COMS

Calendar of upcoming scientific conferences

Home | Conference Management System | Conference Listings | Advertise | Contact | About
German French English
You are in: HomeConference ListingsInformatics → Information Security and information privacy

Conference Management Software

Our Conference Management Software (COMS) can be used for online:

  • registration
  • payment
  • paper submission
  • review process
  • paper selection
  • production of the book of abstracts

Read more ...
Try our demo online

Conferences and Meetings on Information Security and information privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.NSysS 2015 - 1st International Conference on Networking Systems and Security 2015
 Dates 05 Jan 2015 → 07 Jan 2015
[ID=636922] Go to top of page
 LocationDhaka, Bangladesh
 Weblink http://www.buet.ac.bd/cse/nsyss/
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing
  
2.SANS Security East 2015
 Dates 16 Jan 2015 → 21 Jan 2015
[ID=642009] Go to top of page
 LocationNew Orleans, United States
 Abstract You are invited to start your training for 2015 by attending SANS Security East 2015 where SANS will provide outstanding courses in IT security, forensics, and security management presented by the best cybersecurity instructors in the country.
 Topics information security, information technology, hacking, intrusion detection, web apps, web applications, penetration testing, mobile devices, mobile device security, forensics, Windows, malware, auditing
 Weblink http://www.sans.org/info/164727
 Contact SANS Institute , Bethesda; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses; Mobile Computing & Telecommunication
  
3.CS2 2015 — Second Workshop on Cryptography and Security in Computing Systems
 Start date19 Jan 2015
[ID=664497] Go to top of page
 LocationAmsterdam, Netherlands
 Abstract The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems. The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.
 Weblink http://www.cs2.deib.polimi.it/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
4.CS2 '15 — Second Workshop on Cryptography and Security in Computing Systems
 Dates 19 Jan 2015 → 21 Jan 2015
[ID=658750] Go to top of page
 LocationAmsterdam, Netherlands
 Weblink http://www.cs2.deib.polimi.it/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
5.8. Forum E-Discovery DACH
 Dates 21 Jan 2015 → 23 Jan 2015
[ID=672859] Go to top of page
 LocationWiesbaden, Germany
 Abstract Enhancing a strategy for optimally handling US e-Discovery requests while maintaining high level of data protection compliance!
 Topics Bundeskartellamt, Kartellrecht, Datenschutz, IT Governance, Information governance, FRCP, Data Fishing, Cross-border discovery, Data retention, Data management Data minimization, Information Security, LIBE Article 43, Article 29 Working Party, Data breach, International arbitration, EU data protection
 Weblink http://bit.ly/WebsiteEDiscovery
 Contact IQPC Gesellschaft für Management Konferenzen mbH ; Phone: [004930 20913 274]; Email: eq@iqpc.de
  
6.FSP 2015 — The 2015 International Workshop on Future Security and Privacy
 Dates 26 Jan 2015 → 28 Jan 2015
[ID=670564] Go to top of page
 LocationJeju, South Korea
 Weblink http://www.platcon.org/workshops/fsp-14
 Related subject(s) Applied Maths: Cryptography and Information Security
  
7.FC '15 — Financial Cryptography and Data Security 2015
 Dates 26 Jan 2015 → 30 Jan 2015
[ID=664507] Go to top of page
 LocationSan Juan, Puerto Rico
 Abstract Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and inter-disciplinary works are particularly encouraged.
 Weblink http://fc15.ifca.ai/
 Related subject(s) Applied Maths: Cryptography and Information Security; Applied Maths: Economics and Finance
  
8.Cyber Threat Intelligence Summit & Training
 Dates 02 Feb 2015 → 09 Feb 2015
[ID=660415] Go to top of page
 LocationWashington, DC, United States
 Abstract The goal of this summit will be to equip attendees with knowledge on the tools, methodologies and processes they need to move forward with cyber threat intelligence. The SANS What Works in Cyber Threat Intelligence Summit will bring attendees who are eager to hear this information and learn about tools, techniques, and solutions that can help address these needs.
 Weblink http://www.sans.org/info/168672
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
9.nullcon International Security Conference
 Dates 04 Feb 2015 → 07 Feb 2015
[ID=664515] Go to top of page
 LocationGoa, India
 Abstract Nullcon was founded in 2010 with the idea of providing an integrated platform for exchanging information on the latest attack vectors, zero day vulnerabilities and unknown threats. Our motto - "The neXt security thing!" drives the objective of the conference i.e. to discuss and showcase the future of information security and the next-generation of offensive and defensive security technology.
 Weblink http://nullcon.net/website/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
10.ICISSP 2015 — 1st International Conference on Information Systems Security and Privacy
 Dates 09 Feb 2015 → 11 Feb 2015
[ID=636004] Go to top of page
 LocationAngers, Loire Valle, France
 Weblink http://www.icissp.org
  
