COMS

Calendar of upcoming scientific conferences

Home | Conference Management System | Conference Listings | Advertise | Contact | About
German French English
You are in: HomeConference ListingsInformatics → Information Security and Information Privacy

Conference Management Software

Our Conference Management Software (COMS) can be used for online:

  • registration
  • payment
  • paper submission
  • review process
  • paper selection
  • production of the book of abstracts

Read more ...
Try our demo online

Conferences and Meetings on Information Security and Information Privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.Security of symmetric ciphers in network protocols
 Dates 25 May 2015 → 29 May 2015
[ID=670560] Go to top of page
 LocationEdinburgh, United Kingdom
 Weblink http://www.icms.org.uk/workshop.php?id=338
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
2.PHDays — Positive Hack Days
 Dates 26 May 2015 → 27 May 2015
[ID=672517] Go to top of page
 LocationMoscow, Russia
 Abstract PHDays considers various preferences of the entire information community and covers the most topical issues related to information security.
 Topics Security of critical information systems, Fraud management, Cybercrimes and investigation of incidents, Government and corporate security in the era of WikiLeaks, Cyberwar and cyberspying
 Weblink http://www.phdays.com/
 Contact Email: alashkov@ptsecurity.ru
  
3.C2SI Berger — 2015 International Conference in "Codes, Cryptology and Information Security "In honor of Professor Thierry BERGER"
 Dates 26 May 2015 → 28 May 2015
[ID=667733] Go to top of page
 LocationRabat, Morocco
 Abstract The conference has two objectives. Firstly, it aims at paying homage to Professor Thierry Berger for his efforts to develop teaching and research at the fields of cryptography, coding theory and security of information at Mohammed V University in Rabat. Secondly, it aims at bringing together experts and young researchers from all over the world to ensure exchange of ideas and discuss recent developments in the areas that have intersted Pr. T. Berger.
 Weblink http://www.fsr.um5a.ac.ma/C2SI-Berger2015/index.php
 Related subject(s) Applied Maths: Cryptography and Information Security
  
4.ESC — European Security Conference
 Dates 01 Jun 2015 → 02 Jun 2015
[ID=703877] Go to top of page
 LocationLisbon, Portugal
 Abstract The 2015 European Security Conference is scheduled for June 1-2, 2015, in Lisbon, Portugal. The Conference is the European extension of the Annual Security Conference that has been held in Las Vegas (USA) for over a decade. The conference attracts a nice mix of participants from academia, government and industry. Organizers for the 2015 event is ISEG, University of Lisbon (Portugal). Administrative offices for the conference are at ISEG, University of Lisbon. Conference theme for 2015 is: Security in the Internet of Things
 Topics Information Security, Security, Information Systems, Information Technology
 Weblink http://secconf.iseg.ulisboa.pt/
 Contact Sergio Nunes; Email: esc@iseg.ulisboa.pt
  
5.SACMAT '15 — 20th ACM Symposium on Access Control Models and Technologies
 Dates 01 Jun 2015 → 03 Jun 2015
[ID=659252] Go to top of page
 LocationVienna, Austria
 Weblink http://www.sacmat.org
  
6.2015 IAEA International Conference on Computer Security in a Nuclear World
 Dates 01 Jun 2015 → 05 Jun 2015
[ID=650143] Go to top of page
 LocationIAEA headquarters in Vienna, Austria
 Abstract The purpose of the conference is to: (a) review the international community’s experience and achievements to date in strengthening computer security within the framework of nuclear security; (b) enhance understanding of current approaches for computer security worldwide within nuclear regimes, and identify trends; and (c) provide a global forum for competent authorities, operators and other entities engaged in computer security activities relevant to nuclear security.
 Topics Cyberthreats in Nuclear Security, Computer Security and System Design for Systems at Nuclear Facilities, Coordination for Ensuring Computer Security in a Nuclear Security Regime, Nuclear Security Regulatory Approaches to Information and Computer Security, Computer Security Programmes at Licensed Facilities, Computer Security Management in Nuclear Security, Computer Security Culture and Capacity Building for Nuclear Security, International and Legal Considerations in Relation to Computer Security at Nuclear Facilities, Special Topics
 Weblink http://www-pub.iaea.org/iaeameetings/46530/International-Conference-on-Computer-Security-in-a-Nuclear-World-Expert-Discussion-and-Exchange
 Related subject(s) Nuclear Energy and Radwaste
  
7.ICS Houston Summit & Training
 Dates 01 Jun 2015 → 05 Jun 2015
[ID=700117] Go to top of page
 LocationHouston, United States
 Topics computers, computing, security, information security, information technology, ICS, SCADA, management, defense, incident response, infrastructure
 Weblink http://www.sans.org/u/yy
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
8.20th Infosecurity Europe 2015
 Dates 02 Jun 2015 → 04 Jun 2015
[ID=649523] Go to top of page
 LocationLondon, United Kingdom
 Abstract Infosecurity Europe is Europe's number one Information Security conference and exhibition and the most-attended information security event in Europe. It is a free exhibition featuring not only over 345 exhibitors and the most diverse range of new products and services but also an unrivalled education programme, 120 hours of free education, over 165 expert speakers and over 13,000 unique visitors representing every segment of the industry.
 Weblink http://www.infosec.co.uk/
  
9.ACNS'15 — 13th International Conference on Applied Cryptography and Network Security
 Dates 02 Jun 2015 → 05 Jun 2015
[ID=664685] Go to top of page
 LocationNew York, United States
 Abstract The annual ACNS conference focuses on innovative results in applied cryptography and network and computer security. Both academic research works as well as developments in industrial and technical frontiers fall within the scope of the conference.
 Weblink http://acns2015.cs.columbia.edu/
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
10.WISSE 2015 — Fifth International Workshop on Information Systems Security Engineering
 Start date08 Jun 2015
[ID=700048] Go to top of page
 LocationStockholm, Sweden
 Abstract Information systems security problems are currently a widespread and growing concern that covers most of the areas of society, such as business, domestic, financial, government, healthcare, and so on. The scientific community has realized the importance of aligning information systems engineering and security engineering in order to develop more secure information systems. Nevertheless, there is lack of an appropriate event that will promote information systems security within the context of information systems engineering. The proposed workshop fulfils this gap. The workshop aims to provide a forum for researchers and practitioners to present, discuss and debate on one hand the latest research work on methods, models, practices and tools for secure information systems engineering, and on the other hand relevant industrial applications, recurring challenges, problems and industrial led solutions at the area of secure information systems engineering.
 Topics Information System Security engineering; data protection;
 Weblink http://gsya.esi.uclm.es/WISSE2015/index.htm
 Contact Nadira Lammari, CNAM-PARIS; Email: lammari@cnam.fr
  
11.Weiterbildung — IT Security Manager
 Dates 08 Jun 2015 → 11 Jun 2015
[ID=677660] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract - Information – Security – Manager (ISM)
 Topics IT-Security, IT-Grundschutz, IT-Sicherheit, Sicherheitsmanagement, ISO 27001, Informationssicherheit, IT-Systeme, Information-Security-Manager, Informationssicherheit, ISM
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/210/IT_Security_Manager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
12.IEEE ICCC Workshop on SPIC 2015 — The First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems in conjunction with IEEE ICC 2015
 Dates 08 Jun 2015 → 12 Jun 2015
[ID=654588] Go to top of page
 LocationLondon, United Kingdom
 Abstract Recent advances in networking, communications, computation, software, and hardware technologies have revolutionized the way humans, smart things, and engineered systems interact and exchange information. The Internet of Things (IoT) and Cyber-Physical Systems (CPS), which are the major contributors to this area, will fuel the realization of this new, globally interconnected cyber-world. Yet, the success, prosperity, and advancement of IoT and CPS systems strongly depend on the security, privacy & trust of the IoT and cyber-physical devices as well as the sensitive data being exchanged. While these technologies offer a lot of new possibilities, the increasing complexity of hardware and software as well as the worldwide access increase the vulnerability to security attacks. Successful attacks targeted to IoT devices and CPS systems have in common that not only a single computer is affected, but also interconnected technical systems allowing interaction with the physical world are influenced leading to malfunction of devices and control systems with severe financial, environmental and health losses. This fact highlights the need to develop novel tools that will constitute the heart of a much-needed science of security for IoT & CPS. The goal of the SPIC workshop is to bring together internationally leading academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results aimed at addressing all aspects of security and privacy for IoT & CPS.
 Topics IoT, CPS, Security, Privacy, Trust, Communications, Networking, RFID, Smart grids, Sensor, Actuator technologies, Hardware, Software, Test-bed, protocol
 Weblink http://icc2015.ieee-icc.org/
 Contact Qinghe Du; Phone: [+86-18220855266]; Email: duqinghe@mail.xjtu.edu.cn
  
