Conferences and Meetings on Information Security and Information Privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.
 
SANS Security West 2016
ID
765451
Dates
01 May 2016 - 06 May 2016
Location
San Diego, United States
Abstract
Take cybersecurity training in San Diego from SANS Institute, the global leader in information security training. At SANS Security West 2016 + Emerging Trends, we offer more than 20 hands-on, immersion-style security training courses taught by real-world practitioners and interactive bonus sessions, led by a star-studded panel on Emerging Trends in cybersecurity.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, PowerShell, security operations, continuous monitoring, web applications, web apps, web app penetration testing, penetration testing, network penetration testing, mobile device security, digital forensics, Mac forensics, network forensics, management, ICS, industrial control systems
2.
 
HOST — 2016 IEEE International Symposium on Hardware Oriented Security and Trust
ID
768039
Dates
03 May 2016 - 05 May 2016
Location
McLean, VA, United States
Abstract
The International Symposium on Hardware-Oriented Security and Trust (HOST) was founded as a venue to create a community for researchers to discuss solutions to the challenge of hardware trust and security.
Related subject(s)
3.
 
Eurocrypt — Eurocrypt 2016
ID
670630
Dates
08 May 2016 - 13 May 2016
Location
Vienna, Austria
4.
 
ACM Conference on Data and Applications Security and Privacy
ID
758695
Dates
09 May 2016 - 11 May 2016
Location
New Orleans, United States
Abstract
With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to: -    Application-layer security policies -    Access control for applications -    Access control for databases -    Data-dissemination controls -    Data forensics -    Enforcement-layer security policies -    Privacy-preserving techniques -    Private information retrieval -    Search on protected/encrypted data -    Secure auditing -    Secure collaboration -    Secure data provenance -    Secure electronic commerce -    Secure information sharing -    Secure knowledge management -    Secure multiparty computations -    Secure software development -    Securing data/apps on untrusted platforms -    Securing the semantic web -    Security and privacy in GIS/spatial data -    Security and privacy in healthcare -    Security policies for databases -    Social computing security and privacy -    Social networking security and privacy -    Trust metrics for applications, data, and users -    Usable security and privacy -    Web application security
Event website
5.
 
HNW2016 — The Honeynet Project Security Workshop
ID
792349
Dates
09 May 2016 - 11 May 2016
Location
San Antonio, TX, United States
Abstract
Three days of briefings, hands-on trainings, discussions and information exchange with top security professionals from all over the world. Stay up-to-date with the latest trend in information security, deception, honeypots, malware analysis, visualization, industrial control systems security and more.
Contact
Roberto Tanara;     Email: roberto.tanara@gmail.com
Topics
information security, deception, honeypots, malware analysis, visualization, ICS
6.
 
SANS Baltimore Spring 2016
ID
770550
Dates
09 May 2016 - 14 May 2016
Location
Baltimore, United States
Abstract
You are invited to Maryland for SANS Baltimore Spring 2016 this May. Now more than ever, SANS hands-on, immersion information security training experience will set you apart from others in the field. So, register today for SANS Baltimore Spring 2016 and get the best computer security training money can buy. With cyber-attacks and data breaches on the rise, attacks becoming more frequent, sophisticated and more costly, the gap in the ability to defend has become wider and more time sensitive. Now is the perfect time to take the next step in your career. Cybersecurity is more vital, crucial, and important to the growth of your organization than ever before. Join us in Baltimore to gain the skills and knowledge to help your organization succeed. Our instructors will ensure that you not only learn the material but you can use it immediately when you return to your office. This is the SANS Guarantee that you will see in action at SANS Baltimore Spring 2016.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, cyber threat intelligence, hacking, hacker tools, hacker techniques, exploits, incident handling, monitoring, security operations, forensics, digital forensics, Windows forensics, IT management, security leadership, PowerShell, Critical Security Controls, strategic planning
7.
 
SANS Houston 2016
ID
770581
Dates
09 May 2016 - 14 May 2016
Location
Houston, United States
Abstract
We are pleased to invite you to attend SANS Houston 2016 on May 9-14 at the Royal Sonesta Hotel Houston, located in the heart of the Galleria area of Uptown Houston. We have selected eight of our top information security courses to provide you with the training and certification that you need to boost your career by learning from the best! SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office. Data breaches and attacks are in the news each day. SANS courses are proven to teach you the skills needed to prevent attacks and defend against them. Preserving the security of your assets in today's threat environment is more challenging than ever before. Join us in Houston to learn about the tools and gain the skills that will help keep your organization's networks secure. With a reputation for being the most trusted source for information security training and an eagerness to help you meet your training objectives, SANS is the best choice for IT security education. Don't miss this special SANS training event in Houston in May! We hope to see you there.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, monitoring, security operations, penetration testing, pen testing, network penetration testing, forensics, digital forensics, Windows forensics, IT management, data security, data security investigation, infosec law
8.
 
ISSA LA — ISSA LA Eighth Annual Information Security Summit
ID
803697
Dates
19 May 2016 - 20 May 2016
Location
UNIVERSAL CITY, CA, United States
Abstract
The ISSA-LA Information Security Summit is the only educational forum in the great Los Angeles area specifically designed to attract an audience from all over Southern California as a means to encourage participation and interaction among all three vital information security constituencies: (1) business executives, senior business managers, and their trusted advisors; (2) technical IT personnel with responsibility for information systems and the data they contain; and (3) information security practitioners with responsibility for ensuring the security of sensitive information. Trainings and Reception on Thursday - Forums and Sessions on Friday. Register at https://summit.issala.org/
Contact
Email: marketing.director@issa-la.org
Topics
ISSA LA, infosec, cybersecurity
9.
 