11.ICACC-2015 — First International Conference on Anti-Cybercrime
 Dates 09 Feb 2015 → 11 Feb 2015
[ID=656438] Go to top of page
 LocationRiyadh, Saudi Arabia
 Abstract Imam University is going to host the First International Conference on Anti-Cybercrime (ICACC-2015). The ICACC-2015 aims to bring together primarily researchers, but also practitioners from academia, industry and governmental institutions to elaborate and discuss IT security and privacy challenges that we are facing today and will be facing in the future. ICACC-2015 will be a vital forum for the discussion of issues of cybercrime. We are inviting well-known speakers from industry and academia from all over the world, with emphasis on the United States. The conference will have an exhibition floor and to bring together major international companies from all over the world that offer strong solutions to combat cybercrime. In addition to traditional paper sessions, the conference sessions will include participation of industry representatives demonstrating their new products and looking for new ideas.
 Topics Topics of the conference include but are not limited to: - Cybercrime properties, features of cybercrime criminals, and recent trends of cybercrime - Local and international legislation, laws, agreements, and sanctions pertaining to anti-cybercrime - Collection, handling, and documentation of digital forensics - Investigation techniques and means of cybercrime detection - Concepts and challenges pertaining to the anti-cybercrime - Techniques of information security and their role in both cybercrime detection and anti-cybercrime - Effects as well as physical and moral losses due to cybercrime - Cybercrime and its role in spreading terrorism among people - Demonstration of best practices in securing and safely ensuring electronic transactions - Illustration of the work of existing bodies and institutions on infrastructure protection for electronic information - Exchange of experiences by participating countries in the field of cybercrime - Efforts made in formal education to augment anti-cybercrime knowledge - Strategies for increased public awareness of the consequences of cybercrime
 Weblink http://icacc.ccis-imsiu.edu.sa
 Contact Imam Bakhsh, Al-Imam Muhammad ibn Saud Islamic University; Phone: [+966-11-25-85934]; Email: icacc@ccis.imamu.edu.sa
  
12.SANS Scottsdale 2015
 Dates 16 Feb 2015 → 21 Feb 2015
[ID=653396] Go to top of page
 LocationScottsdale, United States
 Weblink http://www.sans.org/info/166132
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
13.MOBISECSERV — 2015 First Conference on Mobile and Secure Services
 Dates 19 Feb 2015 → 21 Feb 2015
[ID=657194] Go to top of page
 LocationGainesville, FL, United States
 Abstract NFC mobile payment is the primary focus
 Weblink http://www.mobisecserv.org/
 Related subject(s) Mobile Computing & Telecommunication
  
14.DFIRCON West 2015
 Dates 23 Feb 2015 → 28 Feb 2015
[ID=656724] Go to top of page
 LocationMonterey, United States
 Topics information security, Mac, forensics, hacking, hackers, Windows, memory forensics, networks, network forensics, malware
 Weblink http://www.sans.org/info/167332
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
15.10th Annual ICS Security Summit - Orlando 2015
 Dates 23 Feb 2015 → 02 Mar 2015
[ID=634537] Go to top of page
 LocationLake Buena Vista, United States
 Topics information security, information technology, infrastructure, cybersecurity, exploits, SCADA
 Weblink http://www.sans.org/info/162742
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
16.CODASPY'15 — Fifth ACM Conference on Data and Application Security and Privacy
 Dates 02 Mar 2015 → 04 Mar 2015
[ID=658900] Go to top of page
 LocationSan Antonio, TX, United States
 Weblink http://codaspy.org
  
