COMS

Calendar of upcoming scientific conferences

Home | Conference Management System | Conference Listings | Advertise | Contact | About
German French English
You are in: HomeConference ListingsInformatics → Information Security and information privacy

Conference Management Software

Our Conference Management Software (COMS) can be used for online:

  • registration
  • payment
  • paper submission
  • review process
  • paper selection
  • production of the book of abstracts

Read more ...
Try our demo online

Conferences and Meetings on Information Security and information privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.Network Security 2014
 Dates 19 Oct 2014 → 27 Oct 2014
[ID=627403] Go to top of page
 LocationLas Vegas, United States
 Abstract If you have attended this event in the past, then you know how valuable it can be to your career and to the safety and preservation of your company's online and computerized resources. Be assured that at SANS Network Security 2014, you'll get hands-on, immersion training from SANS world-class instructors and learn what it takes to stop cyber crime for your organization. Those who attend SANS Network Security 2014 will see that SANS offers a high-energy program, hands-on labs, a huge Vendor Solutions Expo, evening talks on the most timely security challenges, plus a myriad of networking opportunities
 Topics information security, information technology, penetration testing, forensics, network forensics, smartphones, smartphone forensics, SCADA, exploits, intrusion detection, hacking, incident handling, Windows, Linux, Unix, web apps, web applications, IPv6, mobile device security, mobile devices, virtualization, cloud security, Metasploit, coding, malware, management, strategic planning, auditing
 Weblink http://www.sans.org/info/158040
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
2.CNS — 2014 IEEE Conference on Communications and Network Security
 Dates 29 Oct 2014 → 31 Oct 2014
[ID=550834] Go to top of page
 LocationSan Francisco, CA, United States
 Abstract IEEE CNS seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
 Weblink http://www.ieee-cns.org
  
3.SANS Seattle 2014
 Dates 29 Oct 2014 → 04 Nov 2014
[ID=627426] Go to top of page
 LocationSeattle, United States
 Abstract Many of our courses at SANS Seattle 2014 are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join more than 57,500 GIAC certified professionals who make the Cybersecurity industry safe. Here is what our past attendees had to say about their SANS Seattle 2013 experience: "SANS courses are always the best 6 days of the year!" - Erich Knaak, School Employees CO of WA "Eric is high energy and a true subject matter expert. It is a real joy for him to be teaching this class." - Todd Dodson, City of OKC "SEC401 has great information starting with lots of good basics and more advanced material." - Celine Suzzarin, Microsoft "You rock! Best class I have been in." - Lance Harper, Boeing Our campus for SANS Seattle 2014 is the Renaissance Seattle Hotel in the heart of downtown. A special discounted rate of $175 S/D will be honored based on space availability. Government per diem rooms are available with proper ID; you will need to call reservations and ask for the SANS government rate. These rates include high speed Internet in your room. Make your reservations now as this special rate is only available through August 29. The Renaissance Seattle Hotel is just minutes away from both Qwest and Safeco Fields. Pike Place Market with its many unique stores is also nearby. This hotel features views of the city skyline, Puget Sound, and the Cascade and Olympic Mountains. It is convenient to the Sea-Tac airport and has easy access to major freeways. Also in, and unique to Seattle, is the Experience Music Project and Science Fiction Museum and Hall of Fame (abbreviated as EMP/SFM). While it isn't close to the hotel, public transportation makes it an easy destination. For more information, see http://www.empmuseum.org/index.asp. Seattle is the northernmost major city in the contiguous United States and is well known for the beauty of its surroundings. In October, Seattle has highs near 60 degrees and lows in the 40s. With a reputation for being the most trusted source for information security training and an eagerness to help you meet your training objectives, SANS is the best choice for IT security education. Don't miss this special SANS training event in Seattle this October! We hope to see you there. http://www.sans.org/info/156960 - Receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, August 13, 2014 - Receive a discount of up to $250 for any 4-6 day course paid for by Wednesday, August 27, 2014 - No refunds available after Wednesday, September 10, 2014.
 Topics information security, information technology, Mac, forensics, hacking, exploits, incident handling, mobile devices, mobile device security, Metasploit, Windows, management
 Weblink http://www.sans.org/info/156960
 Contact SANS Institute ; Phone: [((301) 654-7267)]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
4.FPS'2014 - 7th International Symposium on Foundations & Practice of Security
 Dates 03 Nov 2014 → 05 Nov 2014
[ID=636699] Go to top of page
 LocationMontreal, Canada
 Weblink http://conferences.telecom-bretagne.eu/fps/2014
  
