COMS

Calendar of upcoming scientific conferences

Home | Conference Management System | Conference Listings | Advertise | Contact | About
German French English
You are in: HomeConference ListingsInformatics → Information Security and information privacy

Conference Management Software

Our Conference Management Software (COMS) can be used for online:

  • registration
  • payment
  • paper submission
  • review process
  • paper selection
  • production of the book of abstracts

Read more ...
Try our demo online

Conferences and Meetings on Information Security and information privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.SANS — ICS Security Training - Houston 2014
 Dates 21 Jul 2014 → 25 Jul 2014
[ID=606043] Go to top of page
 LocationHouston, United States
 Topics computers, computing, security, information security, informatin technology, SCADA, infrastructure, cybersecurity, exploits, control systems
 Weblink http://www.sans.org/info/147715
 Contact SANS Institute; Phone: [(301) 654-SANS (7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
2.SANS Boston 2014
 Dates 28 Jul 2014 → 02 Aug 2014
[ID=614250] Go to top of page
 LocationBoston, United States
 Topics information security, information technology, forensics, network forensics, smartphones, smartphone forensics, hacking, hacker techniques, exploits, incident handling, web applications, web apps, penetration testing, ethical hacking, network penetration testing, mobile devices, mobile device security, computer forensics, management
 Weblink http://www.sans.org/info/151525
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
3.SANS DHS Continuous Diagnostics & Mitigation Award Workshop
 Dates 01 Aug 2014 → 08 Aug 2014
[ID=627280] Go to top of page
 LocationWashington, DC, United States
 Abstract This SANS CDM event provides government security managers the opportunity to get the latest status on the DHS Continuous Diagnostic and Mitigiation program and to learn how the early adopters in government are using CDM to increase security, reduce the cost of FISMA compliance and deliver more secure services to the citizen. Featuring SANS experts (e.g., John Pescatore, Tony Sager, Alan Paller). on continuous monitoring, the Critical Security Controls and other similar initiatives, the workshop will also connect attendees with solution providers, system integrators, Continuous Monitoring as a Service providers as well as some of key players in the overall program including DHS and government CISOs. The workshop will bring continued awareness of this important program, provide thought leadership around cybersecurity risks, showcase key solution capabilities/customer success stories and provide connections with interested potential customers.
 Topics information security, critical security controls
 Weblink http://www.sans.org/info/159507
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
4.DEF CON 22
 Dates 07 Aug 2014 → 10 Aug 2014
[ID=611914] Go to top of page
 LocationLas Vegas, Nevada, United States
 Abstract Started in 1992 by the Dark Tangent, DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge on Las Vegas every summer to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might.
 Topics technology, information security, privacy, hacking, defense, software, hardware, media, physical security, contests, games, technical talks,
 Weblink https://defcon.org
  
5.SANS San Antonio 2014
 Dates 11 Aug 2014 → 16 Aug 2014
[ID=622092] Go to top of page
 LocationSan Antonio, United States
 Abstract We are pleased to invite you to attend SANS San Antonio 2014 on August 11-16 at Westin Riverwalk campus located on the banks of the San Antonio River Walk. We have five of our top information security courses selected to provide you with the training and certification that you need to boost your career by learning from the best! SANS Instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
 Topics information security, information technology, intrusion detection, hacking, exploits, incident handling, CISSP, management
 Weblink http://www.sans.org/info/156930
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
6.ISSA — 2014 Information Security for South Africa
 Dates 13 Aug 2014 → 15 Aug 2014
[ID=585591] Go to top of page
 LocationJohannesburg, South Africa
 Abstract Information security has evolved and in the last few years there has been renewed interest in the subject worldwide. This is evident from the many standards and certifications now available to guide security strategy. The convergence of technologies like the cloud together with advances in wireless communications, has meant new security challenges for the information security fraternity. It is this fraternity that organisations, governments and communities in general look to for guidance on best practice in this converging world. Identity theft and phishing are on-going concerns. Security mechanisms have become so good and are generally implemented by companies wanting to adhere to good corporate governance, so attackers are now looking to the weak link in the chain, namely the individual user. It is far easier to attack them than attempt to penetrate sophisticated corporate systems. Digital forensic investigations and techniques are used in a bid to apprehend the perpetrators.
 Weblink http://www.infosecsa.co.za
  
7.Cyber Defense Summit 2014
 Dates 13 Aug 2014 → 20 Aug 2014
[ID=621898] Go to top of page
 LocationNashville, United States
 Topics information security, hacking, intrusion detection, exploits, incident handling, cybersecurity
 Weblink http://www.sans.org/info/156965
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
8.CSET '14 — 7th Workshop on Cyber Security Experimentation and Test
 Start date18 Aug 2014
[ID=628066] Go to top of page
 LocationManchester Grand Hyatt, San Diego, United States
 Abstract CSET invites submissions on the science of cyber security evaluation, as well as experimentation, measurement, metrics, data, and simulations as those subjects relate to computer and network security and privacy. The 'science' of cyber security poses significant challenges: very little data are available for research use, and little is understood about what good data would look like if it were obtained. Meeting these challenges requires transformational advances, including understanding the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability.
 Weblink http://www.usenix.org/conference/cset14
  
