Conferences and Meetings on Information Security and Information Privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.
 
SANS Las Vegas 2017
ID
833421
Dates
23 Jan 2017 - 28 Jan 2017
Location
Las Vegas, United States
Abstract
You are invited to start your training for 2017 by attending SANS Las Vegas 2017, where SANS will provide outstanding courses in IT security, forensics, and security management presented by the best cybersecurity teachers in the country. At SANS events you get the kind of hands-on, immersion training that you can put to work immediately. SANS training is well-known for being relevant and pragmatic. Our award-winning faculty has proven they understand the challenges you face on a daily basis. Their real-world experience increases the practical value of the course material. Make your 2017 training plans now and register today for SANS Las Vegas 2017.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, web app penetration testing, forensics, digital forensics, Windows forensics, network forensics, management, security leadership, CISSP
2.
 
SANS Cyber Threat Intelligence Summit & Training 2017
ID
821678
Dates
25 Jan 2017 - 01 Feb 2017
Location
Arlington, United States
Abstract
Join SANS at this innovative Summit as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities. Most organizations are familiar with threat intelligence, but have no real concept of how to create and produce proper intelligence. The 2017 Summit will focus on specific analysis techniques and capabilities that can be used to properly create and maintain Cyber Threat Intelligence in your organization. Attend this summit to learn and discuss directly with the experts who are doing the CTI analysis in their organizations. What you learn will help you detect and respond to all ranges of adversaries including some of the most sophisticated threats targeting your networks.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber attacks, digital forensics, forensics, Mac forensics, incident response, network forensics, smartphone forensics, malware, reverse-engineering malware, cyber threats, cyber threat intelligence
3.
 
ASIA-SP — ISEA 1st International conference Asia Security & Privacy
ID
866375
Dates
29 Jan 2017 - 01 Feb 2017
Location
Surat, India
Event website
4.
 
Tallinn Cyber Conf 2017
ID
854476
Dates
31 Jan 2017 - 01 Feb 2017
Location
Tallinn, Estonia
Abstract
Tallinn Cyber Conf will help bring awareness of the risks that exist, how hackers think and what you can do to reduce your risks of being a victim of cyber crime.
Contact
Topconf Software Conferences;     Phone: [00372-5840-1398];     Email: info@topconf.com
Topics
cyber security, cyber risks, cyber attacks, hackers, information, privacy
5.
 
Cyber Resilience & InfoSec 2017
ID
846607
Dates
06 Feb 2017 - 07 Feb 2017
Location
Abu Dhabi, United Arab Emirates
Abstract
UAE remains among the top 10 destinations targeted by cyber criminals and cyber threats have been growing across key sectors like financial services, oil & gas, technology, government, retail, construction and healthcare. In lieu of the thriving threat landscape engulfing the region, the region's network security spend is expected to grow from $340 million in 2012 to $1 billion by 2018.
Contact
Manohar Bharwani;     Phone: [971 - 4609 - 1570];     Email: manohar.bharwani@fleming.events
Topics
Abu Dhabi Systems & Information Center, Emirates Nuclear Energy Corporation, US Embassy in Abu Dhabi, Dubai Customs, Etihad Aviation Group, Emirates Airlines, Al Hosn Gas, Takreer, National Bank of Abu Dhabi, Central Bank of UAE, Cyber Attacks, Cyber Threats, Cyber Security, Ransomware, IoT, Cyber Risk, Cyber Crime, Cyber Resilience
Related subject(s)
6.
 
SANS Southern California - Anaheim 2017
ID
846536
Dates
06 Feb 2017 - 11 Feb 2017
Location
Anaheim, United States
Abstract
At SANS Southern California - Anaheim 2017, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. Enhance your skills by taking advantage of SANS IT security, security management, forensics and ICS/SCADA training loaded with practical tools and cutting-edge information. The site of our training event, February 6-11, is the Anaheim Majestic Garden Hotel, located across the street from the Disneyland (R) Resort. Register for SANS Southern California - Anaheim 2017, and you'll see why SANS is the most trusted source in computer security training, certification, and research.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, Windows, penetration testing, exploit writing, digital forensics, incident response, strategic planning, leadership, ICS, industrial control systems, ICS security
7.
 
PlatCon-17 — 2017 International Conference on Platform Technology and Service
ID
866385
Dates
13 Feb 2017 - 15 Feb 2017
Location
Busan, South Korea
Related subject(s)
Event website
8.
 
FSP 2017 — The 2017 International Workshop on Future Security and Privacy
ID
866362
Dates
13 Feb 2017 - 15 Feb 2017
Location
Busan, South Korea
9.
 
CT-RSA 2017 — 2017 RSA Conference Cryptographer's Track
ID
866383
Dates
14 Feb 2017 - 17 Feb 2017
Location
San Francisco, United States
10.
 
ICISSP 2017 — 3rd International Conference on Information Systems Security and Privacy
ID
822433
Dates
19 Feb 2017 - 21 Feb 2017
Location
Porto, Portugal, Portugal
Event website
11.
 
SANS Scottsdale 2017
ID
845034
Dates
20 Feb 2017 - 25 Feb 2017
Location
Scottsdale, United States
Abstract
Information security training in Scottsdale from SANS Institute, the global leader in information security training. SANS is returning to Arizona, February 20-25, for SANS Scottsdale 2017! Choose from eight hands-on, immersion-style security training courses all taught by real-world practitioners. All are aligned with GIAC certifications and several courses will prepare you or your technical staff for DoD 8570. With a reputation for being the most trusted source for information security training and an eagerness to help you meet your training objectives, SANS is the best choice for IT security education. Be sure to register early to get the best discount and to enjoy this warm winter destination!
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, network penetration testing, critical security controls, forensics, digital forensics, Windows forensics, management, leadership
12.
 