IEEE Symposium on Security and Privacy
ID
759059
Dates
23 May 2016 - 25 May 2016
Location
San Jose, United States
Abstract
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2016 Symposium will mark the 37th annual meeting of this flagship conference.
10.
 
ACM CPSS'16 — 2nd ACM Cyber-Physical System Security Workshop (with ACM AsiaCCS'16)
ID
779302
Start date
30 May 2016
Location
Xi'an, China
11.
 
IoTPTS 2016 — 2nd ACM International Workshop on IoT Privacy, Trust, and Security
ID
779301
Start date
30 May 2016
Location
Xi'an, China
12.
 
IoTPTS 2016 — 2nd ACM International Workshop on IoT Privacy, Trust, and Security
ID
759242
Start date
30 May 2016
Location
Xian, United States
Abstract
IoTPTS 2016 is held in conjunction with ASIACCS'16. The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning.
Contact
Richard Chow;     Phone: [4086537467];     Email: richard.chow@intel.com
Topics
Privacy and IoT data, Privacy attacks for IoT, Trust management and device discoverability for IoT, Usability of privacy and security systems in IoT, User risk perceptions and modeling for IoT, Policy Management and enforcement for IoT, Authentication and access control for users for IoT, Cryptography for IoT, Attack detection and remediation for IoT, Security architectures for IoT systems and applications
13.
 
IFIP SEC — International Conference on ICT Systems Security and Privacy Protection
ID
759081
Dates
30 May 2016 - 01 Jun 2016
Location
Ghent, Belgium
14.
 
IFIP SEC 2016 — 31st International Conference on ICT Systems Security and Privacy Protection
ID
781471
Dates
30 May 2016 - 01 Jun 2016
Location
Ghent, Belgium
Event website
15.
 
Cryptology2016 — International Cryptology and Information Security Conference
ID
759318
Dates
31 May 2016 - 02 Jun 2016
Location
State of Sabah, Malaysia
Abstract
The International Cryptology and Information Security Conference is an open forum, provided for contributions which cover research on the theoretical foundations, applications and any related issues in cryptology, information security and other underlying technologies.   This conference seeks submissions from the academia and industry presenting research on theoretical and practical aspects of cryptology. We also encourage submissions from other communities such as public agencies, defense and business sectors that represent these communities perspectives on issues related to security.
Topics
Cryptography And Security           - Information Security Education           - Key Management Protocols           - Information Security Management             - Block/Stream Ciphers           - Information Technology Mis-Use and the Law             - Watermarking and Fingerprinting           - Information hiding and watermarking             - Quantum Cryptography           - Malware threat and detection             - Hash Functions           - Mobile and wireless security             - Number Theory           - Access control and authentication             - Electronic Commerce and Payment           - Cloud and big data security             - Elliptic Curve Cryptography           - Critical Infrastructure Protection             - Secret Key Cryptography           - Data and Applications Security             - Public Key Cryptography
16.
 
ASIACCS 2016 — The 11th ACM Asia Conference on Computer and Communications Security
ID
779386
Dates
31 May 2016 - 03 Jun 2016
Location
Xi'an, China
17.
 
eCrime — Symposium on Electronic Crime Research
ID
759409
Dates
01 Jun 2016 - 03 Jun 2016
Location
Toronto, Canada
Abstract
eCrime consists of 3 days of keynote presentations, technical and practical sessions, and interactive panels. This will allow for the academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it.
Related subject(s)
18.
 
CTI — 2016 International Conference on Cyber Threat Intelligence
ID
768552
Dates
01 Jun 2016 - 03 Jun 2016
Location
Manchester, United Kingdom
Abstract
Cyber Threat Intelligence, Information security, Digital Forensic
19.
 
CCCC16 — Copenhagen Cybercrime Conference 2016
ID
802743
Start date
09 Jun 2016
Location
Copenhagen, Denmark
Abstract
The Copenhagen Cybercrime Conference is one of the premier cybersecurity events in the Nordic region. As the cyber security field continues to grow in importance and influence, CCCC plays an integral role in keeping security professionals in northern Europe connected and educated.
Contact
Maria Holla;     Email: mah@csis.dk
Topics
Cybercrime CSIS Kaspersky NASA CERN Trendmicro
Related subject(s)
Event website
20.
 
SECITC 2016 — 9th Int. Conference on Security for Information Technology & Communications
ID
779448
Dates
09 Jun 2016 - 10 Jun 2016
Location
Bucharest, Romania
Event website
21.
 
SANSFIRE 2016
ID
784807
Dates
11 Jun 2016 - 18 Jun 2016
Location
Washington DC, United States
Abstract
For more than 10 years, the Internet Storm Center has been providing free analysis and warning to our community. SANSFIRE 2016 is our annual
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, data breach, data breach prevention, data breach protection, cyber attacks, data breach detection, penetration testing, hacking, cyber threats, cyber threat intelligence, cyber defense, ICS, industrial control systems, incident response, health care cybersecurity, intrusion detection, hacker tools, hacking techniques, exploits, incident handling, security operations, cyber deception, auditing, infrastructure, mobile devices, mobile device security, virtualization, cloud computing, cloud security, exploit writing, coding, secure coding, forensics, Windows forensics, digital forensics, computer forensics, Mac forensics, network forensics, malware, management, data security, SCADA, continuous monitoring
22.
 
