COMS

Calendar of upcoming scientific conferences

Home | Conference Management System | Conference Listings | Advertise | Contact | About
German French English
You are in: HomeConference ListingsInformatics → Information Security and information privacy

Conference Management Software

Our Conference Management Software (COMS) can be used for online:

  • registration
  • payment
  • paper submission
  • review process
  • paper selection
  • production of the book of abstracts

Read more ...
Try our demo online

Conferences and Meetings on Information Security and information privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.Digital ID World Asia 2014
 Dates 23 Apr 2014 → 24 Apr 2014
[ID=567979] Go to top of page
 LocationSingapore, Singapore
 Abstract Digital ID World is a 2-day trade expo and premium conference dedicated to enterprises, governments and various industry verticals involved in the planning, design and implementation of digital identification and information security projects.
 Weblink http://www.terrapinn.com/2014/digital-id-world-asia/
 Contact Christine Lee; Phone: [6563222301]; Email: christine.lee@terrapinn.com
 Related subject(s) e-Business, e-Government; Human-Computer Interaction
  
2.Digital Signage World Asia 2014
 Dates 23 Apr 2014 → 24 Apr 2014
[ID=567931] Go to top of page
 LocationSingapore, Singapore
 Abstract Digital Signage World Asia is the strategic event that brings together end-users from all key vertical markets such as education, entertainment and venues, travel and hospitality, healthcare, banking, media and advertising with top-notch digital signage solution providers. With DOOH advertising growing in Asia, Digital Signage World Asia 2014 will be the one-stop place for you to showcase your technologies and educate potential clients on the benefits of your energy-efficient solutions. Digital Signage World Asia will be co-located with Retail World Asia and e-Commerce Show Asi.
 Weblink http://www.terrapinn.com/2014/digital-signage-world-asia/
 Contact Christine Lee; Phone: [6563222301]; Email: christine.lee@terrapinn.com
 Related subject(s) e-Business, e-Government
  
3.SANS Abu Dhabi 2014
 Dates 26 Apr 2014 → 01 May 2014
[ID=606069] Go to top of page
 LocationAbu Dhabi, United Arab Emirates
 Topics computers, computing, information security, information technology, forensics, network forensics, mobile devices, mobile device security, hacking, ethical hacking
 Weblink http://www.sans.org/info/146280
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
4.US Cyber Crime Conference
 Dates 27 Apr 2014 → 28 Apr 2014
[ID=613633] Go to top of page
 LocationLeesburg, United States
 Abstract The U.S. Cyber Crime Conference is continuing the 12 year tradition of success established by the former DoD Cyber Crime Conference. To keep up with the global cyber threat, the conference is expanding its objective and direction to empower the civilian, defense, and government digital forensics communities (legal, IT, and Criminal Investigative) to team together in the battle against cyber crime.
 Topics information security, information technology, legal, IT, criminal investigation, network forensics, forensics, smartphone, smartphone forensics, cyber security, cyber crime
 Weblink http://www.sans.org/info/152802
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
5.SANS Austin 2014
 Dates 28 Apr 2014 → 03 May 2014
[ID=592938] Go to top of page
 LocationAustin, United States
 Abstract We invite you to SANS Austin 2014 starting in late April. You will find security and forensics courses taught by real-world practitioners who are the best at ensuring you not only learn the material, but that you can apply it immediately when you return to the office.
 Topics computers, computing, information security, security, intrusion detection, hacking, exploits, incident handling, auditing
 Weblink http://www.sans.org/info/146285
 Contact SANS Institute ; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
6.CyberSec — 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic
 Dates 29 Apr 2014 → 01 May 2014
[ID=596717] Go to top of page
 LocationBeirut, Lebanon
 Abstract The conference covers topics concerning Cyber Security, Digital Forensic, Information Assurance and Security Management, Cyber Peacefare and Physical Security. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
 Weblink http://sdiwc.net/conferences/2014/cybersec2014/
  
7.Security Leadership Summit 2014
 Dates 30 Apr 2014 → 07 May 2014
[ID=606024] Go to top of page
 LocationBoston, United States
 Topics computers, computing, security, information security, information technology, auditing, leadership, management, incident response
 Weblink http://www.sans.org/info/148350
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
8.ISPEC '14 — 10th Information Security Practice & Experience Conference
 Dates 02 May 2014 → 04 May 2014
[ID=562186] Go to top of page
 LocationFuzhou, China
 Weblink http://icsd.i2r.a-star.edu.sg/ispec2014
  
9.HOST — IEEE International Symposium on Hardware-Oriented Security and Trust
 Dates 06 May 2014 → 07 May 2014
[ID=583456] Go to top of page
 LocationGreater DC Area, United States
 Weblink http://www.hostsymposium.org
  
10.SANS Security West 2014
 Dates 10 May 2014 → 15 May 2014
[ID=592915] Go to top of page
 LocationSan Diego, United States
 Abstract We are pleased to invite you to San Diego on May 10-15 for the best security training money can buy! SANS Security West 2014 will focus on emerging trends and will feature related evening talks and a star-studded panel discussion. We are also bringing new cutting-edge courses and many that are associated with GIAC Certifications.
 Topics computing, computers, security, information security, exploits, intrusion detection, smartphones, forensics, smartphone forensics, network forensics, hacking, exploits, incident handling, malware, Windows, auditing, mobile device security, mobile devices
 Weblink http://www.sans.org/info/146290
 Contact SANS Institute ; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
11.JNS4 — 2014 4th Edition of National Security Days
 Dates 12 May 2014 → 13 May 2014
[ID=617859] Go to top of page
 LocationTetuan, Morocco
 Abstract The 4th Edition of National Security Days ( JNS'4 ) aims to bring together researchers, developers, and practitioners from academia and industry sectors working in the field of computer security. It gives an excellent opportunity to exchange expertise, present and evaluate results of ongoing research. JNS is an annual event that aims to provide an appropriate environment to forge collaborations between different stakeholders interested by the development of system security in Morocco and abroad.
 Weblink http://www.uae.ma/jns4/
  