5.Cyber Defense San Diego 2014
 Dates 03 Nov 2014 → 08 Nov 2014
[ID=628978] Go to top of page
 LocationSan Diego, United States
 Abstract We are pleased to invite you to attend SANS Cyber Defense 2014 from November 3-11, 2014 at the HardRock Hotel in San Diego. SANS will have our top cybersecurity courses selected to provide you with the training and certification that you need to boost your career by learning from the best! SANS Instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
 Topics information security, forensics, Windows, Mac, Mac forensics, network forensics, Smartphones, Smartphone forensics
 Weblink http://www.sans.org/info/159307
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
6.DFIRCON East 2014
 Dates 03 Nov 2014 → 08 Nov 2014
[ID=628988] Go to top of page
 LocationFort Lauderdale, United States
 Abstract This unique Digital Forensics and Incident Response (DFIR) event brings our most popular forensics courses, instructors, and bonus seminars together in one place to offer one of SANS most comprehensive DFIR training experiences. This is a must-attend event for you and your team as our leading experts focus on building the DFIR skills that will take you to that next level.
 Topics information security, intrusion detection, management
 Weblink http://www.sans.org/info/159312
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
7.MilCIS — Military Communications and Information Systems Conference
 Dates 11 Nov 2014 → 13 Nov 2014
[ID=642441] Go to top of page
 LocationCanberra, Australia
 Weblink http://www.milcis.com.au/
 Related subject(s) Mobile Computing & Telecommunication
  
8.Pen Test Hackfest 2014
 Dates 13 Nov 2014 → 20 Nov 2014
[ID=613988] Go to top of page
 LocationWashington, DC, United States
 Topics information security, information technology, penetration testing, Python, hacking, ethical hacking, web app penetration testing, web apps
 Weblink http://www.sans.org/info/153172
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
  
9.SECURWARE 2014 — The Eighth International Conference on Emerging Security Information, Systems and Technologies
 Dates 16 Nov 2014 → 20 Nov 2014
[ID=600453] Go to top of page
 LocationLisbon, Portugal
 Organizer International Academy, Research and Industry Association (IARIA)
 Abstract Colocated with other events part of NetWare 2014
 Weblink http://www.iaria.org/conferences.html
  
10.ZebraCON — Information Security & Risk Management Conference
 Dates 18 Nov 2014 → 21 Nov 2014
[ID=616375] Go to top of page
 LocationKuala Lumpur, Malaysia
 Abstract ZebraCON brings together Information Security and Risk Management industry experts, influencers and respected corporate leaders from all over the world, with the objective to educate today’s leaders and professionals on the significance of the Information Security and Risk Management methodology. ZebraCON offers a platform to meet industry experts, share views of current state of Information Security and Risk Management, learn from peers on explore the best solutions and practices for implementation, and create opportunity for networking collaboration.
 Topics Continuity Management, The Big Challenge of BYOD, Understanding Human Factor – An Essential Link to Information Security?, The Great Security-Privacy Balancing Act: Managing Employee Performance with Workplace Privacy, BIG DATA Security, The Mobile Exploitation Saga, Secure your web of insecurities, Enterprise Risk Management – Mitigating BYOD and Mobile Risk, Advanced Penetration Testing – Discovering the hidden vulnerabilities, Managing the unmanageable streams of data
 Weblink http://www.zebra-con.com
 Contact Ms. Audrey; Phone: [+603-76650911]; Email: audrey@conzebra.com
  