Weiterbildung — Kundendatenschutz
ID
754709
Dates
13 Jun 2016 - 14 Jun 2016
Location
Offenbach, Germany
Abstract
Zweitägiger Praxislehrgang zur rechtskonformen Verarbeitung personenbezogener Kundendaten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
23.
 
Weiterbildung — Verfahrensbeschreibungen und Vorabkontrolle im Datenschutz
ID
756422
Start date
16 Jun 2016
Location
Offenbach, Germany
Abstract
Gesetzliche Forderungen in der betrieblichen Praxis umsetzen
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
24.
 
EuropeanSeC2016 — 2016 European Security Conference
ID
784855
Dates
16 Jun 2016 - 17 Jun 2016
Location
Lisbon, Portugal
Abstract
The 2016 European Security Conference is scheduled for June 16-17, 2016, in Lisbon, Portugal. The Conference is the European extension of the Annual Security Conference that has been held in Las Vegas (USA) for over a decade. The conference attracts a nice mix of participants from academia, government and industry. Organizers for the 2016 event is ISEG, University of Lisbon (Portugal). Administrative offices for the conference are at ISEG, University of Lisbon.
Contact
Sergio Nunes;     Email: esc@iseg.ulisboa.pt
Topics
information security, privacy, security, cybersecurity
25.
 
ACNS — International Conference on Applied Cryptography and Network Security
ID
759835
Dates
19 Jun 2016 - 22 Jun 2016
Location
Guildford, United Kingdom
Abstract
ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. Both academic research works with high relevance to real-world problems as well as developments in industrial and technical frontiers fall within the scope of the conference.
26.
 
SANS Digital Forensics & Incident Response Summit 2016
ID
764531
Dates
23 Jun 2016 - 30 Jun 2016
Location
Austin, United States
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, cyber threat intelligence, forensics, digital forensics, Windows forensics, incident response, Mac forensics, memory forensics, network forensics, smartphone forensics, malware, malware analysis
27.
 
SANS ICS Security Summit & Training - Houston 2016
ID
770571
Dates
25 Jun 2016 - 30 Jun 2016
Location
Houston, United States
Abstract
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses. In conjunction with the ICS - Houston training event, SANS is pleased to offer the 4th Annual Industrial Control Systems Security Briefing. This event provides the opportunity to engage in dialog around Industrial Controls Systems Security and learn about key solution capabilities.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, active defense, ICS, industrial control systems, ICS cybersecurity, NERC, infrastructure, infrastructure protection, critical infrastructure, infrastructure security, infrastructure cybersecurity, exploits, control systems, control system security
28.
 
Oil and Gas Cyber Secutiy
ID
794703
Dates
27 Jun 2016 - 28 Jun 2016
Location
Amsterdam, Netherlands
Abstract
SMi are delighted to announce Oil and Gas Cyber Security 2016. An estimated 250% rise in reported industrial control system incidents over the past four years suggests that the oil and gas companies now more than ever need to strengthen their cyber security units. Perfect security for any successful company is impossible. Inevitably, some doors need to be left open. The question the oil and gas companies are currently faced with is which ones are worth leaving open, and how, when open, are they best monitored to ensure the highest level of security in the company. This conference will discuss where and how oil and gas companies should invest in their cyber security. Special focus will be on how companies can optimise the security of their industrial control systems. Strategy is key and therefore the conference will explain how companies can implement the best security strategy. Threat intelligence, threat analytics and many other industry hot topics will be addressed.
Contact
Anna Serazetdinova;     Phone: [+44 20 7827 6180];     Email: aserazetdinova@smi-online.co.uk
Topics
cyber security, oil, gas, control system, security strategy,
29.
 
CSF — 2016 IEEE 29th Computer Security Foundations Symposium
ID
777717
Dates
27 Jun 2016 - 01 Jul 2016
Location
Lisbon, Portugal
Abstract
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security.
30.
 
SANS Salt Lake City 2016
ID
786860
Dates
27 Jun 2016 - 02 Jul 2016
Location
Salt Lake City, United States
Abstract
We are pleased to invite you to SANS Salt Lake City 2016, June 27-July 2. Are you ready to immerse yourself in the most intense computer training experience available anywhere? Do you need to become a more effective leader when implementing security improvements for your organization? Do you need a more in-depth knowledge of the theory and implementation of computer security, hacker tools and incident handling, advanced digital forensics, defending web apps, or ISC/SCADA? This new event has been planned to meet your needs. Start making your plans now to attend SANS Salt Lake City 2016!
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, data breach, cyber threats, cyberattack, cyber attacks, hacking, hacker tools, hacking techniques, forensics, digital forensics, management, cyber defense, web applications, web app security, ICS, SCADA, industrial control systems
31.
 
ACISP — Australasian Conference on Information Security and Privacy
ID
760171
Dates
04 Jul 2016 - 06 Jul 2016
Location
Melbourne, Australia
32.
 
Weiterbildung — Datenschutz Update
ID
752675
Start date
05 Jul 2016
Location
Offenbach, Germany
Abstract
Eintägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
33.
 
Weiterbildung — Datenschutzbeauftragter
ID
752650
Dates
11 Jul 2016 - 14 Jul 2016
Location
Potsdam, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach, Datenschutz Fortbildung, Datens
34.
 
Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte
ID
752765
Dates
11 Jul 2016 - 14 Jul 2016
Location
Potsdam, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten - Datenschutzbeauftragter
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Daten
35.
 