FinSec — The Banking Security Summit 2017
ID
869908
Dates
21 Feb 2017 - 22 Feb 2017
Location
Dubai, United Arab Emirates
Abstract
The rapid rise of technology has led to advances in the banking and financial security industry which have enhanced convenience and increased retention among consumers. However, the BFSI industry in the Middle East has become one of the prime targets of highly sophisticated and focused attacks.

Emerging channels like mobile banking, digital banking platforms, IoT, digital identity etc. are being exploited by cyber criminals. The recent wave of attacks against banks in the Middle East using highly advanced engineering techniques underlines the gravity of the situation. There is an urgent need to develop a robust security framework as traditional methods are becoming redundant.

The FinSec Summit, which is part of the highly successful New Age Banking series, will bring together decision makers and solution providers to share experiences and address key challenges. CISO professionals will discover the latest technologies, developments and strategies to protect their organisations.

The speaker line-up for the event features:

• Thabet Bakheet, Head of Information Security, Central Bank of UAE

• Noha Amin, Head of Information Security, Kuwait Finance House

• Mohamed Roushdy, Chief Information Officer, Bank Al Bilad

• Osama Hijji, Chief Information Security Officer, Banque Du Caire

Contact
Sanjay Swami;     Email: sanjay@umsconferences.com
Topics
Banking, banking security, cyber security, biometrics, cards and payments, authentication, middle east, UAE, finsec, security breach in banks
Related subject(s)
13.
 
SG-CRC — Singapore Cyber Security R&D Conference
ID
866459
Dates
21 Feb 2017 - 22 Feb 2017
Location
Singapore, Singapore
14.
 
ACSS2017 — The 2nd China Automotive Cyber Security Summit 2017
ID
858588
Dates
23 Feb 2017 - 24 Feb 2017
Location
Shanghai, China
Abstract
“The 2nd China Automotive Cyber Security Summit 2017
Contact
Gavin Cheng;     Phone: [+86 21 52710288];     Email: gavin.cheng@grccinc.com
Topics
·Legislation Update: How China government amend the existing laws and regulations for the characteristics of the connected car technology and potential security risks ·Understand the security business risks for OEM's and top tier suppliers, as well as potential adversaries that you'll face, along with their motivation and resources ·Security and Next Gen Automotive Technology including V2X, fleets, ADAS and autonomous cars ·Secure Automated Vehicles Fuse Security With Functional Safety ·How fleet owner, OEMs, Tier 1s, etc can take today to start protecting their vehicles from cybersecurity attacks, including best practices, updates, and monitoring and the longer-term path toward comprehensive solutions ·Plot the what & why of security technology already in progress, including standards, authentication, security analytics and an update on SHE, EVITA, & CAMP ·How to build a Secure Vehicle Architecture: Discuss the security technology implications of connected cars and best practices for designing a vehicle architecture that minimizes attack surfaces and ensures data privacy ·Understand vulnerabilities and make sure maintain security of the vehicle lifecycle: from “design”, “produce”, “use” and beyond to avoid embarrassing recalls
Event website
15.
 
USEC 2017 — Usable Security Mini Conference 2017
ID
866447
Start date
26 Feb 2017
Location
San Diego, California, United States
16.
 
SANS Dallas 2017
ID
836120
Dates
27 Feb 2017 - 04 Mar 2017
Location
Dallas, United States
Abstract
Information security training in Texas from SANS Institute, the global leader in security training. The site of our live training event is The Westin Dallas Downtown, located downtown next to Belo Garden and a mile from the Kay Bailey Convention Center! With a course line-up including core fundamentals, penetration testing, digital forensics, and security management, SANS Dallas 2017, February 27- March 4, is sure to have a course that meets your needs. All of our courses for this event are associated with a GIAC Certification. Get outstanding cybersecurity training from SANS world-class instructors at SANS Dallas 2017.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, securing Windows, PowerShell, continuous monitoring, security operations, network penetration testing, penetration testing, CISSP, management, security leadership, cyber defense
17.
 
ICCWS 2017 — 12th International Conference on Cyber Warfare and Security
ID
802796
Dates
02 Mar 2017 - 03 Mar 2017
Location
Dayton, United States
Abstract
For the past 10 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings in the form of empirical studies, case histories and other theoretical and practical contributions. In addition doctoral degree candidates find this conference a valuable opportunity to network with others and have the opportunity to present papers and posters.
Contact
Elaine Hayne;     Phone: [01189724148];     Email: elaine@academic-conferences.org
Topics
Cyber Warfare Cyber Defence Cyber Terrorism Cyber Security Cyber Crime Cloud Security Social networking threats Big Data Security Psychological Warfare Digital Forensics
18.
 
FSE 2017 — Fast Software Encryption
ID
866424
Dates
05 Mar 2017 - 08 Mar 2017
Location
Tokyo, Japan
19.
 
