COMS

Calendar of upcoming scientific conferences

Home | Conference Management System | Conference Listings | Advertise | Contact | About
German French English
You are in: HomeConference ListingsInformatics → Information Security and Information Privacy
Cuescience – Live-Streaming war noch nie so einfach.

Conference Management Software

Our Conference Management Software (COMS) can be used for online:

  • registration
  • payment
  • paper submission
  • review process
  • paper selection
  • production of the book of abstracts

Read more ...
Try our demo online

Conferences and Meetings on Information Security and Information Privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 07 Sep 2015 → 10 Sep 2015
[ID=677215] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
2.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 07 Sep 2015 → 10 Sep 2015
[ID=677564] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
3.ISCISC — International Iranian Society of Cryptology Conference on Information Security and Cryptology
 Dates 08 Sep 2015 → 10 Sep 2015
[ID=719978] Go to top of page
 LocationRasht, Iran
 Abstract The objective of ISCISC is to bring together researchers, engineers and practitioners interested in various aspects of information security and cryptology. The conference aims to provide a forum for academicians, engineers, specialists, and students from all around the world to meet and discuss the latest developments in theory, emerging technologies, and progress in standards, services and their applications in various areas of information security. ISCISC encourages researchers, developers and practitioners to submit their original papers, and organize workshops on various new emerging topics. Industrial exhibitions are held in conjunction with the main conference. Keynote/plenary talks and panel discussions are other conference highlights.
 Weblink http://iscisc2015.guilan.ac.ir/index.php
 Related subject(s) Applied Maths: Cryptography and Information Security
  
4.SIN 2015 — 8th International Conference on Security of Information and Networks
 Dates 08 Sep 2015 → 10 Sep 2015
[ID=702041] Go to top of page
 LocationSochi, Russia
 Abstract In succession to the successful SIN 2007 - SIN 2014, the 8th International Conference on Security of Information and Networks (SIN 2015) provides an international forum for presentation of research and applications of security in information and networks. SIN 2015 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice.
 Weblink http://www.sinconf.org
  
5.SANS Crystal City 2015
 Dates 08 Sep 2015 → 13 Sep 2015
[ID=713360] Go to top of page
 LocationArlington, United States
 Abstract Cybersecurity training in Arlington from SANS Institute, the global leader in information security training. At SANS Crystal City 2015, we offer hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Crystal City 2015, September 8-13, is the DoubleTree by Hilton Washington DC-Crystal City, located in Arlington in sight of the Washington Monument and the Potomac River! Why not get your cybersecurity training in a more intimate setting at SANS Crystal City 2015? We are bringing our top courses and instructors to make this the perfect training event for you! Gain the skills and learn about the tools you need to protect your organization from security breaches and attack risk.
 Topics computer security, cybersecurity, information security, hacking, hacker tools, hacker techniques, forensics, digital forensics, Windows forensics, management, auditing, SCADA
 Weblink http://www.sans.org/u/2sH
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
6.SANS Network Security 2015
 Dates 12 Sep 2015 → 19 Sep 2015
[ID=716769] Go to top of page
 LocationLas Vegas, United States
 Abstract Information security training in Las Vegas from SANS Institute, the global leader in information security training.
 Topics computer security, cybersecurity, information security, information technology, hacking, hacker tools, exploits, incident handling, Windows, Linux, Unix, security operations, penetration testing, web applications, web app penetration testing, mobile devices, mobile device security, virtualization, cloud computing, cloud security, exploit writing, coding, forensics, Windows forensics, digital forensics, Mac forensics, memory forensics, smartphone forensics, malware, management, auditing, SCADA
 Weblink http://www.sans.org/u/2sR
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
  
7.EnergySec — 11th Annual Security & Compliance Summit
 Dates 14 Sep 2015 → 16 Sep 2015
[ID=729643] Go to top of page
 LocationArlington, VA, United States
 Abstract EnergySec started producing its security summits back in 2005. This ambitious venture was the result of many successful regional meetings that simply outgrew their capacity. We needed to expand the conversation and accommodate for the industry’s need for more peer networking.Since 2005, there have been many security conferences established in the energy sector tackling everything from technical SCADA security topics to security legislation and compliance to plant physical security. We believe we are one of the oldest and most mature summits, bringing the most relevant and timely security topics to the forefront of discussion. For more than 10 years the EnergySec Security Summit has been the premier gathering for stakeholders in the energy sector focused on physical and cyber security. Our summits give each attendee a rare opportunity to mingle with asset owners, government agencies, researchers, consultants, vendors and academia under one roof.
 Topics NERC, FERC, Critical Infrastructure Protection, Cybersecurity, Cyber Security, Training, Security Frameworks, NIST Cyber Security Framework, physical security, security compliance, industrial control system security, SCADA, SCADA security, ICS, energy sector, electric grid, grid security, cyber, security
 Weblink http://www.securitysummit2015.com/
 Contact Stacy Bresler; Phone: [503-789-5515]; Email: stacy@energysec.og
  
