Events Search and Views Navigation
Past Events › Conference
Events List Navigation
More than 2,500 security and law enforcement professionals from across the Northeast will come together, June 7-8, at the ASIS New York City Security Conference and Expo.
Find out more »This conference offers something for everyone?whether you?re an end user, IT professional, government employee, or business owner. Join more than 1,200 of your colleagues from the public and private sectors who attend this conference. Hear from leading experts in the industry and participate in engaging sessions that provide real-world information you can apply immediately in minimizing the cyber risks in your own environment.
Find out more »CircleCityCon is about the community. Its signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Two tracks, incredible entertainment, and technical villages help round out the CircleCityCom experience. Of course, don?t forget the chance to meet and talk with your peers about all topics including security and hacking.
Find out more »The yearly FIRST Conference promotes worldwide cooperation among Computer Security Incident Response Teams (CSIRTs). The conference gives a forum for ideas, ideas and information on how to improve global computer security.
Find out more »The premier gathering of security, risk management and business continuity management leaders, Gartner Security & Risk Management Summit 2017 delivers the insight you need to guide your organization to a secure digital business future. The comprehensive agenda addresses the latest threats, flexible new security architectures, governance strategies, the chief information security officer role and more. It?s a unique opportunity to reinvent your approach to security and risk for the digital age, based on Gartner?s trusted independent research and practical recommendations.
Find out more »Ignite is one of the biggest gathering of next-generation security experts on the planet. The whole community of attendees will include numerous security industry experts, Palo Alto Networks product experts and some of the of the most experienced Palo Alto Networks customers exhibiting their stories to help you address your hardest security challenges, share best practices, give hands-on training, highlight new developments, and a lot more.
Find out more »SC Congress is a dynamic conference and expo experience amplifying the latest in cyber security for CISO's, CTO's, and industry professionals. Our keynote addresses and breakout sessions feature industry thought leaders who share their insights and analysis on best methods for safeguarding your organization. Our robust exhibit hall houses come of the most innovative brands in information security showcasing the newest technologies.
Find out more »The U.S. Defense Information Systems Agency?s new operational role in the cyber domain as network defender creates a formal relationship between DISA, U.S. Cyber Command and the command?s military service components. The goal is to improve security, but a successful strategy depends on a matrix of participating organizations adapting technical solutions and adopting enterprise management to improve efficiency, security and reliability.
Find out more »The Credit Union InfoSecurity Conference is the credit union movement?s top infosecurity event. Only here can you connect with the brightest, most engaged security-oriented community in the movement that will help you protect what matters most.
Find out more »The Vancouver Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You?ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference…
Find out more »Whether it?s Software as a Service (SaaS), Infrastructure as a Service (IaaS) or Platform as a Service (PaaS), cloud computing has been with us long before the media had a catchy name for it. Join this session to learn how cloud security has evolved and what that means to varied environments. You?ll learn practical and actionable advice from the field that you can take back to your organization and begin using immediately, building on the collective experience of your profession.
Find out more »The Cornerstones of Trust conference helps security leaders and security practitioners evaluate trends and develop responses to the challenges like increasing cost pressures, rising compliance complexity, changing threat landscape and emerging technology disruptors.
Find out more »The definition of cybersecurity, and what it means to be protected in a virtual environment, is constantly evolving. For the defense sector protecting the Nations secrets, new technologies, and personnel, is a no-fail mission and takes relentless vigilance. Everyday tens of thousands of cyber attacks are initiated world wide, with a vast majority of them aimed at the United States and her allies. If even a single one of these attacks are successful, the effects could potentially be devastating.
Find out more »The Philadelphia Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You?ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference…
Find out more »Development of new technologies thrown up new kinds of dangers for companies and end users. Most of time, attackers aim to gain full access on victim?s private systems, this operation is also known as ?Be root? or ?Have a rooted system?.
Find out more »