13.SECITC '15 — 8th Int'l Conference on Security for Information Technology&Communications
 Dates 11 Jun 2015 → 12 Jun 2015
[ID=664672] Go to top of page
 LocationBucharest, Romania
 Weblink http://www.secitc.eu/
  
14.FNSS — Future Network Systems and Security
 Dates 11 Jun 2015 → 13 Jun 2015
[ID=702706] Go to top of page
 LocationParis, France
 Abstract The network of the future is envisioned as an effective, intelligent, adaptive, active and high performance Internet that can enable applications ranging from smart cities to tsunami monitoring. The network of the future will be a network of billions or trillions of entities (devices, machines, things, vehicles) communicating seamlessly with one another and is rapidly gaining global attention from academia, industry, and government. The International Conference on Future Networks Systems and Security aims to provide a forum that brings together researchers from academia, practitioners from industry, standardization bodies, and government to meet and exchange ideas on recent research and future directions for the evolution of the future Internet. The technical discussion will be focused on the technology, communications, systems and security aspects of relevance to the network of the future.
 Topics IoT, RFID
 Weblink http://www.deakin.edu.au/information-technology/research/fnss-2015
 Contact Selwyn piramuthu; Phone: [+1(352)392-8882]; Email: selwyn@ufl.edu
 Related subject(s) Sensor Networks; Mobile Computing & Telecommunication
  
15.HASP '15 — The Fourth Workshop on Hardware and Architectural Support for Security and Privacy
 Start date13 Jun 2015
[ID=705797] Go to top of page
 LocationPortland, OR, United States
 Weblink http://caslab.eng.yale.edu/workshops/hasp2015/index.html
 Related subject(s) Computing Hardware
  
16.SANSFIRE 2015
 Dates 13 Jun 2015 → 20 Jun 2015
[ID=700116] Go to top of page
 LocationBaltimore, United States
 Topics computers, computing, security, information security, information technology, hacking, ethical hacking, hacker tools, hacker techniques, intrusion detection, Windows, Linux, UNIX, cloud security, cloud computing, web apps, penetration testing, IPv6, virtualization, Metasploit, exploits, exploit development, forensics, memory forensics, digital forensics, Smartphone forensics, network forensics, management, auditing, SCADA, industrial control systems
 Weblink http://www.sans.org/u/yD
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
17.CISIS — 8th International Conference on Computational Intelligence in Security for Information Systems
 Dates 15 Jun 2015 → 17 Jun 2015
[ID=693200] Go to top of page
 LocationBurgos, Spain
 Abstract CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.

CISIS is included in the ranking of the best conferences (B category) established by the Computer Science Conference Ranking of the Computing Research and Education Association of Australasia (in 2008), and Excellence in Research for Australia (in 2010).

 Weblink http://cisis.usal.es/
 Contact Álvaro Herrero; Email: cisis@usal.es
 Related subject(s) Multidisciplinary or General Events in Informatics
  
18.IH&MMSec '15 — ACM Information Hiding and Multimedia Security Workshop
 Dates 17 Jun 2015 → 19 Jun 2015
[ID=659311] Go to top of page
 LocationPotland, OR, United States
 Weblink http://www.ihmmsec.org/
 Related subject(s) Multimedia, Computer Graphics and Visualization
  
19.CCCC-15 — Copenhagen Cybercrime Conference 2015
 Start date18 Jun 2015
[ID=718984] Go to top of page
 LocationCopenhagen, Denmark
 Abstract Just within a few years, the Copenhagen Cybercrime Conference has become the premier cybersecurity event of the Nordics. Bringing together cyber security researchers and practitioners from different sectors and industries, the conference represents a unique platform for sharing latest findings, trends and best practices from the field of cybercrime. Hosted by CSIS, Confederation of Danish Industry and Ministry of Business and Growth, this year’s conference is going to take place at DI headquarters on June 11, 2015. It is going to offer 16 presentations distributed across a number of tracks and dealing with topics such as the Internet of things, APTs, encryption and many others.
 Topics Nordics Scandinavia Microsoft Security BOTnets APTs crimeware Cybercrime
 Weblink http://cccc-2015.com/
 Contact Maria Holla; Phone: [+458813600]; Email: mah@csis.dk
  
20.WEIS — 14th Workshop on the Economics of Information Security
 Dates 22 Jun 2015 → 23 Jun 2015
[ID=687097] Go to top of page
 LocationDelft, Netherlands
 Weblink http://weis2015.econinfosec.org/
  
21.WiSec 2015 — 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks
 Dates 22 Jun 2015 → 26 Jun 2015
[ID=670614] Go to top of page
 LocationNew York City, NY, United States
 Weblink http://www.sigsac.org/wisec/WiSec2015/
 Related subject(s) Applied Maths: Cryptography and Information Security; Mobile Computing & Telecommunication
  
22.SANS Rocky Mountain 2015
 Dates 22 Jun 2015 → 27 Jun 2015
[ID=700104] Go to top of page
 LocationDenver, United States
 Topics computing, computers, security, information security, intrusion detection, hacking, hacker tools, hacker techniques, penetration testing, mobile devices, mobile device security, SCADA
 Weblink http://www.sans.org/u/yI
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
23.PTDCS 2015 — Workshop on Privacy by Transparency in Data-Centric-Services
 Dates 24 Jun 2015 → 26 Jun 2015
[ID=700658] Go to top of page
 LocationPoznan, Poland
 Abstract Regarding electronic identities and increasing transformation of a society and industry towards a digital society, please let me draw your attention on the workshop "Privacy by Transparency in Data-Centric Services (PTDCS)". PTDCS #ptdcs15 follows up the NII Shonan Meeting 032 “Privacy by Transparency for Data-Centric Services”. PTDCS is a workshop held in conjunction with the BIS'15 conference in Posen, Poland. It should bring researchers and practitioners together to explore transparency-based mechanisms, such as privacy dashboards, economic explanations of the use of privacy and value of data, as well as user behavior.
 Topics Accountability in data-centric services, Big Data, privacy, security, economics, transparency, user behavior, usage control
 Weblink http://bis.kie.ue.poznan.pl/bis2015/workshops/ptdcs-2015/
 Contact Sven Wohlgemuth; Email: sven.wohlgemuth@cased.de
  
24.SPE2015 — IEEE Services 2015 Visionary Track - Security and Privacy Engineering (SPE 2015) Theme
 Dates 27 Jun 2015 → 02 Jul 2015
[ID=706087] Go to top of page
 LocationNew York, , United States
 Weblink http://sesar.di.unimi.it/SPE2015/
  
25.Weiterbildung — Informationssicherheitsmanagement gemäß ISO 27001
 Dates 29 Jun 2015 → 30 Jun 2015
[ID=677824] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zur Einführung des Informationssicherheitsmanagements
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/216/Informationssicherheitsmanagement_gemäß_ISO_27001.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
26.ACISP 2014 — 20th Australasian Conference on Information Security and Privacy
 Dates 30 Jun 2015 → 01 Jul 2015
[ID=670668] Go to top of page
 LocationBrisbane, Australia
 Weblink http://acisp2015.qut.edu.au
 Related subject(s) Applied Maths: Cryptography and Information Security
  
27.PETS — Privacy Enhancing Technologies Symposium
 Dates 30 Jun 2015 → 02 Jul 2015
[ID=664660] Go to top of page
 LocationPhiladelphia, United States
 Abstract The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy and anonymity experts from around the world to discuss recent advances and new perspectives. PETS addresses the design and realization of privacy services for the Internet and other data systems and communication networks.
 Weblink https://www.petsymposium.org/2015/
  