9.EVT/WOTE '14: 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections
 Dates 18 Aug 2014 → 19 Aug 2014
[ID=627622] Go to top of page
 LocationManchester Grand Hyatt, San Diego, United States
 Abstract EVT/WOTE brings together researchers from a variety of disciplines, ranging from computer science and human-computer interaction experts through political scientists, legal experts, election administrators, and voting equipment vendors.
 Weblink http://www.usenix.org/conference/evtwote14
 Related subject(s) Computing Hardware; Social Networks and Social Aspects of Information Techonology
  
10.SANS Virginia Beach 2014
 Dates 18 Aug 2014 → 29 Aug 2014
[ID=624139] Go to top of page
 LocationVirginia Beach, United States
 Topics information security, information technology, intrusion detection, hacking, exploits, incident handling, penetration testing, virtualization, cloud security, Windows, forensics, computer forensics, incident response, malware
 Weblink http://www.sans.org/info/156935
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
11.HotSec '14 — 2014 USENIX Summit on Hot Topics in Security
 Start date19 Aug 2014
[ID=627540] Go to top of page
 LocationManchester Grand Hyatt, San Diego, United States
 Abstract The 2014 USENIX Summit on Hot Topics in Security (HotSec '14) will be held on Tuesday, August 19, 2014, in conjunction with the 23nd USENIX Security Symposium in San Diego, CA. HotSec aims to bring together researchers across computer security disciplines to discuss the state of the art, with emphasis on future directions and emerging areas.
 Weblink http://www.usenix.org/conference/hotsec14
  
12.WOOT '14 — 8th USENIX Workshop on Offensive Technologies
 Start date19 Aug 2014
[ID=627592] Go to top of page
 LocationManchester Grand Hyatt, San Diego, United States
 Abstract Progress in the field of computer security is driven by a symbiotic relationship between our understandings of attack and of defense. The 8th USENIX Workshop on Offensive Technologies (WOOT .14) aims to bring together researchers and practitioners in systems security to present research advancing the understanding of attacks on operating systems, networks, and applications.
 Weblink http://www.usenix.org/conference/woot14
  
13.23rd USENIX Security Symposium
 Dates 20 Aug 2014 → 22 Aug 2014
[ID=627857] Go to top of page
 LocationManchester Grand Hyatt, San Diego, United States
 Abstract The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The Symposium includes a technical program with refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Workshops will precede the Symposium on August 18 and 19.
 Weblink http://www.usenix.org/conference/usenixsecurity14
  
14.UEFI Mini-Summit at LinuxCon & CloudOpen North America
 Start date22 Aug 2014
[ID=637583] Go to top of page
 LocationChicago, United States
 Abstract The UEFI Forum is hosting a UEFI Mini-Summit as a co-located event at LinuxCon & CloudOpen North America. The UEFI Mini-Summit will be held on Friday, August 22 and is a full-day session with five presentations covering the latest UEFI firmware developments, including tools and resources available to the Linux community. This free session is open to all conference attendees as well as members of the press.
 Topics UEFI, firmware, BIOS, Linux, Secure Boot, UEFI Secure Boot, LinuxCon, ARM, servers, ACPI
 Weblink http://events.linuxfoundation.org/events/cloudopen-north-america/extend-the-experience/uefi-mini-summit
 Contact Christine Antles ; Email: cantles@nereus-worldwide.com
 Related subject(s) Computing Hardware; Embedded Systems & Ubiquitous Computing
  
15.SHA3 — The 2014 SHA3 Workshop
 Dates 22 Aug 2014 → 23 Aug 2014
[ID=583607] Go to top of page
 LocationSanta Barbara, California, United States
 Weblink http://csrc.nist.gov/groups/ST/hash/sha-3/Aug2014/SHA3-aug2014-call-for-papers.pdf
 Related subject(s) Applied Maths: Cryptography and Information Security
  
16.SANS Chicago 2014
 Dates 24 Aug 2014 → 29 Aug 2014
[ID=624094] Go to top of page
 LocationChicago, United States
 Topics information security, information technology, intrusion detection, hacking, exploits, incident handling, forensics, computer forensics, incident response, management, CISSP, strategic planning, policy
 Weblink http://www.sans.org/info/156940
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
17.IWSEC 2014 — 9th International Workshop on Security
 Dates 27 Aug 2014 → 29 Aug 2014
[ID=615579] Go to top of page
 LocationHirosaki, Japan
 Weblink http://www.iwsec.org/2014/
  