12.KCSF2014 — Kingdom Cyber Security Forum
 Dates 12 May 2014 → 13 May 2014
[ID=609110] Go to top of page
 LocationRiyadh, Saudi Arabia
 Topics cyber security, cyber hacking, cyber security summit,
 Weblink http://security.fleminggulf.com/kingdom-cyber-security
 Contact Mohammed Raiyan; Phone: [919742750289]; Email: mohammed.raiyan@fleminggulf.com
  
13.ISPEC '14 — Information Security Practice & Experience Conference
 Dates 12 May 2014 → 14 May 2014
[ID=583487] Go to top of page
 LocationFuzhou, China
 Weblink http://icsd.i2r.a-star.edu.sg/ispec2014/
  
14.ICS410 London 2014
 Dates 12 May 2014 → 16 May 2014
[ID=614366] Go to top of page
 LocationLondon, United Kingdom
 Topics information security, information technology, SCADA
 Weblink http://www.sans.org/info/153797
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
15.SANS — SANS Melbourne 2014
 Dates 12 May 2014 → 17 May 2014
[ID=606045] Go to top of page
 LocationMelbourne, Australia
 Topics computers, computing, security, information security, penetration testing, hacking, forensics, networking, networks, network forensics
 Weblink http://www.sans.org/info/146295
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
16.Malaysia @MCMC 2014
 Dates 12 May 2014 → 24 May 2014
[ID=612622] Go to top of page
 LocationCyberjaya, Malaysia
 Abstract This year's event will feature IT security, pen testing, and forensics courses offered over two weeks. This would allow you to take two courses!
 Topics information security, penetration testing, hacking, ethical hacking, forensics, incident response, advanced forensics
 Weblink http://www.sans.org/info/146300
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
17.SANS Secure Europe 2014
 Dates 12 May 2014 → 24 May 2014
[ID=578521] Go to top of page
 LocationAmsterdam, Netherlands
 Topics computers, computing, security, information security, virtualization, cloud security, web apps, penetration testing, hacking, exploits
 Weblink http://www.sans.org/info/141895
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
18.INFILTRATE 2014 — Exclusively Offensive Security Conference
 Dates 15 May 2014 → 16 May 2014
[ID=599728] Go to top of page
 LocationMiami Beach, United States
 Abstract INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.
 Topics Information Security, Offensive, Computer Security,
 Weblink http://infiltratecon.com/register.html
  
19.WISSE 2014 — Fourth International Workshop on Information Systems Security Engineering
 Start date17 May 2014
[ID=590191] Go to top of page
 LocationThessaloniki, Greece
 Abstract As modern Information systems support significant areas of the human society, which require storage and processing of sensitive personal and organisational information, security problems of information systems are currently a widespread and growing concern. The scientific community has realized the importance of aligning information systems engineering and security engineering in order to develop more secure information systems. The International Workshop on Information System Security Engineering aims to provide a forum for researchers and practitioners to present, discuss and debate on one hand the latest research work on methods, models, practices and tools for secure information systems engineering, and on the other hand relevant industrial applications, recurring challenges, problems and industrial led solutions at the area of secure information systems engineering.
 Topics Secure Information system, security engineering, privacy, Anonymity, access control, Availability, Confidentiality, Integrity, Accountability
 Weblink http://gsya.esi.uclm.es/WISSE2014/
 Contact Email: lammari@cnam.fr
  
20.SPW — 2014 IEEE Security and Privacy Workshops
 Dates 17 May 2014 → 18 May 2014
[ID=617882] Go to top of page
 LocationSan Jose, California, United States
 Abstract SPW supports up to six workshops, each of which will cover a specific aspect of security or privacy and provide opportunities for focused technical exchanges among participants.
 Weblink http://www.ieee-security.org/TC/SPW2014/
  
21.SANS Bahrain 2014
 Dates 17 May 2014 → 22 May 2014
[ID=614693] Go to top of page
 LocationManama, Bahrain
 Topics information security, information technology
 Weblink http://www.sans.org/info/154222
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
22.SP — 2014 IEEE Symposium on Security and Privacy
 Dates 18 May 2014 → 21 May 2014
[ID=573314] Go to top of page
 LocationSan Jose, California, United States
 Abstract IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.
 Weblink http://www.ieee-security.org/TC/SP2014
  
23.Cyber Resilience essential for Infrastructure
 Dates 19 May 2014 → 21 May 2014
[ID=616689] Go to top of page
 LocationRiyadh, Saudi Arabia
 Abstract Cyber Resilience is about ideas of defense and prevention but goes beyond those measures to emphasize response and resilience in moments of crisis. This could mean focussing energy and resources on the cyber risks that truly could generate a business impact, and on the metrics that will provide insights and warnings about those risks.
 Topics cyber security, cyber resilience, malware, spyware, threats, network security
 Weblink http://www.archler.com
 Related subject(s) Training in Computer Science
  