SANS San Jose 2017
ID
842090
Dates
06 Mar 2017 - 11 Mar 2017
Location
Milpitas, United States
Abstract
Information security training coming to the Silicon Valley. Securing and defending your network has never been more important as attacks and breaches make the news daily. Gain the skills and tools you need to win the battle against the wide range of cyber adversaries who want to harm your environment at SANS San Jose 2017 (March 6-11). Choose from 6 hands-on, intensive cyber security training courses. Five are aligned with GIAC certifications and several courses will prepare you or your technical staff for DoDD 8570. SANS is the most trusted source in computer security training, certification, and research. Come see for yourself - register today for SANS San Jose 2017.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, incident handling, exploits, continuous monitoring, security operations, penetration testing, web app penetration testing, defending web applications, cyber defense
20.
 
cyph3r Hack to Protect
ID
868011
Dates
12 Mar 2017 - 16 Mar 2017
Location
Dubai, United Arab Emirates
Abstract
cyph3r is a super-charged 4 day immersive event which allows professionals in the field of Information Security to stay focused on the pulse of changing trends, newly emergent tech, threats and tricks to stay vigilant, protected and ahead of the game. cyph3r calls for a paradigm shift in the way cyber security is planned at the basic level. This approach is premised on allowing a free flow of information which nourishes the growth of our economies, while restricting avenue which hinder safety and progress. cypher’s core mission is to empower organisations and individuals to prepare themselves with the knowledge and ammunition to shield themselves against crime and deviation by bringing together a network of creative, ethical professionals who have the ability to lead cyber security projects.

This summit is a unique opportunity for individuals and teams to explore the biggest challenges the industry is facing and potential solutions to counter them. All participants will dive deep into the fundamental issues surrounding the information security business through the numerous panels and strategy sessions while also creating life-changing connections that is guaranteed to rapidly advance both personal and professional development.

Contact
Delcy D’souza;     Phone: [+971 4 553 1434];     Email: info@cyph3rsec.com
Topics
cyph3r, Hack, Network Security, Protect, Information and Technology
21.
 
RiSK Conference 2017
ID
870150
Dates
15 Mar 2017 - 16 Mar 2017
Location
Lasko, Slovenia
Abstract
RiSK 2017, a conference bringing together CIOs, CTOs, CSO from banks, retailers, telcos, government, system integrators, IT consultants and the world’s top Internet security people. Internationally renowned and acclaimed speakers. First class training.
Contact
Matic Knuplez;     Phone: [+38622347474];     Email: info@risk-conference.com
Topics
Network security Threat Intelligence Advanced Evasion Techniques Web 2.0 security Encryption Network risks Next Generation Network Cybercrime Fraud detection DLP Virtualised Identity Virus protection Firewalls Anti spam WiFI security Cloud technologies E-mail security Cryptography Access control Attacks and Countermeasures Intrusion Prevention Forensics SIEM Awareness Management Current IT Trends
22.
 
Spring School on Lattice-Based Cryptography
ID
866434
Dates
20 Mar 2017 - 24 Mar 2017
Location
Oxford, United Kingdom
23.
 
SANS Tysons Corner Spring 2017
ID
859591
Dates
20 Mar 2017 - 25 Mar 2017
Location
McLean, United States
Abstract
Information security training in Tysons Corner from SANS Institute the global leader in cybersecurity training. Securing and defending your network has never been more important as attacks and breaches make the news daily. Gain the skills and tools you need to win the battle against the wide range of cyber adversaries who want to harm your environment by attending SANS Tysons Corner Spring 2017 (March 20-25). Choose from several hands-on, intensive cyber security training courses. Multiple courses are aligned with GIAC certifications and several will prepare you or your technical staff for DoDD 8570. SANS is the most trusted source in computer security training, certification, and research. Come see for yourself - register today for SANS Tysons Corner Spring 2017.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, network penetration testing, critical security controls, forensics, digital forensics, malware, reverse-engineering malware, malware analysis, management, leadership
24.
 
SANS ICS Security Summit & Training - Orlando 2017
ID
825794
Dates
20 Mar 2017 - 27 Mar 2017
Location
Orlando, United States
Abstract
Join us for the 12th Annual ICS Security Summit where you'll participate in briefings by the industry's most seasoned practitioners as well as live demonstrations, the largest collection of hands-on challenges and simulations, and ICS focused immersion courses taught by the nation's best instructors. Learn what qualifies as an attack, what does not, and get hands-on with the challenges and skills required to bridge the IT/OT gap and respond to threats at the ICS Security Summit. Industry leaders and in-the-field practitioners will share their experience covering a wide topic of ICS forensics, attack demos, industry trends, and more.
Contact
Lacee Santos;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber attacks, ICS, ICS security, industrial control systems, hacking, hacker tools, hacking techniques, exploits, incident handling, risk management, active defense, incident response, critical infrastructure
25.
 
SANS Pen Test Austin 2017
ID
845169
Dates
27 Mar 2017 - 01 Apr 2017
Location
Austin, United States
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, incident handling, exploits, penetration testing, web app penetration testing, cyber deception, active defense, network penetration testing, CyberCity, exploit writing
26.
 
APKC'17 — The 4th ACM ASIA Public-Key Cryptography Workshop
ID
866400
Start date
01 Apr 2017
Location
Abu Dhabi, United Arab Emirates
27.
 
IoTPTS'17 — 3rd International Workshop on IoT Privacy, Trust, and Security
ID
852215
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
Abstract
The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning.
Topics
Privacy and IoT data, Privacy attacks for IoT, Trust management and device discoverability for IoT, Usability of privacy and security systems in IoT, User risk perceptions and modeling for IoT, Policy Management and enforcement for IoT, Authentication and access control for users for IoT, Cryptography for IoT, Attack detection and remediation for IoT, Security architectures for IoT systems and applications
28.
 
