Conferences and Meetings on Information Security and Information Privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.
 
SANS Threat Hunting and Incident Response Summit 2017
ID
846546
Dates
18 Apr 2017 - 25 Apr 2017
Location
New Orleans, United States
Abstract
Join SANS for the Threat Hunting & Incident Response Summit in New Orleans! This year's Summit features industry talks filled with the most advanced methodologies used by top cyber defense practitioners. Additionally, choose from seven courses taught by experienced instructors who are actively hunting for threats and stopping the most sophisticated, and dangerous attacks against organizations.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, network security, data breach, cyber-attacks, cyber threats, cyber threat intelligence, incident response, security operations, security ops, active defense, cyber deception, digital forensics, memory forensics, network forensics, malware, malware analysis
2.
 
SANS Baltimore Spring 2017
ID
878226
Dates
24 Apr 2017 - 29 Apr 2017
Location
Baltimore, United States
Abstract
SANS' instructors are innovative thought leaders and industry experts teaching constantly updated, practical cybersecurity techniques. Join us for SANS Baltimore Spring 2017, April 24-29, and learn how to out-think and out-maneuver cyber adversaries with cutting-edge cybersecurity tactics. Choose from nine courses in IT security, penetration testing, forensics, and security management. Register today.
Contact
Lacee Santos;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, intrusion detection, hacking, hacker tools, hacking techniques, incident handling, continuous monitoring, security operations, security ops, web apps, web app penetration testing, penetration testing, network penetration testing, pen testing, exploit writing, forensics, digital forensics, incident response, management, security leadership
3.
 
EuroS&P — 2nd IEEE European Symposium on Security and Privacy
ID
866566
Dates
26 Apr 2017 - 28 Apr 2017
Location
Paris, France
4.
 
ISDFS2017 — International Symposium on Digital Forensics and Security
ID
866554
Dates
26 Apr 2017 - 28 Apr 2017
Location
Mures, Romania
Related subject(s)
Event website
5.
 
IEEE S&B — IEEE Security and Privacy on the Blockchain
ID
866520
Start date
29 Apr 2017
Location
Paris, France
6.
 
WCS 2017 — The second international Workshop on Communication Security
ID
866585
Start date
30 Apr 2017
Location
Paris, France
7.
 
SEMS — Workshop on Security for Embedded and Mobile Systems
ID
866617
Start date
30 Apr 2017
Location
Paris, France
8.
 
Eurocrypt 2017
ID
866594
Dates
30 Apr 2017 - 04 May 2017
Location
Paris, France
9.
 
HOST'17 — IEEE International Symposium on Hardware-Oriented Security and Trust
ID
866626
Dates
01 May 2017 - 05 May 2017
Location
McLean, United States
Related subject(s)
10.
 
SANS Automotive Cybersecurity Summit 2017
ID
838950
Dates
01 May 2017 - 08 May 2017
Location
Detroit, United States
Abstract
The automotive industry is in an era of exciting change and innovation. Vehicles are more connected than ever and feature technologies that dramatically enhance user experience and safety. However, this unprecedented wave of automation presents new and unique cybersecurity challenges. Recent high-profile car hacking demonstrations highlight the fact that modern automobiles are inherently vulnerable and connected computing platforms, and as a result, automotive cybersecurity professionals are dealing with new and difficult challenges in an ever-evolving security landscape. SANS will hold its inaugural Automotive Cybersecurity Summit to address the specific issues and challenges around securing automotive organizations and their products. Join us for a comprehensive look at automotive assembly, industry suppliers, embedded systems, and safeguarding extended customer and product data. The Summit will include two-days of in-depth presentations from top security experts and seasoned practitioners, hands-on learning exercises, and exclusive networking opportunities.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, ICS, industrial control systems, SCADA, automotive cybersecurity
11.
 