SANS Rocky Mountain 2016
ID
787197
Dates
11 Jul 2016 - 16 Jul 2016
Location
Denver, United States
Abstract
Mile high...mile deep, SANS IT security training! When you attend SANS Rocky Mountain 2016 you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office. With a reputation for being the most trusted source for information security training and an eagerness to help you meet your training objectives, SANS is the best choice for cyber security education. So let your colleagues and friends know about SANS Rocky Mountain 2016. We look forward to seeing you all in Denver!
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, cyber-attacks, data breaches, cyber threats, cyber threat intelligence, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, continuous monitoring, security operations, security ops, penetration testing, auditing, critical security controls, forensics, digital forensics, Windows forensics, management, CISSP, training
36.
 
WiSec — Conference on Security and Privacy in Wireless and Mobile Networks
ID
760439
Dates
18 Jul 2016 - 20 Jul 2016
Location
Darmstadt, Germany
Abstract
As wireless and mobile networking becomes ubiquitous, security and privacy become increasingly critical. The focus of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) is on the security and privacy aspects of wireless communications, mobile networks, and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we also welcome papers focusing on the security and privacy of mobile software platforms and the increasingly diverse range of mobile or wireless applications. The conference welcomes both theoretical as well as systems contributions. 
Related subject(s)
37.
 
SANS San Antonio 2016
ID
790308
Dates
18 Jul 2016 - 23 Jul 2016
Location
San Antonio, United States
Abstract
SANS proudly brings hands-on, immersion-style cybersecurity training courses taught by real-world practitioners to SANS San Antonio 2016, July 18-23, at the Hilton Palacio del Rio, located on the banks of the San Antonio River Walk! Many of the courses are aligned with DoD Directive 8570 and are associated with a GIAC Certification. Get unparalleled cybersecurity training at SANS San Antonio 2016 taught by outstanding instructors who are the best at ensuring you not only learn the material, but that you can apply it immediately when you return to the office.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, cyber-attacks, data breaches, cyber threats, cyber threat intelligence, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, active defense, cyber defense, cyber offense, cyber deception, management
38.
 
SANS Minneapolis 2016
ID
790597
Dates
18 Jul 2016 - 23 Jul 2016
Location
Minneapolis, United States
Abstract
Information security training in Minnesota from SANS Institute, the global leader in information security training. At SANS Minneapolis 2016, July 18-23, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of this event is the Hilton Minneapolis, located in the center of the financial district and within minutes of many of the attractions in the city. Choose from outstanding, cutting-edge courses presented by our top-rated instructors. Now is the time to improve your information security skills. This event features comprehensive hands-on technical training from some of the best instructors in the industry and includes courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans now to attend SANS Minneapolis 2016!
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, cyber-attacks, data breaches, cyber threats, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, digital forensics, management, incident response
39.
 
PETS — Privacy Enhancing Technologies Symposium
ID
760499
Dates
19 Jul 2016 - 22 Jul 2016
Location
Darmstadt, Germany
Abstract
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to discuss recent advances and new perspectives on research in privacy technologies. PETS addresses the design and realization of privacy services for the Internet and other digital systems and communication networks. Suggested topics include but are not restricted to: -    Behavioural targeting -    Building and deploying privacy-enhancing systems -    Crowdsourcing for privacy -    Cryptographic tools for privacy -    Data protection technologies -    Differential privacy -    Economics of privacy and game-theoretical approaches to privacy -    Forensics and privacy -    Human factors, usability and user-centered design for PETs -    Information leakage, data correlation and generic attacks to privacy -    Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology -    Location and mobility privacy -    Measuring and quantifying privacy -    Obfuscation-based privacy -    Policy languages and tools for privacy -    Privacy and human rights -    Privacy in ubiquitous computing and mobile devices -    Privacy in cloud and big-data applications -    Privacy in social networks and microblogging systems -    Privacy-enhanced access control, authentication, and identity management -    Profiling and data mining -    Reliability, robustness, and abuse prevention in privacy systems -    Surveillance -    Systems for anonymous communications and censorship resistance -    Traffic analysis -    Transparency enhancing tools
40.
 
SANS San Jose 2016
ID
793650
Dates
25 Jul 2016 - 30 Jul 2016
Location
San Jose, United States
Abstract
Information security training is coming to Silicon Valley from SANS Institute, the global leader in information security training. At SANS San Jose 2016, July 25-30, 2016, choose from 7 hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. We will see you at The Westin San Jose, located in the heart of downtown San Jose. Now is the time to improve your information security skills. SANS San Jose 2016 features comprehensive hands-on technical training from some of the best instructors in the industry and includes several courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans to attend now!
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, network security, netsec, IT security, infosec, data breach, cyber threats, cyberattack, cyber attacks, data breach protection, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, web apps, web app penetration testing, network penetration testing, mobile devices, mobile device security, management, development, cyber defense
41.
 
CyberSec — 2016 Fifth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic
ID
769343
Dates
26 Jul 2016 - 28 Jul 2016
Location
Manchester, United Kingdom
Abstract
Cyber security,Computer Science and Security, Cyber Welfare
Related subject(s)
42.
 
SECRYPT 2016 — The 13th International Conference on Security and Cryptography
ID
749302
Dates
26 Jul 2016 - 28 Jul 2016
Location
Lisbon, Portugal
Abstract
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.
Contact
SECRYPT Secretariat;     Phone: [+351 265 520 185];     Email: secrypt.secretariat@insticc.org
Topics
Computer Science, Security, Cryptography
43.
 