CPSS?17 — 3rd ACM Cyber-Physical System Security Workshop
ID
866509
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
29.
 
BCC'17 — First ACM Workshop on Blockchain, Cryptocurrencies and Contracts
ID
866464
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
30.
 
SCC'17 — The Fifth International Workshop on Security in Cloud Computing
ID
866485
Start date
02 Apr 2017
Location
Abu Dhabi, United Arab Emirates
31.
 
AsiaCCS 2017 — 2017 ACM Asia Conference on Computer and Communications Security
ID
866451
Dates
02 Apr 2017 - 06 Apr 2017
Location
Abu Dhabi, United Arab Emirates
Event website
32.
 
TPMPC2017 — Theory and Practice of Multi-Party Computation Workshop
ID
866471
Dates
03 Apr 2017 - 07 Apr 2017
Location
Bristol, United Kingdom
33.
 
FC '17 — Financial Cryptography and Data Security 2017
ID
866505
Dates
03 Apr 2017 - 07 Apr 2017
Location
Sliema, Malta
Event website
34.
 
ISPIT 2017 — Information Security and Protection of Information Technologies 2017
ID
866503
Dates
06 Apr 2017 - 07 Apr 2017
Location
Saint-Petersburg, Russia
35.
 
TA'17 — Targeted Attacks 2017
ID
866524
Start date
07 Apr 2017
Location
Sliema, Malta
36.
 
SANS 2017
ID
842183
Dates
07 Apr 2017 - 14 Apr 2017
Location
Orlando, United States
Abstract
Information security training in Orlando, FL from SANS Institute, the global leader in information security training. SANS 2017 returns to Orlando, Florida offering more than 40+ hands-on, intensive cyber security training courses all taught by the industry's top instructors. Regardless of the course you select, SANS promises that you will be able to use what you learn as soon as you return to your office. Nothing beats the SANS live training experience. Don't delay as many courses sold out last year. Register today to guarantee your seat and to lay a strong foundation for a successful year!
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident response, incident handling, Windows, PowerShell, Linux, Unix, continuous monitoring, security operations, security ops, penetration testing, web apps, web app penetration testing, network penetration testing, critical security controls, auditing, mobile devices, mobile devices security, virtualization, cloud security, exploit writing, forensics, digital forensics, Windows forensics, Mac forensics, network forensics, cyber threat intelligence, smartphone forensics, malware, malware analysis, CISSP, security leadership, management, strategic planning, project management, cyber defense, secure coding, coding, .NET, auditing, data security, law
37.
 
2nd Annual - GCC ICS Cyber Security Forum Dubai 2017
ID
870293
Dates
09 Apr 2017 - 11 Apr 2017
Location
Dubai, United Arab Emirates
Abstract
Following on form of success of the first Forum Sept 2015 ICS Cyber Security Forum Has Been called to examine the issues of concern here in region together with the growing number of international Partnership being formed around the world to tackle and address the increasing number of cyber-attacks. The ICS Cyber Security forum is the event where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber incidents, analyze their causes and cooperate on solutions. The ICS Cyber Security forum, Dubai is the must attend event which brings together cyber security expert and control system to meet a common goal, securing the control systems. This year conference is designed to arm you with the pertinent and mission critical information on SCADA and industrial control systems which will help you to create tactics, techniques, and procedures to improve the security of ICS System
Contact
Aqeel Ahmed;     Phone: [+91 8884600884];     Email: aqeel@imnbi.com
Topics
ICS Cyber Security, SCADA Security, industrial control systems, cyber defense, data protection, security priorities, IT Compliance, cyber security, cyber security threat, Endpoint security, Threat base security, Security intelligence, future cyber strategies
38.
 
C2SI 2017 — International Conference in "Codes, Cryptology and Information Security"
ID
866501
Dates
10 Apr 2017 - 12 Apr 2017
Location
Rabat, Morocco
39.
 
4th Annual Kingdom Cyber Security Conference
ID
850537
Dates
18 Apr 2017 - 19 Apr 2017
Location
Riyadh, Saudi Arabia
Contact
Sonika Mendjoge;     Email: sonika.mendjoge@fleming.events
Topics
cyber security, security management, cyber threats, cyber attacks, cyber security solutions, cyber security conference, social engineering, ransomware, cyber incident response, securing critical infrastructure, information security, cyber intelligence, cyber security in Middle East, cyber security Saudi Arabia
40.
 
AnnualSec2017 — 16th Annual Security Conference
ID
850078
Dates
18 Apr 2017 - 20 Apr 2017
Location
Las Vegas, United States
Abstract
The nature and scope of the Information Security field is evolving. We are no longer are we just concerned with protecting the technical edifice. Our emphasis has become more holistic, and we tend to consider both the organizational and technical aspects of information protection to be equally important. The 16th Annual Security Conference provides a forum for discourses in Security, Assurance and Privacy that enhance the understanding of current events, but also nurture future dialogues related to cybersecurity. The conference is scheduled for April 18-20, 2017, in Las Vegas, NV, USA. The 16th Annual Security Conference is part of the Vegas Conferences organized by the Information Institute. Co-organizers for the 2017 event are Virginia Commonwealth University, Plymouth University, The University of South Carolina and DePaul University. Administrative offices for the conference are at Virginia Commonwealth University. Conference theme for 2017 is: Discourses in Cybersecurity
Contact
Sergio Nunes;     Email: esc@iseg.ulisboa.pt
Topics
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome participation in the 16th Annual Security Conference. Topic areas covered in the conference include, but are not limited to the following: Cyber security in specific sectors (healthcare, banking, government etc) Cyber terrorism Digital forensics Electronic espionage Ethical and legal aspects of security Intrusion detection and prevention IT audit and control Risky habits risky behaviors Security and BYOD Security breaches and data analytics Security governance Security in social media and online communities Security policies Socio-technical aspects of security System vulnerabilities and risk exposure Technology enabled crime Publishing opportunity: All submissions are considered for possible fast tracking in the following academic journals: Journal of Information System Security, European Journal of Management Studies, Information and Computer Security. If your paper is not fast tracked, it will still get published in an edited book.
41.
 