24.SANS Delhi 2014
 Dates 19 May 2014 → 31 May 2014
[ID=606011] Go to top of page
 LocationGurgaon, India
 Topics computers, computing, security, information security, forensics, smartphones, smartphone forensics, virtualization, cloud security, cloud computing
 Weblink http://www.sans.org/info/147705
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
25.PHDays — Positive Hack Days
 Dates 21 May 2014 → 22 May 2014
[ID=612032] Go to top of page
 LocationMoscow, Russia
 Abstract Positive Hack Days is a unique international event that successfully brings together the establishment and the underground, "suits" and "T-shirts," theory and practice, professional discussion and fascinating contests and demos. This is where representatives of government and business, information security leaders, and the world's legendary hackers come together to find new ways to survive the cyber jungle.
 Topics Information security, IT security, information privacy, hacking,
 Weblink http://www.phdays.com
 Contact phd@ptsecurity.com
  
26.Annual Security Conference — Annual Security Conference
 Dates 21 May 2014 → 23 May 2014
[ID=574245] Go to top of page
 LocationLas Vegas, Nevada, United States
 Abstract The nature and scope of the Information Security field is evolving. We are no longer are we just concerned with protecting the technical edifice. Our emphasis has become more holistic, and we tend to consider both the organizational and technical aspects of information protection to be equally important. The Annual Security Conference, we hope, provides a forum for discourses in Security, Assurance and Privacy that will define the moment and provide a useful basis for nurturing further dialogues.
 Topics computer security, information security, cybersecurity, forensics
 Weblink http://www.security-conference.org
 Contact Gurpreet Dhillon; Phone: [8048283183]; Email: chair@security-conference.org
  
27.SANS Secure Thailand 2014
 Dates 26 May 2014 → 31 May 2014
[ID=613914] Go to top of page
 LocationBangkok, United States
 Topics information security, information technology, hacking, exploits, incident handling
 Weblink http://www.sans.org/info/146305
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
28.SEC 2014 — 29th IFIP TC11 SEC 2014 Int Conf ICT Systems Security & Privacy Protection
 Dates 02 Jun 2014 → 04 Jun 2014
[ID=583517] Go to top of page
 LocationMarrakech, Morocco
 Weblink http://www.ensa.ac.ma/sec2014/
  
29.AsiaCCS-SCC — The Second International Workshop on Security in Cloud Computing
 Start date03 Jun 2014
[ID=615424] Go to top of page
 LocationKyoto, Japan
 Weblink http://conference.cs.cityu.edu.hk/asiaccsscc/
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing
  
30.OGC — Oil and Gas Cyber Security
 Dates 03 Jun 2014 → 04 Jun 2014
[ID=620382] Go to top of page
 LocationOslo, Norway
 Abstract Oil and gas companies now are heavily investing in establishing the most comprehensive security systems for their assets and digital infrastructures, with spending set to reach $1.87 billion by 2018. Managing security of networks and wireless communication systems, as well as defending IT infrastructure from external virus attacks and internal compatibility threats is a top priority. SMi's 4th Oil and Gas Cyber Security conference will address the most pressing cyber security issues facing the oil and gas sector with key presentations delivered by senior industry figures from Total, GDF Suez, Tullow Oil, Salalah Methanol Company, Cairn India and Saudi Aramco among others. The two-day programme will build on the success of the 2013 event and discuss recent efforts to bolster protection of highly valuable intellectual property and commercially sensitive information on production, exploration plans and assets.
 Topics oil, gas, cyber, security, telecom, satellite, ICT, information, communication, technology, tech, telecommunications, comm, IT, virus, malware, SCADA, operational, attack, stuxnet, network, hardware, software, hack, threat, firewall, industrial, critical, infrastructure, application, data, risk, M2M, system
 Weblink http://www.smi-online.co.uk/oilandgas-cybersecurity64.asp
 Contact Andrew Gibbons ; Phone: [+44 (0) 20 7827 6156]; Email: agibbons@smi-online.co.uk
 Related subject(s) Petrochemistry and petrochemical industry
  
31.CyCon — 2014 6th International Conference on Cyber Conflict
 Dates 03 Jun 2014 → 06 Jun 2014
[ID=620832] Go to top of page
 LocationTallinn, Estonia
 Abstract The International Conference on Cyber Conflict is CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts . The theme of the conference is Active Cyber Defence.
 Weblink http://www.cycon.org
  
32.DFIR Summit 2014
 Dates 03 Jun 2014 → 10 Jun 2014
[ID=581737] Go to top of page
 LocationAustin, United States
 Abstract The 7th annual Forensics and Incident Response Summit will again be held in the live musical capital of the world, Austin, Texas. The Summit will focus on high quality and extremely relevant content as well as panel discussions in Digital Forensics and Incident Response. The 2014 theme is currently in development as the digital forensics and incident response community is constantly evolving and our content promises to be cutting-edge and relevant to ensure you will be able to utilize the ideas presented when you return to your organization.
 Topics computing, computers, security, information security, forensics, incident response, computer forensics, Windows, malware
 Weblink http://www.sans.org/info/143512
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
33.WASMAS 2014 - Workshop on Active Security through Multi-Agent Systems
 Dates 04 Jun 2014 → 06 Jun 2014
[ID=582871] Go to top of page
 LocationSalamanca, Spain
 Weblink http://www.paams.net/wasmas14
 Related subject(s) Software Agents
  