28.Weiterbildung — Datenschutz Update
 Start date01 Jul 2015
[ID=677948] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract 1-tägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/220/Datenschutz_Update.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
29.HAISA 2015 — International Symposium on Human Aspects of Information Security & Assurance
 Dates 01 Jul 2015 → 03 Jul 2015
[ID=693590] Go to top of page
 LocationLesvos, United Kingdom
 Abstract We invite you to participate in the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015). The event will be held over the 1-3 July 2015 in the city of Mytilene on the island of Lesvos, Greece in association with the Tenth International Workshop on Digital Forensics and Incident Management (WDFIA 2015). This symposium, the ninth in our series, will bring together leading figures from academia and industry to present and discuss the latest advances in information security from research and commercial perspectives.
 Topics Information security culture, Awareness and education methods, Enhancing risk perception, Public understanding of security, Usable security, Psychological models of security software usage, User acceptance of security policies and technologies, User-friendly authentication methods, Biometric technologies and impacts, Automating security functionality, Non-intrusive security, Assisting security administration, Organizational governance for information assurance, Simplifying risk and threat assessment, Understanding motivations for misuse, Social engineering and other human-related risks, Privacy attitudes and practices, Computer ethics and security
 Weblink http://haisa.org/
 Contact HAISA 2015 Secretariat; Email: admin@haisa.org
  
30.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 06 Jul 2015 → 09 Jul 2015
[ID=677238] Go to top of page
 LocationPotsdam, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
31.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 06 Jul 2015 → 09 Jul 2015
[ID=677543] Go to top of page
 LocationPotsdam, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
32.InfoSec 2015 - INTERNATIONAL SUMMER SCHOOL ON INFORMATION SECURITY
 Dates 06 Jul 2015 → 10 Jul 2015
[ID=692471] Go to top of page
 LocationTarragona, Spain
 Weblink http://grammars.grlmc.com/InfoSec2015/
 Related subject(s) Training in Computer Science, Courses
  
33.SANS Capital City 2015
 Dates 06 Jul 2015 → 11 Jul 2015
[ID=701138] Go to top of page
 LocationWashington, DC, United States
 Abstract Cybersecurity Training Washington DC Make your plans now to attend SANS Capital City 2015 this July and use what you learn in the classroom as soon as you return to the office. Choose from our outstanding offering of courses. We know that training and travel budgets are tight, so we are offering courses at the Capital Hilton. Many courses offered at Capital City 2015 are associated with a GIAC Certification attempt. Put the skills you'll learn to practical use and join GIAC certified professionals who make the Cybersecurity industry safe! Visit the GIAC page for more information and register for your certification attempt today! Extend your training experience and advance your career by enrolling in a master's degree or a graduate certificate from the SANS Technology Institute - regionally accredited and eligible for tuition reimbursement plans. Choose from a master's in Information Security Engineering or a graduate certificate in Penetration Testing or Incident Response. Apply today! SANS training is well known for being relevant and pragmatic. Our award-winning faculty has proven they understand the challenges you face on a daily basis. Their real-world experience increases the practical value of the course material. Here is what SANS alumni had to say about their SANS Training: "Lots of information that was useful and directly applicable." - Joseph Weber, Regions Financial "This is a good overview of a broad topic that's presented in a very organized and understandable format." - Cory Mock, Nissan North America "SANS course work is the most thorough learning available anywhere. What you learn is not only conceptual, but it also is hands-on showing you what you do, why you do it, and how you can apply what you learn to real-world solutions to problems." - Duane Tucker, Barmark Partners "This course adds some more techniques and processes along with a whole bunch of new fundamentals and tools to the arsenal." - Toby Andrews, Wetrock.net Our campus for this event, the Capital Hilton, is located two blocks north of the White House along K Street. This hotel is located conveniently to allow you to explore the US Capitol, historic monuments, or the Smithsonian Museums. A discounted room rate of $205 Single/Double is available to SANS students until June 11, but space is limited so book early! Washington, DC is a fabulous destination for training with all that there is to do. Places to visit include: National Mall Lincoln Memorial President Lincoln's Cottage Washington Monument Library of Congress Arlington National Cemetery Smithsonian National Air and Space Museum Vietnam Veterans Memorial Wall National Portrait Gallery National Postal Museum National Zoo See the original Declaration of Independence, the U.S. Constitution, and the Bill of Rights at the National Archives To save $400, enter discount code "EarlyBird15" and pay for any 4-6 day course by May 13. Register today to join us at SANS Capital City 2015! http://www.sans.org/u/yN - Register with discount code "EarlyBird15" and receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, May 13, 2015. - Register with discount code "EarlyBird15" and receive a discount of up to $200 for any 4-6 day course paid for by Wednesday, June 10, 2015. - If the order is not paid by the early registration deadline the discount amount will automatically be reduced to the next valid early registration discount amount. - No refunds available after Wednesday, June 17, 2015.
 Topics computing, computers, security, cyber security, information security, hacking, hacker tools, hacker techniques, web apps, web applications, penetration testing, virtualization, cloud security, cloud computing, exploit writing
 Weblink http://www.sans.org/u/yN
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
34.CECC '15 — 15th Central European Conference on Cryptology
 Dates 08 Jul 2015 → 10 Jul 2015
[ID=670623] Go to top of page
 LocationKlagenfurt, Austria
 Weblink http://www.math.aau.at/cecc2015/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
35.DBSec 2015 — 29th IFIP WG11.3 Working Conf. on Data and Applications Security & Privacy
 Dates 13 Jul 2015 → 15 Jul 2015
[ID=670611] Go to top of page
 LocationFairfax, United States
 Weblink http://dbsec2015.di.unimi.it
 Related subject(s) Applied Maths: Cryptography and Information Security
  
36.Lightweight Cryptography Workshop 2015
 Dates 20 Jul 2015 → 21 Jul 2015
[ID=670654] Go to top of page
 LocationGaithersburg, MD, United States
 Weblink http://www.nist.gov/itl/csd/ct/lwc_workshop2015.cfm
 Related subject(s) Applied Maths: Cryptography and Information Security
  