SANS Boston 2016
ID
793728
Dates
01 Aug 2016 - 06 Aug 2016
Location
Boston, United States
Abstract
Information security training in Boston from SANS Institute, the global leader in information security training. At SANS Boston 2016, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of our live training event on August 1-6, 2016, is the Omni Parker House, located along the Freedom Trail and at the foot of Beacon Hill, Boston Common, Quincy Market, and Faneuil Hall marketplace.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, network security, netsec, computer security, IT security, infosec, data breach, data breach prevention, data breach protection, data breach detection, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, monitoring, security operations, web apps, web applications, web app penetration testing, penetration testing, pen testing, mobile devices, mobile device security, forensics, digital forensics, Windows forensics, network forensics, management, security leadership, strategic planning
44.
 
SANS Security Awareness Summit & Training 2016
ID
787352
Dates
01 Aug 2016 - 10 Aug 2016
Location
San Francisco, United States
Abstract
The 3rd annual SANS Security Awareness Summit is on, and it is bigger and better than ever before. First, the summit has been designed for experienced security awareness officers who want to take their security awareness program to the next level. Our promise is to provide actionable lessons you can take back and apply right away within your own organization, with a focus on your industry, employee base, and current maturity level. Second, we have expanded the event to two days to support additional talks, add new interactive sessions and host numerous networking events.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, cyber attacks, critical security controls, auditing, CISSP, risk management, risk awareness, security awareness
45.
 
SANS Dallas 2016
ID
793726
Dates
08 Aug 2016 - 13 Aug 2016
Location
Dallas, United States
Abstract
Information security training in Texas from SANS Institute, the global leader in security training. The site of our live training event is The Westin Dallas Downtown, located downtown next to Belo Garden and a mile from the Kay Bailey Convention Center! With a course line-up including core fundamentals, penetration testing, digital forensics, and security management, SANS Dallas 2016, August 8-13, is sure to have a course that meets your needs.

All of our courses for this event are associated with a GIAC Certification. Get outstanding information security training from SANS world-class instructors at SANS Dallas 2016.

Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyberattack, cyber attacks, data breach protection, intrusion detection, penetration testing, hacking, network penetration testing, networks, forensics, network forensics, malware, auditing
46.
 
SANS Portland 2016
ID
797399
Dates
08 Aug 2016 - 13 Aug 2016
Location
Portland, United States
Abstract
Information security training in Portland from SANS Institute, the global leader in cybersecurity training. SANS Portland 2016, August 8 - 13, offers hands-on, immersion-style security training courses taught by real-world practitioners and leading experts working in security today. The site of our event is the DoubleTree by Hilton Portland, located in the heart of Portland's thriving metro area - close to public transportation and within walking distance to top city attractions. Get unparalleled information security training from SANS in Portland.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, infrastructure, critical infrastructure, industrial control systems, ICS, penetration testing, network penetration testing, hacking, forensics, digital forensics, incident response, management
47.
 
ICCS 2016 — International Conference on Cyber Security (ICCS) 2016
ID
794890
Dates
13 Aug 2016 - 14 Aug 2016
Location
Kota, Rajasthan, India
Abstract
The International Conference on Cyber Security (ICCS) 2016 is an unparalleled opportunity to discuss cyberthreat analysis, operations, research, and law enforcement to coordinate various efforts to create a more secure world.
Topics
Database Security, Big Data Techniques in Cyber Security, Digital Signature Techniques, Forensic Analysis of Cyber Crimes, Secure User Authentication, Spam Protection, Advance Persistent Threat, Secret Sharing, Key Management, Security in Mobile Networks, Hardware Security, Cloud Security, Cyber Physical System, Network Protocols, Next-generation Communication Networks, Mobile & Ubiquitous Communication Networks, Mobile Cloud, Secure Routing, Naming/Addressing, Network Management, Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs, Security & Privacy in Peer-to-Peer and Overlay Networks, Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks, Security & Isolation in Cloud, Data Center and Software-Defined Networks
48.
 
Crypto — Crypto 2016
ID
670695
Dates
14 Aug 2016 - 18 Aug 2016
Location
Santa Barbara, United States
49.
 
SANS Data Breach Summit 2016
ID
805214
Start date
18 Aug 2016
Location
Chicago, United States
Abstract
For every organization, data breach is a major risk. It's not a matter of whether your organization will be breached; it's when, and - most importantly - how bad the damage will be. You likely have a response plan in place. In fact, your organization has purchased insurance against this eventuality. But your response in the first hours after initially discovering the
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats
50.
 
SP4SC — International Workshop on Signal Processing for Secure Communications
ID
772932
Dates
22 Aug 2016 - 24 Aug 2016
Location
Vienna, Austria
51.
 
SANS Chicago 2016
ID
797320
Dates
22 Aug 2016 - 27 Aug 2016
Location
Chicago, United States
Abstract
We are pleased to invite you to the Palmer House Hilton in downtown Chicago - our campus for SANS Chicago 2016 this August. Why attend? Attackers are targeting you with increasing viciousness and stealth, and it's essential you understand the tools and techniques and learn the skills needed to protect your organizations. Get the training you need from SANS - the most trusted and by far the largest source for information security training in the world. When you attend SANS Chicago 2016, you will see the SANS promise in action - what you learn in the classroom, you will be able to use immediately upon returning to the office.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber threat intelligence, hacking, hacking tools, hacker techniques, exploits, incident handling, cyber defense, active defense, cyber deception, forensics, digital forensics, Windows forensics, management, data security, law, investigations, industrial control systems, ICS, SCADA
52.
 