34.ASIACCS 2014 — 9th ACM Symposium on Information, Computer and Communications Security
 Dates 04 Jun 2014 → 06 Jun 2014
[ID=583494] Go to top of page
 LocationKyoto, Japan
 Weblink http://www2.nict.go.jp/nsri/fund/asiaccs2014/index.html
  
35.TSA — 2014 International Conference on Trustworthy Systems and their Applications
 Dates 09 Jun 2014 → 10 Jun 2014
[ID=620946] Go to top of page
 LocationTaichung, Taiwan
 Abstract The TSA 2014 conference focuses on innovative methodologies, techniques, tools, management, and applications to produce dependable and trustworthy systems and their applications in a more cost-effective way. It provides a discussion forum to bring together academic researchers, industry practitioners, and government policy and decision makers to exchange ideas and results, share experiences, and explore possible solutions to overcome current challenges.
 Weblink http://paris.utdallas.edu/tsa14
  
36.Training — SANS Rocky Mountain 2014
 Dates 09 Jun 2014 → 14 Jun 2014
[ID=611434] Go to top of page
 LocationDenver, United States
 Topics computers, computing, security, information security, information technology, intrusion detection, hacking, hacker techniques, exploits, incident handling, penetration testing, network penetration testing, auditing, mobile devices, mobile device security, forensics, computer forensics
 Weblink http://www.sans.org/info/147710
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
37.ACNS'14 — 12th International Conference on Applied Cryptography and Network Security
 Dates 10 Jun 2014 → 13 Jun 2014
[ID=583526] Go to top of page
 LocationLausanne, Switzerland
 Weblink http://acns2014.epfl.ch/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
38.IH&MMSec'14 — The 2nd Information Hiding and Multimedia Security Workshop
 Dates 11 Jun 2014 → 13 Jun 2014
[ID=574118] Go to top of page
 LocationSalzburg, Austria
 Abstract The 2nd Information Hiding and Multimedia Security Workshop focusses on both, information hiding topics such as watermarking, steganography and steganalysis, anonymity, privacy, hard-to-intercept communications, and covert/subliminal channels as well as multimedia security topics such as data hiding, robust/perceptual hashing, biometrics, video surveillance, and multimedia forensics.
 Topics Multimedia, watermarking, fingerprinting, identification, steganography, steganalysis, biometrics, forensics, security, privacy
 Weblink http://www.ihmmsec.org
 Contact Andreas Unterweger , Department of Computer Sciences , University of Salzburg ; Email: aunterweg@cosy.sbg.ac.at
 Related subject(s) Multimedia, Computer Graphics and Visualization
  
39.SANS Pen Test Berlin 2014
 Dates 15 Jun 2014 → 21 Jun 2014
[ID=612676] Go to top of page
 LocationBerlin, Germany
 Abstract SANS once again presents a world class line up of pen test training courses led by SANS' globally renowned, expert instructors. See below for full course descriptions and reserve your place by clicking Register Now. As well as the unique SANS training experience, we will also be offering a series of @Night talks and social functions.
 Topics information security, information technology, penetration testing, exploits, web apps, ethical hacking, hacking, mobile devices, mobile device security, web applications
 Weblink http://www.sans.org/info/146310
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
40.SANS Milan 2014
 Dates 16 Jun 2014 → 21 Jun 2014
[ID=613979] Go to top of page
 LocationMilan, Italy
 Topics information security, information technology, hacking, hacker techniques, exploits, incident handling
 Weblink http://www.sans.org/info/152662
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
41.SACMAT '14 — 19th ACM Symposium on Access Control Models and Technologies
 Dates 18 Jun 2014 → 19 Jun 2014
[ID=571170] Go to top of page
 LocationLondon, Canada
 Weblink http://sacmat.org
  
42.WiSec'14 — The 7th ACM Conference on Security and Privacy
 Dates 21 Jun 2014 → 25 Jun 2014
[ID=583547] Go to top of page
 LocationOxford, United Kingdom
 Weblink http://www.sigsac.org/wisec/WiSec2014/
  
43.Training — SANSFIRE 2014
 Dates 21 Jun 2014 → 30 Jun 2014
[ID=611411] Go to top of page
 LocationBaltimore, United States
 Topics computers, computing, security, information security, information technology, cybersecurity, intrusion detection, pen testing, penetration testing, smartphones, smartphone forensics, SCADA, network forensics, forensics, computer forensics, Android, Android security, hacking, hacker techniques, exploits, incident handling, Windows, IPv6, mobile devices, mobile device security, web apps, web app penetration testing, coding, incident response
 Weblink http://www.sans.org/info/150355
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
44.DigitalSec — The International Conference on Digital Security and Forensics
 Dates 24 Jun 2014 → 26 Jun 2014
[ID=583579] Go to top of page
 LocationOstrava, Czech Republic
 Abstract You are invited to participate in The International Conference on Digital Security and Forensics (DigitalSec2014) that will be held at VSB-Technical University of Ostrava, Czech Republic on June 24-26, 2014. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
 Weblink http://sdiwc.net/conferences/2014/digitsec2014/
  