18.SANS Tallinn 2014
 Dates 01 Sep 2014 → 06 Sep 2014
[ID=616217] Go to top of page
 LocationTallinn, Estonia
 Topics information security, information technology, hacking, exploits, incident handling, web apps, web applications, penetration testing
 Weblink http://www.sans.org/info/154760
 Contact Phone: [((301) 654-7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
19.SECRYPT 2014 — 11th International Conference on Security and Cryptography
 Dates 02 Sep 2014 → 04 Sep 2014
[ID=615523] Go to top of page
 LocationVienna, Austria
 Weblink http://www.secrypt.icete.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
20.SECRYPT 2014 — 11th International Conference on Security and Cryptography
 Dates 02 Sep 2014 → 04 Sep 2014
[ID=583551] Go to top of page
 LocationVienna, Australia
 Weblink http://www.secrypt.icete.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
21.SCN 2014 — Ninth Conference on Security and Cryptography for Networks
 Dates 03 Sep 2014 → 05 Sep 2014
[ID=615544] Go to top of page
 LocationAmalfi, Italy
 Weblink http://scn.dia.unisa.it/
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
22.ARES 2014 — 9th International Conference on Availability, Reliability and Security
 Dates 08 Sep 2014 → 12 Sep 2014
[ID=611971] Go to top of page
 LocationFreiburg, Switzerland
 Abstract The 9th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.
 Weblink http://www.ares-conference.eu/
  
23.RASIEM 2014 — The 3rd International Workshop on Recent Advances in Security Information and Event Management
 Dates 08 Sep 2014 → 12 Sep 2014
[ID=613130] Go to top of page
 LocationFreiburg, Switzerland
 Abstract The SIEM (Security Information and Event Management) approach enables near-real time event management as well as proactive management of security incidents and events for IT infrastructures. This workshop addresses research topics in SIEM and related methods and technologies.
 Topics Recognition, analysis and treatment of safety-relevant anomalies in virtualized computer systems, Adequate sensors in the hypervisor VMs and in run-time environments for applications, Case study of SIEM in operational scenarios, Protection of critical infrastructures against (targeted) cyber attacks, Recognizing real threats in the multitude of daily alerts, Predictive security analysis, Ensuring data source reliability, Managing data from heterogeneous devices and networks, Correlation of highly heterogeneous data to identify threats SIEM for distributed computing, Fault tolerance and resilience for SIEM architectures, Real-time security analysis for SIEM, SIEM for process monitoring and control, Decision systems in SIEM, Event translation and complex event processing for SIEM, Big data approaches of mapping and reducing problem sets with regard to security information to help create meaning and structure from myriad data sources, Visualization of security events
 Weblink http://www.ares-conference.eu/conference/workshops/rasiem-2014/
 Contact Email: romain.giot@u-bordeaux1.fr
  
24.ECTCM 2014 — Second International Workshop on Emerging Cyberthreats and Countermeasures
 Dates 08 Sep 2014 → 12 Sep 2014
[ID=615543] Go to top of page
 LocationFreiburg, Switzerland
 Weblink http://www.ectcm.net
 Related subject(s) Applied Maths: Cryptography and Information Security
  
