RCD 2017 — 4th Romanian Cryptology Days Conference
ID
866692
Dates
18 Sep 2017 - 20 Sep 2017
Location
Bucharest, Romania
66.
 
QCrypt'17 — 7th international conference on quantum cryptography
ID
866680
Dates
18 Sep 2017 - 22 Sep 2017
Location
Cambridge, United Kingdom
Event website
67.
 
SecDev — 2017 IEEE Cybersecurity Development
ID
872491
Dates
24 Sep 2017 - 26 Sep 2017
Location
Cambridge, MA, United States
Abstract
EEE Cybersecurity Development (SecDev) is a new venue for presenting ideas, research, and experience about how to develop secure systems. SecDev is distinguished by its focus on how to “build security in” (and not simply discover the absence of security). Its goal is to encourage and disseminate ideas for secure system development among both academia and industry. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. We anticipate that attendees from academic conferences like IEEE S&P, USENIX Security, PLDI, FSE, ISSTA, SOUPS, and many others could contribute ideas to SecDev, as could attendees of industrial conferences like AppSec, RSA, Black Hat, and Shmoocon.
Event website
68.
 
CHES 2017 — Cryptographic Hardware and Embedded Systems 2017
ID
866767
Dates
25 Sep 2017 - 28 Sep 2017
Location
Taipei, Taiwan
69.
 
CNS — 2017 IEEE Conference on Communications and Network Security
ID
843416
Dates
09 Oct 2017 - 11 Oct 2017
Location
Las Vegas, NV, United States
Abstract
IEEE Conference on Communications and Network Security (CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security.
70.
 
Cyber Security Chicago
ID
874984
Dates
18 Oct 2017 - 19 Oct 2017
Location
McCormick Place, Chicago, United States
Abstract
Cyber Security Chicago offers invaluable security insight for both IT managers & security specialists. Hear from cyber securities finest on how you can build stronger defenses against cyber-attacks & how to recover if your systems are breached. Cyber Security Chicago allows you access to a wealth of insight and solutions to help you protect your employees, organization and country from criminal gangs and cyber terrorism. Learn from industry experts at thought-provoking seminars and discover solutions on all facets of cyber security and risk mitigation, from perimeter firewalls to the latest threat intelligence solutions. Attendees will have the unique opportunity to network with IT security visionaries and practitioners that are changing the face of cybersecurity. Don’t miss your chance to attend this industry leading event series.
Topics
Cyber Security Chicago, Cyber-attacks, Cyber criminals, Cyber terrorism, Cyber terrorist
71.
 
ProvSec 2017 — The 11th International Conference on Provable Security
ID
866744
Dates
23 Oct 2017 - 25 Oct 2017
Location
Xi'an, China
72.
 
DASC 2017 — The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
ID
853083
Dates
06 Nov 2017 - 10 Nov 2017
Location
Orlando, Florida, United States
Abstract
IEEE DASC 2017 will be held in November 6-10, 2017 in Orlando, Florida, USA, co-located with CyberSciTech 2017, IEEE DataCom 2017 and IEEE PiCom 2017 (the event location is very close to the Walt Disney World, which is in walking distance). IEEE DASC 2017 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems.
Topics
Autonomic Computing Theory, Models, Architectures and Communications, Cloud Computing and Fog/edge Computing with Autonomic and Trusted Environment, Dependable Automatic Control Techniques and Systems, Dependability Models and Evaluation Algorithms, Dependable Sensors, Devices, Embedded Systems, Dependable Electronic-Mechanical Systems, Optic-Electronic Systems, Self-improvement in Dependable Systems, Self-healing, Self-protection and Fault-tolerant Systems, Hardware and Software Reliability, Verification and Testing, Software Engineering for Dependable Systems, Safety-critical Systems in Transportation and Power System, Security Models and Quantifications, Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS, Self-protection and Intrusion-detection in Security, DRM, Watermarking Technology, IP Protection, Context-aware Access Control, Virus Detections and Anti-Virus Techniques/Software, Cyber Attack, Crime and Cyber War, Human Interaction with Trusted and Autonomic Computing Systems, Security, Dependability and Autonomic Issues in Ubiquitous Computing, Security, Dependability and Autonomic Issues in Cyber-Physical System, Security, Dependability and Autonomic Issues in Big Data, SDN, and IoT Systems, QoS in Communications and Services, Information and System Security, Reliable Computing and Trusted Computing, Wireless Emergency and Security Systems, Information Technology in Biomedicine, Multimedia Security Issues over Mobile and Wireless Networks, Multimedia in Mobile Computing: Issues, System Design and Performance Evaluation, Software Architectures and Design for Emerging Systems, Software Engineering for Emerging Networks, Systems, and Mobile Systems
73.
 