11.13. SECUTA Information Security Tagung 2014
 Dates 19 Nov 2014 → 21 Nov 2014
[ID=581795] Go to top of page
 LocationSpitzingsee - Oberbayern, Germany
 Abstract Ziel unserer Jahrestagung ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit für das kommende Jahr praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, diverse Unternehmensberichte, Live Hacking's sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der jährlichnen Information Security Tagung ab.
 Topics Informationssicherheit, IT-Sicherheit, IT-Security, Security, ISO, ISO Normen, ISO 27001, Riskmanagement, Spionage, Cybercrime, Wirtsschaftsspionage, Datenschutz, Datensicherheit, IT Recht, DSB, Auditor, CISO, CISA, CISM, CISSP, IT-Manager, Security Manager, Forensik, Hacking, Live Hacking, Penetration, Tagung, Konferenz, IT, IS, ISMS, BCM, ITSIBE, IT Beauftragter
 Weblink http://www.it-secuta.de/
 Contact Manuela Krämer, Leitung Informationssicherheit; Phone: [+49 89 4576918-12]; Email: m.kraemer@cbt-training.de
  
12.Healthcare Cyber Security Summit 2014
 Dates 03 Dec 2014 → 10 Dec 2014
[ID=631231] Go to top of page
 LocationSan Francisco, United States
 Abstract Health Care is in an exciting time of change. Patients are demanding more convenient and personal care. Digital health is changing the way that doctors and patients interact. New technologies allow patients to track their own health and generate data that was previously not available to care providers. Additionally, health information exchanges are being created to enable access to electronic medical records across disparate organizations. Hospitals, clinics, and health plans are faced with the challenge of reducing costs while maintaining quality. With the number of patients expected to rise how can hospitals treat patients with the limited number of beds and staff on hand? Shifting care delivery away from traditional hospitals by leveraging technologies like mobile and cloud may help. Moreover, new regulations are having a big effect on health insurance plans, requiring coordination with state health insurance exchanges.
 Topics information security, cyber security information technology, information privacy, healthcare, healthcare cyber security, hacking, exploits, incident handling, penetration testing, penetration test, web apps, web applications, forensics, computer forensics, SCADA, incident response
 Weblink http://www.sans.org/info/161835
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Clinical Data Management; Training in Computer Science
  
13.ICITST-2014 — The 9th International Conference for Internet Technology and Secured Transactions
 Dates 08 Dec 2014 → 10 Dec 2014
[ID=634613] Go to top of page
 LocationLondon, United Kingdom
 Abstract The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
 Topics Internet Applications, Information Security, Multimedia, Web Services, e-Technology
 Weblink http://www.icitst.org
 Contact Dan Lin; Email: info@icitst.org
  