25.SANS Crystal City 2014
 Dates 08 Sep 2014 → 13 Sep 2014
[ID=624060] Go to top of page
 LocationArlington, United States
 Topics information security, hacking, exploits, incident handling, mobile devices, mobile device security, forensics, Windows, Mac, management
 Weblink http://www.sans.org/info/156945
 Contact SANS Institute ; Phone: [((301) 654-7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
26.Retail Cyber Security Summit 2014
 Dates 08 Sep 2014 → 17 Sep 2014
[ID=630800] Go to top of page
 LocationAddison, United States
 Abstract The National Retail Federation Loss Prevention Advisory Council lists reducing shrinkage costs and increasing employee safety as their top two priorities. On the brick and mortar side, loss prevention programs have dealt with physical threats for years. However, in online retail the 2014 PwC Global State of Information Security survey shows that over 31% of retailed have experienced expensive customer data breaches and an even higher percentage have had their employee records compromised. http://www.sans.org/info/160012 Cybersecurity leaders in retail face many challenges in enabling new business initiatives while mitigating threats. Not only are retailers the number one target for cybercriminals going after cardholder data, they also have complex supply chains, high turnover workforces, globally distributed operations and (last but definitely not least) have to meet the demands of the Payment Card Industry assessment regime that often siphons resources away from the real job of protecting customer and business data. Retail Cyber Security Summit http://www.sans.org/info/160012 At this unique event, security experts will discuss proven approaches for securing and succeeding in the challenging retail environment. Meet security leaders from the top retailers and see what really works in securing cardholder data, protecting critical business information - and then passing that PCI assessment. The Summit is the place to come and learn how the wide range of retail organizations can balance the security, compliance, and innovation required to thrive in this quickly changing market.At this unique event, security experts will discuss proven approaches for securing and succeeding in the challenging retail environment. Meet security leaders from the top retailers and see what really works in securing cardholder data, protecting critical business information - and then passing that PCI assessment. The Summit is the place to come and learn how the wide range of retail organizations can balance the security, compliance, and innovation required to thrive in this quickly changing market. Topics will include: Emerging retail security threats Data protection, tokenization and end to end encryption Increasing security while decreasing the cost of PCI compliance The Retail ISAC and Lessons learned from other vertical ISACs Relating cybersecurity to Loss Prevention Applying the Critical Security Controls to retail Security of PoS devices and emerging payment systems User case studies Who should attend? Chief Information Officers (CIO) Chief Technology Officers (CTO) Chief Security Officers (CSO) Cyber security professionals Security architects Security risk managers Compliance professionals - Receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, July 23, 2014 - Receive a discount of up to $250 for any 4-6 day course paid for by Wednesday, August 6, 2014 - No refunds available after Sunday, September 7, 2014.
 Topics computing, computers, security, information security, information technology, penetration testing, hacking, networks, network penetration testing
 Weblink http://www.sans.org/info/160012
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
27.Security Awareness Summit 2014
 Dates 08 Sep 2014 → 17 Sep 2014
[ID=634450] Go to top of page
 LocationDallas, United States
 Topics computing, computers, security, information security, information technology, penetration testing, network penetration testing, hacking, management
 Weblink http://www.sans.org/info/160017
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
28.NSPW'14 — 2014 New Security Paradigms Workshop
 Dates 15 Sep 2014 → 18 Sep 2014
[ID=615586] Go to top of page
 LocationVictoria, Canada
 Weblink http://www.nspw.org/2014/cfp
 Related subject(s) Applied Maths: Cryptography and Information Security
  
29.LATINCRYPT 2014 — Third International Conference on Cryptology and Information Security
 Dates 17 Sep 2014 → 19 Sep 2014
[ID=583550] Go to top of page
 LocationFlorianopolis, Brazil
 Weblink https://sites.google.com/site/latincrypt2014/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
30.ICS Amsterdam 2014
 Dates 21 Sep 2014 → 26 Sep 2014
[ID=614348] Go to top of page
 LocationAmsterdam, Netherlands
 Topics information security, information technology, ICS, SCADA, exploits, exploitation, infrastructure, control systems
 Weblink http://www.sans.org/info/152687
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
31.CSS 2014 — 3rd Conference on Cryptography and Security System
 Dates 22 Sep 2014 → 24 Sep 2014
[ID=614428] Go to top of page
 LocationLublin, Poland
 Abstract In recent years, computer applications and Internet services have been contributing extensively to our life experience and, simultaneously, they are vulnerable and undergo permanent attacks. The objective of the Cryptography and Security System Conference is to present research and developing activities original unpublished results related to all aspects of cryptography and network security. We invite both theoretical, applied research papers, case studies, implementation experiences as well as work-in-progress presentations.
 Topics network security, cryptography and data protection, peer-to-peer security, wireless networks security, security of sensor networks, heterogeneous networks security, privacy-enhancing methods, covert channels, steganography and watermarking for security applications, security of webservices, cryptographic protocols, security as quality of service, quality of protection, data and application security, software security, formal methods in security, trust and reputation models, reputation systems for security applications, intrusion tolerance, system surveillance and enhanced security, cybercrime: threats and countermeasures, Legal constraints of security systems, Risk analysis and management, security models, evaluation, and verification
 Weblink http://www.css.umcs.lublin.pl/
 Contact Email: bogdan.ksiezopolski@acm.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
32.CHES 2014 — Cryptographic Hardware and Embedded Systems
 Dates 23 Sep 2014 → 26 Sep 2014
[ID=583571] Go to top of page
 LocationBusan, South Korea
 Weblink http://www.chesworkshop.org/
 Related subject(s) Applied Maths: Cryptography and Information Security; Embedded Systems & Ubiquitous Computing
  
33.NWC 2014 — National Workshop on Cryptology 2014
 Dates 25 Sep 2014 → 27 Sep 2014
[ID=637873] Go to top of page
 LocationJabalpur, Madhya Pradesh, India
 Topics Symmetric and Public key Cryptosystems and Cryptanalysis, Information and Coding Theory, Digital Signature Schemes, Network Security, Wireless Network Security, Steganography and Digital watermarking for security applications, Security of web services, Secret Sharing, Cloud Security
 Weblink http://nwc.iiitdmj.ac.in/
 Contact Email: nwc@iiitdmj.ac.in
 Related subject(s) Applied Maths: Cryptography and Information Security
  