RuhrSec
ID
868943
Dates
02 May 2017 - 05 May 2017
Location
Bochum, Germany
Abstract
RuhrSec is the non-profit security conference at the Ruhr University Bochum. As one of the organizers of the famous lecture called HackPra, we are hosting a high-quality and low-priced security conference in the heart of Bochum near the river Ruhr. We provide awesome academic and industry talks from smart international speakers, the typical Ruhr University feeling and the highly recommended HackPra social event.
Contact
Marcus Niemietz;     Phone: [+49 234 45930961];     Email: ruhrsec@hackmanit.de
Topics
Security, Attacks, Side-Channel, Ruhr-Universität Bochum, Security Community, non-profit, security conference, Pentest, OWASP, IT-Security
12.
 
SANS Security West 2017
ID
870123
Dates
09 May 2017 - 18 May 2017
Location
San Diego, United States
Abstract
Cybersecurity skills and knowledge are in high demand. Cyber attacks and data breaches are more frequent and sophisticated than ever, and organizations are grappling with how to best defend themselves. As a result, cybersecurity is more vital, crucial, and important to the growth of your organization than ever before. Now is the perfect time to take the next step to protect your organization and advance your career. Join us at Security West 2017 (May 9-18) in beautiful San Diego, CA to gain the skills and knowledge to help your organization succeed. You will learn cutting-edge content about the hottest information security topics across penetration testing, digital forensics and incident response (DFIR), security operations, audit, application security, and security management.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, PowerShell, continuous monitoring, security operations, SecOps, penetration testing, pen testing, web app penetration testing, network penetration testing, critical security controls, auditing, mobile device security, virtualization, cloud security, exploit writing, digital forensics, Windows forensics, threat hunting, Mac forensics, cyber threat intelligence, IT management, security leadership, strategic planning, DevOps
13.
 
Cyber Security North Africa Summit
ID
850525
Dates
15 May 2017 - 16 May 2017
Location
Cairo, Egypt
Contact
Sonika Mendjoge;     Email: sonika.mendjoge@fleming.events
Topics
cyber security, security management, cyber threats, cyber attacks, cyber security solutions, cyber security conference, social engineering, ransomware, cyber incident response, securing critical infrastructure, information security, cyber intellience, cyber security in Egypt
14.
 
Global Cybersecurity Innovation Summit
ID
884977
Dates
16 May 2017 - 17 May 2017
Location
London, United Kingdom
Abstract
SINET – London creates a forum to build and maintain international relationships required to foster vital information sharing, broad awareness and the adoption of innovative Cybersecurity technologies
Contact
theresa princi;     Email: tprinci@security-innovation.org
15.
 
SANS Northern Virginia - Reston 2017
ID
870122
Dates
21 May 2017 - 26 May 2017
Location
Reston, United States
Abstract
We are pleased to invite you to SANS Reston 2017, May 21-26. This event features comprehensive hands-on technical training from some of the best instructors in the industry and includes courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans now to attend SANS Reston 2017.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, Python, hacking, hacker tools, hacking techniques, exploits, incident handling, Windows, PowerShell, security operations, SecOps, Continuous Monitoring, web applications, web app penetration testing, pen testing, penetration testing, network penetration testing, digital forensics, strategic planning, IT management
16.
 
AFRICACRYPT 2017 — 9th International Conference on Cryptology and Information Security
ID
866570
Dates
24 May 2017 - 26 May 2017
Location
Dakar, Senegal
17.
 
WITS2017 — WITS Feeder Conference on Security and Risk in SMAC and Cyber-Physical Systems
ID
900751
Dates
25 May 2017 - 27 May 2017
Location
Pomona, California, United States
Abstract
This is a feeder workshop for the 2017 WITS conference in Seoul, South Korea. The purpose of the conference is to present and improve cutting edge work, as well as to lay the foundation for future work in SMAC (Social, Mobile, Analytics, Cloud) and Cyber-Physical Systems.
Contact
Drew Hwang;     Phone: [9095699367];     Email: dhwang@cpp.edu
Topics
Cyber-Physical Systems, Cybersecurity, SMAC Stacks, Social Computing, Mobile Computing, Analytics, Cloud Computing, Computer Security, Digital Transformation
18.
 