14.SANS Cyber Defense Initiative 2014
 Dates 10 Dec 2014 → 19 Dec 2014
[ID=638523] Go to top of page
 LocationWashington, DC, United States
 Abstract You are invited to attend SANS Cyber Defense Initiative 2014 (CDI), SANS is the one educational organization known for developing the cybersecurity skills most in need right now. SANS Cyber Defense Initiative 2014 will feature courses in IT security, security management, IT audit, penetration testing, and computer forensics, including short courses that can be taken with a long course to enhance your training. Every course, evening talk, and special event is designed to equip you with cutting-edge knowledge and skills required to combat today's cyber criminals. http://www.sans.org/info/162085 SANS events offer you a unique opportunity to learn from the best cybersecurity teachers in the country. At SANS events you get the kind of hands-on, immersion training that you can put to work immediately. Many courses taken at CDI 2014 are associated with a GIAC Certification attempt. Put the skills you'll learn to practical use and join more than 58,500 GIAC certified professionals who make the Cybersecurity industry safe! Visit the GIAC Page for more information and register for your certification attempt today! Extend your training experience and advance your career by enrolling in a master's degree or a graduate certificate from the SANS Technology Institute - regionally accredited and eligible for tuition reimbursement plans. Choose from a master's in Information Security Engineering or a graduate certificate in Penetration Testing or Incident Response. Apply today! Don't miss the opportunity to participate in the Core NetWars Tournament . Core NetWars Tournament is a live and timed event that runs over two intense evenings. It is a competitive environment that creates a sense of urgency and pressure among the participants, with a real-time scoreboard available for viewing. Many enterprises, government agencies, and military organizations rely on NetWars Tournament training to help identify skilled personnel and as part of extensive hands-on skill development. Another option is SANS DFIR NetWars Tournament This is an incident simulator packed with a vast amount of forensic and incident response challenges, for individual or team-based "firefights." It is developed by incident responders and forensic analysts who use these skills daily to stop data breaches and solve complex crimes. DFIR NetWars Tournament allows each player to progress through multiple skill levels of increasing difficulty, learning first-hand how to solve key challenges they might experience during a serious incident. DFIR NetWars Tournament enables players to learn and sharpen new skills prior to being involved in a real incident. SANS training is well known for being relevant and pragmatic. Our award-winning faculty (SC Magazine's Best Profession Training for 2014) has proven they understand the challenges you face on a daily basis. Their real-world experience increases the practical value of the course material. Here is what CDI 2013 attendees had to say about their SANS training experience: "Excellent material and course as always! That's why I keep coming back!" - Bo Jonsson, Borenis AB "FOR 508 was exactly what I needed to transition my mindset from years of dead boxit forensics and only being exposed to IR though books." - Roger Iker, JP Morgan Chase "MGT 414 is simply the best way to prepare for the CISSP. Great test taking tips, relevant examples and real- life meaningful examples." - Thomas Cook, USMA "Security Essentials Bootcamp Style gave me a solid foundation in security and greatly increased my awareness of potential threats." - Kristen Rollins, Greenleaf Trust "SANS trainings are in general the best ones I attended the last couple of years." - Peter Leydold, Frequentis USA, Inc. Our campus for this event, the Grand Hyatt Washington, is located in the Penn Quarter and close to many local attractions. A discounted room rate of $209 S/D is available to SANS students until November 18, but space is limited so book early! http://www.sans.org/info/162085 Register and pay by October 22 and receive a $400 tuition fee discount! Register today to join us at SANS Cyber Defense Initiative 2014! We look forward to seeing you there. - Receive a discount of up to $400 for any 4-6 day course paid for by Wednesday, October 22, 2014 - Receive a discount of up to $200 for any 4-6 day course paid for by Wednesday, November 12, 2014 - No refunds available after Wednesday, November 19, 2014.
 Topics computing, computers, security, information security, information technology, forensics, SCADA, hacking exploits, incident handling, Windows, web apps, penetration testing, intrusion detection, management, malware, computer forensics, virtualization, cloud, cloud security, auditing, mobile devices, mobile device security, Metasploit
 Weblink http://www.sans.org/info/162085
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
15.PASSAT 2014 — 2014 IEEE International Conference on Information Privacy, Security, Risk and Trust
 Dates 12 Dec 2014 → 15 Dec 2014
[ID=618996] Go to top of page
 LocationCambridge, Massachusetts, United States
 Weblink http://www.computer.org/portal/web/conferences/calendar
  
16.1st International Conference on Security Standardisation Research
 Dates 16 Dec 2014 → 17 Dec 2014
[ID=627805] Go to top of page
 LocationRoyal Holloway, University of London (RHUL), Egham, United Kingdom
 Abstract Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used. Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new domains. The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. This conference is intended to cover the full spectrum of research on security standard.
 Weblink http://www.ssr2014.com
  
17.NSysS 2015 - 1st International Conference on Networking Systems and Security 2015
 Dates 05 Jan 2015 → 07 Jan 2015
[ID=636955] Go to top of page
 LocationDhaka, Bangladesh
 Weblink http://www.buet.ac.bd/cse/nsyss/
 Related subject(s) Grid-, Distributed- and Parallel Computing, Cloud Computing
  
18.SANS Security East 2015
 Dates 16 Jan 2015 → 21 Jan 2015
[ID=641965] Go to top of page
 LocationNew Orleans, United States
 Abstract You are invited to start your training for 2015 by attending SANS Security East 2015 where SANS will provide outstanding courses in IT security, forensics, and security management presented by the best cybersecurity instructors in the country.
 Topics information security, information technology, hacking, intrusion detection, web apps, web applications, penetration testing, mobile devices, mobile device security, forensics, Windows, malware, auditing
 Weblink http://www.sans.org/info/164727
 Contact SANS Institute , Bethesda; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science; Mobile Computing & Telecommunication
  