8.STM — International Workshop on Security and Trust Management
 Dates 21 Sep 2015 → 22 Sep 2015
[ID=720483] Go to top of page
 LocationVienna, Austria
 Abstract The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs. Topics of interest include, but are not limited to: - Access control      - Mobile security      - Security and trust in the Internet of Things - Anonymity      - Networked systems security      - Security and trust in pervasive computing - Applied cryptography      - Operating systems security      - Security and trust in services - Authentication     - Privacy      - Security and trust in social networks - Complex systems security      - Security and trust metrics      - Social implications of security and trust - Data and application security      - Security and trust policies      - Trust assessment and negotiation - Data protection
 Weblink http://stm2015.di.unimi.it/
  
9.ESORICS — European Symposium on Research in Computer Security
 Dates 21 Sep 2015 → 25 Sep 2015
[ID=720654] Go to top of page
 LocationVienna, Austria
 Abstract Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished Research and implementation experiences. We encourage submissions of papers discussing industrial research and development. 
 Weblink http://esorics2015.sba-research.org/
  
10.SANS Baltimore 2015
 Dates 21 Sep 2015 → 26 Sep 2015
[ID=717446] Go to top of page
 LocationBaltimore, United States
 Abstract Information security training in Baltimore, MD from SANS Institute, the global leader in information security training. At SANS Baltimore 2015, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Baltimore 2015, September 21-26, is the Hotel Baltimore, located in the magnificent Inner Harbor and close to everything that makes this city special!
 Topics security, information security, infosec, cybersecurity, information technology, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, cyber deception, forensics, digital forensics, computer forensics, memory forensics
 Weblink http://www.sans.org/u/3qR
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
  
11.SANS Cyber Security Enforcement Summit & Training
 Dates 21 Sep 2015 → 26 Sep 2015
[ID=729136] Go to top of page
 LocationDallas, United States
 Abstract The Cyber Security Enforcement Summit & Training will take place Sept. 21-25, 2015 in Dallas, TX. A variety of hands-on cyber security training courses will be offered for all levels of attendees from general security practitioners to seasoned incident responders and analysts.
 Topics information security, cybersecurity, computer security, IT security, computers, computing, information technology, hacking, hacker tools, hacker techniques, forensics, digital forensics, incident response
 Weblink http://www.sans.org/u/6lv
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
12.ESORICS 2015 — 20th European Symposium on Research in Computer Security
 Dates 23 Sep 2015 → 25 Sep 2015
[ID=706297] Go to top of page
 LocationVienna, Austria
 Weblink http://www.esorics2015.sba-research.org
  
13.Industrial Control Cybersecurity Europe
 Dates 28 Sep 2015 → 29 Sep 2015
[ID=720939] Go to top of page
 LocationLondon, United Kingdom
 Abstract Identify, protect, detect, respond and recover.    All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy, Oil, Gas, Electric and Water Sector.    The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industrys leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the worlds most influential solution providers.    Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.    Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.    2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.    We will introduce demonstrations on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery. 
 Weblink http://atnd.it/25741-0
  
14.CNS 2015 — 3rd IEEE Conference on Communications and Network Security
 Dates 28 Sep 2015 → 30 Sep 2015
[ID=705740] Go to top of page
 LocationFlorence, Italy
 Weblink http://cns2015.ieee-cns.org/
 Related subject(s) Networks, Internet
  
15.Hacker Day 2015
 Start date30 Sep 2015
[ID=734063] Go to top of page
 LocationKönigswinter / Bonn, Germany
 Abstract Digitaler Wandel und IT-Security: Potenziale nutzen, Daten schützen, Netze sichern! Entdecken Sie, wie Sie optimal von Big Data Anwendungen profitieren und gleichzeitig Datenschutzanforderungen zuverlässig erfüllen. Erleben Sie beim Live-Hacking, welche Gefahren kritische Infrastrukturen durch digitalisierte Prozesse und vernetzte Systeme drohen und wie Sie ihnen wirkungsvoll begegnen.
 Weblink https://hackerday.t-systems-mms.com/
  
16.SADFE - 2015 — 10th International Conference on Systematic Approaches to Digital Forensic Engineering
 Dates 30 Sep 2015 → 02 Oct 2015
[ID=704972] Go to top of page
 LocationMalaga, Spain
 Abstract SADFE-2015 investigates requirements for digital forensic readiness and methods, technologies, and building blocks for digital forensic engineering. Digital forensic at SADFE focuses on variety of goals, including criminal and corporate investigations, data records produced by calibrated devices, as well as documentation of individual and organizational activities. Another focus is on challenges brought in by globalization and cross-legislation digital applications. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.
 Topics Digital Forensics, Evidence Management, Digital Evidence, Data Integrity and Analytics, Security, Digital Preservation and Recovery,
 Weblink http://sadfe.org/
 Contact Antonio Maña; Phone: [+34 951 952 940]; Email: amg@lcc.uma.es
  