17.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 02 Mar 2015 → 05 Mar 2015
[ID=677184] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
18.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 02 Mar 2015 → 05 Mar 2015
[ID=677599] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
19.Cyber Guardian 2015
 Dates 02 Mar 2015 → 07 Mar 2015
[ID=656723] Go to top of page
 LocationBaltimore, United States
 Topics information security, penetration testing, pen test, penetration test, Windows, critical security controls, forensics, hacking
 Weblink http://www.sans.org/info/167382
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
20.SANS Northern Virginia 2015
 Dates 09 Mar 2015 → 14 Mar 2015
[ID=656799] Go to top of page
 LocationReston, United States
 Topics information security, information technology, intrusion detection, penetration testing, pen test, web apps, web applications, forensics, Windows, smartphones, mobile devices, forensics, management
 Weblink http://www.sans.org/info/167387
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
21.SANS Houston 2015
 Dates 23 Mar 2015 → 28 Mar 2015
[ID=660436] Go to top of page
 LocationHouston, United States
 Abstract We are pleased to invite you to attend SANS Houston 2015 on March 23-28 at the Royal Sonesta Hotel, located in the heart of the Galleria area of Uptown Houston. We have six of our top information security courses selected to provide you with the training and certification that you need to boost your career by learning from the best! SANS Instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
 Weblink http://www.sans.org/info/168677
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
22.ICCWS — 10th International Conference on Cyber Warfare and Security
 Dates 24 Mar 2015 → 25 Mar 2015
[ID=625859] Go to top of page
 LocationKruger National Park, South Africa
 Abstract ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
 Topics Cyber Warfare, Security, Physical security, Biometrics
 Weblink http://academic-conferences.org/iccws/iccws2015/iccws15-home.htm
 Contact Mandy Limbrick-Butler; Phone: [+44 (0)1189 724148]; Email: Mandy@academic-conferences.org
  
23.Workshop on Cybersecurity in a Post-Quantum World
 Dates 02 Apr 2015 → 03 Apr 2015
[ID=664510] Go to top of page
 LocationGaithersburg, United States
 Abstract The advent of practical quantum computing will break all commonly used public key cryptographic algorithms. In response, NIST is researching cryptographic algorithms for public key-based key agreement and digital signatures that are not susceptible to cryptanalysis by quantum algorithms. NIST is holding this workshop to engage academic, industry, and government stakeholders. This workshop will be co-located with the 2015 International Conference on Practice and Theory of Public-Key Cryptography, which will be held March 30 - April 1, 2015. NIST seeks to discuss issues related to post-quantum cryptography and its potential future standardization.
 Weblink http://www.nist.gov/itl/csd/ct/post-quantum-crypto-workshop-2015.cfm
 Related subject(s) Applied Maths: Cryptography and Information Security
  
24.COSADE 2015 — 6th Int. Workshop on Constructive Side-Channel Analysis and Secure Design
 Dates 13 Apr 2015 → 14 Apr 2015
[ID=664619] Go to top of page
 LocationBerlin, Germany
 Abstract Side-channel analysis (SCA) and physical attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process.
 Weblink http://www.cosade.org/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
25.CPSS'15 — 1st Cyber-Physical System Security Workshop
 Start date14 Apr 2015
[ID=664573] Go to top of page
 LocationSingapore, Singapore
 Abstract Cyber-Physical Systems (CPS) consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There are a multitude of CPS devices and applications being deployed to serve critical functions in our lives. The security of CPS becomes extremely important. This workshop will provide a platform for professionals from academia, government, and industry to discuss how to address the increasing security challenges facing CPS. Besides invited talks, we also seek novel submissions describing theoretical and practical security solutions to CPS. Papers that are pertinent to the security of embedded systems, SCADA, smart grid, and critical infrastructure networks are all welcome, especially in the domains of energy and transportation.
 Weblink http://icsd.i2r.a-star.edu.sg/cpss15/
  
26.IoTPTS 2015 — ASIACCS Workshop on IoT Privacy, Trust, and Security
 Start date14 Apr 2015
[ID=664561] Go to top of page
 LocationSingapore, Singapore
 Abstract The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning.
 Weblink https://sites.google.com/site/iotpts/
  
27.SCC '15 — The Third International Workshop on Security in Cloud Computing
 Start date14 Apr 2015
[ID=664615] Go to top of page
 LocationSingapore, Singapore
 Abstract Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems.
 Weblink http://conference.cs.cityu.edu.hk/asiaccsscc/
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing
  