34.RootCon 8
 Dates 26 Sep 2014 → 27 Sep 2014
[ID=634002] Go to top of page
 LocationCebu, Philippines
 Abstract "ROOTCON comes from the two words "ROOT" (super user on Unix systems) and "CON" (conference). ROOTCON operation started 27-December-2008, registered as DEFCON Group 6332, and carried the name DEFCONPH. The group held two small gatherings under DEFCONPH - known as the BeerTalks.
 Topics Security Talks , Live Demo , Security Training , Hacking Contest, Philippines Hacker, Advanced HTTP Header Security Analysis - Day 1 Keynote, Browser extension malware extend cybercrime capabilities, New Techniques: Email Based Threat and Attacks, Shellcode Exploit Analysis: Tips and Tricks, The Necurs Rootkit, Social Engineering: Hacking The Mind, Hacking your way to ROOTCON
 Weblink https://rootcon.org/xml/rc8/
  
35.SECRYPT 2014 — 11th International Conference on Security and Cryptography
 Dates 28 Sep 2014 → 30 Sep 2014
[ID=569630] Go to top of page
 LocationVienna, Austria
 Abstract The purpose of SECRYPT 2014, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
 Topics data communications, data networks and distributed computing
 Weblink http://www.secrypt.icete.org
 Contact Phone: [+351 265 520 185]; Email: secrypt.secretariat@insticc.org
 Related subject(s) Applied Maths: Cryptography and Information Security
  
36.SSS 2014 - 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems
 Dates 29 Sep 2014 → 01 Oct 2014
[ID=636537] Go to top of page
 LocationPaderborn, Germany
 Weblink http://sss2014.cs.upb.de/
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing
  
37.DFIR Prague 2014
 Dates 29 Sep 2014 → 11 Oct 2014
[ID=613890] Go to top of page
 LocationPrague, Czech Republic
 Topics information security, information technology, network forensics, forensics, smartphone, smartphone forensics, hacking, hacking techniques, exploits, incident handling, computer forensics, malware
 Weblink http://www.sans.org/info/150985
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
38.ProvSec 2014 — The Eighth International Conference on Provable Security
 Dates 09 Oct 2014 → 10 Oct 2014
[ID=615582] Go to top of page
 LocationHong Kong, China
 Weblink http://home.ie.cuhk.edu.hk/~provsec14/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
39.ICCST — 2014 International Carnahan Conference on Security Technology
 Dates 13 Oct 2014 → 16 Oct 2014
[ID=573026] Go to top of page
 LocationRome, Italy
 Abstract This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.
 Weblink http://www.iccst2014.org
  
40.NSS 2014 — The 8th International Conference on Network and System Security
 Dates 15 Oct 2014 → 17 Oct 2014
[ID=615581] Go to top of page
 LocationXi'an, China
 Weblink http://anss.org.au/nss2014/index.htm
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
41.Network Security 2014
 Dates 19 Oct 2014 → 27 Oct 2014
[ID=627403] Go to top of page
 LocationLas Vegas, United States
 Abstract If you have attended this event in the past, then you know how valuable it can be to your career and to the safety and preservation of your company's online and computerized resources. Be assured that at SANS Network Security 2014, you'll get hands-on, immersion training from SANS world-class instructors and learn what it takes to stop cyber crime for your organization. Those who attend SANS Network Security 2014 will see that SANS offers a high-energy program, hands-on labs, a huge Vendor Solutions Expo, evening talks on the most timely security challenges, plus a myriad of networking opportunities
 Topics information security, information technology, penetration testing, forensics, network forensics, smartphones, smartphone forensics, SCADA, exploits, intrusion detection, hacking, incident handling, Windows, Linux, Unix, web apps, web applications, IPv6, mobile device security, mobile devices, virtualization, cloud security, Metasploit, coding, malware, management, strategic planning, auditing
 Weblink http://www.sans.org/info/158040
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
42.CANS 2014 — 13rd International Conference on Cryptology and Network Security
 Dates 22 Oct 2014 → 24 Oct 2014
[ID=615580] Go to top of page
 LocationHeraklion, Crete, Greece
 Weblink http://www.ics.forth.gr/cans2014/
 Related subject(s) Applied Maths: Cryptography and Information Security; Networks, Internet
  
43.WATER 2014 — Second Workshop on Anti-malware Testing Research
 Start date23 Oct 2014
[ID=634965] Go to top of page
 LocationCanterbury, United Kingdom
 Weblink http://www.computer.org/portal/web/conferences/calendar
  
44.ICCSM — 2nd International Conference on Cloud Security Management
 Dates 23 Oct 2014 → 24 Oct 2014
[ID=625317] Go to top of page
 LocationReading, United Kingdom
 Abstract The 2nd International Conference on Cloud Security Management (ICCSM-2014) invites researchers, practitioners and academics to present their research findings, works in progress, case studies and conceptual advances in areas of work where education and technology intersect. The conference brings together varied groups of people with different perspectives, experiences and knowledge in one location. It aims to help practitioners find ways of putting research into practice and researchers to gain an understanding of real-world problems, needs and aspirations.
 Weblink http://academic-conferences.org/iccsm/iccsm2014/iccsm14-home.htm
 Contact Mandy Limbrick-Butler; Phone: [+44 (0)1189 724148]; Email: Mandy@academic-conferences.org
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing
  