SANS Threat Hunting and Incident Response Summit 2017
ID
846546
Dates
18 Apr 2017 - 25 Apr 2017
Location
New Orleans, United States
Abstract
Join SANS for the Threat Hunting & Incident Response Summit in New Orleans! This year's Summit features industry talks filled with the most advanced methodologies used by top cyber defense practitioners. Additionally, choose from seven courses taught by experienced instructors who are actively hunting for threats and stopping the most sophisticated, and dangerous attacks against organizations.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, network security, data breach, cyber-attacks, cyber threats, cyber threat intelligence, incident response, security operations, security ops, active defense, cyber deception, digital forensics, memory forensics, network forensics, malware, malware analysis
42.
 
EuroS&P — 2nd IEEE European Symposium on Security and Privacy
ID
866544
Dates
26 Apr 2017 - 28 Apr 2017
Location
Paris, France
43.
 
ISDFS2017 — International Symposium on Digital Forensics and Security
ID
866609
Dates
26 Apr 2017 - 28 Apr 2017
Location
Mures, Romania
Related subject(s)
Event website
44.
 
IEEE S&B — IEEE Security and Privacy on the Blockchain
ID
866553
Start date
29 Apr 2017
Location
Paris, France
45.
 
WCS 2017 — The second international Workshop on Communication Security
ID
866552
Start date
30 Apr 2017
Location
Paris, France
46.
 
SEMS — Workshop on Security for Embedded and Mobile Systems
ID
866628
Start date
30 Apr 2017
Location
Paris, France
47.
 
Eurocrypt 2017
ID
866561
Dates
30 Apr 2017 - 04 May 2017
Location
Paris, France
48.
 
HOST'17 — IEEE International Symposium on Hardware-Oriented Security and Trust
ID
866648
Dates
01 May 2017 - 05 May 2017
Location
McLean, United States
Related subject(s)
49.
 
SANS Automotive Cybersecurity Summit 2017
ID
838961
Dates
01 May 2017 - 08 May 2017
Location
Detroit, United States
Abstract
The automotive industry is in an era of exciting change and innovation. Vehicles are more connected than ever and feature technologies that dramatically enhance user experience and safety. However, this unprecedented wave of automation presents new and unique cybersecurity challenges. Recent high-profile car hacking demonstrations highlight the fact that modern automobiles are inherently vulnerable and connected computing platforms, and as a result, automotive cybersecurity professionals are dealing with new and difficult challenges in an ever-evolving security landscape. SANS will hold its inaugural Automotive Cybersecurity Summit to address the specific issues and challenges around securing automotive organizations and their products. Join us for a comprehensive look at automotive assembly, industry suppliers, embedded systems, and safeguarding extended customer and product data. The Summit will include two-days of in-depth presentations from top security experts and seasoned practitioners, hands-on learning exercises, and exclusive networking opportunities.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, ICS, industrial control systems, SCADA, automotive cybersecurity
50.
 
RuhrSec
ID
869009
Dates
02 May 2017 - 05 May 2017
Location
Bochum, Germany
Abstract
RuhrSec is the non-profit security conference at the Ruhr University Bochum. As one of the organizers of the famous lecture called HackPra, we are hosting a high-quality and low-priced security conference in the heart of Bochum near the river Ruhr. We provide awesome academic and industry talks from smart international speakers, the typical Ruhr University feeling and the highly recommended HackPra social event.
Contact
Marcus Niemietz;     Phone: [+49 234 45930961];     Email: ruhrsec@hackmanit.de
Topics
Security, Attacks, Side-Channel, Ruhr-Universität Bochum, Security Community, non-profit, security conference, Pentest, OWASP, IT-Security
51.
 
SANS Security West 2017
ID
870112
Dates
09 May 2017 - 18 May 2017
Location
San Diego, United States
Abstract
Cybersecurity skills and knowledge are in high demand. Cyber attacks and data breaches are more frequent and sophisticated than ever, and organizations are grappling with how to best defend themselves. As a result, cybersecurity is more vital, crucial, and important to the growth of your organization than ever before. Now is the perfect time to take the next step to protect your organization and advance your career. Join us at Security West 2017 (May 9-18) in beautiful San Diego, CA to gain the skills and knowledge to help your organization succeed. You will learn cutting-edge content about the hottest information security topics across penetration testing, digital forensics and incident response (DFIR), security operations, audit, application security, and security management.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, PowerShell, continuous monitoring, security operations, SecOps, penetration testing, pen testing, web app penetration testing, network penetration testing, critical security controls, auditing, mobile device security, virtualization, cloud security, exploit writing, digital forensics, Windows forensics, threat hunting, Mac forensics, cyber threat intelligence, IT management, security leadership, strategic planning, DevOps
52.
 