SANS Virginia Beach 2016
ID
799132
Dates
22 Aug 2016 - 02 Sep 2016
Location
Virginia Beach, United States
Abstract
Information security training in Virginia Beach from SANS Institute, the global leader in information security training. At SANS Virginia Beach 2016, August 22- September 2, SANS offers two weeks of the hands-on, immersion-style security training courses taught by real-world practitioners. The site of our event is the Hilton Virginia Beach Oceanfront is located right on Virginia Beach.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, security operations, continuous monitoring, penetration testing, pen testing, network penetration testing, mobile device security, forensics, network forensics, digital forensics, Mac forensics, Windows forensics, smartphone forensics, management, CISSP, leadership, industrial control systems, active defense, incident response
Related subject(s)
53.
 
IEEE TrustCom-16 — 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
ID
769441
Dates
23 Aug 2016 - 26 Aug 2016
Location
Tianjin, China
Abstract
This conference is created to provide a prime international forum for researchers, industry practitioners and domain experts to exchange the latest advances in trusted computing and communications, concurrent and parallel systems, and Big Data and broadly related areas.
Related subject(s)
54.
 
TRUST 2016 — The 9th International Conference on Trust & Trustworthy Computing
ID
797198
Dates
29 Aug 2016 - 30 Aug 2016
Location
Vienna, Austria
Abstract
TRUST 2016 is an international conference that explores new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discusses experiences in building, designing, using and understanding trustworthy computing systems.
Contact
Somayeh Salimi;     Email: somayen@kth.se
Topics
Architectures for trustworthy infrastructures, Trustworthy applications, Security analysis and formal techniques for trusted/trustworthy computing, Usability of trusted/trustworthy computing solutions, Trust management, Software engineering techniques for trustworthiness, Operating system security, Cryptography for trusted computing and related applications, Intrusion detection and resilience leveraging trusted computing
55.
 
ARES — International Conference on Availability, Reliability and Security
ID
773128
Dates
29 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
The  International Conference on Availability, Reliability and Security  (“ARES”) will bring  together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security –  with special  focus on the crucial linkage between availability, reliability and security. The  International Conference on Availability, Reliability and Security  (“ARES”) will bring  together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security –  with special  focus on the crucial linkage between availability, reliability and security. ARES  aims at a full and detailed discussion of the research issues of security as an  integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.  
Related subject(s)
56.
 
WMA 2016 — First Workshop on Malware Analysis
ID
788120
Dates
31 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
MWA aims to bring together experts from academia, industry, government, and law enforcement who are interested in advancing the state of the art in malware analysis by exchanging their knowledge, results, ideas, and experiences. The goal of the workshop is to provide a relaxed atmosphere that promotes discussion and free exchange of ideas, with a sound academic backing. The focus of this workshop is not restricted to techniques for malware detection, but also includes discussion of new models of malware and guidelines for limiting malware diffusion that can be utilized by governments, industries, and other organizations to defend against cyber attacks.Best papers will be selected for publication in a Special Issue of the Journal in Computer Virology and Hacking Techniques, published by Springer Verlag.
Contact
Aaron visaggio;     Email: visaggio@unisannio.it
Topics
Theoretical aspects and new directions in Broad Spectrum Malware related research, Novel malware detection techniques, Targeted Attacks, Smartphone Malware, Analysis and measurements of real malware incidents, Worms, viruses and other propagating Malware, Spyware, keystroke loggers, information theft Malware, Honeypots and other sample collection methodologies, Botnet attacks, detection/tracking and defense, Malware economics and black market studies, Code reverse engineering tools and practices, Malware performance, analysis and capture tools, Anti-spam and anti-phishing techniques and practices, Malware for SCADA Systems, Malware and its impact in social networking and cloud computing, Rootkit and virtualization techniques, Malware in wireless mobile devices
57.
 
ARES 2016 — International Conference on Availability, Reliability and Security
ID
789004
Dates
31 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security – with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.
Contact
Email: office@ares-conference.eu
Topics
Authorization and Authentication, Availability and Reliability, Business Continuity & Resilience, Cost/Benefit Analysis, Cryptography, Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics), Dependability Aspects of Electronic Government (e-Government), Dependability Administration, Dependability in Open Source Software, Designing Security, Requirements, Digital Forensics, E-Commerce Dependability, Failure Prevention, Identity Management, IPR of Security Technology, Incident Response and Prevention, Information Flow Control, Information Hiding, Internet Dependability, Interoperability Aspects, Intrusion Detection and Fraud Detection, Legal Issues, Mobile Security, Network and Organizational Vulnerability Analysis, Network Security, Privacy-Enhancing Technologies, Process based Security Models and Methods, RFID Security and Privacy, Risk planning, Analysis & Awareness, Safety Critical Systems, Secure Enterprise Architectures, Security Issues for Ubiquitous Systems, Security and Privacy in E-Health, Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications, Security and Usability, Security as Quality of Service, Security in Distributed Systems / Distributed Databases, Security in Electronic Payments, Security in Electronic Voting Software Engineering of Dependable Systems, Software Security, Standards, Guidelines and Certification, Survivability of Computing Systems, Temporal Aspects of Dependability, Threats and Attack Modelling, Trusted Computing, Tools for Dependable System Design and Evaluation, Trust Models and Trust Management, VOIP, Wireless Security
58.
 
ARES EU Projects Symposium 2016
ID
789058
Dates
31 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
Based on the success of the workshops for the projects CyberROAD, AU2EU, MUSA, CLARUS and INTER-TRUST in conjunction with ARES 2015 in Toulouse, we cordially invite EU project partners to organize a workshop at “The ARES EU Projects Symposium” – a co-located event of the 11th International Conference on Availability, Reliability and Security (ARES).
Contact
Email: office@ares-conference.eu
59.
 