Cyber Security (SCSC — Cyber Security Conclave - India's two-day Cyber Security Event
ID
872985
Dates
22 Nov 2017 - 23 Nov 2017
Location
Hyderabad, India
Contact
Srinivas Rao;     Phone: [+91 40 2311 9888 \ 6522 1616];     Email: srao@kenes-exhibitions.com
Topics
Protection, Business protection, internal and external Cyber Threats, Mitigation risk, people and financial performance, Understanding the holistic nature of Cyber Security, cyber security, cyber and the political context, Sharing situational awareness of the Threats, cyber threads, Gain knowledge of legislation, compliance requirements, consequences of breaches, Knowing best practice strategy and policies, understanding Cyber Security roles and responsibilities throughout the organization, Cyber Security optimization
Related subject(s)
74.
 
ISPEC 2017 — 13th International Conference on Information Security Practice and Experience
ID
866754
Dates
29 Nov 2017 - 01 Dec 2017
Location
Melbourne, Austria
Abstract
The 13th International Conference on Information Security Practice and Experience (ISPEC 2017) will be held in Melbourne on 29 Nov - 01 Dec 2017, organised by Deakin University and Monash University. The ISPEC conference is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
75.
 
ICAC3 — 2017 International Conference on Advances in Computing, Communication and Control
ID
856220
Dates
01 Dec 2017 - 02 Dec 2017
Location
Mumbai, India
Abstract
Network Security:• Mobile Network Security • Security in CDN (Contents Distribution Networks) • Virtual Private Network (VPN) • Security in Grid • Transport-Level Security • Wireless Network Security • IP Security • Electronic Mail security • Security Protocols • Cryptographic Technologies • Block and Stream Ciphers • Public Key Cryptology • Message Authentication and Hash Functions • Digital Signature Schemes • Secret Sharing • Cryptanalysis • Novel Biometric Methods • Bio inspired Security methods • Digital Forensic • Biometrics for Security • Feature Extraction and pattern Matching Algorithms • Embedded Systems Security • Side Channel Attacks • Fault Attacks • Hardware Tamper Resistance • Secure Storage Devices • Firewall Systems • Hacking Techniques and Related Issues • Intrusion Detection System (IDS) • Honey-pot • Self replicating algorithms • Malware Analysis • Intrusion Detection • Denial of service issues • Trust networks on semantic web • Self recovery algorithms
76.
 
ICITST-2017 — The 12th International Conference for Internet Technology and Secured Transactions
ID
878971
Dates
11 Dec 2017 - 14 Dec 2017
Location
Cambridge, United Kingdom
Contact
Holly Green;     Phone: [01268 523262];     Email: info@icitst.org
Topics
Curriculum, Research and Development, Educational Foundations, Learning, Teaching Methodologies, Assessment, Pedagogy
Related subject(s)
Event website
77.
 
SP — 2018 IEEE Symposium on Security and Privacy
ID
838378
Dates
20 May 2018 - 24 May 2018
Location
San Francisco, CA, United States
Abstract
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
78.
 
Crypto 2018
ID
866808
Dates
19 Aug 2018 - 23 Aug 2018
Location
Santa Barbara, United States
79.
 
SecDev — 2018 IEEE Cybersecurity Development
ID
872126
Dates
23 Sep 2018 - 25 Sep 2018
Location
Cambridge, MA, United States
Abstract
IEEE Cybersecurity Development (SecDev) is a new venue for presenting ideas, research, and experience about how to develop secure systems. SecDev is distinguished by its focus on how to "build security in" (and not simply discover the absence of security). Its goal is to encourage and disseminate ideas for secure system development among both academia and industry. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. We anticipate that attendees from academic conferences like IEEE S&P, USENIX Security, PLDI, FSE, ISSTA, SOUPS, and many others could contribute ideas to SecDev, as could attendees of industrial conferences like AppSec, RSA, Black Hat, and Shmoocon.
Event website
80.
 
SP — 2019 IEEE Symposium on Security and Privacy
ID
856705
Dates
19 May 2019 - 23 May 2019
Location
San Francisco, CA, United States
Abstract
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
81.
 
Crypto 2019
ID
866807
Dates
18 Aug 2019 - 22 Aug 2019
Location
Santa Barbara, United States
Future Armoured Vehicles Situational Awareness 2017

Good to know...

You can advertise your event or services in this space.

Last updated: 19 March 2017