19.CS2 '15 — Second Workshop on Cryptography and Security in Computing Systems
 Dates 19 Jan 2015 → 21 Jan 2015
[ID=658805] Go to top of page
 LocationAmsterdam, Netherlands
 Weblink http://www.cs2.deib.polimi.it/
 Related subject(s) Applied Maths: Cryptography and Information Security
  
20.Cyber Threat Intelligence Summit & Training
 Dates 02 Feb 2015 → 09 Feb 2015
[ID=660459] Go to top of page
 LocationWashington, DC, United States
 Abstract The goal of this summit will be to equip attendees with knowledge on the tools, methodologies and processes they need to move forward with cyber threat intelligence. The SANS What Works in Cyber Threat Intelligence Summit will bring attendees who are eager to hear this information and learn about tools, techniques, and solutions that can help address these needs.
 Weblink http://www.sans.org/info/168672
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
21.ICISSP 2015 — 1st International Conference on Information Systems Security and Privacy
 Dates 09 Feb 2015 → 11 Feb 2015
[ID=635993] Go to top of page
 LocationAngers, Loire Valle, France
 Weblink http://www.icissp.org
  
22.ICACC-2015 — First International Conference on Anti-Cybercrime
 Dates 09 Feb 2015 → 11 Feb 2015
[ID=656383] Go to top of page
 LocationRiyadh, Saudi Arabia
 Abstract Imam University is going to host the First International Conference on Anti-Cybercrime (ICACC-2015). The ICACC-2015 aims to bring together primarily researchers, but also practitioners from academia, industry and governmental institutions to elaborate and discuss IT security and privacy challenges that we are facing today and will be facing in the future. ICACC-2015 will be a vital forum for the discussion of issues of cybercrime. We are inviting well-known speakers from industry and academia from all over the world, with emphasis on the United States. The conference will have an exhibition floor and to bring together major international companies from all over the world that offer strong solutions to combat cybercrime. In addition to traditional paper sessions, the conference sessions will include participation of industry representatives demonstrating their new products and looking for new ideas.
 Topics Topics of the conference include but are not limited to: - Cybercrime properties, features of cybercrime criminals, and recent trends of cybercrime - Local and international legislation, laws, agreements, and sanctions pertaining to anti-cybercrime - Collection, handling, and documentation of digital forensics - Investigation techniques and means of cybercrime detection - Concepts and challenges pertaining to the anti-cybercrime - Techniques of information security and their role in both cybercrime detection and anti-cybercrime - Effects as well as physical and moral losses due to cybercrime - Cybercrime and its role in spreading terrorism among people - Demonstration of best practices in securing and safely ensuring electronic transactions - Illustration of the work of existing bodies and institutions on infrastructure protection for electronic information - Exchange of experiences by participating countries in the field of cybercrime - Efforts made in formal education to augment anti-cybercrime knowledge - Strategies for increased public awareness of the consequences of cybercrime
 Weblink http://icacc.ccis-imsiu.edu.sa
 Contact Imam Bakhsh, Al-Imam Muhammad ibn Saud Islamic University; Phone: [+966-11-25-85934]; Email: icacc@ccis.imamu.edu.sa
  
23.SANS Scottsdale 2015
 Dates 16 Feb 2015 → 21 Feb 2015
[ID=653374] Go to top of page
 LocationScottsdale, United States
 Weblink http://www.sans.org/info/166132
 Contact SANS Institute 8120 Woodmont Ave Bethesda, MD 20814; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
24.MOBISECSERV — 2015 First Conference on Mobile and Secure Services
 Dates 19 Feb 2015 → 21 Feb 2015
[ID=657238] Go to top of page
 LocationGainesville, FL, United States
 Abstract NFC mobile payment is the primary focus
 Weblink http://www.mobisecserv.org/
 Related subject(s) Mobile Computing & Telecommunication
  