SANS Northern Virginia - Crystal City 2016
ID
806468
Dates
06 Sep 2016 - 11 Sep 2016
Location
Arlington, United States
Abstract
You are invited to return to Arlington, Virginia on September 6-11. Why not get your Cybersecurity training in close to DC at SANS Northern Virginia - Crystal City 2016? We are bringing our top courses and instructors to make this the perfect training event for you! Gain the skills and learn about the tools you need to protect your organization from security breaches and attack risk.

Put the skills you'll learn to practical use and join more than 79,000 GIAC certified professionals who use their training to keep their assets safe!

Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, hacking, hacker techniques, exploits, incident handling, penetration testing, web applications, web app penetration testing, forensics, digital forensics, Windows forensics, management, strategic planning
60.
 
BalkanCryptSec 2016 — International Conference on Cryptography and Information Security
ID
779508
Dates
08 Sep 2016 - 09 Sep 2016
Location
Bucharest, Romania
61.
 
SANS Network Security 2016
ID
799175
Dates
10 Sep 2016 - 19 Sep 2016
Location
Las Vegas, United States
Abstract
We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity! SANS will bring you the best in network security training, certification, and up-to-the-minute research on the most important topics in the industry today.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, penetration testing, pen testing, social engineering, cyber threat intelligence, cyber threats, cyber attacks, critical security controls, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, PowerShell, continuous monitoring, security operations, cloud security, web app penetration testing, physical penetration testing, active defense, cyber deception, network penetration testing, industrial control systems, auditing, Python, mobile device security, virtualization, exploit writing, forensics, network forensics, digital forensics, Windows forensics, incident response, Mac forensics, memory forensics, smartphone forensics, malware, management, CISSP, risk management, security awareness, strategic planning, project management, web application security, secure coding, auditing, SCADA, active defense
62.
 
Oceania CACS 2016
ID
800302
Dates
11 Sep 2016 - 13 Sep 2016
Location
Gold Coast, Australia
Abstract
Learn from world-changing thinkers and innovators in information systems audit, control and security Oceania CACS 2016 is the premier event in our region for IS Governance, IS Security and IS Assurance professionals.
63.
 
IWSEC 2016 — The 11th International Workshop on Security
ID
774232
Dates
12 Sep 2016 - 14 Sep 2016
Location
Tokyo, Japan
Abstract
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2016. Topics of interest for IWSEC 2016 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:

- Big Data Analysis for Security

- Critical Infrastructure Security

- Cryptanalysis

- Cryptographic Protocols

- Cybersecurity Economics

- Digital Forensics

- Enriched Cryptography

- Formal Methods

- IoT security

- Machine Learning for Security

- Malware Countermeasures

- Measurements for Cybersecurity

- Multiparty Computation

- Post Quantum Cryptography

- Privacy Preserving

- Real World Cryptography

- Visualization for Security

Contact
Email: iwsec2016-staff@klab.is.sci.toho-u.ac.jp
Topics
Cybersecurity, Internet of Things, security engineering, risk management, HCI, privacy
Related subject(s)
64.
 
Rock Stars of Risk Based Security
ID
793615
Start date
13 Sep 2016
Location
Seattle, Washington, United States
Abstract
What Do Google, Adobe, Intel Health and Life Sciences, and PayPal Know About Risk-based Security That You Need to Know?

Lots!

The attackers have gotten more sophisticated. No company or person is safe. The only way to protect your organization and your personal data in 2016 is with a strong risk-based security solution. At Rock Stars of Risk-based Security, we’ve brought together the real leaders in this critical technology – Google, Adobe, PayPal, Intel Health and Life Sciences, and others – to talk about the trends, risk-based security programs and advice on how you can develop real-world security solutions that work for your organization – and that don’t disrupt your operations.

65.
 
Weiterbildung — Datenschutzbeauftragter
ID
752660
Dates
19 Sep 2016 - 22 Sep 2016
Location
Offenbach, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach, Datenschutz Fortbildung, Datens
66.
 
Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte
ID
752808
Dates
19 Sep 2016 - 22 Sep 2016
Location
Offenbach, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten - Datenschutzbeauftragter
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Daten
67.
 
HAKON — HAKON- International Information Security Meet
ID
806284
Dates
30 Sep 2016 - 02 Oct 2016
Location
Indore, India
Abstract
The International Information Security Meet “ Hakon’2016, UNCOVER THE EBOLA OF UNDERGROUND BLACK MARKET – A NEW ERA OF DIGITAL TERRORISM. HAKON- International Information Security meet is a unique event, where the best brains in Cyber Security Society with mandatory Steps TO SECURE DIGITAL INDIA – Moving Forward with the Information Security Leaders to make the dream of Digital INDIA SUCCESSFULLY. HAKON International Information Security Meet will be a stepping stone for young professionals, information security enthusiasts, hackers, coders, programmers, security and network professionals, web developers, government, specially Cyber Cell Officers and enterprise people and for all who cares about Information Security Seriously. We have successfully completed 2 years, with a vision to spread awareness among the society & Nation; we are on our Journey to bring together, the brightest mind within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global threat landscape.
Contact
Sadhana Ojha;     Phone: [+917771888835];     Email: ojhasadhana85@gmail.com
Topics
Information Security Meet, Information Security Conference, Cyber Security Summit, IT Security Conference, Digital Forensics, Workshop, Security Conference
68.
 