17.Weiterbildung — IT Security Manager
 Dates 05 Oct 2015 → 08 Oct 2015
[ID=677670] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract - Information – Security – Manager (ISM)
 Topics IT-Security, IT-Grundschutz, IT-Sicherheit, Sicherheitsmanagement, ISO 27001, Informationssicherheit, IT-Systeme, Information-Security-Manager, Informationssicherheit, ISM
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/210/IT_Security_Manager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
18.SANS Seattle 2015
 Dates 05 Oct 2015 → 10 Oct 2015
[ID=718624] Go to top of page
 LocationSeattle, United States
 Abstract We would like to welcome you to the Pacific Northwest for SANS Seattle 2015! We are bringing our top courses and top instructors to Seattle on October 5 - 10. With just 1 in 1,200 candidates qualifying globally to join our faculty, SANS Instructors are the foremost experts and are the best at ensuring you will not only learn the material, but that you can also apply it immediately when you return from your training.
 Topics information security, cybersecurity, computer security, computers, computing, hacking, hacker tools, hacker techniques, exploits, incident handling, critical security controls, mobile devices, mobile device security, digital forensics, forensics, incident response
 Weblink http://www.sans.org/u/3qW
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
19.it-sa — it-sa - The IT Security Expo and Congress
 Dates 06 Oct 2015 → 08 Oct 2015
[ID=724401] Go to top of page
 LocationNuremberg, Germany
 Abstract - Products and Solutions for IT Security - Physical IT Security - Services/Consulting/Reseach around IT Security
 Topics Cloud Security, Identity and Access Management, Data Security, Network Security, Mobile Security, Data Center Security, Industrial Security
 Weblink http://www.it-sa.de
 Contact Frank Venjakob; Phone: [+49-911-86068697]; Email: frank.venjakob@nuernbergmesse.de
  
20.MEInfoSecurity — MIDDLE EAST INFO SECURITY SUMMIT 2015
 Dates 12 Oct 2015 → 13 Oct 2015
[ID=721670] Go to top of page
 LocationCairo, Egypt
 Abstract The Middle East Info Security Summit, the premier event for info security, risk and IT professionals, will be held on 12 – 13 October 2015 at the Sofitel El Gezirah Hotel, Cairo, Egypt.
 Topics Information Security, info security, infosec, Information Security Management, Information Security Governance, Information Security Awareness, Information Security Consultancy, Information Security Standards, Information Security Engineering, Cisco Information Security, Internet Security, Mobile Security, Network Security, Enterprise Network Security, Network Security Implementation, Application Security, Web Application Security, Web Application Security Assessment, Application Security Assessments, Access Control, Antivirus, Symantec Antivirus, Secure Coding, Security, Security Management, Secure Remote Access, Telecommunications, Telecommunications Systems, Security Policy, Cryptography, Malware Analysis, Firewalls, Security Awareness, IT systems development, Digital Forensics, Infrastructure Security, Biometrics, CISA, IT Risk Management, Information Technology, Software Verification, Viruses, Authentication, Authentication Systems, National Security, Computer Security, Security Operations
 Weblink http://www.meinfosecurity.com
 Contact Ahmed Shoeib; Phone: [+21025377733]; Email: shoeib@promediakw.com
  
21.Industrial Control Cybersecurity USA
 Dates 12 Oct 2015 → 14 Oct 2015
[ID=722258] Go to top of page
 LocationSacramento, United States
 Weblink https://industrialcontrolsecurityusa.com/
  
22.SANS Tysons Corner 2015
 Dates 12 Oct 2015 → 17 Oct 2015
[ID=722430] Go to top of page
 LocationMcLean, United States
 Abstract At SANS Tysons Corner 2015, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Tysons Corner 2015, October 12 - 17, 2015, is the Hilton McLean Tysons Corner located in the center of Tysons Corner's technology corridor.
 Topics cybersecurity, information security, computer security, computers, computing, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, digital forensics, incident response, forensics, computer forensics, smartphone forensics, management, CISSP, IT security, strategic planning
 Weblink http://www.sans.org/u/3GK
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
23.SANS GridSecCon 2015
 Start date13 Oct 2015
[ID=729071] Go to top of page
 LocationPhiladelphia, United States
 Abstract SANS is pleased to announce we have partnered with NERC to offer a pre-conference training course and CyberCity at Grid Security Conference (GridSecCon) 2015 on Tuesday, October 13, 2015 at the Hilton Philadelphia Penn's Landing in Philadelphia, Pennsylvania. NERC's annual Grid Security Conference (GridSecCon) series brings together cybersecurity and physical security experts from industry and government to share emerging security trends, policy advancements, and lessons learned related to the Electricity Sub-sector.
 Topics information security, cybersecurity, computer security, IT security, computers, computing, information technology
 Weblink http://www.sans.org/u/6iG
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
24.Security B-Sides DC
 Dates 16 Oct 2015 → 18 Oct 2015
[ID=695347] Go to top of page
 LocationWashington DC, United States
 Abstract Security B-Sides DC is a regional Security B-Sides held in Washington, DC. It operates under the umbrella principles of Security B-Sides as a larger community project within information security. Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.
 Weblink http://www.BSidesDC.org
 Contact Alex Norman; Email: info@bsidesdc.org
  