28.SECUTA.AT 2015 für IT-Manager — Information Security Tagung in Österreich
 Dates 14 Apr 2015 → 15 Apr 2015
[ID=652319] Go to top of page
 LocationSalzburg (Fuschlsee), Austria
 Abstract Ziel der Jahrestagung für IT-Manager ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, Live Hacking sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der Information Security Tagung SECUTA.AT in Österreich ab.
 Topics Mobile Kommunikation, Mobile IT, IT-Recht, IT-Sicherheit, IT-Security, Informationssicherheit, IT, EDV, Hacking, Live Hacking, ISO, ISO 27001, Datenschutz, Datensicherheit, Antivirus, Cybercrime, Cyberwar, Industrial Security, Penetration, Forensik, SIEM, IT-Forensik, Audit, Datenschutz Europa, Metasploid, CIO, CISO, ITSIBE, IT-Manager, IT-Leiter, IT-Mitarbeiter,
 Weblink http://www.secuta.at/
 Contact Manuela Krämer ; Phone: [(+49 (0)89 4576918-12)]; Email: m.kraemer@cbt-training.de
 Related subject(s) Training in Computer Science, Courses
  
29.AsiaCCS'15 — 10th ACM Symposium on Information, Computer and Communications Security
 Dates 14 Apr 2015 → 17 Apr 2015
[ID=670629] Go to top of page
 LocationSingapore, United Kingdom
 Weblink http://icsd.i2r.a-star.edu.sg/asiaccs15/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
30.AsiaCCS'15 — 10th ACM Symposium on Information, Computer and Communications Security
 Dates 14 Apr 2015 → 17 Apr 2015
[ID=664636] Go to top of page
 LocationSingapore, Singapore
 Abstract The 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015) will be held in Singapore, April 14-17, 2015, and hosted by Institute for Inforcomm Research (I2R), Singapore.
 Weblink http://icsd.i2r.a-star.edu.sg/asiaccs15/
  
31.CT-RSA 2015 — RSA Conference 2015 Cryptographers' Track
 Dates 20 Apr 2015 → 24 Apr 2015
[ID=670606] Go to top of page
 LocationSan Francisco, United States
 Weblink http://www.rsaconference.com/speakers/cryptographers-track
 Related subject(s) Applied Maths: Cryptography and Information Security
  
32.Weiterbildung — Datenschutzmanager
 Dates 04 May 2015 → 05 May 2015
[ID=677899] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zum Datenschutzmanagement
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/217/Datenschutzmanager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
33.SANS Security West 2015
 Dates 04 May 2015 → 12 May 2015
[ID=670882] Go to top of page
 LocationSan Diego, United States
 Abstract We are pleased to invite you to San Diego on May 4-12 for the best security training money can buy! SANS Security West 2015 will focus on Emerging Trends and will feature related evening talks and a star-studded, interactive panel discussion on the future of cyber security. We are also bringing new cutting-edge courses and many that are associated with GIAC Certifications.
 Topics information security, information technology, forensics, SCADA, intrusion detection, hacking, hacking tools, hacking techniques, exploits, incident handling, web apps, web applications, penetration testing, networks, pen test, mobile devices, mobile device security, virtualization, private cloud security, cloud computing, Metasploit, Windows forensics, Windows, digital forensics, smartphone forensics, management
 Weblink http://www.sans.org/info/171477
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
34.HOST '15 — IEEE International Symposium on Hardware-Oriented Security and Trust
 Dates 05 May 2015 → 07 May 2015
[ID=664610] Go to top of page
 LocationWashington DC Metro Area, United States
 Abstract The IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aimsto facilitate the rapid growth of hardware-based security research and development. HOST seeksoriginal contributions in the area of hardware and system security. Relevant research topics includetechniques, tools, design/test methods, architectures, circuits, and applications of secure hardware.
 Weblink http://www.hostsymposium.org/
 Related subject(s) Computing Hardware
  
35.SP — 2015 IEEE Symposium on Security and Privacy
 Dates 18 May 2015 → 20 May 2015
[ID=636179] Go to top of page
 LocationSan Jose, California, United States
 Abstract Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.
 Weblink http://www.ieee-security.org/TC/SP-Index.html
  