37.SANS San Jose 2015
 Dates 20 Jul 2015 → 25 Jul 2015
[ID=703408] Go to top of page
 LocationSan Jose, United States
 Abstract SANS exceptional cybersecurity training comes to San Jose in July. We are pleased to invite you to SANS San Jose 2015, July 20-25. Are you ready to immerse yourself in the most intense computer training experience available anywhere? Do you need to become a more effective leader when implementing cybersecurity improvements for your organization? Do you need a more in-depth knowledge of the theory and implementation of computer security, virtualization, or securing your private cloud? This new event has been planned to meet your needs. Start making your plans now to attend SANS San Jose 2015! The SANS promise is that on your first day back at work after a SANS training, you will be able to put into practice the skills you learned. SANS instructors are experts at providing training that will keep that promise. Choose from 5-6 day courses, with their corresponding certifications, hands-on exercises, tips, and tricks you'll gain in the classroom for use in the workplace! Offered at SANS San Jose 2015 is a NEW course, SEC550: Active Defense, Offensive Countermeasures and Cyber Deception taught by Bryce Galbraith. Here is a brief description: SEC550: Active Defense, Offensive Countermeasures and Cyber Deception is based on the Active Defense Harbinger Distribution live Linux environment funded by the Defense Advanced Research Projects Agency (DARPA). This virtual machine is built from the ground up for defenders to quickly implement Active Defenses in their environments. The course is very heavy with hands-on activities - we won't just talk about Active Defenses, we will work through labs that will enable you to quickly and easily implement what you learn in your own working environment. Here's what SANS alumni have said about the value of SANS training: "This is one of the best courses I have had to date and I feel like I have thousands of things to take back to my job." - Ryan Spencer, Reed Elsevier Inc. "I believe this is a very helpful course and provides a lot of supplemental materials, references, and concepts that will really save time and improve quality as someone creates a security awareness program." - Yvonne Bashor, Oregon Legislature "This course provides real-world content and perspectives, data, and tools. The instructor is very knowledgeable and is a great educator." - George Diolamou, Jacob's Engineering "No improvement necessary... The course had very clear and easy to understand instruction with well-structured relevant content." - Geoffrey Davidson, QA Ltd For your accommodations, The Sainte Claire offers a special discounted rate of $211 S/D based on space availability. Government per diem rooms are available with proper ID. Simply call reservations and ask for the SANS government rate. These rates include high-speed Internet in your room and are only available thru June 25, 2015. Book your reservation now! The Sainte Claire is a genuine grand hotel situated in the heart of downtown San Jose. From the Sainte Claire website, "Across the street is the McEnery Convention Center and just steps away from the hotel are countless museums, restaurants and trendy shopping and nightlife on Santana Row. When you stay here you're in the perfect location and the perfect hotel." To follow or tweet about this event, use hashtag #SANSSanJose. Follow SANS at http://twitter.com/SANSInstitute Take a first-hand look at why SANS is the most trusted source in computer security training, certification, and research. Come see for yourself - register today for SANS San Jose 2015. - Register with discount code "EarlyBird15" and receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, May 27, 2015. - Register with discount code "EarlyBird15" and receive a discount of up to $200 for any 4-6 day course paid for by Wednesday, June 17, 2015. - If the order is not paid by the early registration deadline the discount amount will automatically be reduced to the next valid early registration discount amount. - No refunds available after Wednesday, July 1, 2015.
 Topics computers, computing, cybersecurity, information security, information technology, hacking, hacker tools, hacker techniques, web apps, web applications, penetration testing, active defense
 Weblink http://www.sans.org/u/yS
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
38.SANS Minneapolis 2015
 Dates 20 Jul 2015 → 25 Jul 2015
[ID=703773] Go to top of page
 LocationMinneapolis, United States
 Abstract SANS exceptional cybersecurity training comes to Minneapolis in July. We are pleased to invite you to SANS Minneapolis 2015, July 20-25. Are you ready to immerse yourself in the most intense computer training experience available anywhere? Whether you are just starting your security training or if you are looking for advanced skills and tools, this event will provide solutions. Do you need to become a more effective leader when implementing security improvements for your organization? We are bringing specific help! Do you need a more in-depth knowledge of the theory and implementation of computer security, pen testing, forensics, or securing industrial systems? A look at our course list will show that SANS Minneapolis 2015 has been crafted to meet your needs. Start making your plans now to attend SANS Minneapolis 2015! The SANS promise is that on your first day back at work, after a SANS training, you'll be able to put into practice the skills you learned. SANS instructors are experts at providing training that will keep that promise. Choose from these 5-6 day courses, with their corresponding certifications, hands-on exercises, tips, and tricks you'll gain in the classroom for use in the workplace! Here's what SANS alumni have said about the value of SANS training: "It covers all areas of basic security. Not only were the text books great, doing the labs helped apply what we learned." - Michael Hagen, VSACISAP Korea "It helps me get a better sense of knowing if I am doing things correctly. It also has provided some useful tools-applications already." - Daniel Samuel, UNDP "This course has given me another way to look at security and how we use tools to look at many things in different ways." - Kim Maloney, Oregon Dept. of Transportation "Good pace, very interactive, has great world experiences, ability to fill in gaps, completely engaged. Has been better than I even expected so far." - Matt Shores, IMPD "Extremely engaging course that highlights new ways of looking into incident response." - Ryan Guest, Southern Company For your accommodations, Hilton Minneapolis offers a special discounted rate of $189 S/D based on space availability. Government per diem rooms are available with proper ID. Simply call reservations and ask for the SANS government rate. These rates include high-speed Internet in your room and are only available thru June 26, 2015. Book your reservation now! The Hilton Minneapolis is conveniently connected to the Minneapolis Convention Center. This world-class convention and leisure destination is located near theaters, shops, restaurants, and other cultural attractions -- just steps from Target Center and Target Field. The Mall of America, Minnesota Zoo, and TCF Bank Stadium are just a short drive away. To follow or tweet about this event, use hashtag # SANSmpls. Follow SANS at http://twitter.com/SANSInstitute Take a first-hand look at why SANS is the most trusted source in cybersecurity training, certification, and research. Come see for yourself - register today for SANS Minneapolis 2015. http://www.sans.org/u/12o - Register with discount code "EarlyBird15" and receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, May 27, 2015. - Register with discount code "EarlyBird15" and receive a discount of up to $200 for any 4-6 day course paid for by Wednesday, June 17, 2015. - If the order is not paid by the early registration deadline the discount amount will automatically be reduced to the next valid early registration discount amount. - No refunds available after Wednesday, July 1, 2015.
 Topics information security, information technology, hacking, hacker tools, hacker techniques, exploits, incident handling, penetration testing, web apps, web applications, forensics, Windows forensics, network forensics, digital forensics, management, ICS, SCADA
 Weblink http://www.sans.org/u/12o
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
39.SOUPS '15 — Symposium on Usable Privacy and Security
 Dates 22 Jul 2015 → 24 Jul 2015
[ID=687223] Go to top of page
 LocationOttawa, Canada
 Weblink http://cups.cs.cmu.edu/soups/2015/
  
40.ECCWS — 14th European Conference on Cyber Warfare and Security
 Dates 02 Aug 2015 → 03 Aug 2015
[ID=643584] Go to top of page
 LocationHatfield, United Kingdom
 Abstract The 14th European Conference on Cyber Warfare and Security (ECCWS) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat cyber warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
 Topics Cyber conflict Patriotic hackers as an extension of state power Potential military uses of cyber attacks Case studies of cyber attacks in modern conflicts Theoretical cyber conflict scenarios Cyber conflict frameworks Human Factors Cyber-terrorism Principles of i-Warfare Physical security Counter-terrorism security policies, procedures and legislation Information warfare policy SMEs - Small-to-medium Size Enterprises Security model Critical national infrastructure protection Information warfare theory Security implications of “virtualised machines and services e-Health systems as part of a national critical infrastructure Information warfare techniques The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs) Information security governance and management Information warfare and security education Hacking and cracking Biometrics e-Intelligence/counter-intelligence Information Assurance Cryptography : classical and malicious Networked Centric War Malwares and antimalwares technologies Wireless Treats Reflector attacks UCE Threat Agents Art of war Cyber-fraud Particle swarm data mining Computers-as-weapons Risk Management Virtual Intrusion Detection Electro-magnetic pulse weapons Collaborative decision making National security policy Information operations Security policy Acute situational awareness Strategic leadership Firewalls Aircraft Environment Influence campaigns Phishing and spam Digital forensics Psychological warfare Current Anti Virus Technologies Network anomaly detection models PSYOP - PSYOPS Mobile Virus Corporate defence mechanisms Perception management RFID Virus Security for small to medium enterprises Infra-structure warfare SQL Infections Information, computer and network security Military Culture Topography Data Loss Security of the virtual worlds Modern conflict Data Integration SIMAD what can/should be done to protect against this threat? Military approaches ISO 27001 Unidirectional linguistic steganography Compromise path analysis Gaussian empirical rule IT auditing and compliance Defence steganography Natural computing Information Security Architecture Data and service integration Random numbers approximation sequence Artificial immune recognition system security infrastructure Legal issues concerned with information warfare and e-Crime Traffic classification Public Key Infrastructure Non-traditional enemies Subliminal Channel Network Address Translator Ethical, political and social issues relating to information warfare Machine Learning Risk Mathematical-filtering Association of Religions with Warfare Context free grammers SecureMDA Image-processing New trends Information Security Economy Other relevant topics
 Weblink http://academic-conferences.org/eccws/eccws2015/eccws15-home.htm
 Contact Mandy Limbrick; Phone: [+44 (0)1189 724148]; Email: mandy@academic-conferences.org
 Related subject(s) Networks, Internet
  