45.WISTP 2014 — 8th Workshop in Information Security Theory and Practice
 Dates 30 Jun 2014 → 02 Jul 2014
[ID=615509] Go to top of page
 LocationHeraklion, Greece
 Weblink http://www.wistp.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
46.SERE — 2014 8th IEEE International Conference on Software Security and Reliability
 Dates 30 Jun 2014 → 02 Jul 2014
[ID=580084] Go to top of page
 LocationSan Francisco, CA, United States
 Abstract SERE 2014 is the eighth annual conference sponsored by the IEEE Reliability Society on Software Security and Reliability, with SE representing SEcurity and RE for Reliability. The conference draws engineers and scientists from both industry and academia to present their on-going work, relate their research outcomes and experiences, and discuss the best and most efficient techniques for the development of reliable, secure, and trustworthy systems. It not only allows the academic community to gain an increased awareness of the areas that are vital to the industry, but it also grants practitioners an opportunity to express their needs.
 Weblink http://paris.utdallas.edu/sere14
  
47.DASec 2014 — The First International Workshop on Big Data Analytics for Security
 Dates 30 Jun 2014 → 03 Jul 2014
[ID=615519] Go to top of page
 LocationMadrid, Spain
 Weblink http://www.dis.uniroma1.it/~dasec/
  
48.ECCIWS — The European Conference on Cyber Warfare and Security
 Dates 03 Jul 2014 → 04 Jul 2014
[ID=564878] Go to top of page
 LocationPiraeus, Greece
 Abstract Now in its 13th year offers a forum for academics, researchers and practitioners working in the this important field, whether at micro or macro levels. ECCWS provides a forum for discussion, exploration and development of both theoretical and practical aspects of information warfare and security and a chance to network with others working and researching in this area. As a result of an Executive Committee meeting in Jyväskylä at the 12th European Conference on i-Warfare & Security ECIW 2013 the conference name has been changed to the European Conference on Cyber Warfare and Security (ECCWS). This change was made to better reflect the language accepted and used by most people researching today.
 Topics warfare, conferences, security, iwarfare
 Weblink http://academic-conferences.org/eccws/ECCWS-home.htm
 Contact Mandy Limbrick; Phone: [+44 (0)1189 724148]; Email: mady@academic-conferences.org
  
49.ACISP 2014 — 19th Australasian Conference on Information Security and Privacy
 Dates 07 Jul 2014 → 09 Jul 2014
[ID=583512] Go to top of page
 LocationWollongong, Australia
 Weblink https://ssl.informatics.uow.edu.au/acisp2014/
  
50.Training — SANS Capital City 2014
 Dates 07 Jul 2014 → 12 Jul 2014
[ID=611443] Go to top of page
 LocationWashington, DC, United States
 Topics computing, computers, security, information security, information technology, intrusion detection, hacking, hacker techniques, exploits, incident handling, auditing, Windows
 Weblink http://www.sans.org/info/150360
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
51.DBSec'14 — 28th IFIP WG 11.3 Working Conf. on Data and Applications Security & Privacy
 Dates 14 Jul 2014 → 16 Jul 2014
[ID=615473] Go to top of page
 LocationVienna, Austria
 Weblink http://dbsec2014.sba-research.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
52.SANS London Summer 2014
 Dates 14 Jul 2014 → 19 Jul 2014
[ID=614738] Go to top of page
 LocationLondon, United Kingdom
 Topics information security, information technology, hacking, exploits, incident handling, web applications, web apps, auditing, critical controls, forensics, computer forensics, incident response
 Weblink http://www.sans.org/info/152667
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
53.SANS San Francisco 2014
 Dates 14 Jul 2014 → 19 Jul 2014
[ID=612091] Go to top of page
 LocationSan Francisco, United States
 Abstract SANS is bringing a mix of security courses to the Bay Area for SANS San Francisco 2014, July 14-19. Enhance your skills by taking advantage of SANS IT security, security management, and forensics training loaded with practical tools and cutting-edge information.
 Topics information security, information technology, smartphone forensics, hacker techniques, exploits, incident handling, auditing, virtualization, cloud computing, cloud security, management, strategic planning, policy, leadership
 Weblink http://www.sans.org/info/151180
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
54.PETS'14 — Privacy Enhancing Technologies Symposium
 Dates 16 Jul 2014 → 18 Jul 2014
[ID=615516] Go to top of page
 LocationAmsterdam, Netherlands
 Weblink http://petsymposium.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
55.CSF'14 — 27th IEEE Computer Security Foundations Symposium
 Dates 19 Jul 2014 → 22 Jul 2014
[ID=615460] Go to top of page
 LocationVienna, Austria
 Weblink http://csf2014.di.univr.it/index
 Related subject(s) Applied Maths: Cryptography and Information Security
  
56.RFIDSec'14 — The 10th Workshop on RFID Security
 Dates 21 Jul 2014 → 23 Jul 2014
[ID=583500] Go to top of page
 LocationOxford, United Kingdom
 Weblink http://www.sigsac.org/wisec/WiSec2014/
  
57.SANS — ICS Security Training - Houston 2014
 Dates 21 Jul 2014 → 25 Jul 2014
[ID=606098] Go to top of page
 LocationHouston, United States
 Topics computers, computing, security, information security, informatin technology, SCADA, infrastructure, cybersecurity, exploits, control systems
 Weblink http://www.sans.org/info/147715
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
58.PST — 2014 Twelfth Annual Conference on Privacy, Security and Trust
 Dates 23 Jul 2014 → 24 Jul 2014
[ID=580137] Go to top of page
 LocationToronto, ON, Canada
 Abstract The PST conference mission is to provide a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.
 Weblink http://pst2014.ryerson.ca
  