36.Genopri 2015 — Genopri 2015 (2nd International Workshop on Genome Privacy and Security
 Start date21 May 2015
[ID=670594] Go to top of page
 LocationSan Jose, United States
 Weblink http://www.genopri.org/
 Related subject(s) Applied Maths: Cryptography and Information Security; Genomics and Bioinformatics
  
37.Security of symmetric ciphers in network protocols
 Dates 25 May 2015 → 29 May 2015
[ID=670659] Go to top of page
 LocationEdinburgh, United Kingdom
 Weblink http://www.icms.org.uk/workshop.php?id=338
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
38.PHDays — Positive Hack Days
 Dates 26 May 2015 → 27 May 2015
[ID=672462] Go to top of page
 LocationMoscow, Russia
 Abstract PHDays considers various preferences of the entire information community and covers the most topical issues related to information security.
 Topics Security of critical information systems, Fraud management, Cybercrimes and investigation of incidents, Government and corporate security in the era of WikiLeaks, Cyberwar and cyberspying
 Weblink http://www.phdays.com/
 Contact Email: alashkov@ptsecurity.ru
  
39.C2SI Berger — 2015 International Conference in "Codes, Cryptology and Information Security "In honor of Professor Thierry BERGER"
 Dates 26 May 2015 → 28 May 2015
[ID=667733] Go to top of page
 LocationRabat, Morocco
 Abstract The conference has two objectives. Firstly, it aims at paying homage to Professor Thierry Berger for his efforts to develop teaching and research at the fields of cryptography, coding theory and security of information at Mohammed V University in Rabat. Secondly, it aims at bringing together experts and young researchers from all over the world to ensure exchange of ideas and discuss recent developments in the areas that have intersted Pr. T. Berger.
 Weblink http://www.fsr.um5a.ac.ma/C2SI-Berger2015/index.php
 Related subject(s) Applied Maths: Cryptography and Information Security
  
40.SACMAT '15 — 20th ACM Symposium on Access Control Models and Technologies
 Dates 01 Jun 2015 → 03 Jun 2015
[ID=659263] Go to top of page
 LocationVienna, Austria
 Weblink http://www.sacmat.org
  
41.2015 IAEA International Conference on Computer Security in a Nuclear World
 Dates 01 Jun 2015 → 05 Jun 2015
[ID=650165] Go to top of page
 LocationIAEA headquarters in Vienna, Austria
 Abstract The purpose of the conference is to: (a) review the international community’s experience and achievements to date in strengthening computer security within the framework of nuclear security; (b) enhance understanding of current approaches for computer security worldwide within nuclear regimes, and identify trends; and (c) provide a global forum for competent authorities, operators and other entities engaged in computer security activities relevant to nuclear security.
 Topics Cyberthreats in Nuclear Security, Computer Security and System Design for Systems at Nuclear Facilities, Coordination for Ensuring Computer Security in a Nuclear Security Regime, Nuclear Security Regulatory Approaches to Information and Computer Security, Computer Security Programmes at Licensed Facilities, Computer Security Management in Nuclear Security, Computer Security Culture and Capacity Building for Nuclear Security, International and Legal Considerations in Relation to Computer Security at Nuclear Facilities, Special Topics
 Weblink http://www-pub.iaea.org/iaeameetings/46530/International-Conference-on-Computer-Security-in-a-Nuclear-World-Expert-Discussion-and-Exchange
 Related subject(s) Nuclear Energy and Radwaste
  
42.20th Infosecurity Europe 2015
 Dates 02 Jun 2015 → 04 Jun 2015
[ID=649490] Go to top of page
 LocationLondon, United Kingdom
 Abstract Infosecurity Europe is Europe's number one Information Security conference and exhibition and the most-attended information security event in Europe. It is a free exhibition featuring not only over 345 exhibitors and the most diverse range of new products and services but also an unrivalled education programme, 120 hours of free education, over 165 expert speakers and over 13,000 unique visitors representing every segment of the industry.
 Weblink http://www.infosec.co.uk/
  