41.SANS Boston 2015
 Dates 03 Aug 2015 → 08 Aug 2015
[ID=703838] Go to top of page
 LocationBoston, United States
 Abstract SANS exceptional cybersecurity training comes to Boston in August. You are invited to take SANS exceptional training when we return to Boston this August with an awesome training lineup on August 3-8. We are bringing our top courses and best instructors who will ensure that you not only learn the material, but that you can apply it immediately when you return to the office. Put the skills you'll learn to practical use and join nearly 65,000 GIAC certified professionals who make the Cybersecurity industry safe! Earn your Master's Degree at SANS Technology Institute (STI). Take classes in Information Security Management (MSISM) or Engineering (MSISE). Our campus for the event is the Omni Parker House. A special discounted rate of $215.00 Single/Double will be honored based on space availability. Government per diem rooms are available with proper ID; you will need to call reservations and ask for the SANS government rate. These rates include high speed Internet in your room and are only available through July 10, 2015. The Omni Parker House is in the heart of downtown Boston -- located along the Freedom Trail and at the foot of Beacon Hill, Boston Common, Quincy Market, and Faneuil Hall marketplace. Here is a list of Boston attractions and their distance from the hotel: Arts & Culture Theatre District - adjacent Orpheum Theatre - 1 block Emerson Theatre - 3 blocks Historic Opera House - 3 blocks Shubert Theatre - 4 blocks Wilbur Theatre - 4 blocks Children's Museum - 6 blocks Museum of Science - 15 minutes (Green Line on the T) Symphony Hall - 15 minutes (Green Line on the T) DCR Hatch Memorial Shell - 15 minutes (Red Line on the T) Museum of Fine Arts - 11 minute walk Huntington Theatre - 13 minute walk Isabella Stewart Gardner Art Museum - 3 miles JFK Library - 20 minutes (Red Line on the T) Harvard University Museums - 15 minutes (Red Line on the T) MIT Museum - 15 minutes (Red Line on the T) Boston Public Library - 15 minutes (Green Line on the T) Boston Tea Party Ships & Museum - blocks/10 minute walk Museum of Contemporary Art - 15 minute walk Seaport District - 10 minute walk Attractions On the historic Freedom Trail, a historic walking tour Old City Hall - adjacent Government Center - 1 block Old Town Trolley Tours - 2 blocks Massachusetts State house - 2 blocks Faneuil Hall Marketplace/Quincy Market - 5 minute walk New England Aquarium - 10 minute walk Bunker Hill Monument - 2 miles U.S.S. Constitution - 2 miles Old South Meeting House - 2 blocks Fenway Park - 15 minutes (Green Line on the T) Why register for SANS Boston 2015? Here's what past alumni have said about the value of SANS training: "SANS presents superior content, and the opportunity for certification." - Greg Stiger, Oliver Wyman "SANS courses provide practical knowledge and skills that can be immediately applied on the job." - Martin Hristov, Sony "SANS courses have made me want to eat, sleep, and breath security & forensics!" - Cory Flynn, Firewall Experts "SANS is the best security training you can get, period." - Don Lopez, Valley National Bank With a reputation for being the most trusted source for information security training and an eagerness to help you meet your training objectives, SANS is the best choice for cybersecurity education. Don't miss this special SANS training event in Boston this August! We hope to see you there. http://www.sans.org/u/12t - Register with discount code "EarlyBird15" and receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, June 10, 2015. - Register with discount code "EarlyBird15" and receive a discount of up to $200 for any 4-6 day course paid for by Wednesday, July 1, 2015. - If the order is not paid by the early registration deadline the discount amount will automatically be reduced to the next valid early registration discount amount. - No refunds available after Wednesday, July 15, 2015.
 Topics information security, information technology, intrusion detection, hacking, hacker tools, hacker techniques, monitoring, security operations, web apps, web applications, penetration testing, mobile devices, mobile device security
 Weblink http://www.sans.org/u/12t
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses; Training in Computer Science, Courses
  
42.SSIC'2015 — International Conference on Cyber Security of Smart cities, Industrial Control System and Communications
 Dates 05 Aug 2015 → 07 Aug 2015
[ID=716014] Go to top of page
 LocationShanghai, China
 Abstract The International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC 2015) is the first version of an annual conference in the area of cyber security focusing on the industry control system, cloud platform and smart cities. City and industrial control infrastructures are changing with new interconnected systems for monitoring, control and automation. The goal of SSIC is to attract cyber security researchers, industry practitioners, policy makers, and users to exchange ideas, techniques and tools, and share experience related to all practical and theoretical aspects of communications and network security. It will take place on August 05 - 07, 2015, Shanghai, China, which is a global financial center and a popular tourist destination renowned for its historical landmarks such as The Bund, City God Temple and Yu Garden.
 Topics Security, SCADA, Cloud, Smart Cities, Networks
 Weblink http://www.ssic-conf.org
  
43.Cyber Defense Summit & Training
 Dates 11 Aug 2015 → 18 Aug 2015
[ID=708602] Go to top of page
 LocationNashville, United States
 Abstract The mission of SANS' Cyber Defense curriculum, led by Dr. Eric Cole, is to teach individuals the essential skills and techniques needed to protect and secure an organization's critical information assets and business systems.
 Topics cybersecurity, information security, information technology, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, cyber defense, security operations
 Weblink http://www.sans.org/u/1z3
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
  
44.ISSA — 2015 Information Security for South Africa
 Dates 12 Aug 2015 → 14 Aug 2015
[ID=668186] Go to top of page
 LocationJohannesburg, South Africa
 Abstract Information security has evolved and in the last few years there has been renewed interest in the subject worldwide. This is evident from the many standards and certifications now available to guide security strategy. The convergence of technologies like the cloud together with advances in wireless communications, has meant new security challenges for the information security fraternity. It is this fraternity that organisations, governments and communities in general look to for guidance on best practice in this converging world. Identity theft and phishing are on-going concerns. Security mechanisms have become so good and are generally implemented by companies wanting to adhere to good corporate governance, so attackers are now looking to the weak link in the chain, namely the individual user. It is far easier to attack them than attempt to penetrate sophisticated corporate systems. Digital forensic investigations and techniques are used in a bid to apprehend the perpetrators.
 Weblink http://www.infosecsa.co.za
  
45.SANS San Antonio 2015
 Dates 17 Aug 2015 → 22 Aug 2015
[ID=708674] Go to top of page
 LocationSan Antonio, United States
 Abstract Information security training in San Antonio from SANS Institute, the global leader in information security training. SANS proudly brings to San Antonio hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office. The site of SANS San Antonio 2015, August 17-22, is the Hilton Palacio del Rio, located on the banks of the San Antonio River Walk!
 Topics cyber security, information security, information technology, intrusion detection, hacking, hacker tools, hacker techniques, penetration testing, networks, network forensics, forensics, management
 Weblink http://www.sans.org/u/1AZ
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
  
46.Security Awareness Summit & Training 2015
 Dates 17 Aug 2015 → 25 Aug 2015
[ID=713392] Go to top of page
 LocationPhiladelphia, United States
 Abstract SDon't miss the opportunity to learn from your peers on how to build next generation security awareness programs at the SANS Security Awareness Summit in Philadelphia. Hear security awareness officers share inside knowledge on how they took their awareness programs to the next level and how they measured the impact. In addition, you will have the opportunity to share, network and learn from other attendees through a variety of activities.
 Topics cybersecurity, information security, information technology, management, security awareness
 Weblink http://www.sans.org/u/2sM
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
47.NetWare 2015 / SECURWARE 2015 — The Ninth International Conference on Emerging Security Information, Systems and Technologies
 Dates 23 Aug 2015 → 28 Aug 2015
[ID=696762] Go to top of page
 LocationVenice, Italy
 Weblink http://www.iaria.org/conferences2015/NetWare15.html
  
48.ICITCS2015 — 5th International Conference on IT Convergence and Security
 Dates 24 Aug 2015 → 27 Aug 2015
[ID=716886] Go to top of page
 LocationKuala Lumpur, Malaysia
 Abstract ICITCS 2015 is the next event in the series of highly successful International Conferences on Information Science and Applications, previously held in Beijing, China(2014), Macau(2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011). 3rd and 4th Conferences were technically sponsored by IEEE Computer Society and proceedings were published in IEEE Xplore. 1st and 2nd Conferences were technically sponsored by LNEE(Springer) and proceedings were published in LNEE Series. IEEE Xplore and LNEE Series were indexed by EI, ISI, and Scopus.
 Topics IT Convergence, IT Security
 Weblink http://icatse.org/icitcs/
 Contact ICITCS2015 Secretariat; Phone: [(+827076170375)]; Email: icitcs@icatse.org
  
49.ARES 2015 — The 10th International Conference on Availability, Reliability and Security
 Dates 24 Aug 2015 → 28 Aug 2015
[ID=693723] Go to top of page
 LocationToulouse, France
 Abstract ARES will highlight the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security. The ARES conferences have been published by IEEE CPS.
 Topics Business Continuity, Cryptography, Digital Forensics, E-Commerce Dependability, Risk planning, Security Analysis & Awareness, Security and Privacy in E-Health, Security and Privacy, Authorization and Authentication, Network Security
 Weblink http://www.ares-conference.eu
 Contact Yvonne Poul; Email: office@ares-conference.eu
  
50.RISI 2015 — Resilience and IT-Risk in Social Infrastructures 2015
 Dates 24 Aug 2015 → 28 Aug 2015
[ID=700615] Go to top of page
 LocationToulouse, France
 Abstract Resilience gains importance for sustainable welfare of societies with respect to their acceptable adaption to interferences of all kind. In order to prepare for expected interferences and to response to unexpected, inevitable interferences in real-time, current initiatives in computer science and business & information systems engineering aim to analyze huge amount of data from public and private domains and to share derived information with adaptive information systems, e.g. social networks. Realizing adequate and shared IT services implies availability of sufficient authentic, partly personal data from different origins, their aggregation, and secondary use. These services are "data-centric" by definition. One main challenge to be solved for achieving reliable data-centric services within acceptable risks is cross-domain processing of (personal) data in compliance to law, business rules, and social norms. Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for data-centric services and adaptive information systems. The aim of the RISI 2015 workshop is to discuss risk scenarios with data-centric services and approaches for improving "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration.
 Topics Risk assessment and vulnerability analysis for data-centric services, Policy and IT security management for data-centric services, Methods for resilience & best practices
 Weblink http://www.ares-conference.eu/conference/workshops/risi-2015/
 Contact Sven Wohlgemuth; Email: sven.wohlgemuth@cased.de
  