25.WorldCIS-2015 — World Congress on Internet Security
 Dates 19 Oct 2015 → 21 Oct 2015
[ID=719260] Go to top of page
 LocationDublin, Ireland
 Abstract The World Congress on Internet Security (WorldCIS) has been Technical Co-sponsored by IEEE UK/RI Computer Chapter. The WorldCIS is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
 Weblink http://www.worldcis.org/
 Contact Charles Shoniregun; Email: info@worldcis.org
 Related subject(s) Networks, Internet
  
26.SANS Cyber Defense San Diego 2015
 Dates 19 Oct 2015 → 24 Oct 2015
[ID=721556] Go to top of page
 LocationSan Diego, United States
 Abstract The SANS Cyber Defense team is pleased to invite you to attend our 2nd Annual Cyber Defense training event: SANS Cyber Defense San Diego 2015.
 Topics cybersecurity, information security, computer security, computers, computing, cyber deception, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, security operations, CISSP, management
 Weblink http://www.sans.org/u/3r1
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
27.CEE-SECR — Central&Eastern European Software Engineering Conference in Russia
 Dates 22 Oct 2015 → 23 Oct 2015
[ID=723062] Go to top of page
 LocationMoscow, Russia
 Abstract Organized since 2005, CEE-SECR is the key annual software event in Central and Eastern Europe that is regularly attended by over 700 participants from local industry. The conference produce a high quality program with acceptance rate about 35%.
 Topics Software Engineering, Quality Assurance, Software, Programming, Information Technologies, IT, Cloud Computing, Mobile Applications, usability, UX, Testing, Project Management, Product Management, Agile, Cyber Security, Internet of things, Internet of Threats, Startups
 Weblink http://2015.secr.ru/
 Contact Alina Sokolova; Phone: [+79500119828]; Email: pr@secr.ru
 Related subject(s) Software Engineering; Application Software
  
28.ISPIT 2015 — Information Security and Protection of Information Technology Conference
 Dates 05 Nov 2015 → 06 Nov 2015
[ID=732034] Go to top of page
 LocationSaint-Petersburg, Russia
 Abstract The ISPIT 2015 will take place in Saint-Petersburg, Russia from November 5th to November 6th, 2015. The conference will base in ITMO University in coordination with “SCA RESEARCH LAB”, Central Asian University, companies : MegaFon, Infotecs, SearchInfrom, Gazinformservice. The ISPIT provides a valuable connection between the research and engineering communities and participants from industry, academia, and government organizations. The ISPIT conference highlights new results in the area of information security and protection of information technologyes. All submitted papers will be reviewed and accepted papers will be published in the proceeding of the conference.
 Topics Information security of mobile phones, Protecting of the data channels, Information security in the banking sector, Digital forensic, Information security of the cloud technologies content.
 Weblink http://ispit.ifmo.ru/
 Contact Igor S. Pantiukhin; Phone: [+79117257474]; Email: zevall@ya.ru
  
29.Weiterbildung — Datenschutzmanager
 Dates 09 Nov 2015 → 10 Nov 2015
[ID=677843] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zum Datenschutzmanagement
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/217/Datenschutzmanager.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
30.SANS South Florida 2015
 Dates 09 Nov 2015 → 14 Nov 2015
[ID=722746] Go to top of page
 LocationFort Lauderdale, United States
 Abstract Information security and forensics training in Fort Lauderdale November 9-14. SANS Institute, the global leader in infosec and forensics training will offer hands-on, immersion-style security and forensics training courses taught by real-world practitioners. Join us in Fort Lauderdale where you are just two miles from Fort Lauderdale Beach. This is a must-attend event as industry-leading experts focus on helping you build to protect your assets and enhance your knowledge base.
 Topics cybersecurity, information security, computer security, IT security, computers, computing, web applications, web app penetration testing, penetration testing, hacking, hacker tools, hacker techniques, exploits, incident handling, forensics, digital forensics, incident response, network forensics, smartphone forensics
 Weblink http://www.sans.org/u/4vm
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
31.ICACC — International Conference on Anti-Cybercrime
 Dates 10 Nov 2015 → 12 Nov 2015
[ID=734948] Go to top of page
 LocationRiyadh, Saudi Arabia
 Abstract The ICACC aims to bring together primarily researchers, but also practitioners from academia, industry and governmental institutions to elaborate and discuss IT security and privacy challenges that we are facing today and will be facing in the future. ICACC will be a vital forum for the discussion of issues of cybercrime. We are inviting well-known speakers from industry and academia from all over the world. The conference will have an exhibition floor and to bring together major international companies from all over the world that offer strong solutions to combat cybercrime. In addition to traditional paper sessions, the conference sessions will include participation of industry representatives demonstrating their new products and looking for new ideas. The conference will offer an ideal environment for learning, so we welcome your participation. We are certain that you will enjoy all the planned events, including your stay in Riyadh, and we look forward to meeting you during the conference.
 Weblink http://icacc.ccis-imsiu.edu.sa/
  