43.ACNS'15 — 13th International Conference on Applied Cryptography and Network Security
 Dates 02 Jun 2015 → 05 Jun 2015
[ID=664663] Go to top of page
 LocationNew York, United States
 Abstract The annual ACNS conference focuses on innovative results in applied cryptography and network and computer security. Both academic research works as well as developments in industrial and technical frontiers fall within the scope of the conference.
 Weblink http://acns2015.cs.columbia.edu/
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
44.Weiterbildung — IT Security Manager
 Dates 08 Jun 2015 → 11 Jun 2015
[ID=677748] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract - Information – Security – Manager (ISM)
 Topics IT-Security, IT-Grundschutz, IT-Sicherheit, Sicherheitsmanagement, ISO 27001, Informationssicherheit, IT-Systeme, Information-Security-Manager, Informationssicherheit, ISM
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/210/IT_Security_Manager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
45.IEEE ICCC Workshop on SPIC 2015 — The First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems in conjunction with IEEE ICC 2015
 Dates 08 Jun 2015 → 12 Jun 2015
[ID=654511] Go to top of page
 LocationLondon, United Kingdom
 Abstract Recent advances in networking, communications, computation, software, and hardware technologies have revolutionized the way humans, smart things, and engineered systems interact and exchange information. The Internet of Things (IoT) and Cyber-Physical Systems (CPS), which are the major contributors to this area, will fuel the realization of this new, globally interconnected cyber-world. Yet, the success, prosperity, and advancement of IoT and CPS systems strongly depend on the security, privacy & trust of the IoT and cyber-physical devices as well as the sensitive data being exchanged. While these technologies offer a lot of new possibilities, the increasing complexity of hardware and software as well as the worldwide access increase the vulnerability to security attacks. Successful attacks targeted to IoT devices and CPS systems have in common that not only a single computer is affected, but also interconnected technical systems allowing interaction with the physical world are influenced leading to malfunction of devices and control systems with severe financial, environmental and health losses. This fact highlights the need to develop novel tools that will constitute the heart of a much-needed science of security for IoT & CPS. The goal of the SPIC workshop is to bring together internationally leading academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results aimed at addressing all aspects of security and privacy for IoT & CPS.
 Topics IoT, CPS, Security, Privacy, Trust, Communications, Networking, RFID, Smart grids, Sensor, Actuator technologies, Hardware, Software, Test-bed, protocol
 Weblink http://icc2015.ieee-icc.org/
 Contact Qinghe Du; Phone: [+86-18220855266]; Email: duqinghe@mail.xjtu.edu.cn
  
46.SECITC '15 — 8th Int'l Conference on Security for Information Technology&Communications
 Dates 11 Jun 2015 → 12 Jun 2015
[ID=664661] Go to top of page
 LocationBucharest, Romania
 Weblink http://www.secitc.eu/
  
47.IH&MMSec '15 — ACM Information Hiding and Multimedia Security Workshop
 Dates 17 Jun 2015 → 19 Jun 2015
[ID=659377] Go to top of page
 LocationPotland, OR, United States
 Weblink http://www.ihmmsec.org/
 Related subject(s) Multimedia, Computer Graphics and Visualization
  
48.WiSec 2015 — 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks
 Dates 22 Jun 2015 → 26 Jun 2015
[ID=670658] Go to top of page
 LocationNew York City, NY, United States
 Weblink http://www.sigsac.org/wisec/WiSec2015/
 Related subject(s) Applied Maths: Cryptography and Information Security; Mobile Computing & Telecommunication
  
49.Weiterbildung — Informationssicherheitsmanagement gemäß ISO 27001
 Dates 29 Jun 2015 → 30 Jun 2015
[ID=677824] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zur Einführung des Informationssicherheitsmanagements
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/216/Informationssicherheitsmanagement_gemäß_ISO_27001.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
50.ACISP 2014 — 20th Australasian Conference on Information Security and Privacy
 Dates 30 Jun 2015 → 01 Jul 2015
[ID=670613] Go to top of page
 LocationBrisbane, Australia
 Weblink http://acisp2015.qut.edu.au
 Related subject(s) Applied Maths: Cryptography and Information Security
  
51.PETS — Privacy Enhancing Technologies Symposium
 Dates 30 Jun 2015 → 02 Jul 2015
[ID=664693] Go to top of page
 LocationPhiladelphia, United States
 Abstract The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy and anonymity experts from around the world to discuss recent advances and new perspectives. PETS addresses the design and realization of privacy services for the Internet and other data systems and communication networks.
 Weblink https://www.petsymposium.org/2015/
  