45.SANS Gulf Region 2014
 Dates 25 Oct 2014 → 06 Nov 2014
[ID=614321] Go to top of page
 LocationDubai, United Arab Emirates
 Topics information security, intrusion detection, penetration testing, exploits, hacking, auditing
 Weblink http://www.sans.org/info/153807
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
46.CNS — 2014 IEEE Conference on Communications and Network Security
 Dates 29 Oct 2014 → 31 Oct 2014
[ID=550889] Go to top of page
 LocationSan Francisco, CA, United States
 Abstract IEEE CNS seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
 Weblink http://www.ieee-cns.org
  
47.SANS Seattle 2014
 Dates 29 Oct 2014 → 04 Nov 2014
[ID=627448] Go to top of page
 LocationSeattle, United States
 Abstract Many of our courses at SANS Seattle 2014 are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join more than 57,500 GIAC certified professionals who make the Cybersecurity industry safe. Here is what our past attendees had to say about their SANS Seattle 2013 experience: "SANS courses are always the best 6 days of the year!" - Erich Knaak, School Employees CO of WA "Eric is high energy and a true subject matter expert. It is a real joy for him to be teaching this class." - Todd Dodson, City of OKC "SEC401 has great information starting with lots of good basics and more advanced material." - Celine Suzzarin, Microsoft "You rock! Best class I have been in." - Lance Harper, Boeing Our campus for SANS Seattle 2014 is the Renaissance Seattle Hotel in the heart of downtown. A special discounted rate of $175 S/D will be honored based on space availability. Government per diem rooms are available with proper ID; you will need to call reservations and ask for the SANS government rate. These rates include high speed Internet in your room. Make your reservations now as this special rate is only available through August 29. The Renaissance Seattle Hotel is just minutes away from both Qwest and Safeco Fields. Pike Place Market with its many unique stores is also nearby. This hotel features views of the city skyline, Puget Sound, and the Cascade and Olympic Mountains. It is convenient to the Sea-Tac airport and has easy access to major freeways. Also in, and unique to Seattle, is the Experience Music Project and Science Fiction Museum and Hall of Fame (abbreviated as EMP/SFM). While it isn't close to the hotel, public transportation makes it an easy destination. For more information, see http://www.empmuseum.org/index.asp. Seattle is the northernmost major city in the contiguous United States and is well known for the beauty of its surroundings. In October, Seattle has highs near 60 degrees and lows in the 40s. With a reputation for being the most trusted source for information security training and an eagerness to help you meet your training objectives, SANS is the best choice for IT security education. Don't miss this special SANS training event in Seattle this October! We hope to see you there. http://www.sans.org/info/156960 - Receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, August 13, 2014 - Receive a discount of up to $250 for any 4-6 day course paid for by Wednesday, August 27, 2014 - No refunds available after Wednesday, September 10, 2014.
 Topics information security, information technology, Mac, forensics, hacking, exploits, incident handling, mobile devices, mobile device security, Metasploit, Windows, management
 Weblink http://www.sans.org/info/156960
 Contact SANS Institute ; Phone: [((301) 654-7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
48.FPS'2014 - 7th International Symposium on Foundations & Practice of Security
 Dates 03 Nov 2014 → 05 Nov 2014
[ID=636666] Go to top of page
 LocationMontreal, Canada
 Weblink http://conferences.telecom-bretagne.eu/fps/2014
  