32.WIFS — International Workshop on Information Forensics and Security
 Dates 16 Nov 2015 → 19 Nov 2015
[ID=735104] Go to top of page
 LocationRome, Italy
 Abstract The conference will feature three keynote lectures, up to four tutorials, lectures and poster sessions, demo and ongoing work activities. Its major goal is to bring together researchers in the field to foster ideas exchange and to allow cross-fertilization among researchers working in the different areas of information security. WIFS will serve as a powerful instrument for community building.
 Weblink http://www.wifs2015.org/
  
33.SANS Pen Test Hackfest Summit & Training
 Dates 16 Nov 2015 → 23 Nov 2015
[ID=726233] Go to top of page
 LocationAlexandria, United States
 Abstract SANS Pen Test Hackfest Training Event and Summit is coming back to Washington DC, bigger and better than ever! The Hackfest is an ideal way to learn offensive techniques so you can better defend your environment. Whether you are a penetration tester, a forensics specialist, or defender, the techniques covered at the Hackfest represent the latest and most powerful attacks every organization needs to thwart. Featuring top-rated, industry-leading experts sharing their best tips and advice, this must-attend event is focused on building your skills in providing super high-value in your work. Other hacker and pen test conferences cover interesting hacks, but only the SANS Pen Test Hackfest is focused on imparting skills you can directly apply to your next project. With two days of in-depth presentations followed by your choice of SANS top-rated penetration testing courses, the SANS Pen Test Hackfest Training Event and Summit is the place to be in November in Washington DC. Our goal with this event is to blow your mind with exciting, hands-on learning opportunities. As an added benefit, we'll also run an extended NetWars Tournament during the evenings at the event! These sessions will give you more time than ever with SANS awesome NetWars challenge series to even further build your skills in a fun, interactive, hands-on fashion. Check out this list of all the great stuff at the SANS Pen Test Hackfest Training Event and Summit: - NetWars, NetWars, NetWars! This event will include THREE full evenings of NetWars challenges, increasing the amount of NetWars time over a traditional SANS Live Training Event. NetWars is an action-packed challenge environment where people can build their skills while having fun. - Coin-a-palooza: For participants who have taken a given SANS course, this event will offer the ability to catch up on the SANS Pen Test prize coins by participating in the three nights of NetWars challenges. If you've taken 504 in the past (but didn't win the coin), and make it from NetWars Level 1 into 2, you'll earn the 504 coin! If you make it into Level 3, you'll get your choice of a 542, 560, 561, 573 or 575 coin, provided you've taken the associated course sometime in the past. Make it into Level 4, and you'll get your choice of a 617, 642, or 760 coin if you've had those classes! Nail Level 5, and you'll get your 760 coin if you are an alum of that class. And, if you win NetWars, you'll get the NetWars coin. With Coin-a-palooza, you'll have an opportunity to win up to FIVE awesome challenge coins for your collection. - CyberCity: The SANS CyberCity project helps train cyber warriors that computer and network activities can have major kinetic impact on the real-world. With its power grid, traffic lights, and water reservoir included in a physical model city, participants access and gain control over these assets, preventing attackers from wreaking havoc. This event will include a full evening session of CyberCity missions. This is one of the few annual events where you have hands-on access to the physical city. - Summit: Two full-days of in-depth presentations chock full of cutting-edge penetration testing topics focused on helping you provide technical excellence and real business value in your vulnerability assessment and penetration testing work. - Training: 5-6 days of deep SANS training in real-world penetration techniques you can use immediately when you return to your job. - Super Secret Field Trip: Last year's field trip to the National Cryptologic Museum was incredible. This year, we've got even bigger plans for an awesome outing full of learning and networking! Wait 'til you see this! Special Offers for All Attendees! This offer reduces the Summit registration fee from $1,495 to $695 when purchased in conjunction with a full price 5-6 day course a savings of $1,000! The discount is automatically applied when the Summit and a qualifying course are both selected during registration. http://www.sans.org/u/5BW - Receive a discount of up to 400 USD for any 4-6 day course paid for by Wednesday, September 30, 2015. - Receive a discount of up to 200 USD for any 4-6 day course paid for by Wednesday, October 14, 2015. - No refunds available after Sunday, November 1, 2015.
 Topics cybersecurity, information security, computer security, IT security, web apps, web applications, penetration testing, hacking, hacker tools, hacking techniques, exploits, incident handling, network penetration testing
 Weblink http://www.sans.org/u/5BW
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
34.DeepSec 2015 — In Depth Security Conference
 Dates 17 Nov 2015 → 20 Nov 2015
[ID=740766] Go to top of page
 LocationVienna, Austria
 Weblink https://deepsec.net
 Contact Email: deepsec@deepsec.net
 Related subject(s) Applied Maths: Cryptography and Information Security
  