HAKON- International Information Security Meet
ID
799379
Start date
02 Oct 2016
Location
Indore, India
Abstract
The International Information Security Meet “ Hakon’2016, UNCOVER THE EBOLA OF UNDERGROUND BLACK MARKET – A NEW ERA OF DIGITAL TERRORISM. HAKON- International Information Security meet is a unique event, where the best brains in Cyber Security Society with mandatory Steps gather TO SECURE DIGITAL INDIA – Moving Forward with the Information Security Leaders to make the dream of Digital INDIA SUCCESSFULLY. HAKON International Information Security Meet will be a stepping stone for young professionals, information security enthusiasts, hackers, coders, programmers, security and network professionals, web developers, government, specially Cyber Cell Officers and enterprise people and for all who cares about Information Security Seriously. We have successfully completed 2 years, with a vision to spread awareness among the society & Nation; we are on our Journey to bring together, the brightest mind within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global threat landscape. Ninja’s Information Security convention is a platform for security analysts, ethical hackers, professionals, and students to present their technical research papers and show case their skills , Attendees to be the witness of the most advanced talks in the field of Information Security with outstanding Speakers.
Contact
Sadhana Ojha;     Phone: [+917771818845];     Email: director@ninjasecurity.co.in
Topics
IT Security Meet, Information Security Meet, Information Security Conference, Information Security Convention, Cyber Security Meet, Cyber Security Conference, Cyber Security Convention, IT Security Conference, Digital Forensics Workshop, Conference for Digital Forensics, Research Paper for IT
69.
 
Rock Stars of Pervasive, Predictive Analytics
ID
793591
Start date
18 Oct 2016
Location
Mountain View, California, United States
Abstract
The Rock Stars of Pervasive, Predictive Analytics

Want to know how to avoid the 4 biggest problems of predictive analytics – from the Principal Data Scientist at Microsoft? Take a little time to discover how predictive analytics are used in the real world, like at Orbitz Worldwide or Halliburton. You can stop letting traditional perspectives limit you with help from Mashable’s chief data scientist.

70.
 
Weiterbildung — Datenschutzmanager
ID
752701
Dates
07 Nov 2016 - 08 Nov 2016
Location
Offenbach, Germany
Abstract
Zweitägiger Praxislehrgang zum Datenschutzmanagement
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
71.
 
Weiterbildung — Kundendatenschutz
ID
754708
Dates
14 Nov 2016 - 15 Nov 2016
Location
Offenbach, Germany
Abstract
Zweitägiger Praxislehrgang zur rechtskonformen Verarbeitung personenbezogener Kundendaten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
72.
 
WorldCIS-2016 — World Congress on Internet Security
ID
803522
Dates
14 Nov 2016 - 16 Nov 2016
Location
London, United Kingdom
Abstract
The WorldCIS-2016 is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Contact
Email: info@worldcis.org
Topics
Cyber Security, Internet Security, Web Services and Performance, Data Security, Software Architectures, Biometrics
Related subject(s)
Event website
73.
 
Weiterbildung — Datenschutzbeauftragter
ID
752703
Dates
14 Nov 2016 - 17 Nov 2016
Location
Hamburg, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach, Datenschutz Fortbildung, Datens
74.
 
Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte
ID
752807
Dates
14 Nov 2016 - 17 Nov 2016
Location
Hamburg, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten - Datenschutzbeauftragter
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Daten
75.
 
SANS Healthcare Cyber Security Summit & Training 2016
ID
802832
Dates
14 Nov 2016 - 21 Nov 2016
Location
Houston, United States
Abstract
SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the new healthcare environment. You'll have the opportunity to meet with leaders from top organizations and see what really works in securing healthcare.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, healthcare IT, healthcare cybersecurity, healthcare security, hacking, hacking tools, hacker techniques, exploits, incident handling, management
76.
 
Weiterbildung — Verfahrensbeschreibungen und Vorabkontrolle im Datenschutz
ID
756454
Start date
17 Nov 2016
Location
Offenbach, Germany
Abstract
Gesetzliche Forderungen in der betrieblichen Praxis umsetzen
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
77.
 
Mycrypt 2016 — Int'l Conference on Cryptology & Malicious Security
ID
779538
Dates
01 Dec 2016 - 02 Dec 2016
Location
Kuala Lumpur, Malaysia
78.
 
Asiacrypt — Asiacrypt 2016
ID
670727
Dates
04 Dec 2016 - 08 Dec 2016
Location
Hanoi, Vietnam
79.
 
ICITST-2016 — The 11th International Conference for Internet Technology and Secured Transactions
ID
803626
Dates
05 Dec 2016 - 07 Dec 2016
Location
Barcelona, Spain
Abstract
The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Contact
Sean Mears;     Phone: [01268523262];     Email: info@icitst.org
Event website
80.
 
Weiterbildung — Datenschutz Update
ID
752685
Start date
07 Dec 2016
Location
Offenbach, Germany
Abstract
Eintägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
81.
 
ICCWS 2017 — 12th International Conference on Cyber Warfare and Security
ID
802730
Dates
02 Mar 2017 - 03 Mar 2017
Location
Dayton, United States
Abstract
For the past 10 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings in the form of empirical studies, case histories and other theoretical and practical contributions. In addition doctoral degree candidates find this conference a valuable opportunity to network with others and have the opportunity to present papers and posters.
Contact
Elaine Hayne;     Phone: [01189724148];     Email: elaine@academic-conferences.org
Topics
Cyber Warfare Cyber Defence Cyber Terrorism Cyber Security Cyber Crime Cloud Security Social networking threats Big Data Security Psychological Warfare Digital Forensics

Good to know...

You can advertise your event or services in this space.

Last updated: 30 October 2071