25.DFIRCON West 2015
 Dates 23 Feb 2015 → 28 Feb 2015
[ID=656702] Go to top of page
 LocationMonterey, United States
 Topics information security, Mac, forensics, hacking, hackers, Windows, memory forensics, networks, network forensics, malware
 Weblink http://www.sans.org/info/167332
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
26.10th Annual ICS Security Summit - Orlando 2015
 Dates 23 Feb 2015 → 02 Mar 2015
[ID=634526] Go to top of page
 LocationLake Buena Vista, United States
 Topics information security, information technology, infrastructure, cybersecurity, exploits, SCADA
 Weblink http://www.sans.org/info/162742
 Contact SANS Institute; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
27.CODASPY'15 — Fifth ACM Conference on Data and Application Security and Privacy
 Dates 02 Mar 2015 → 04 Mar 2015
[ID=658944] Go to top of page
 LocationSan Antonio, TX, United States
 Weblink http://codaspy.org
  
28.Cyber Guardian 2015
 Dates 02 Mar 2015 → 07 Mar 2015
[ID=656734] Go to top of page
 LocationBaltimore, United States
 Topics information security, penetration testing, pen test, penetration test, Windows, critical security controls, forensics, hacking
 Weblink http://www.sans.org/info/167382
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
29.SANS Northern Virginia 2015
 Dates 09 Mar 2015 → 14 Mar 2015
[ID=656755] Go to top of page
 LocationReston, United States
 Topics information security, information technology, intrusion detection, penetration testing, pen test, web apps, web applications, forensics, Windows, smartphones, mobile devices, forensics, management
 Weblink http://www.sans.org/info/167387
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
30.SANS Houston 2015
 Dates 23 Mar 2015 → 28 Mar 2015
[ID=660447] Go to top of page
 LocationHouston, United States
 Abstract We are pleased to invite you to attend SANS Houston 2015 on March 23-28 at the Royal Sonesta Hotel, located in the heart of the Galleria area of Uptown Houston. We have six of our top information security courses selected to provide you with the training and certification that you need to boost your career by learning from the best! SANS Instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
 Weblink http://www.sans.org/info/168677
 Contact SANS Institute ; Phone: [(301) 654-7267]; Email: info@sans.org
 Related subject(s) Training in Computer Science
  
31.ICCWS — 10th International Conference on Cyber Warfare and Security
 Dates 24 Mar 2015 → 25 Mar 2015
[ID=625826] Go to top of page
 LocationKruger National Park, South Africa
 Abstract ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
 Topics Cyber Warfare, Security, Physical security, Biometrics
 Weblink http://academic-conferences.org/iccws/iccws2015/iccws15-home.htm
 Contact Mandy Limbrick-Butler; Phone: [+44 (0)1189 724148]; Email: Mandy@academic-conferences.org
  
32.SECUTA.AT 2015 für IT-Manager — Information Security Tagung in Österreich
 Dates 14 Apr 2015 → 15 Apr 2015
[ID=652253] Go to top of page
 LocationSalzburg (Fuschlsee), Austria
 Abstract Ziel der Jahrestagung für IT-Manager ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, Live Hacking sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der Information Security Tagung SECUTA.AT in Österreich ab.
 Topics Mobile Kommunikation, Mobile IT, IT-Recht, IT-Sicherheit, IT-Security, Informationssicherheit, IT, EDV, Hacking, Live Hacking, ISO, ISO 27001, Datenschutz, Datensicherheit, Antivirus, Cybercrime, Cyberwar, Industrial Security, Penetration, Forensik, SIEM, IT-Forensik, Audit, Datenschutz Europa, Metasploid, CIO, CISO, ITSIBE, IT-Manager, IT-Leiter, IT-Mitarbeiter,
 Weblink http://www.secuta.at/
 Contact Manuela Krämer ; Phone: [(+49 (0)89 4576918-12)]; Email: m.kraemer@cbt-training.de
 Related subject(s) Training in Computer Science
  
33.SP — 2015 IEEE Symposium on Security and Privacy
 Dates 18 May 2015 → 20 May 2015
[ID=636135] Go to top of page
 LocationSan Jose, California, United States
 Abstract Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.
 Weblink http://www.ieee-security.org/TC/SP-Index.html
  
34.SACMAT '15 — 20th ACM Symposium on Access Control Models and Technologies
 Dates 01 Jun 2015 → 03 Jun 2015
[ID=659252] Go to top of page
 LocationVienna, Austria
 Weblink http://www.sacmat.org
  