59.SANS Boston 2014
 Dates 28 Jul 2014 → 02 Aug 2014
[ID=614327] Go to top of page
 LocationBoston, United States
 Topics information security, information technology, forensics, network forensics, smartphones, smartphone forensics, hacking, hacker techniques, exploits, incident handling, web applications, web apps, penetration testing, ethical hacking, network penetration testing, mobile devices, mobile device security, computer forensics, management
 Weblink http://www.sans.org/info/151525
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
60.DEF CON 22
 Dates 07 Aug 2014 → 10 Aug 2014
[ID=611870] Go to top of page
 LocationLas Vegas, Nevada, United States
 Abstract Started in 1992 by the Dark Tangent, DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge on Las Vegas every summer to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might.
 Topics technology, information security, privacy, hacking, defense, software, hardware, media, physical security, contests, games, technical talks,
 Weblink https://defcon.org
  
61.SANS San Antonio 2014
 Dates 11 Aug 2014 → 16 Aug 2014
[ID=622136] Go to top of page
 LocationSan Antonio, United States
 Abstract We are pleased to invite you to attend SANS San Antonio 2014 on August 11-16 at Westin Riverwalk campus located on the banks of the San Antonio River Walk. We have five of our top information security courses selected to provide you with the training and certification that you need to boost your career by learning from the best! SANS Instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
 Topics information security, information technology, intrusion detection, hacking, exploits, incident handling, CISSP, management
 Weblink http://www.sans.org/info/156930
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
62.ISSA — 2014 Information Security for South Africa
 Dates 13 Aug 2014 → 15 Aug 2014
[ID=585657] Go to top of page
 LocationJohannesburg, South Africa
 Abstract Information security has evolved and in the last few years there has been renewed interest in the subject worldwide. This is evident from the many standards and certifications now available to guide security strategy. The convergence of technologies like the cloud together with advances in wireless communications, has meant new security challenges for the information security fraternity. It is this fraternity that organisations, governments and communities in general look to for guidance on best practice in this converging world. Identity theft and phishing are on-going concerns. Security mechanisms have become so good and are generally implemented by companies wanting to adhere to good corporate governance, so attackers are now looking to the weak link in the chain, namely the individual user. It is far easier to attack them than attempt to penetrate sophisticated corporate systems. Digital forensic investigations and techniques are used in a bid to apprehend the perpetrators.
 Weblink http://www.infosecsa.co.za
  
63.Cyber Defense Summit 2014
 Dates 13 Aug 2014 → 20 Aug 2014
[ID=621854] Go to top of page
 LocationNashville, United States
 Topics information security, hacking, intrusion detection, exploits, incident handling, cybersecurity
 Weblink http://www.sans.org/info/156965
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
64.SANS Virginia Beach 2014
 Dates 18 Aug 2014 → 29 Aug 2014
[ID=624106] Go to top of page
 LocationVirginia Beach, United States
 Topics information security, information technology, intrusion detection, hacking, exploits, incident handling, penetration testing, virtualization, cloud security, Windows, forensics, computer forensics, incident response, malware
 Weblink http://www.sans.org/info/156935
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
65.SHA3 — The 2014 SHA3 Workshop
 Dates 22 Aug 2014 → 23 Aug 2014
[ID=583541] Go to top of page
 LocationSanta Barbara, California, United States
 Weblink http://csrc.nist.gov/groups/ST/hash/sha-3/Aug2014/SHA3-aug2014-call-for-papers.pdf
 Related subject(s) Applied Maths: Cryptography and Information Security
  
66.SANS Chicago 2014
 Dates 24 Aug 2014 → 29 Aug 2014
[ID=624105] Go to top of page
 LocationChicago, United States
 Topics information security, information technology, intrusion detection, hacking, exploits, incident handling, forensics, computer forensics, incident response, management, CISSP, strategic planning, policy
 Weblink http://www.sans.org/info/156940
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
67.IWSEC 2014 — 9th International Workshop on Security
 Dates 27 Aug 2014 → 29 Aug 2014
[ID=615480] Go to top of page
 LocationHirosaki, Japan
 Weblink http://www.iwsec.org/2014/
  
68.SANS Tallinn 2014
 Dates 01 Sep 2014 → 06 Sep 2014
[ID=616239] Go to top of page
 LocationTallinn, Estonia
 Topics information security, information technology, hacking, exploits, incident handling, web apps, web applications, penetration testing
 Weblink http://www.sans.org/info/154760
 Contact Phone: [((301) 654-7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
69.SECRYPT 2014 — 11th International Conference on Security and Cryptography
 Dates 02 Sep 2014 → 04 Sep 2014
[ID=615578] Go to top of page
 LocationVienna, Austria
 Weblink http://www.secrypt.icete.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
70.SECRYPT 2014 — 11th International Conference on Security and Cryptography
 Dates 02 Sep 2014 → 04 Sep 2014
[ID=583562] Go to top of page
 LocationVienna, Australia
 Weblink http://www.secrypt.icete.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
71.SCN 2014 — Ninth Conference on Security and Cryptography for Networks
 Dates 03 Sep 2014 → 05 Sep 2014
[ID=615511] Go to top of page
 LocationAmalfi, Italy
 Weblink http://scn.dia.unisa.it/
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
72.ARES 2014 — 9th International Conference on Availability, Reliability and Security
 Dates 08 Sep 2014 → 12 Sep 2014
[ID=612026] Go to top of page
 LocationFreiburg, Switzerland
 Abstract The 9th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.
 Weblink http://www.ares-conference.eu/
  