35.IEEE PRDC 2015 — The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015)
 Dates 18 Nov 2015 → 20 Nov 2015
[ID=691515] Go to top of page
 LocationZhangjiajie, China
 Abstract IEEE PRDC 2015 is the twenty-first event in the series of symposia started in 1989 that are devoted to dependable and fault-tolerant computing. PRDC is recognized as the main event in the Pacific area that covers many dimensions of dependability and fault tolerance, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated into all aspects of daily life, the dependability of computing systems has become increasingly critical. This symposium provides a forum for countries around the Pacific Rim and other areas of the world to exchange ideas for improving the dependability of computing systems.
 Topics (1) Software and hardware reliability, testing, verification, and validation (2) Dependability measurement, modeling, evaluation, and tools (3) Self-healing, self-protecting, and fault-tolerant systems (4) Software aging and rejuvenation (5) Safety-critical systems and software (6) Architecture and system design for dependability (7) Fault-tolerant algorithms and protocols (8) Reliability in cloud computing, Internet, and web systems and applications (9) Cloud and Internet Information security (10) Dependability issues in computer networks and communications (11) Dependability issues in distributed and parallel systems (12) Dependability issues in real-time systems, database, and transaction processing systems (13) Dependability issues in autonomic computing (14) Dependability issues in aerospace and embedded systems (15) Dependability issues in cyber-physical systems (16) Dependability issues in socio-technical systems
 Weblink http://prdc.dependability.org/PRDC2015/
 Contact Prof. Guojun Wang; Email: csgwang@gmail.com
 Related subject(s) Embedded Systems & Ubiquitous Computing; Grid-, Distributed- and Parallel Computing, Cloud Computing
  
36.Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte (Datenschutzbeauftragte(r)
 Dates 23 Nov 2015 → 26 Nov 2015
[ID=677585] Go to top of page
 LocationHamburg, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/197/Datenschutzseminar_für_Betriebs-_und_Personalräte_(Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
37.ProvSec 2015 — The Ninth International Conference on Provable Security
 Dates 24 Nov 2015 → 26 Nov 2015
[ID=706569] Go to top of page
 LocationKanazawa, Japan
 Weblink https://security-lab.jaist.ac.jp/provsec2015/
 Related subject(s) Software Engineering
  
38.14. SECUTA 25. - 27.11.2015 in Garmisch-Partenkirchen — Information Security Tagung 2015 für IT-Manager
 Dates 25 Nov 2015 → 27 Nov 2015
[ID=648811] Go to top of page
 LocationGarmisch-Partenkirchen, Germany
 Abstract Ziel der IT-Security Jahrestagung ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit für das Folgejahr praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, diverse Unternehmensberichte, Live Hacking´s sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der Information Security Tagung ab.
 Topics Informationssicherheit, IT-Sicherheit, IT, Hacking, IT-Security, Security, Riskmanagement, IT-Management, CIO, CISO, Datenschutz, Datensicherheit, Netzwerk, Penetration, Richtlinien, ISO, ISO 27001, IT Tagung, Security Tagung, ISMS, Audit, Auditor, ITSIBE, Live Hacking, Forensik, IT Forensik, IT Recht, Vorträge, Risiko, Richtlinien, Awareness,
 Weblink http://www.it-secuta.de/
 Contact Manuela Krämer SECUTA Leitung Vertriebsleitung Informationssicherheit; Phone: [+49 (0)89 4576918-12]; Email: m.kraemer@cbt-training.de
  
39.Asiacrypt — Asiacrypt 2015
 Dates 29 Nov 2015 → 03 Dec 2015
[ID=670697] Go to top of page
 LocationAuckland, New Zealand
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
40.Weiterbildung — Informationssicherheitsmanagement gemäß ISO 27001
 Dates 30 Nov 2015 → 01 Dec 2015
[ID=677856] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Zweitägiger Praxislehrgang zur Einführung des Informationssicherheitsmanagements
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/216/Informationssicherheitsmanagement_gemäß_ISO_27001.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
41.SANS San Francisco 2015
 Dates 30 Nov 2015 → 05 Dec 2015
[ID=738688] Go to top of page
 LocationSan Francisco, United States
 Abstract You are invited to attend another great SANS training event in "The City by the Bay." SANS San Francisco 2015 will be in the heart of the city at the Hilton San Francisco Union Square campus. Some of our courses are in alignment with DoD Directive 8570 requirements for Baseline IA Certifications. Several courses also have GIAC Certification attempts available. See the GIAC homepage for more information.
 Topics cybersecurity, computer security, information security, IT security, computing, computers, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, exploit writing, forensics, Mac forensics, CISSP, strategic planning, auditing
 Weblink http://www.sans.org/u/5vk
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses; Networks, Internet
  