49.Cyber Defense San Diego 2014
 Dates 03 Nov 2014 → 08 Nov 2014
[ID=628912] Go to top of page
 LocationSan Diego, United States
 Abstract We are pleased to invite you to attend SANS Cyber Defense 2014 from November 3-11, 2014 at the HardRock Hotel in San Diego. SANS will have our top cybersecurity courses selected to provide you with the training and certification that you need to boost your career by learning from the best! SANS Instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
 Topics information security, forensics, Windows, Mac, Mac forensics, network forensics, Smartphones, Smartphone forensics
 Weblink http://www.sans.org/info/159307
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
50.DFIRCON East 2014
 Dates 03 Nov 2014 → 08 Nov 2014
[ID=628900] Go to top of page
 LocationFort Lauderdale, United States
 Abstract This unique Digital Forensics and Incident Response (DFIR) event brings our most popular forensics courses, instructors, and bonus seminars together in one place to offer one of SANS most comprehensive DFIR training experiences. This is a must-attend event for you and your team as our leading experts focus on building the DFIR skills that will take you to that next level.
 Topics information security, intrusion detection, management
 Weblink http://www.sans.org/info/159312
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
51.Pen Test Hackfest 2014
 Dates 13 Nov 2014 → 20 Nov 2014
[ID=613999] Go to top of page
 LocationWashington, DC, United States
 Topics information security, information technology, penetration testing, Python, hacking, ethical hacking, web app penetration testing, web apps
 Weblink http://www.sans.org/info/153172
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
52.SANS London 2014
 Dates 15 Nov 2014 → 24 Nov 2014
[ID=632259] Go to top of page
 LocationLondon, United Kingdom
 Abstract SANS London 2014 takes place from November 15th to November 24th at London's Grand Connaught Rooms. Presenting 15 of SANS' world-class courses covering topics from across the SANS curricula including Pen Testing, Mobile, Hacker Techniques, Forensics, Intrusion Detection and Management.
 Topics information security, network forensics, forensics, SCADA, intrusion detection, hacking, incident handling, cloud, cloud security, network penetration testing, penetration testing, mobile devices, mobile device security, virtualization, computer forensics
 Weblink http://www.sans.org/info/152707
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
53.SANS London 2014
 Dates 15 Nov 2014 → 24 Nov 2014
[ID=632339] Go to top of page
 LocationLondon, United Kingdom
 Abstract SANS London 2014 takes place from November 15th to November 24th at London's Grand Connaught Rooms. Presenting 15 of SANS' world-class courses covering topics from across the SANS curricula including Pen Testing, Mobile, Hacker Techniques, Forensics, Intrusion Detection and Management. SANS London 2014 will also host evening networking and social functions plus the opportunity to take part in a NetWars tournament - free for all 5 or 6-day course students. The combination of real-world content and the expert delivery of SANS' world class instructors, all of whom are leading security practitioners themselves, has led to SANS becoming by far the World's largest and most trusted provider of information security Join us in London for a unique blend of learning, lively debate and socialising with fellow industry specialists and SANS instructors. http://www.sans.org/info/152707 - Receive a discount of up to €250 for any 4-6 day course paid for by Wednesday, October 1, 2014 - No refunds available after Wednesday, October 22, 2014.
 Topics computing, computers, information technology, information security, network forensics, forensics, SCADA, intrusion detection, hacking, incident handling, cloud, cloud security, network penetration testing, penetration testing, mobile devices, mobile device security, virtualization, computer forensics
 Weblink http://www.sans.org/info/152707
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
54.SECURWARE 2014 — The Eighth International Conference on Emerging Security Information, Systems and Technologies
 Dates 16 Nov 2014 → 20 Nov 2014
[ID=600431] Go to top of page
 LocationLisbon, Portugal
 Organizer International Academy, Research and Industry Association (IARIA)
 Abstract Colocated with other events part of NetWare 2014
 Weblink http://www.iaria.org/conferences.html
  
55.ZebraCON — Information Security & Risk Management Conference
 Dates 18 Nov 2014 → 21 Nov 2014
[ID=616353] Go to top of page
 LocationKuala Lumpur, Malaysia
 Abstract ZebraCON brings together Information Security and Risk Management industry experts, influencers and respected corporate leaders from all over the world, with the objective to educate today’s leaders and professionals on the significance of the Information Security and Risk Management methodology. ZebraCON offers a platform to meet industry experts, share views of current state of Information Security and Risk Management, learn from peers on explore the best solutions and practices for implementation, and create opportunity for networking collaboration.
 Topics Continuity Management, The Big Challenge of BYOD, Understanding Human Factor – An Essential Link to Information Security?, The Great Security-Privacy Balancing Act: Managing Employee Performance with Workplace Privacy, BIG DATA Security, The Mobile Exploitation Saga, Secure your web of insecurities, Enterprise Risk Management – Mitigating BYOD and Mobile Risk, Advanced Penetration Testing – Discovering the hidden vulnerabilities, Managing the unmanageable streams of data
 Weblink http://www.zebra-con.com
 Contact Ms. Audrey; Phone: [+603-76650911]; Email: audrey@conzebra.com
  
56.13. SECUTA Information Security Tagung 2014
 Dates 19 Nov 2014 → 21 Nov 2014
[ID=581817] Go to top of page
 LocationSpitzingsee - Oberbayern, Germany
 Abstract Ziel unserer Jahrestagung ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit für das kommende Jahr praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, diverse Unternehmensberichte, Live Hacking's sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der jährlichnen Information Security Tagung ab.
 Topics Informationssicherheit, IT-Sicherheit, IT-Security, Security, ISO, ISO Normen, ISO 27001, Riskmanagement, Spionage, Cybercrime, Wirtsschaftsspionage, Datenschutz, Datensicherheit, IT Recht, DSB, Auditor, CISO, CISA, CISM, CISSP, IT-Manager, Security Manager, Forensik, Hacking, Live Hacking, Penetration, Tagung, Konferenz, IT, IS, ISMS, BCM, ITSIBE, IT Beauftragter
 Weblink http://www.it-secuta.de/
 Contact Manuela Krämer, Leitung Informationssicherheit; Phone: [+49 89 4576918-12]; Email: m.kraemer@cbt-training.de
  