Cyber Security North Africa Summit
ID
850525
Dates
15 May 2017 - 16 May 2017
Location
Cairo, Egypt
Contact
Sonika Mendjoge;     Email: sonika.mendjoge@fleming.events
Topics
cyber security, security management, cyber threats, cyber attacks, cyber security solutions, cyber security conference, social engineering, ransomware, cyber incident response, securing critical infrastructure, information security, cyber intellience, cyber security in Egypt
53.
 
SANS Northern Virginia - Reston 2017
ID
870122
Dates
21 May 2017 - 26 May 2017
Location
Reston, United States
Abstract
We are pleased to invite you to SANS Reston 2017, May 21-26. This event features comprehensive hands-on technical training from some of the best instructors in the industry and includes courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans now to attend SANS Reston 2017.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, Python, hacking, hacker tools, hacking techniques, exploits, incident handling, Windows, PowerShell, security operations, SecOps, Continuous Monitoring, web applications, web app penetration testing, pen testing, penetration testing, network penetration testing, digital forensics, strategic planning, IT management
54.
 
AFRICACRYPT 2017 — 9th International Conference on Cryptology and Information Security
ID
866647
Dates
24 May 2017 - 26 May 2017
Location
Dakar, Senegal
55.
 
Security in Times of Surveillance
ID
866657
Start date
29 May 2017
Location
Eindhoven, Netherlands
56.
 
IFIP SEC 2017 — 32nd IFIP TC-11 International Information Security and Privacy Conference
ID
866667
Dates
29 May 2017 - 31 May 2017
Location
Rome, Italy
Event website
57.
 
CyCon — 2017 9th International Conference on Cyber Conflict
ID
853651
Dates
30 May 2017 - 02 Jun 2017
Location
Tallinn, Estonia
Abstract
International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation
Event website
58.
 
SANS Atlanta 2017
ID
870187
Dates
30 May 2017 - 04 Jun 2017
Location
Atlanta, United States
Abstract
We are pleased to invite you to attend SANS training in the capital of the State of Georgia! We are bringing our top courses and top instructors to Atlanta on May 30- June 4. With only one in 1,200 candidates qualifying globally to join our faculty, SANS instructors are the foremost experts and the best at ensuring you will not only learn the material, but that you can also apply it immediately when you return from your training. All of our courses at SANS Atlanta 2017 are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join nearly 73,000 GIAC credentialed Information Security professionals worldwide.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, hacking, hacker tools, hacking techniques, exploits, incident handling, continuous monitoring, security operations, cyber threat intelligence, CISSP, security leadership, IT management
59.
 
EuropeanSeC2017 — 2017 European Security Conference
ID
849933
Dates
05 Jun 2017 - 06 Jun 2017
Location
Lisbon, Portugal
Abstract
The 2017 European Security Conference is scheduled for June 5-6, 2017, in Lisbon, Portugal. The Conference is the European extension of the Annual Security Conference that has been held in Las Vegas (USA) for over a decade. The conference attracts a nice mix of participants from academia, government and industry. Organizers for the 2017 event is ISEG, University of Lisbon (Portugal). Administrative offices for the conference are at ISEG, University of Lisbon. Conference theme for 2017 is: Cybersecurity Analytics
Contact
Email: esc@iseg.ulisboa.pt
Topics
Cybersecurity, security, Information security
60.
 
CTCrypt 2017 — 6th Workshop on Current Trends in Cryptology
ID
866644
Dates
05 Jun 2017 - 07 Jun 2017
Location
Saint Petersburg, Russia
Event website
61.
 
Summer school on real-world crypto and privacy
ID
866698
Dates
05 Jun 2017 - 09 Jun 2017
Location
Sibenik, Croatia
62.
 
SANS Houston 2017
ID
870175
Dates
05 Jun 2017 - 10 Jun 2017
Location
Houston, United States
Abstract
Information security training in Houston from SANS Institute, the global leader in security training. At SANS Houston 2017, SANS offers hands-on, immersion-style security, security management, and pen testing training courses taught by real-world practitioners. The site of SANS Houston 2017, June 5-10, is Royal Sonesta Hotel Houston, located in the heart of the Galleria area of Uptown Houston. We have selected some of our top information security courses to provide you with the training and certification that you need to boost your career by learning from the best! SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, intrusion detection, hacking, hacker tools, hacking techniques, ethical hacking, penetration testing, pen testing, network penetration testing, IT management, strategic planning
63.
 
SANS Security Operations Center Summit & Training 2017
ID
846512
Dates
05 Jun 2017 - 12 Jun 2017
Location
Arlington, United States
Abstract
In light of numerous recent high-profile attacks and data breaches, Security Operations Centers are taking on a more prominent role in organizations as executives aim to improve their security programs. While a Security Operations Center (SOC) is capable of improving security, effectively implementing and managing the many functions of a SOC can be a major challenge. Information security managers must balance people, process, and procedure in order to operate a SOC that is effective and works within the constraints of the organization. The Security Operations Center Summit will bring together top experts for two days of in-depth talks and panel discussions around building, operating, and growing a SOC. Attendees will hear from and interact with top experts who have faced many of the same challenges SOCs encounter within their organizations.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, security operations, SecOps, intrusion detection, network forensics, digital forensics, security operations center
64.
 
SECITC 2017 — The 10th International Conference on IT and Communications Security
ID
866686
Dates
08 Jun 2017 - 09 Jun 2017
Location
Bucharest, Romania
Event website
65.
 