73.RASIEM 2014 — The 3rd International Workshop on Recent Advances in Security Information and Event Management
 Dates 08 Sep 2014 → 12 Sep 2014
[ID=613229] Go to top of page
 LocationFreiburg, Switzerland
 Abstract The SIEM (Security Information and Event Management) approach enables near-real time event management as well as proactive management of security incidents and events for IT infrastructures. This workshop addresses research topics in SIEM and related methods and technologies.
 Topics Recognition, analysis and treatment of safety-relevant anomalies in virtualized computer systems, Adequate sensors in the hypervisor VMs and in run-time environments for applications, Case study of SIEM in operational scenarios, Protection of critical infrastructures against (targeted) cyber attacks, Recognizing real threats in the multitude of daily alerts, Predictive security analysis, Ensuring data source reliability, Managing data from heterogeneous devices and networks, Correlation of highly heterogeneous data to identify threats SIEM for distributed computing, Fault tolerance and resilience for SIEM architectures, Real-time security analysis for SIEM, SIEM for process monitoring and control, Decision systems in SIEM, Event translation and complex event processing for SIEM, Big data approaches of mapping and reducing problem sets with regard to security information to help create meaning and structure from myriad data sources, Visualization of security events
 Weblink http://www.ares-conference.eu/conference/workshops/rasiem-2014/
 Contact Email: romain.giot@u-bordeaux1.fr
  
74.ECTCM 2014 — Second International Workshop on Emerging Cyberthreats and Countermeasures
 Dates 08 Sep 2014 → 12 Sep 2014
[ID=615510] Go to top of page
 LocationFreiburg, Switzerland
 Weblink http://www.ectcm.net
 Related subject(s) Applied Maths: Cryptography and Information Security
  
75.SANS Crystal City 2014
 Dates 08 Sep 2014 → 13 Sep 2014
[ID=624137] Go to top of page
 LocationArlington, United States
 Topics information security, hacking, exploits, incident handling, mobile devices, mobile device security, forensics, Windows, Mac, management
 Weblink http://www.sans.org/info/156945
 Contact SANS Institute ; Phone: [((301) 654-7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
76.NSPW'14 — 2014 New Security Paradigms Workshop
 Dates 15 Sep 2014 → 18 Sep 2014
[ID=615542] Go to top of page
 LocationVictoria, Canada
 Weblink http://www.nspw.org/2014/cfp
 Related subject(s) Applied Maths: Cryptography and Information Security
  
77.LATINCRYPT 2014 — Third International Conference on Cryptology and Information Security
 Dates 17 Sep 2014 → 19 Sep 2014
[ID=583583] Go to top of page
 LocationFlorianopolis, Brazil
 Weblink https://sites.google.com/site/latincrypt2014/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
78.ICS Amsterdam 2014
 Dates 21 Sep 2014 → 26 Sep 2014
[ID=614282] Go to top of page
 LocationAmsterdam, Netherlands
 Topics information security, information technology, ICS, SCADA, exploits, exploitation, infrastructure, control systems
 Weblink http://www.sans.org/info/152687
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
79.CSS 2014 — 3rd Conference on Cryptography and Security System
 Dates 22 Sep 2014 → 24 Sep 2014
[ID=614439] Go to top of page
 LocationLublin, Poland
 Abstract In recent years, computer applications and Internet services have been contributing extensively to our life experience and, simultaneously, they are vulnerable and undergo permanent attacks. The objective of the Cryptography and Security System Conference is to present research and developing activities original unpublished results related to all aspects of cryptography and network security. We invite both theoretical, applied research papers, case studies, implementation experiences as well as work-in-progress presentations.
 Topics network security, cryptography and data protection, peer-to-peer security, wireless networks security, security of sensor networks, heterogeneous networks security, privacy-enhancing methods, covert channels, steganography and watermarking for security applications, security of webservices, cryptographic protocols, security as quality of service, quality of protection, data and application security, software security, formal methods in security, trust and reputation models, reputation systems for security applications, intrusion tolerance, system surveillance and enhanced security, cybercrime: threats and countermeasures, Legal constraints of security systems, Risk analysis and management, security models, evaluation, and verification
 Weblink http://www.css.umcs.lublin.pl/
 Contact Email: bogdan.ksiezopolski@acm.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
80.CHES 2014 — Cryptographic Hardware and Embedded Systems
 Dates 23 Sep 2014 → 26 Sep 2014
[ID=583648] Go to top of page
 LocationBusan, South Korea
 Weblink http://www.chesworkshop.org/
 Related subject(s) Applied Maths: Cryptography and Information Security; Embedded Systems & Ubiquitous Computing
  
81.SECRYPT 2014 — 11th International Conference on Security and Cryptography
 Dates 28 Sep 2014 → 30 Sep 2014
[ID=569630] Go to top of page
 LocationVienna, Austria
 Abstract The purpose of SECRYPT 2014, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
 Topics data communications, data networks and distributed computing
 Weblink http://www.secrypt.icete.org
 Contact Phone: [+351 265 520 185]; Email: secrypt.secretariat@insticc.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
82.DFIR Prague 2014
 Dates 29 Sep 2014 → 11 Oct 2014
[ID=613945] Go to top of page
 LocationPrague, Czech Republic
 Topics information security, information technology, network forensics, forensics, smartphone, smartphone forensics, hacking, hacking techniques, exploits, incident handling, computer forensics, malware
 Weblink http://www.sans.org/info/150985
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
83.ProvSec 2014 — The Eighth International Conference on Provable Security
 Dates 09 Oct 2014 → 10 Oct 2014
[ID=615626] Go to top of page
 LocationHong Kong, China
 Weblink http://home.ie.cuhk.edu.hk/~provsec14/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
84.ICCST — 2014 International Carnahan Conference on Security Technology
 Dates 13 Oct 2014 → 16 Oct 2014
[ID=573015] Go to top of page
 LocationRome, Italy
 Abstract This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.
 Weblink http://www.iccst2014.org
  