51.WCSF 2015 — The International Workshop on Cloud Security and Forensics
 Dates 24 Aug 2015 → 28 Aug 2015
[ID=701134] Go to top of page
 LocationToulouse, France
 Abstract Cloud computing offers utility oriented Information and Communications Technology (ICT) services to users all over the world. The evolution of cloud computing is driving the design of datacentres by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, logically the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cybersecurity and digital forensic practitioners.
 Topics Cloud Forensics and e-Discovery, Intrusion and Attack Readiness, Cloud Cryptography, Datacentre and Data Security, Big Data Forensics, Security and Privacy for Cloud Computing, Trust and Policy Management, Case Studies of Cloud-based Attacks, Cloud Data Recovery, Private Cloud Security
 Weblink http://www.wcsf.co
 Contact Mark Scanlon; Phone: [none]; Email: chairs@wcsf.co
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing; Networks, Internet
  
52.IWCC 2015 — International Workshop on Cyber Crime
 Dates 24 Aug 2015 → 28 Aug 2015
[ID=703324] Go to top of page
 LocationToulouse, France
 Abstract International Workshop on Cyber Crime (IWCC 2015) is co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015)
 Topics cybersecurity, cyber crime, network security, security
 Weblink http://stegano.net/IWCC2015/
 Contact Wojciech; Phone: [(0012323432)]; Email: wmazurczyk@tele.pw.edu.pl
  
53.SANS Virginia Beach 2015
 Dates 24 Aug 2015 → 04 Sep 2015
[ID=708640] Go to top of page
 LocationVirginia Beach, United States
 Abstract Information security training in Virginia Beach from SANS Institute, the global leader in information security training. At SANS Virginia Beach 2015, SANS offers two weeks of hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Virginia Beach 2015, August 24- September 4, is the Hilton Virginia Beach Oceanfront, located right on the boardwalk.
 Topics information security, cybersecurity, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, security operations, penetration testing, network penetration testing, mobile device security, mobile devices, forensics, Windows forensics, digital forensics, incident response, Mac forensics, malware
 Weblink http://www.sans.org/u/1QN
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
  
54.IWSEC 2015 — The 10th International Workshop on Security
 Dates 26 Aug 2015 → 28 Aug 2015
[ID=664690] Go to top of page
 LocationNara, Japan
 Weblink http://www.iwsec.org/
  
55.SANS Chicago 2015
 Dates 30 Aug 2015 → 04 Sep 2015
[ID=710708] Go to top of page
 LocationChicago, United States
 Abstract Information security training in Chicago from SANS Institute, the global leader in information security training. At SANS Chicago 2015, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Chicago 2015, August 30-September 4, is Palmer House Hilton Hotel, located in downtown Chicago! We are bringing our top-rated courses for your cybersecurity training needs. Taught by SANS top instructors, this event offers an opportunity to learn, network, and practice career-boosting hands-on skills in a more intimate setting. Many of the courses are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join more than 65,000 GIAC certified professionals who make the infosec industry safe. Visit the Certification links on the main page for more information and to register for your certification attempt today. Extend your training experience and advance your career by enrolling in a master's degree or a graduate certificate from the SANS Technology Institute - regionally accredited and eligible for tuition reimbursement plans. Choose from a master's in Information Security Engineering or a graduate certificate in Penetration Testing or Incident Response. Apply today! Again this year, our campus is the Palmer House Hilton Hotel. Attendees have enjoyed this wonderful old hotel that has undergone renovations to enhance the spectacular decor. A special discounted rate of $189 S/D will be honored based on space availability. Government per diem rooms are available with proper ID; you will need to call reservations and ask for the SANS government rate. These rates include high speed Internet in your room and are only available through July 29. Travelers to this city find that downtown Chicago is friendly and clean; people that you meet want you to share their love of their city! A downtown hotel provides easy access to Lake Michigan in all its grandeur where you can stroll Millennium and Grant Parks to see incredible sculpture and gardens. You are close to the Art Institute of Chicago and Macy's on State Street; and you are just blocks from the Magnificent Mile, Water Tower Place, The Shops of Northbridge, and The 900 Shops. Of course there is much, much more with the following attractions also being close to the hotel: Shedd Aquarium, Adler Planetarium, and Field Museum, and all the great dining, theater, symphony, and opera that comes with a major US city. When you attend SANS Chicago 2015, you will see the SANS promise in action - what you learn in the classroom, you will be able to use immediately upon returning to the office. Here's what some of our alumni have to say about their experience: "The instructor responds appropriately, professionally & knowledgeably to all questions even simple ones." - Phil McCullough, ARRT "Really well organized, I think there is not much to improve. Books, slides, and written materials are professional." - Daniel Augustyn. Allstate Insurance "Great! The resources that I learned about are priceless. So much knowledge gained in one week. Awesome." - Craig Bowden, Bowdoin College "Hacker Tools, Techniques, Exploits and Incident Handling is an excellent topic- great instructor. The world is moving in this direction, might as well get ahead of the main stream." - Sanjeev Shah, Honeywell Let your colleagues and friends know about SANS Chicago 2015. Get a first-hand look at why SANS is the most trusted source in computer security research, training, and certification - register today! We look forward to seeing you in Chicago. - Register with discount code "EarlyBird15" and receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, July 8, 2015. - Register with discount code "EarlyBird15" and receive a discount of up to $200 for any 4-6 day course paid for by Wednesday, July 29, 2015. - If the order is not paid by the early registration deadline the discount amount will automatically be reduced to the next valid early registration discount amount. - No refunds available after Wednesday, August 12, 2015.
 Topics computing, computers, cybersecurity, information security, hacking, hacker tools, hacker techniques, exploits, incident handling, coding, CISSP, data security, management
 Weblink http://www.sans.org/u/21m
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
56.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 07 Sep 2015 → 10 Sep 2015
[ID=677226] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
57.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 07 Sep 2015 → 10 Sep 2015
[ID=677608] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
58.ISCISC — International Iranian Society of Cryptology Conference on Information Security and Cryptology
 Dates 08 Sep 2015 → 10 Sep 2015
[ID=719989] Go to top of page
 LocationRasht, Iran
 Abstract The objective of ISCISC is to bring together researchers, engineers and practitioners interested in various aspects of information security and cryptology. The conference aims to provide a forum for academicians, engineers, specialists, and students from all around the world to meet and discuss the latest developments in theory, emerging technologies, and progress in standards, services and their applications in various areas of information security. ISCISC encourages researchers, developers and practitioners to submit their original papers, and organize workshops on various new emerging topics. Industrial exhibitions are held in conjunction with the main conference. Keynote/plenary talks and panel discussions are other conference highlights.
 Weblink http://iscisc2015.guilan.ac.ir/index.php
 Related subject(s) Applied Maths: Cryptography and Information Security
  
59.SIN 2015 — 8th International Conference on Security of Information and Networks
 Dates 08 Sep 2015 → 10 Sep 2015
[ID=702030] Go to top of page
 LocationSochi, Russia
 Abstract In succession to the successful SIN 2007 - SIN 2014, the 8th International Conference on Security of Information and Networks (SIN 2015) provides an international forum for presentation of research and applications of security in information and networks. SIN 2015 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice.
 Weblink http://www.sinconf.org
  