52.Weiterbildung — Datenschutz Update
 Start date01 Jul 2015
[ID=677882] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract 1-tägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/220/Datenschutz_Update.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
53.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 06 Jul 2015 → 09 Jul 2015
[ID=677161] Go to top of page
 LocationPotsdam, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
54.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 06 Jul 2015 → 09 Jul 2015
[ID=677543] Go to top of page
 LocationPotsdam, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
55.CECC '15 — 15th Central European Conference on Cryptology
 Dates 08 Jul 2015 → 10 Jul 2015
[ID=670678] Go to top of page
 LocationKlagenfurt, Austria
 Weblink http://www.math.aau.at/cecc2015/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
56.DBSec 2015 — 29th IFIP WG11.3 Working Conf. on Data and Applications Security & Privacy
 Dates 13 Jul 2015 → 15 Jul 2015
[ID=670622] Go to top of page
 LocationFairfax, United States
 Weblink http://dbsec2015.di.unimi.it
 Related subject(s) Applied Maths: Cryptography and Information Security
  
57.Lightweight Cryptography Workshop 2015
 Dates 20 Jul 2015 → 21 Jul 2015
[ID=670676] Go to top of page
 LocationGaithersburg, MD, United States
 Weblink http://www.nist.gov/itl/csd/ct/lwc_workshop2015.cfm
 Related subject(s) Applied Maths: Cryptography and Information Security
  
58.ECCWS — 14th European Conference on Cyber Warfare and Security
 Dates 02 Aug 2015 → 03 Aug 2015
[ID=643595] Go to top of page
 LocationHatfield, United Kingdom
 Abstract The 14th European Conference on Cyber Warfare and Security (ECCWS) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat cyber warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
 Topics Cyber conflict Patriotic hackers as an extension of state power Potential military uses of cyber attacks Case studies of cyber attacks in modern conflicts Theoretical cyber conflict scenarios Cyber conflict frameworks Human Factors Cyber-terrorism Principles of i-Warfare Physical security Counter-terrorism security policies, procedures and legislation Information warfare policy SMEs - Small-to-medium Size Enterprises Security model Critical national infrastructure protection Information warfare theory Security implications of “virtualised machines and services e-Health systems as part of a national critical infrastructure Information warfare techniques The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs) Information security governance and management Information warfare and security education Hacking and cracking Biometrics e-Intelligence/counter-intelligence Information Assurance Cryptography : classical and malicious Networked Centric War Malwares and antimalwares technologies Wireless Treats Reflector attacks UCE Threat Agents Art of war Cyber-fraud Particle swarm data mining Computers-as-weapons Risk Management Virtual Intrusion Detection Electro-magnetic pulse weapons Collaborative decision making National security policy Information operations Security policy Acute situational awareness Strategic leadership Firewalls Aircraft Environment Influence campaigns Phishing and spam Digital forensics Psychological warfare Current Anti Virus Technologies Network anomaly detection models PSYOP - PSYOPS Mobile Virus Corporate defence mechanisms Perception management RFID Virus Security for small to medium enterprises Infra-structure warfare SQL Infections Information, computer and network security Military Culture Topography Data Loss Security of the virtual worlds Modern conflict Data Integration SIMAD what can/should be done to protect against this threat? Military approaches ISO 27001 Unidirectional linguistic steganography Compromise path analysis Gaussian empirical rule IT auditing and compliance Defence steganography Natural computing Information Security Architecture Data and service integration Random numbers approximation sequence Artificial immune recognition system security infrastructure Legal issues concerned with information warfare and e-Crime Traffic classification Public Key Infrastructure Non-traditional enemies Subliminal Channel Network Address Translator Ethical, political and social issues relating to information warfare Machine Learning Risk Mathematical-filtering Association of Religions with Warfare Context free grammers SecureMDA Image-processing New trends Information Security Economy Other relevant topics
 Weblink http://academic-conferences.org/eccws/eccws2015/eccws15-home.htm
 Contact Mandy Limbrick; Phone: [+44 (0)1189 724148]; Email: mandy@academic-conferences.org
 Related subject(s) Networks, Internet
  