42.Weiterbildung — Datenschutz Update
 Start date02 Dec 2015
[ID=677881] Go to top of page
 LocationOffenbach, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract 1-tägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/220/Datenschutz_Update.html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
43.SANS Security Leadership Summit & Training 2015
 Dates 03 Dec 2015 → 10 Dec 2015
[ID=726267] Go to top of page
 LocationDallas, United States
 Abstract CISOs must manage budgets, garner support from non-technical executive management and stakeholders, oversee a team of IT security professionals, support and enable the latest business innovations, and - oh yeah - keep the organization safe from hacks, intrusions, APT, malware and a constant stream of emerging threats. It's a tall order, one that requires both a breadth and depth of technical knowledge, experience and leadership skill. At this summit, Security Leaders and SANS subject matter experts will provide crucial insights, advice and experiences relevant for both current and aspiring CISOs. The format will partner senior CISOs and security leaders with SANS experts, pairing experiences, best practices, lessons learned (the hard way), and career advice, with depth on key security topics and emerging trends... So you can stay ahead of the curve - and impress your management. Topics and themes to be explored include: - Building an effective CISO/CEO relationship - Getting board and executive buy-in for your security program - Effective Cyber Threat Intelligence - Incident response - Product and application security lessons learned - Legal Perspectives: Cyber Investigations, Ethics, and Evidence - The Road to Becoming a CISO - Developing Cyber Talent and working with HR Attendees will have the opportunity to explore a variety of topics, in both security and management, and network with CISOs, SANS experts, and peers to gain an in-depth understanding of what it takes to succeed as a CISO. Special Offers for All Attendees! This offer reduces the Summit registration fee from $1,495 to $995 when purchased in conjunction with a full price 4-6 day course a savings of $500! The discount is automatically applied when the Summit and a qualifying course are both selected during registration. Early bird course discounts do not apply with this bundle offer. http://www.sans.org/u/5yX Available Courses: SEC401: Security Essentials Bootcamp Style - Russell Eubanks MGT414: SANS Training Program for CISSP® Certification MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ Security Leadership Summit - Frank Kim - Receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, October 21, 2015. - Receive a discount of up to $200 for any 4-6 day course paid for by Wednesday, November 4, 2015. - No refunds available after Monday, November 23, 2015.
 Topics cybersecurity, information security, computer security, CISSP, management, IT security
 Weblink http://www.sans.org/u/5yX
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
44.ACSAC — Annual Computer Security Applications Conference
 Dates 07 Dec 2015 → 11 Dec 2015
[ID=736266] Go to top of page
 LocationUniversal City, United States
 Abstract ACSAC brings together cutting edge researchers, with a broad cross-section of security professionals drawn from industry, government and academia, gathered to present and discuss the latest security results and topics. With peer reviewed papers, invited talks, panels, workshops, and professional development and training courses, ACSAC continues its core mission of investigating practical solutions for computer security technology.
 Weblink https://www.acsac.org/2015/
  
45.SANS Cyber Defense Initiative 2015
 Dates 12 Dec 2015 → 19 Dec 2015
[ID=724313] Go to top of page
 LocationWashington, DC, United States
 Abstract You are invited to attend SANS Cyber Defense Initiative 2015 (CDI), SANS is the one educational organization known for developing the cybersecurity skills most in need right now. SANS Cyber Defense Initiative 2015 will feature courses in IT security, security management, IT audit, penetration testing, and computer forensics, including short courses that can be taken with a long course to enhance your training. Every course, evening talk, and special event is designed to equip you with cutting-edge knowledge and skills required to combat today's cyber criminals.
 Topics cybersecurity, active defense, cyber deception, cyber threats, cyber threat intelligence, incident response, critical security controls, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, PowerShell, Windows, security operations, penetration testing, networks, mobile devices, mobile device security, virtualization, cloud security, exploit writing, secure coding, coding, forensics, computer forensics, digital forensics, Windows forensics, network forensics, malware, management, IT security, strategic planning, auditing, data security law, ICS, SCADA
 Weblink http://www.sans.org/u/4OD
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Mobile Computing & Telecommunication ; Training in Computer Science, Courses
  
46.WCICSS — World Congress on Industrial Control Systems Security
 Dates 14 Dec 2015 → 16 Dec 2015
[ID=721386] Go to top of page
 LocationLondon, United Kingdom
 Abstract The World Congress on Industrial Control Systems Security (WCICSS) will be held from the 14th to 16th of December, 2015 in London, UK. The WCICSS-2015 is a meeting point for Professionals and researchers, IT security professionals, managers, developers, educators, vendors and service providers who are involved in development, integration, assessment, implementation, and operation of industrial cybersecurity technologies. Therefore, the conference will provide opportunities to discuss both the current status and emerging trends in protection of industrial control systems. The aim of WCICSS is to provide an opportunity for academicians and professionals from various educational fields with cross-disciplinary interests to bridge the knowledge gap, promote research esteem and the evolution of pedagogy. The WCICSS-2015 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.
 Weblink http://www.wcicss.org/
 Contact Email: info@wcicss.org
  
47.Weiterbildung — Datenschutzbeauftragte(r)
 Dates 14 Dec 2015 → 17 Dec 2015
[ID=677203] Go to top of page
 LocationHamburg, Germany
 Organizer Umweltinstitut Offenbach GmbH
 Abstract Viertägiger Lehrgang im Sinne des § 4f Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten.
 Topics Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach
 Weblink http://www.umweltinstitut.de/themen/32/Veranstaltungen/189/Datenschutzbeauftragte(r).html
 Contact Umweltinstitut Offenbach GmbH; Phone: 069/810679; Email: mail@umweltinstitut.de
 Related subject(s) Continuing Professional Education, Courses (general)
  
48.International Conference on Research in Security Standardisation
 Dates 15 Dec 2015 → 16 Dec 2015
[ID=736666] Go to top of page
 LocationTokyo, Japan
 Abstract Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series of standards has become the internationally adopted basis for managing corporate information security. Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new domains. The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation.
 Weblink http://ssr2015.com/
  