60.SANS Crystal City 2015
 Dates 08 Sep 2015 → 13 Sep 2015
[ID=713459] Go to top of page
 LocationArlington, United States
 Abstract Cybersecurity training in Arlington from SANS Institute, the global leader in information security training. At SANS Crystal City 2015, we offer hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Crystal City 2015, September 8-13, is the DoubleTree by Hilton Washington DC-Crystal City, located in Arlington in sight of the Washington Monument and the Potomac River! Why not get your cybersecurity training in a more intimate setting at SANS Crystal City 2015? We are bringing our top courses and instructors to make this the perfect training event for you! Gain the skills and learn about the tools you need to protect your organization from security breaches and attack risk.
 Topics computer security, cybersecurity, information security, hacking, hacker tools, hacker techniques, forensics, digital forensics, Windows forensics, management, auditing, SCADA
 Weblink http://www.sans.org/u/2sH
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
61.SANS Network Security 2015
 Dates 12 Sep 2015 → 19 Sep 2015
[ID=716758] Go to top of page
 LocationLas Vegas, United States
 Abstract Information security training in Las Vegas from SANS Institute, the global leader in information security training.
 Topics computer security, cybersecurity, information security, information technology, hacking, hacker tools, exploits, incident handling, Windows, Linux, Unix, security operations, penetration testing, web applications, web app penetration testing, mobile devices, mobile device security, virtualization, cloud computing, cloud security, exploit writing, coding, forensics, Windows forensics, digital forensics, Mac forensics, memory forensics, smartphone forensics, malware, management, auditing, SCADA
 Weblink http://www.sans.org/u/2sR
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
  
62.STM — International Workshop on Security and Trust Management
 Dates 21 Sep 2015 → 22 Sep 2015
[ID=720461] Go to top of page
 LocationVienna, Austria
 Abstract The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs. Topics of interest include, but are not limited to: - Access control      - Mobile security      - Security and trust in the Internet of Things - Anonymity      - Networked systems security      - Security and trust in pervasive computing - Applied cryptography      - Operating systems security      - Security and trust in services - Authentication     - Privacy      - Security and trust in social networks - Complex systems security      - Security and trust metrics      - Social implications of security and trust - Data and application security      - Security and trust policies      - Trust assessment and negotiation - Data protection
 Weblink http://stm2015.di.unimi.it/
  
63.ESORICS — European Symposium on Research in Computer Security
 Dates 21 Sep 2015 → 25 Sep 2015
[ID=720698] Go to top of page
 LocationVienna, Austria
 Abstract Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished Research and implementation experiences. We encourage submissions of papers discussing industrial research and development. 
 Weblink http://esorics2015.sba-research.org/
  
64.SANS Baltimore 2015
 Dates 21 Sep 2015 → 26 Sep 2015
[ID=717457] Go to top of page
 LocationBaltimore, United States
 Abstract Information security training in Baltimore, MD from SANS Institute, the global leader in information security training. At SANS Baltimore 2015, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Baltimore 2015, September 21-26, is the Hotel Baltimore, located in the magnificent Inner Harbor and close to everything that makes this city special!
 Topics security, information security, infosec, cybersecurity, information technology, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, cyber deception, forensics, digital forensics, computer forensics, memory forensics
 Weblink http://www.sans.org/u/3qR
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
  
65.ESORICS 2015 — 20th European Symposium on Research in Computer Security
 Dates 23 Sep 2015 → 25 Sep 2015
[ID=706319] Go to top of page
 LocationVienna, Austria
 Weblink http://www.esorics2015.sba-research.org
  
66.Industrial Control Cybersecurity Europe
 Dates 28 Sep 2015 → 29 Sep 2015
[ID=720884] Go to top of page
 LocationLondon, United Kingdom
 Abstract Identify, protect, detect, respond and recover.    All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy, Oil, Gas, Electric and Water Sector.    The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industrys leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the worlds most influential solution providers.    Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.    Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.    2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.    We will introduce demonstrations on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery. 
 Weblink http://atnd.it/25741-0
  
67.CNS 2015 — 3rd IEEE Conference on Communications and Network Security
 Dates 28 Sep 2015 → 30 Sep 2015
[ID=705839] Go to top of page
 LocationFlorence, Italy
 Weblink http://cns2015.ieee-cns.org/
 Related subject(s) Networks, Internet
  
68.SADFE - 2015 — 10th International Conference on Systematic Approaches to Digital Forensic Engineering
 Dates 30 Sep 2015 → 02 Oct 2015
[ID=704972] Go to top of page
 LocationMalaga, Spain
 Abstract SADFE-2015 investigates requirements for digital forensic readiness and methods, technologies, and building blocks for digital forensic engineering. Digital forensic at SADFE focuses on variety of goals, including criminal and corporate investigations, data records produced by calibrated devices, as well as documentation of individual and organizational activities. Another focus is on challenges brought in by globalization and cross-legislation digital applications. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.
 Topics Digital Forensics, Evidence Management, Digital Evidence, Data Integrity and Analytics, Security, Digital Preservation and Recovery,
 Weblink http://sadfe.org/
 Contact Antonio Maña; Phone: [+34 951 952 940]; Email: amg@lcc.uma.es
  
69.Weiterbildung — IT Security Manager
 Dates 05 Oct 2015 → 08 Oct 2015
[ID=677769] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract - Information – Security – Manager (ISM)
 Topics IT-Security, IT-Grundschutz, IT-Sicherheit, Sicherheitsmanagement, ISO 27001, Informationssicherheit, IT-Systeme, Information-Security-Manager, Informationssicherheit, ISM
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/210/IT_Security_Manager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
70.SANS Seattle 2015
 Dates 05 Oct 2015 → 10 Oct 2015
[ID=718657] Go to top of page
 LocationSeattle, United States
 Abstract We would like to welcome you to the Pacific Northwest for SANS Seattle 2015! We are bringing our top courses and top instructors to Seattle on October 5 - 10. With just 1 in 1,200 candidates qualifying globally to join our faculty, SANS Instructors are the foremost experts and are the best at ensuring you will not only learn the material, but that you can also apply it immediately when you return from your training.
 Topics information security, cybersecurity, computer security, computers, computing, hacking, hacker tools, hacker techniques, exploits, incident handling, critical security controls, mobile devices, mobile device security, digital forensics, forensics, incident response
 Weblink http://www.sans.org/u/3qW
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
71.MEInfoSecurity — MIDDLE EAST INFO SECURITY SUMMIT 2015
 Dates 12 Oct 2015 → 13 Oct 2015
[ID=721758] Go to top of page
 LocationCairo, Egypt
 Abstract The Middle East Info Security Summit, the premier event for info security, risk and IT professionals, will be held on 12 – 13 October 2015 at the Sofitel El Gezirah Hotel, Cairo, Egypt.
 Topics Information Security, info security, infosec, Information Security Management, Information Security Governance, Information Security Awareness, Information Security Consultancy, Information Security Standards, Information Security Engineering, Cisco Information Security, Internet Security, Mobile Security, Network Security, Enterprise Network Security, Network Security Implementation, Application Security, Web Application Security, Web Application Security Assessment, Application Security Assessments, Access Control, Antivirus, Symantec Antivirus, Secure Coding, Security, Security Management, Secure Remote Access, Telecommunications, Telecommunications Systems, Security Policy, Cryptography, Malware Analysis, Firewalls, Security Awareness, IT systems development, Digital Forensics, Infrastructure Security, Biometrics, CISA, IT Risk Management, Information Technology, Software Verification, Viruses, Authentication, Authentication Systems, National Security, Computer Security, Security Operations
 Weblink http://www.meinfosecurity.com
 Contact Ahmed Shoeib; Phone: [+21025377733]; Email: shoeib@promediakw.com
  
72.Industrial Control Cybersecurity USA
 Dates 12 Oct 2015 → 14 Oct 2015
[ID=722247] Go to top of page
 LocationSacramento, United States
 Weblink https://industrialcontrolsecurityusa.com/
  
73.SANS Tysons Corner 2015
 Dates 12 Oct 2015 → 17 Oct 2015
[ID=722463] Go to top of page
 LocationMcLean, United States
 Abstract At SANS Tysons Corner 2015, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Tysons Corner 2015, October 12 - 17, 2015, is the Hilton McLean Tysons Corner located in the center of Tysons Corner's technology corridor.
 Topics cybersecurity, information security, computer security, computers, computing, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, digital forensics, incident response, forensics, computer forensics, smartphone forensics, management, CISSP, IT security, strategic planning
 Weblink http://www.sans.org/u/3GK
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
74.Security B-Sides DC
 Dates 16 Oct 2015 → 18 Oct 2015
[ID=695303] Go to top of page
 LocationWashington DC, United States
 Abstract Security B-Sides DC is a regional Security B-Sides held in Washington, DC. It operates under the umbrella principles of Security B-Sides as a larger community project within information security. Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.
 Weblink http://www.BSidesDC.org
 Contact Alex Norman; Email: info@bsidesdc.org
  