59.ISSA — 2015 Information Security for South Africa
 Dates 12 Aug 2015 → 14 Aug 2015
[ID=668186] Go to top of page
 LocationJohannesburg, South Africa
 Abstract Information security has evolved and in the last few years there has been renewed interest in the subject worldwide. This is evident from the many standards and certifications now available to guide security strategy. The convergence of technologies like the cloud together with advances in wireless communications, has meant new security challenges for the information security fraternity. It is this fraternity that organisations, governments and communities in general look to for guidance on best practice in this converging world. Identity theft and phishing are on-going concerns. Security mechanisms have become so good and are generally implemented by companies wanting to adhere to good corporate governance, so attackers are now looking to the weak link in the chain, namely the individual user. It is far easier to attack them than attempt to penetrate sophisticated corporate systems. Digital forensic investigations and techniques are used in a bid to apprehend the perpetrators.
 Weblink http://www.infosecsa.co.za
  
60.IWSEC 2015 — The 10th International Workshop on Security
 Dates 26 Aug 2015 → 28 Aug 2015
[ID=664756] Go to top of page
 LocationNara, Japan
 Weblink http://www.iwsec.org/
  
61.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 07 Sep 2015 → 10 Sep 2015
[ID=677226] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
62.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 07 Sep 2015 → 10 Sep 2015
[ID=677542] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
63.Weiterbildung — IT Security Manager
 Dates 05 Oct 2015 → 08 Oct 2015
[ID=677703] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract - Information – Security – Manager (ISM)
 Topics IT-Security, IT-Grundschutz, IT-Sicherheit, Sicherheitsmanagement, ISO 27001, Informationssicherheit, IT-Systeme, Information-Security-Manager, Informationssicherheit, ISM
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/210/IT_Security_Manager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
64.Weiterbildung — Datenschutzmanager
 Dates 09 Nov 2015 → 10 Nov 2015
[ID=677832] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zum Datenschutzmanagement
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/217/Datenschutzmanager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
65.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 23 Nov 2015 → 26 Nov 2015
[ID=677585] Go to top of page
 LocationHamburg, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
66.14. SECUTA 25. - 27.11.2015 in Garmisch-Partenkirchen — Information Security Tagung 2015 für IT-Manager
 Dates 25 Nov 2015 → 27 Nov 2015
[ID=648822] Go to top of page
 LocationGarmisch-Partenkirchen, Germany
 Abstract Ziel der IT-Security Jahrestagung ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit für das Folgejahr praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, diverse Unternehmensberichte, Live Hacking´s sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der Information Security Tagung ab.
 Topics Informationssicherheit, IT-Sicherheit, IT, Hacking, IT-Security, Security, Riskmanagement, IT-Management, CIO, CISO, Datenschutz, Datensicherheit, Netzwerk, Penetration, Richtlinien, ISO, ISO 27001, IT Tagung, Security Tagung, ISMS, Audit, Auditor, ITSIBE, Live Hacking, Forensik, IT Forensik, IT Recht, Vorträge, Risiko, Richtlinien, Awareness,
 Weblink http://www.it-secuta.de/
 Contact Manuela Krämer SECUTA Leitung Vertriebsleitung Informationssicherheit; Phone: [+49 (0)89 4576918-12]; Email: m.kraemer@cbt-training.de
  
67.Asiacrypt — Asiacrypt 2015
 Dates 29 Nov 2015 → 03 Dec 2015
[ID=670620] Go to top of page
 LocationAuckland, New Zealand
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
68.Weiterbildung — Informationssicherheitsmanagement gemäß ISO 27001
 Dates 30 Nov 2015 → 01 Dec 2015
[ID=677834] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zur Einführung des Informationssicherheitsmanagements
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/216/Informationssicherheitsmanagement_gemäß_ISO_27001.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
69.Weiterbildung — Datenschutz Update
 Start date02 Dec 2015
[ID=677914] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract 1-tägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/220/Datenschutz_Update.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
70.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 14 Dec 2015 → 17 Dec 2015
[ID=677269] Go to top of page
 LocationHamburg, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
71.Eurocrypt — Eurocrypt 2016
 Dates 08 May 2016 → 13 May 2016
[ID=670630] Go to top of page
 LocationVienna, Austria
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
72.Crypto — Crypto 2016
 Dates 14 Aug 2016 → 18 Aug 2016
[ID=670662] Go to top of page
 LocationSanta Barbara, United States
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
73.Asiacrypt — Asiacrypt 2016
 Dates 04 Dec 2016 → 08 Dec 2016
[ID=670716] Go to top of page
 LocationHanoi, Vietnam
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  

Last updated: 01 December 2014