Cyber Incident — 2017 International Conference On Cyber Incident Response, Coordination, Containment & Control
ID
856159
Dates
19 Jun 2017 - 20 Jun 2017
Location
London, United Kingdom
Abstract
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control. The aim of the Cyber Incident 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.
Event website
66.
 
Cyber Security — 2017 International Conference On Cyber Security And Protection Of Digital Services
ID
856102
Dates
19 Jun 2017 - 20 Jun 2017
Location
London, United Kingdom
Abstract
The International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.
67.
 
CSCloud — 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing
ID
853603
Dates
26 Jun 2017 - 28 Jun 2017
Location
New York, NY, United States
Abstract
The increasing usages of Web-based technologies have enabled numerous benefits in people’s daily life, from mobile social applications to heterogeneous high performance computing. The implementations of the Internet-related solutions are considered one of the important approaches for enterprises to grow their businesses. However, novel mechanisms using networking techniques also introduce new threats harming users’ privacy information and operations. Two critical aspects in Web security are cyber security and cloud computing. IEEE CSCloud 2017 focuses on these two aspects and aims to gather recent achievements in cyber security and cloud computing fields. The conference invites those papers that concentrate on new paradigms, algorithms, and applications in cyber security or cloud computing. We also encourage researchers and practitioners to build up the connections between academia and industry.
68.
 
ACISP2017 — 22nd Australasian Conference on Information Security and Privacy 2017
ID
866630
Dates
03 Jul 2017 - 05 Jul 2017
Location
Auckland, New Zealand
69.
 
ACNS'17 — 15th International Conference on Applied Cryptography and Network Security
ID
866673
Dates
10 Jul 2017 - 12 Jul 2017
Location
Kanazawa, Japan
70.
 
ICCCF — 2017 5th International Conference on Cybercrime and Computer Forensic
ID
843519
Dates
16 Jul 2017 - 18 Jul 2017
Location
Gold Coast, Australia
Abstract
This is a well established international conference for technologists and social scientists to gather and shares their forefront research outcome, to disseminate their research experience, to make the society for better place for humanity.
71.
 
SECRYPT 2017 — 14th International Conference on Security and Cryptography
ID
866749
Dates
26 Jul 2017 - 28 Jul 2017
Location
Madrid, Spain
72.
 
UBICNET 2017 — EAI International Conference on Ubiquitous Communications and Network Computing
ID
845439
Dates
03 Aug 2017 - 05 Aug 2017
Location
Bangalore, India
Abstract
Ubiquitous Communications and Network Computing (UBICNET) are revolutionary concept that aim to provide pervasive and reliable communication and computing services available anytime and anywhere. UBICNET has drawn significant interests from both academia and industry and continues to attract tremendous research efforts due to its promising new business opportunity in information technology and engineering. Ubiquitous communication and computing is the growing trend and became one of the requirements for most of the people around the globe. While ubiquitous communication ensures communication anywhere with anyone, ubiquitous computing devices are completely connected and constantly available. Ubiquitous network computing relies on the convergence of wireless technologies, advanced electronics and Internet and what we can call it as Internet of Things (IoT). This emerging technology is built upon a wide range of key areas including wireless and sensor networks, mobile and distributed computing, embedded systems, IoT, agent technologies, autonomic communication, and information security.
Contact
European Alliance for Innovation;     Email: lenka.oravska@eai.eu
Topics
Topics: Advanced Communications Next Generation Networks Wireless Access Technologies Networked Sensing, and Applications Heterogeneous Networks Cognitive radio Software Defined Networks Virtualization Soft Computing Sensor Networks Mobile Systems and Applications Mobile Data Management and Analytics Mobile Multimedia Mobile User Interfaces and Interaction Technologies Energy Aware Mobile Computing Mobile Cloud Computing Smart and Intelligent Devices Networks Computing Distributed Computing Localization and Tracking Internet of Things – Systems, Data Analytics, and Applications Crowdsourcing – Platforms and Applications Wearable Computing Body Area Networks Security and Privacy
73.
 
DSC — 2017 IEEE Conference on Dependable and Secure Computing
ID
837809
Dates
07 Aug 2017 - 10 Aug 2017
Location
Taipei, Taiwan
Abstract
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems.
Related subject(s)
74.
 
Crypto — Crypto 2017
ID
866715
Dates
20 Aug 2017 - 24 Aug 2017
Location
Santa Barbara, United States
75.
 
CSF — 2017 IEEE 30th Computer Security Foundations Symposium
ID
849080
Dates
21 Aug 2017 - 25 Aug 2017
Location
Santa Barbara, CA, United States
Abstract
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security.
76.
 
IWSEC 2017 — The 12th International Workshop on Security
ID
854678
Dates
30 Aug 2017 - 01 Sep 2017
Location
Hiroshima, Japan
Abstract
IWSEC (International Workshop on Security) is organized by ISEC (Information Security) and CSEC (Computer Security Group). ISEC is a technical group on information security of IEICE (The Institute of Electronics, Information and Communication Engineers) and CSEC is SIG (Special Interest Groups) of IPSJ (Information Processing Society of Japan).
Contact
Email: iwsec2017-inquiry@klab.is.sci.toho-u.ac.jp
Topics
Big Data Analysis for Security, Critical Infrastructure Security, Cryptanalysis, Cryptographic Protocols, Cybersecurity Economics, Digital Forensics, Enriched Cryptography, Financial Security, Formal Methods, Information Law and Ethics, IoT security, Machine Learning for Security, Malware Countermeasures, Measurements for Cybersecurity, Multiparty Computation, Post Quantum Cryptography, Privacy Preserving, Rational Cryptography, Real World Cryptography, Security Management, Visualization for Security
77.
 