75.WorldCIS-2015 — World Congress on Internet Security
 Dates 19 Oct 2015 → 21 Oct 2015
[ID=719271] Go to top of page
 LocationDublin, Ireland
 Abstract The World Congress on Internet Security (WorldCIS) has been Technical Co-sponsored by IEEE UK/RI Computer Chapter. The WorldCIS is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
 Weblink http://www.worldcis.org/
 Contact Charles Shoniregun; Email: info@worldcis.org
 Related subject(s) Networks, Internet
  
76.SANS Cyber Defense San Diego 2015
 Dates 19 Oct 2015 → 24 Oct 2015
[ID=721556] Go to top of page
 LocationSan Diego, United States
 Abstract The SANS Cyber Defense team is pleased to invite you to attend our 2nd Annual Cyber Defense training event: SANS Cyber Defense San Diego 2015.
 Topics cybersecurity, information security, computer security, computers, computing, cyber deception, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, security operations, CISSP, management
 Weblink http://www.sans.org/u/3r1
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
77.CEE-SECR — Central&Eastern European Software Engineering Conference in Russia
 Dates 22 Oct 2015 → 23 Oct 2015
[ID=723073] Go to top of page
 LocationMoscow, Russia
 Abstract Organized since 2005, CEE-SECR is the key annual software event in Central and Eastern Europe that is regularly attended by over 700 participants from local industry. The conference produce a high quality program with acceptance rate about 35%.
 Topics Software Engineering, Quality Assurance, Software, Programming, Information Technologies, IT, Cloud Computing, Mobile Applications, usability, UX, Testing, Project Management, Product Management, Agile, Cyber Security, Internet of things, Internet of Threats, Startups
 Weblink http://2015.secr.ru/
 Contact Alina Sokolova; Phone: [+79500119828]; Email: pr@secr.ru
 Related subject(s) Software Engineering; Application Software
  
78.Weiterbildung — Datenschutzmanager
 Dates 09 Nov 2015 → 10 Nov 2015
[ID=677854] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zum Datenschutzmanagement
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/217/Datenschutzmanager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
79.SANS South Florida 2015
 Dates 09 Nov 2015 → 14 Nov 2015
[ID=722735] Go to top of page
 LocationFort Lauderdale, United States
 Abstract Information security and forensics training in Fort Lauderdale November 9-14. SANS Institute, the global leader in infosec and forensics training will offer hands-on, immersion-style security and forensics training courses taught by real-world practitioners. Join us in Fort Lauderdale where you are just two miles from Fort Lauderdale Beach. This is a must-attend event as industry-leading experts focus on helping you build to protect your assets and enhance your knowledge base.
 Topics cybersecurity, information security, computer security, IT security, computers, computing, web applications, web app penetration testing, penetration testing, hacking, hacker tools, hacker techniques, exploits, incident handling, forensics, digital forensics, incident response, network forensics, smartphone forensics
 Weblink http://www.sans.org/u/4vm
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
80.IEEE PRDC 2015 — The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015)
 Dates 18 Nov 2015 → 20 Nov 2015
[ID=691537] Go to top of page
 LocationZhangjiajie, China
 Abstract IEEE PRDC 2015 is the twenty-first event in the series of symposia started in 1989 that are devoted to dependable and fault-tolerant computing. PRDC is recognized as the main event in the Pacific area that covers many dimensions of dependability and fault tolerance, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated into all aspects of daily life, the dependability of computing systems has become increasingly critical. This symposium provides a forum for countries around the Pacific Rim and other areas of the world to exchange ideas for improving the dependability of computing systems.
 Topics (1) Software and hardware reliability, testing, verification, and validation (2) Dependability measurement, modeling, evaluation, and tools (3) Self-healing, self-protecting, and fault-tolerant systems (4) Software aging and rejuvenation (5) Safety-critical systems and software (6) Architecture and system design for dependability (7) Fault-tolerant algorithms and protocols (8) Reliability in cloud computing, Internet, and web systems and applications (9) Cloud and Internet Information security (10) Dependability issues in computer networks and communications (11) Dependability issues in distributed and parallel systems (12) Dependability issues in real-time systems, database, and transaction processing systems (13) Dependability issues in autonomic computing (14) Dependability issues in aerospace and embedded systems (15) Dependability issues in cyber-physical systems (16) Dependability issues in socio-technical systems
 Weblink http://prdc.dependability.org/PRDC2015/
 Contact Prof. Guojun Wang; Email: csgwang@gmail.com
 Related subject(s) Embedded Systems & Ubiquitous Computing; Grid-, Distributed- and Parallel Computing, Cloud Computing
  
81.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 23 Nov 2015 → 26 Nov 2015
[ID=677618] Go to top of page
 LocationHamburg, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
82.ProvSec 2015 — The Ninth International Conference on Provable Security
 Dates 24 Nov 2015 → 26 Nov 2015
[ID=706470] Go to top of page
 LocationKanazawa, Japan
 Weblink https://security-lab.jaist.ac.jp/provsec2015/
 Related subject(s) Software Engineering
  
83.14. SECUTA 25. - 27.11.2015 in Garmisch-Partenkirchen — Information Security Tagung 2015 für IT-Manager
 Dates 25 Nov 2015 → 27 Nov 2015
[ID=648877] Go to top of page
 LocationGarmisch-Partenkirchen, Germany
 Abstract Ziel der IT-Security Jahrestagung ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit für das Folgejahr praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, diverse Unternehmensberichte, Live Hacking´s sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der Information Security Tagung ab.
 Topics Informationssicherheit, IT-Sicherheit, IT, Hacking, IT-Security, Security, Riskmanagement, IT-Management, CIO, CISO, Datenschutz, Datensicherheit, Netzwerk, Penetration, Richtlinien, ISO, ISO 27001, IT Tagung, Security Tagung, ISMS, Audit, Auditor, ITSIBE, Live Hacking, Forensik, IT Forensik, IT Recht, Vorträge, Risiko, Richtlinien, Awareness,
 Weblink http://www.it-secuta.de/
 Contact Manuela Krämer SECUTA Leitung Vertriebsleitung Informationssicherheit; Phone: [+49 (0)89 4576918-12]; Email: m.kraemer@cbt-training.de
  
84.Asiacrypt — Asiacrypt 2015
 Dates 29 Nov 2015 → 03 Dec 2015
[ID=670686] Go to top of page
 LocationAuckland, New Zealand
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
85.Weiterbildung — Informationssicherheitsmanagement gemäß ISO 27001
 Dates 30 Nov 2015 → 01 Dec 2015
[ID=677856] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zur Einführung des Informationssicherheitsmanagements
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/216/Informationssicherheitsmanagement_gemäß_ISO_27001.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
86.Weiterbildung — Datenschutz Update
 Start date02 Dec 2015
[ID=677881] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract 1-tägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/220/Datenschutz_Update.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
87.WCICSS — World Congress on Industrial Control Systems Security
 Dates 14 Dec 2015 → 16 Dec 2015
[ID=721386] Go to top of page
 LocationLondon, United Kingdom
 Abstract The World Congress on Industrial Control Systems Security (WCICSS) will be held from the 14th to 16th of December, 2015 in London, UK. The WCICSS-2015 is a meeting point for Professionals and researchers, IT security professionals, managers, developers, educators, vendors and service providers who are involved in development, integration, assessment, implementation, and operation of industrial cybersecurity technologies. Therefore, the conference will provide opportunities to discuss both the current status and emerging trends in protection of industrial control systems. The aim of WCICSS is to provide an opportunity for academicians and professionals from various educational fields with cross-disciplinary interests to bridge the knowledge gap, promote research esteem and the evolution of pedagogy. The WCICSS-2015 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
 Weblink http://www.wcicss.org/
 Contact Email: info@wcicss.org
  
88.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 14 Dec 2015 → 17 Dec 2015
[ID=677236] Go to top of page
 LocationHamburg, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
89.ICISS 2015 — 11th International Conference on Information Systems Security
 Dates 16 Dec 2015 → 20 Dec 2015
[ID=706321] Go to top of page
 LocationKolkata, India
 Weblink http://www.iciss.org.in
  
90.Eurocrypt — Eurocrypt 2016
 Dates 08 May 2016 → 13 May 2016
[ID=670729] Go to top of page
 LocationVienna, Austria
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
91.Crypto — Crypto 2016
 Dates 14 Aug 2016 → 18 Aug 2016
[ID=670684] Go to top of page
 LocationSanta Barbara, United States
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
92.Asiacrypt — Asiacrypt 2016
 Dates 04 Dec 2016 → 08 Dec 2016
[ID=670727] Go to top of page
 LocationHanoi, Vietnam
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  

Last updated: 26 May 2015