49.ICISS 2015 — 11th International Conference on Information Systems Security
 Dates 16 Dec 2015 → 20 Dec 2015
[ID=706354] Go to top of page
 LocationKolkata, India
 Weblink http://www.iciss.org.in
  
50.SANS Las Vegas 2016
 Dates 09 Jan 2016 → 14 Jan 2016
[ID=724587] Go to top of page
 LocationLas Vegas, United States
 Topics cybersecurity, cyber threats, information security, computer security, computers, computing, hacking, hacker tools, hacking techniques, exploits, incident handling, CISSP, ICS, SCADA
 Weblink http://www.sans.org/u/4Zh
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
51.SANS Security East 2016
 Dates 25 Jan 2016 → 30 Jan 2016
[ID=724586] Go to top of page
 LocationNew Orleans, United States
 Topics cybersecurity, information security, computer security, IT security, web applications, web apps, penetration testing, incident response, hacking, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, security operations, network penetration testing, critical security controls, mobile devices, mobile device security, forensics, Windows forensics, memory forensics, digital forensics, computer security
 Weblink http://www.sans.org/u/52v
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
52.ICISSP 2016 — The 2nd International Conference on Information Systems Security and Privacy
 Dates 19 Feb 2016 → 21 Feb 2016
[ID=733458] Go to top of page
 LocationRome, Italy
 Topics Security Frameworks, Architectures and Protocols ; Cryptographic Algorithms ; Information Hiding and Anonymity ; Vulnerability Analysis and Countermeasures ; Database Security ; Content Protection and Digital Rights Management ; Software Security Assurance ; Security Architecture and Design Analysis ; Security Testing ; Risk and Reputation Management ; Phishing ; Security and Trust in Pervasive Information Systems ; Legal and Regulatory Issues ; Security Professionalism and Practice ; Trust in Social Networks ; Identity and Trust Management ; Intrusion Detection and Response ; Smartcard Technology ; Privacy-Enhancing Models and Technologies ; Privacy In Cloud and Pervasive Computing ; Authentication, Privacy and Security Models ; Social Media Privacy ; E-Voting and Privacy ; Privacy Metrics and Control ; Malware Detection ; Vehicular Systems and Networks ; Threat Awareness ; Identification and Access Control ; Mobile Systems Security ; Biometric Technologies and Applications ; Security Awareness and Education ; Data and Software Security ; Data Mining and Knowledge Discovery ; Web Applications and Services
 Weblink http://www.icissp.org/
  
53.PQCrypto — International Conference on Post-Quantum Cryptography
 Dates 24 Feb 2016 → 26 Feb 2016
[ID=740494] Go to top of page
 LocationFukuoka, Japan
 Abstract The aim of PQCrypto is to serve as a forum for researchers to present results and exchange ideas on the topic of cryptography in an era with large-scale quantum computers. Original research papers on all technical aspects of cryptographic research related to post-quantum cryptography are solicited. The topics include (but are not restricted to): -    Cryptosystems that have the potential to be safe against quantum computers such as: hash-based signature schemes, lattice-based cryptosystems, code-based cryptosystems, multivariate cryptosystems and quantum cryptographic schemes; -    Classical or quantum attacks (including on side-channels) on post-quantum cryptosystems; -    Security models for the post-quantum era.
 Weblink https://pqcrypto2016.jp/
 Related subject(s) Applied Maths: Cryptography and Information Security; Quantum Mechanics and Quantum Information Theory
  
54.SANS Threat Hunting and Incident Response Summit 2016
 Dates 12 Apr 2016 → 19 Apr 2016
[ID=729890] Go to top of page
 LocationNew Orleans, United States
 Topics information security, cybersecurity, computer security, IT security, computers, computing, information technology, data breaches, cyber threat intelligence, hacking, hacker tools, hacker techniques, exploits, computer exploits, incident handling, forensics, digital forensics, incident response, network forensics
 Weblink http://www.sans.org/u/6AP
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science, Courses
  
55.Eurocrypt — Eurocrypt 2016
 Dates 08 May 2016 → 13 May 2016
[ID=670718] Go to top of page
 LocationVienna, Austria
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
56.ECCWS 2016 — 15th European Conference on Information Warfare and Security
 Dates 07 Jul 2016 → 08 Jul 2016
[ID=731410] Go to top of page
 LocationMunich, Germany
 Weblink http://academic-conferences.org/eccws/eccws2016/eccws16-call-papers.htm
 Contact Mandy Butler; Phone: [01189724148]; Email: mandy@academic-conferences.org
  
57.Crypto — Crypto 2016
 Dates 14 Aug 2016 → 18 Aug 2016
[ID=670728] Go to top of page
 LocationSanta Barbara, United States
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
58.Asiacrypt — Asiacrypt 2016
 Dates 04 Dec 2016 → 08 Dec 2016
[ID=670738] Go to top of page
 LocationHanoi, Vietnam
 Weblink http://www.iacr.org/conferences/
 Related subject(s) Applied Maths: Cryptography and Information Security
  

Last updated: 19 August 2015