57.Healthcare Cyber Security Summit 2014
 Dates 03 Dec 2014 → 10 Dec 2014
[ID=631220] Go to top of page
 LocationSan Francisco, United States
 Abstract Health Care is in an exciting time of change. Patients are demanding more convenient and personal care. Digital health is changing the way that doctors and patients interact. New technologies allow patients to track their own health and generate data that was previously not available to care providers. Additionally, health information exchanges are being created to enable access to electronic medical records across disparate organizations. Hospitals, clinics, and health plans are faced with the challenge of reducing costs while maintaining quality. With the number of patients expected to rise how can hospitals treat patients with the limited number of beds and staff on hand? Shifting care delivery away from traditional hospitals by leveraging technologies like mobile and cloud may help. Moreover, new regulations are having a big effect on health insurance plans, requiring coordination with state health insurance exchanges.
 Topics information security, cyber security information technology, information privacy, healthcare, healthcare cyber security, hacking, exploits, incident handling, penetration testing, penetration test, web apps, web applications, forensics, computer forensics, SCADA, incident response
 Weblink http://www.sans.org/info/161835
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Clinical Data Management; Training in Computer Science
  
58.ICITST-2014 — The 9th International Conference for Internet Technology and Secured Transactions
 Dates 08 Dec 2014 → 10 Dec 2014
[ID=634657] Go to top of page
 LocationLondon, United Kingdom
 Abstract The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
 Topics Internet Applications, Information Security, Multimedia, Web Services, e-Technology
 Weblink http://www.icitst.org
 Contact Dan Lin; Email: info@icitst.org
  
59.PASSAT 2014 — 2014 IEEE International Conference on Information Privacy, Security, Risk and Trust
 Dates 12 Dec 2014 → 15 Dec 2014
[ID=618974] Go to top of page
 LocationCambridge, Massachusetts, United States
 Weblink http://www.computer.org/portal/web/conferences/calendar
  
60.1st International Conference on Security Standardisation Research
 Dates 16 Dec 2014 → 17 Dec 2014
[ID=627816] Go to top of page
 LocationRoyal Holloway, University of London (RHUL), Egham, United Kingdom
 Abstract Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used. Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new domains. The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. This conference is intended to cover the full spectrum of research on security standard.
 Weblink http://www.ssr2014.com
  
61.NSysS 2015 - 1st International Conference on Networking Systems and Security 2015
 Dates 05 Jan 2015 → 07 Jan 2015
[ID=636999] Go to top of page
 LocationDhaka, Bangladesh
 Weblink http://www.buet.ac.bd/cse/nsyss/
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing
  
62.SANS Brussels 2015
 Dates 26 Jan 2015 → 31 Jan 2015
[ID=637448] Go to top of page
 LocationBrussels, Germany
 Abstract SANS Brussels 2015 hosts four essential information security training courses, covering pen testing, forensics, incident handling and SANS new course SEC511: Continuous Monitoring and Security Operations. Training takes place from Monday 26 - Saturday 31 January in the Radisson Blu Royal Hotel in the heart of Brussels.
 Topics computing, computers, security, information security, information technology, hacking, exploits, incident handling, web apps, web applications, penetration testing, computer forensics, forensics, incident response
 Weblink http://www.sans.org/info/163152
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
63.ICISSP 2015 — 1st International Conference on Information Systems Security and Privacy
 Dates 09 Feb 2015 → 11 Feb 2015
[ID=635982] Go to top of page
 LocationAngers, Loire Valle, France
 Weblink http://www.icissp.org
  
64.10th Annual ICS Security Summit - Orlando 2015
 Dates 23 Feb 2015 → 02 Mar 2015
[ID=634515] Go to top of page
 LocationLake Buena Vista, United States
 Topics information security, information technology, infrastructure, cybersecurity, exploits, SCADA
 Weblink http://www.sans.org/info/162742
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
65.ICCWS — 10th International Conference on Cyber Warfare and Security
 Dates 24 Mar 2015 → 25 Mar 2015
[ID=625837] Go to top of page
 LocationKruger National Park, South Africa
 Abstract ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
 Topics Cyber Warfare, Security, Physical security, Biometrics
 Weblink http://academic-conferences.org/iccws/iccws2015/iccws15-home.htm
 Contact Mandy Limbrick-Butler; Phone: [+44 (0)1189 724148]; Email: Mandy@academic-conferences.org
  
66.SP — 2015 IEEE Symposium on Security and Privacy
 Dates 18 May 2015 → 20 May 2015
[ID=636124] Go to top of page
 LocationSan Jose, California, United States
 Abstract Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.
 Weblink http://www.ieee-security.org/TC/SP-Index.html
  

Last updated: 24 July 2014