arizona

SecureCISO Phoenix

On February 13th, 60 InfoSec Leaders walk into a collaboration attended by the largest enterprises and brands within Phoenix; a day of thought-leading exchange as we examine directions from within the Office of the CISO; all under the umbrella of riveting keynotes, revealing panels, engaging round-tables and unparalleled networking.

Phoenix CyberSecurity Conference

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, […]

Data Connectors Phoenix (Cybersecurity)

The Phoenix Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You’ll come away with […]

Airobotics Selects Arizona To Expand Its Data-Driven Automated Drone Solution

Leading Israeli automated drone startup Airobotics launched its North American headquarters in Scottsdale, Arizona, where they will run all North America, South America and Central America operations. Airobotics has created the only data-driven, fully automated solution enabling a new dimension of data collection and insights. The company is headquartered in Israel and has offices in Australia, as well as additional operations in Chile and New Caledonia. The Scottsdale office is intended to become the company’s global headquarters as Airobotics continues to scale.

CSO50 Conference Awards

If you live and work in Arizona then this event would be an excellent idea to attend, not least for the career networking opportunities.

SANS Scottsdale 2018

Our mission at SANS is to deliver cutting-edge information security knowledge and skills to all students in order to protect people and assets. At the heart of everything we do is the SANS Promise: Students will be able to use the new skills they have learned as soon as they return to work. See that […]

FloCon 2018

FloCon provides a forum for exploring large-scale, next-generation data analytics in support of security operations.

NH-ISAC Cyber Rodeo Fall Summit

Can a security team gain traction while battling with other departments for IT budgets? If there is a breach who gets blamed? Is not having enough resources an acceptable alibi? A constant theme is juggling needs with budgets and corporate strategies. Beyond the obvious need to share and increase the resiliency of our sector, there […]

Data Connectors Phoenix Tech-Security

The Phoenix Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You’ll come away […]

15th Annual Executive Women’s Forum National Conference

Join us October 24-26, 2017 as we focus on the most complex and critical issues facing companies globally in the fields of Information Security, Risk Management and Privacy. The Executive Women’s Forum Annual Conference provides the most comprehensive and unbiased overview of the current industry landscape for women executive business decision-makers. The Executive Women’s Forum […]

15th Annual Executive Women’s Forum National Conference

We are delighted to add this event to our ever-growing directory: 15th Annual EWF National Conference: Thrive In The Era Of Volatility, Uncertainty And Ambiguity: Cybersecurity, Risk and Leadership Solutions. Join the team this October 24 – 26, 2017 as they focus on the most complex and critical issues facing companies globally in the fields […]

2017 IEEE Symposium on Visualization for Cyber Security (VizSec)

The IEEE Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad […]

CactusCon (CFP AZ, United States)

CactusCon is the largest annual hacker and security conference in Arizona and this year is expected to attract 800 attendees from throughout the entire country. In just five years, it has established a solid reputation as a top-tier security conference and has quickly become a must-attend learning and networking event.

The Border’s New Boundaries, Part I: Digital Towers

In a dim, low ceiling room, federal agents and private contractors are testing the feed coming off cameras erected along the southeastern Arizona border. It’s a subdued project when you consider the magnitude of the goal: eyes and ears watching every movement along the U.S.-Mexico border 24 hours, seven days a week. The Customs and Border Protection agency uses two types of towers: integrated fixed towers (IFT), which use ground sensor surveillance in rural parts of the Mexican border, and remote video surveillance systems, which are used in urban areas where legal traffic is heavy enough to render ground sensors useless. The agency currently uses eight of the IFTs in southeastern Arizona and 11 of the remote video systems. It’s called the Arizona Border Surveillance Technology Plan; and it’s a network of these towers, cameras mounted on pickup trucks and backpack surveillance systems that can be hiked into the desert and dug into the ground.

CSO50 Conference + Awards

Find out what award-winning organizations are doing at the CSO50 Conference + Awards, taking place May 1-3, 2017 at The Scottsdale Resort at McCormick Ranch in Scottsdale, Arizona.

7th ACM Conference on Data and Applications Security and Privacy

With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an […]

(ISC)² SecurePhoenix17

Information Security, as a function, sits at a great confluence of raw unfiltered data; perhaps more data about the enterprise than any other function of the organization. From state-based data such as vulnerability scan results, to event-based data such as IDS logs, we are collecting more and more information about the enterprise every passing day.