Events Search and Views Navigation
Past Events › Cybersecurity Conference
Events List Navigation
Join your industry colleagues for three days of networking and one-of-a-kind partnership opportunities. Whether you want to learn more about updates in the payment industry or showcase a new product, you?ll find it all at the 2017 Community Meetings.
Find out more »The Executive Alliance regional Security Leaders Summits, National Symposiums, and Custom Dinners are the premier events across the U.S. that bring together the most successful leaders in the technology industry. The exclusive programs offer peer-level interaction across industries with a big-picture focus on driving change as well as new approaches to managing complexities in today?s environment. The relaxed atmosphere allows an extraordinary opportunity for senior level executives to collaborate and innovate with peers through presentations, interviews, breakout roundtable discussions and…
Find out more »The Cloud Security Summit, is an invite-only, half-day event supported by Amazon Web Services, focused on unpacking the challenges and key security considerations for organizations with application workloads in (or moving to) the AWS cloud. This event features valuable sessions led by cloud security experts, AWS security architects, and senior security and technology leaders from organizations who have successfully made their journey to the cloud
Find out more »SEC-T is an affordable, non-profit, English speaking, two day, single track information security/hacking conference taking place in late summer every year in Stockholm, Sweden. At SEC-T we focus on providing our audience with high quality talks and in depth ?QnA? with speakers. SEC-T is a conference where you can feel safe from sales pitches and marketing presentations as we have a large focus on our speakers research and first person accounts. SEC-T is also a conference that opts to pay…
Find out more »Cyber Security has become the technology sector?s hottest topic and the biggest fear for large numbers of UK-based businesses. With so much coverage produced across multiple mediums of communication and newly self appointed GDPR ?experts?, we ask : how much of this is fake news?
Find out more »Our major goal is to gather all the communities from the region and abroad so we can socialize, hack, play, learn, exchange knowledge and experience and of course, party together. BalCCon aims to become the center of the hacker community in the region as well as to provide an opportunity for all the people in this part of Europe to connect and to cooperate. Program and speakers will be taken through a ?Call for Papers? few months before the congress.…
Find out more »Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, Sguil, Squert, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
Find out more »This is a computer security event that was born from The DragonJAR Community to promote this theme in Colombia and kindly invite anyone interested in showing and sharing their research and / or Developments in the field of Information Security to participate in the event. The unique characteristics of the DragonJAR Security Conference, such as the quality of its speakers, all Spanish-speaking, Trainings (offensive computer security diplomas), alternative events (such as CTF / contests) and staging make DragonJAR Security Conference…
Find out more »The Open Source Intelligence course will expose participants to a wide variety of open source intelligence tools, methodologies and technologies. Upon completion of the course participants will be able to undertake advanced internet searches, website evaluation and vetting, advanced people searches and image analysis. Further participants will be familiarised with deep/dark web technologies, threats within the cyber environment and open source intelligence collection and implementation methodologies.
Find out more »One of the premier gathering of security, risk management and business continuity management leaders, Gartner Security & Risk Management Summit 2017 delivers the insight you need to guide your organization to a secure digital business future. The comprehensive agenda addresses the latest threats, flexible new security architectures, governance strategies, the chief information security officer role and more. This event is a unique opportunity to reinvent your approach to security and risk for the digital age, based on Gartner?s trusted independent…
Find out more »Blending the unique opportunity to network and benchmark with peers in a closed door environment the Noord InfoSec Dialogue also provides a platform to meet with the right solution partners that will drive your information security strategy forward.
Find out more »Interconnecting IT and Automation offers great opportunities for the operation of industrial production sites and critical infrastructures. However, this may carry along some complex risks. With the title ?IT meets Industry? the IMI 2017 brings together the ICS- and IT-Community.
Find out more »You are invited to participate in The Fourth International Conference on Artificial Intelligence and Pattern Recognition (AIPR2017) that will be held in Lodz, Poland on September 18-20, 2017. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
Find out more »2017 will provide insight into how the industry can further develop organisational priorities, effective methodologies, educate procurement, ensure supply chain security and how to incorporate security throughout the ICS lifecycle through the engineering process by developing appropriate security measures in the specification, operation and design.
Find out more »C5 are delighted to introduce a two-day, tailored event specifically designed for Chief Information Officers to Insider Threat analysts to help support your organisation?s insider threat strategy. Insider threats are among the most difficult for organisations to detect and stop and many are unaware that their security vulnerabilities within the enterprise results in a major breach.
Find out more »