RCD 2017 — 4th Romanian Cryptology Days Conference
ID
866692
Dates
18 Sep 2017 - 20 Sep 2017
Location
Bucharest, Romania
78.
 
QCrypt'17 — 7th international conference on quantum cryptography
ID
866746
Dates
18 Sep 2017 - 22 Sep 2017
Location
Cambridge, United Kingdom
Event website
79.
 
CHES 2017 — Cryptographic Hardware and Embedded Systems 2017
ID
866712
Dates
25 Sep 2017 - 28 Sep 2017
Location
Taipei, Taiwan
80.
 
CNS — 2017 IEEE Conference on Communications and Network Security
ID
843350
Dates
09 Oct 2017 - 11 Oct 2017
Location
Las Vegas, NV, United States
Abstract
IEEE Conference on Communications and Network Security (CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security.
81.
 
ProvSec 2017 — The 11th International Conference on Provable Security
ID
866755
Dates
23 Oct 2017 - 25 Oct 2017
Location
Xi'an, China
82.
 
DASC 2017 — The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
ID
853094
Dates
06 Nov 2017 - 10 Nov 2017
Location
Orlando, Florida, United States
Abstract
IEEE DASC 2017 will be held in November 6-10, 2017 in Orlando, Florida, USA, co-located with CyberSciTech 2017, IEEE DataCom 2017 and IEEE PiCom 2017 (the event location is very close to the Walt Disney World, which is in walking distance). IEEE DASC 2017 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems.
Topics
Autonomic Computing Theory, Models, Architectures and Communications, Cloud Computing and Fog/edge Computing with Autonomic and Trusted Environment, Dependable Automatic Control Techniques and Systems, Dependability Models and Evaluation Algorithms, Dependable Sensors, Devices, Embedded Systems, Dependable Electronic-Mechanical Systems, Optic-Electronic Systems, Self-improvement in Dependable Systems, Self-healing, Self-protection and Fault-tolerant Systems, Hardware and Software Reliability, Verification and Testing, Software Engineering for Dependable Systems, Safety-critical Systems in Transportation and Power System, Security Models and Quantifications, Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS, Self-protection and Intrusion-detection in Security, DRM, Watermarking Technology, IP Protection, Context-aware Access Control, Virus Detections and Anti-Virus Techniques/Software, Cyber Attack, Crime and Cyber War, Human Interaction with Trusted and Autonomic Computing Systems, Security, Dependability and Autonomic Issues in Ubiquitous Computing, Security, Dependability and Autonomic Issues in Cyber-Physical System, Security, Dependability and Autonomic Issues in Big Data, SDN, and IoT Systems, QoS in Communications and Services, Information and System Security, Reliable Computing and Trusted Computing, Wireless Emergency and Security Systems, Information Technology in Biomedicine, Multimedia Security Issues over Mobile and Wireless Networks, Multimedia in Mobile Computing: Issues, System Design and Performance Evaluation, Software Architectures and Design for Emerging Systems, Software Engineering for Emerging Networks, Systems, and Mobile Systems
83.
 
ISPEC 2017 — 13th International Conference on Information Security Practice and Experience
ID
866787
Dates
29 Nov 2017 - 01 Dec 2017
Location
Melbourne, Austria
Abstract
The 13th International Conference on Information Security Practice and Experience (ISPEC 2017) will be held in Melbourne on 29 Nov - 01 Dec 2017, organised by Deakin University and Monash University. The ISPEC conference is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
84.
 
ICAC3 — 2017 International Conference on Advances in Computing, Communication and Control
ID
856264
Dates
01 Dec 2017 - 02 Dec 2017
Location
Mumbai, India
Abstract
Network Security:• Mobile Network Security • Security in CDN (Contents Distribution Networks) • Virtual Private Network (VPN) • Security in Grid • Transport-Level Security • Wireless Network Security • IP Security • Electronic Mail security • Security Protocols • Cryptographic Technologies • Block and Stream Ciphers • Public Key Cryptology • Message Authentication and Hash Functions • Digital Signature Schemes • Secret Sharing • Cryptanalysis • Novel Biometric Methods • Bio inspired Security methods • Digital Forensic • Biometrics for Security • Feature Extraction and pattern Matching Algorithms • Embedded Systems Security • Side Channel Attacks • Fault Attacks • Hardware Tamper Resistance • Secure Storage Devices • Firewall Systems • Hacking Techniques and Related Issues • Intrusion Detection System (IDS) • Honey-pot • Self replicating algorithms • Malware Analysis • Intrusion Detection • Denial of service issues • Trust networks on semantic web • Self recovery algorithms
85.
 
SP — 2018 IEEE Symposium on Security and Privacy
ID
838312
Dates
20 May 2018 - 24 May 2018
Location
San Francisco, CA, United States
Abstract
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
86.
 
Crypto 2018
ID
866797
Dates
19 Aug 2018 - 23 Aug 2018
Location
Santa Barbara, United States
87.
 
SP — 2019 IEEE Symposium on Security and Privacy
ID
856727
Dates
19 May 2019 - 23 May 2019
Location
San Francisco, CA, United States
Abstract
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
88.
 
Crypto 2019
ID
866730
Dates
18 Aug 2019 - 22 Aug 2019
Location
Santa Barbara, United States
Future Armoured Vehicles Situational Awareness 2017

Good to know...

You can advertise your event or services in this space.

Last updated: 15 January 2017