35.2015 IAEA International Conference on Computer Security in a Nuclear World
 Dates 01 Jun 2015 → 05 Jun 2015
[ID=650176] Go to top of page
 LocationIAEA headquarters in Vienna, Austria
 Abstract The purpose of the conference is to: (a) review the international community’s experience and achievements to date in strengthening computer security within the framework of nuclear security; (b) enhance understanding of current approaches for computer security worldwide within nuclear regimes, and identify trends; and (c) provide a global forum for competent authorities, operators and other entities engaged in computer security activities relevant to nuclear security.
 Topics Cyberthreats in Nuclear Security, Computer Security and System Design for Systems at Nuclear Facilities, Coordination for Ensuring Computer Security in a Nuclear Security Regime, Nuclear Security Regulatory Approaches to Information and Computer Security, Computer Security Programmes at Licensed Facilities, Computer Security Management in Nuclear Security, Computer Security Culture and Capacity Building for Nuclear Security, International and Legal Considerations in Relation to Computer Security at Nuclear Facilities, Special Topics
 Weblink http://www-pub.iaea.org/iaeameetings/46530/International-Conference-on-Computer-Security-in-a-Nuclear-World-Expert-Discussion-and-Exchange
 Related subject(s) Nuclear Energy and Radwaste
  
36.20th Infosecurity Europe 2015
 Dates 02 Jun 2015 → 04 Jun 2015
[ID=649545] Go to top of page
 LocationLondon, United Kingdom
 Abstract Infosecurity Europe is Europe's number one Information Security conference and exhibition and the most-attended information security event in Europe. It is a free exhibition featuring not only over 345 exhibitors and the most diverse range of new products and services but also an unrivalled education programme, 120 hours of free education, over 165 expert speakers and over 13,000 unique visitors representing every segment of the industry.
 Weblink http://www.infosec.co.uk/
  
37.IEEE ICCC Workshop on SPIC 2015 — The First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems in conjunction with IEEE ICC 2015
 Dates 08 Jun 2015 → 12 Jun 2015
[ID=654533] Go to top of page
 LocationLondon, United Kingdom
 Abstract Recent advances in networking, communications, computation, software, and hardware technologies have revolutionized the way humans, smart things, and engineered systems interact and exchange information. The Internet of Things (IoT) and Cyber-Physical Systems (CPS), which are the major contributors to this area, will fuel the realization of this new, globally interconnected cyber-world. Yet, the success, prosperity, and advancement of IoT and CPS systems strongly depend on the security, privacy & trust of the IoT and cyber-physical devices as well as the sensitive data being exchanged. While these technologies offer a lot of new possibilities, the increasing complexity of hardware and software as well as the worldwide access increase the vulnerability to security attacks. Successful attacks targeted to IoT devices and CPS systems have in common that not only a single computer is affected, but also interconnected technical systems allowing interaction with the physical world are influenced leading to malfunction of devices and control systems with severe financial, environmental and health losses. This fact highlights the need to develop novel tools that will constitute the heart of a much-needed science of security for IoT & CPS. The goal of the SPIC workshop is to bring together internationally leading academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results aimed at addressing all aspects of security and privacy for IoT & CPS.
 Topics IoT, CPS, Security, Privacy, Trust, Communications, Networking, RFID, Smart grids, Sensor, Actuator technologies, Hardware, Software, Test-bed, protocol
 Weblink http://icc2015.ieee-icc.org/
 Contact Qinghe Du; Phone: [+86-18220855266]; Email: duqinghe@mail.xjtu.edu.cn
  
38.IH&MMSec '15 — ACM Information Hiding and Multimedia Security Workshop
 Dates 17 Jun 2015 → 19 Jun 2015
[ID=659311] Go to top of page
 LocationPotland, OR, United States
 Weblink http://www.ihmmsec.org/
 Related subject(s) Multimedia, Computer Graphics and Visualization
  