85.NSS 2014 — The 8th International Conference on Network and System Security
 Dates 15 Oct 2014 → 17 Oct 2014
[ID=615625] Go to top of page
 LocationXi'an, China
 Weblink http://anss.org.au/nss2014/index.htm
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
86.CANS 2014 — 13rd International Conference on Cryptology and Network Security
 Dates 22 Oct 2014 → 24 Oct 2014
[ID=615613] Go to top of page
 LocationHeraklion, Crete, Greece
 Weblink http://www.ics.forth.gr/cans2014/
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
87.SANS Gulf Region 2014
 Dates 25 Oct 2014 → 06 Nov 2014
[ID=614354] Go to top of page
 LocationDubai, United Arab Emirates
 Topics information security, intrusion detection, penetration testing, exploits, hacking, auditing
 Weblink http://www.sans.org/info/153807
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
88.CNS — 2014 IEEE Conference on Communications and Network Security
 Dates 29 Oct 2014 → 31 Oct 2014
[ID=550878] Go to top of page
 LocationSan Francisco, CA, United States
 Abstract IEEE CNS seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
 Weblink http://www.ieee-cns.org
  
89.Pen Test Hackfest 2014
 Dates 13 Nov 2014 → 20 Nov 2014
[ID=613999] Go to top of page
 LocationWashington, DC, United States
 Topics information security, information technology, penetration testing, Python, hacking, ethical hacking, web app penetration testing, web apps
 Weblink http://www.sans.org/info/153172
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
90.SECURWARE 2014 — The Eighth International Conference on Emerging Security Information, Systems and Technologies
 Dates 16 Nov 2014 → 20 Nov 2014
[ID=600442] Go to top of page
 LocationLisbon, Portugal
 Organizer International Academy, Research and Industry Association (IARIA)
 Abstract Colocated with other events part of NetWare 2014
 Weblink http://www.iaria.org/conferences.html
  
91.ZebraCON — Information Security & Risk Management Conference
 Dates 18 Nov 2014 → 21 Nov 2014
[ID=616386] Go to top of page
 LocationKuala Lumpur, Malaysia
 Abstract ZebraCON brings together Information Security and Risk Management industry experts, influencers and respected corporate leaders from all over the world, with the objective to educate today’s leaders and professionals on the significance of the Information Security and Risk Management methodology. ZebraCON offers a platform to meet industry experts, share views of current state of Information Security and Risk Management, learn from peers on explore the best solutions and practices for implementation, and create opportunity for networking collaboration.
 Topics Continuity Management, The Big Challenge of BYOD, Understanding Human Factor – An Essential Link to Information Security?, The Great Security-Privacy Balancing Act: Managing Employee Performance with Workplace Privacy, BIG DATA Security, The Mobile Exploitation Saga, Secure your web of insecurities, Enterprise Risk Management – Mitigating BYOD and Mobile Risk, Advanced Penetration Testing – Discovering the hidden vulnerabilities, Managing the unmanageable streams of data
 Weblink http://www.zebra-con.com
 Contact Ms. Audrey; Phone: [+603-76650911]; Email: audrey@conzebra.com
  
92.13. SECUTA Information Security Tagung 2014
 Dates 19 Nov 2014 → 21 Nov 2014
[ID=581817] Go to top of page
 LocationSpitzingsee - Oberbayern, Germany
 Abstract Ziel unserer Jahrestagung ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit für das kommende Jahr praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, diverse Unternehmensberichte, Live Hacking's sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der jährlichnen Information Security Tagung ab.
 Topics Informationssicherheit, IT-Sicherheit, IT-Security, Security, ISO, ISO Normen, ISO 27001, Riskmanagement, Spionage, Cybercrime, Wirtsschaftsspionage, Datenschutz, Datensicherheit, IT Recht, DSB, Auditor, CISO, CISA, CISM, CISSP, IT-Manager, Security Manager, Forensik, Hacking, Live Hacking, Penetration, Tagung, Konferenz, IT, IS, ISMS, BCM, ITSIBE, IT Beauftragter
 Weblink http://www.it-secuta.de/
 Contact Manuela Krämer, Leitung Informationssicherheit; Phone: [+49 89 4576918-12]; Email: m.kraemer@cbt-training.de
  
93.PASSAT 2014 — 2014 IEEE International Conference on Information Privacy, Security, Risk and Trust
 Dates 12 Dec 2014 → 15 Dec 2014
[ID=618930] Go to top of page
 LocationCambridge, Massachusetts, United States
 Weblink http://www.computer.org/portal/web/conferences/calendar
  
94.SAFE 2015 — 6th International Conference on Safety and Security Engineering
 Dates 06 May 2015 → 08 May 2014
[ID=623761] Go to top of page
 LocationOpatija, Croatia
 Organizer Wessex Institute
 Abstract Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together in a systematic view, many disciplines of engineering, from the traditional to the most technologically advanced. The conference covers areas such as crisis management, security engineering, natural disasters and emergencies, terrorism, IT security, man-made hazards, risk management, control, protection and mitigation issues, and many others.
 Weblink http://www.wessex.ac.uk/15-conferences.html
 Related subject(s) Civil Engineering; Engineering (general)
  

Last updated: 22 April 2014