39.ECCWS — 14th European Conference on Cyber Warfare and Security
 Dates 02 Aug 2015 → 03 Aug 2015
[ID=643584] Go to top of page
 LocationHatfield, United Kingdom
 Abstract The 14th European Conference on Cyber Warfare and Security (ECCWS) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat cyber warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.
 Topics Cyber conflict Patriotic hackers as an extension of state power Potential military uses of cyber attacks Case studies of cyber attacks in modern conflicts Theoretical cyber conflict scenarios Cyber conflict frameworks Human Factors Cyber-terrorism Principles of i-Warfare Physical security Counter-terrorism security policies, procedures and legislation Information warfare policy SMEs - Small-to-medium Size Enterprises Security model Critical national infrastructure protection Information warfare theory Security implications of “virtualised machines and services e-Health systems as part of a national critical infrastructure Information warfare techniques The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs) Information security governance and management Information warfare and security education Hacking and cracking Biometrics e-Intelligence/counter-intelligence Information Assurance Cryptography : classical and malicious Networked Centric War Malwares and antimalwares technologies Wireless Treats Reflector attacks UCE Threat Agents Art of war Cyber-fraud Particle swarm data mining Computers-as-weapons Risk Management Virtual Intrusion Detection Electro-magnetic pulse weapons Collaborative decision making National security policy Information operations Security policy Acute situational awareness Strategic leadership Firewalls Aircraft Environment Influence campaigns Phishing and spam Digital forensics Psychological warfare Current Anti Virus Technologies Network anomaly detection models PSYOP - PSYOPS Mobile Virus Corporate defence mechanisms Perception management RFID Virus Security for small to medium enterprises Infra-structure warfare SQL Infections Information, computer and network security Military Culture Topography Data Loss Security of the virtual worlds Modern conflict Data Integration SIMAD what can/should be done to protect against this threat? Military approaches ISO 27001 Unidirectional linguistic steganography Compromise path analysis Gaussian empirical rule IT auditing and compliance Defence steganography Natural computing Information Security Architecture Data and service integration Random numbers approximation sequence Artificial immune recognition system security infrastructure Legal issues concerned with information warfare and e-Crime Traffic classification Public Key Infrastructure Non-traditional enemies Subliminal Channel Network Address Translator Ethical, political and social issues relating to information warfare Machine Learning Risk Mathematical-filtering Association of Religions with Warfare Context free grammers SecureMDA Image-processing New trends Information Security Economy Other relevant topics
 Weblink http://academic-conferences.org/eccws/eccws2015/eccws15-home.htm
 Contact Mandy Limbrick; Phone: [+44 (0)1189 724148]; Email: mandy@academic-conferences.org
 Related subject(s) Networks, Internet
  
40.14. SECUTA 25. - 27.11.2015 in Garmisch-Partenkirchen — Information Security Tagung 2015 für IT-Manager
 Dates 25 Nov 2015 → 27 Nov 2015
[ID=648877] Go to top of page
 LocationGarmisch-Partenkirchen, Germany
 Abstract Ziel der IT-Security Jahrestagung ist es, Ihnen aktuelle Entwicklungen sowie Trends der Informationssicherheit für das Folgejahr praxisnah aufzuzeigen und neue Lösungswege zu präsentieren. Praxisberichte mit vielen Fallbeispielen und Live-Sessions, diverse Unternehmensberichte, Live Hacking´s sowie aktuelle IT-Rechtsprechungen und das Thema Datenschutz & Datensicherheit, runden die Agenda der Information Security Tagung ab.
 Topics Informationssicherheit, IT-Sicherheit, IT, Hacking, IT-Security, Security, Riskmanagement, IT-Management, CIO, CISO, Datenschutz, Datensicherheit, Netzwerk, Penetration, Richtlinien, ISO, ISO 27001, IT Tagung, Security Tagung, ISMS, Audit, Auditor, ITSIBE, Live Hacking, Forensik, IT Forensik, IT Recht, Vorträge, Risiko, Richtlinien, Awareness,
 Weblink http://www.it-secuta.de/
 Contact Manuela Krämer SECUTA Leitung Vertriebsleitung Informationssicherheit; Phone: [+49 (0)89 4576918-12]; Email: m.kraemer@cbt-training.de
  

Last updated: 06 October 2014