Security in Times of Surveillance
ID
866613
Start date
29 May 2017
Location
Eindhoven, Netherlands
19.
 
IFIP SEC 2017 — 32nd IFIP TC-11 International Information Security and Privacy Conference
ID
866601
Dates
29 May 2017 - 31 May 2017
Location
Rome, Italy
Event website
20.
 
CyCon — 2017 9th International Conference on Cyber Conflict
ID
853640
Dates
30 May 2017 - 02 Jun 2017
Location
Tallinn, Estonia
Abstract
International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation
Event website
21.
 
SANS Atlanta 2017
ID
870121
Dates
30 May 2017 - 04 Jun 2017
Location
Atlanta, United States
Abstract
We are pleased to invite you to attend SANS training in the capital of the State of Georgia! We are bringing our top courses and top instructors to Atlanta on May 30- June 4. With only one in 1,200 candidates qualifying globally to join our faculty, SANS instructors are the foremost experts and the best at ensuring you will not only learn the material, but that you can also apply it immediately when you return from your training. All of our courses at SANS Atlanta 2017 are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join nearly 73,000 GIAC credentialed Information Security professionals worldwide.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, hacking, hacker tools, hacking techniques, exploits, incident handling, continuous monitoring, security operations, cyber threat intelligence, CISSP, security leadership, IT management
22.
 
EuropeanSeC2017 — 2017 European Security Conference
ID
849900
Dates
05 Jun 2017 - 06 Jun 2017
Location
Lisbon, Portugal
Abstract
The 2017 European Security Conference is scheduled for June 5-6, 2017, in Lisbon, Portugal. The Conference is the European extension of the Annual Security Conference that has been held in Las Vegas (USA) for over a decade. The conference attracts a nice mix of participants from academia, government and industry. Organizers for the 2017 event is ISEG, University of Lisbon (Portugal). Administrative offices for the conference are at ISEG, University of Lisbon. Conference theme for 2017 is: Cybersecurity Analytics
Contact
Email: esc@iseg.ulisboa.pt
Topics
Cybersecurity, security, Information security
23.
 
CTCrypt 2017 — 6th Workshop on Current Trends in Cryptology
ID
866699
Dates
05 Jun 2017 - 07 Jun 2017
Location
Saint Petersburg, Russia
Event website
24.
 
Summer school on real-world crypto and privacy
ID
866676
Dates
05 Jun 2017 - 09 Jun 2017
Location
Sibenik, Croatia
25.
 
SANS Houston 2017
ID
870164
Dates
05 Jun 2017 - 10 Jun 2017
Location
Houston, United States
Abstract
Information security training in Houston from SANS Institute, the global leader in security training. At SANS Houston 2017, SANS offers hands-on, immersion-style security, security management, and pen testing training courses taught by real-world practitioners. The site of SANS Houston 2017, June 5-10, is Royal Sonesta Hotel Houston, located in the heart of the Galleria area of Uptown Houston. We have selected some of our top information security courses to provide you with the training and certification that you need to boost your career by learning from the best! SANS instructors are industry professionals who will ensure that you not only learn the material, but that you will also be able to apply what you learn your first day back in the office.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, cyber risk, risk management, intrusion detection, hacking, hacker tools, hacking techniques, ethical hacking, penetration testing, pen testing, network penetration testing, IT management, strategic planning
26.
 
SANS San Francisco Summer 2017
ID
901830
Dates
05 Jun 2017 - 10 Jun 2017
Location
San Francisco, United States
Abstract
Join us at SANS San Francisco Summer 2017 (June 5-10), and take a first-hand look at why SANS is the most trusted source for information security training, certification, and research. Learn the skills needed to protect your organization and advance your career! Discover the most effective steps to prevent cyber-attacks and detect adversaries with actionable techniques you can apply immediately when you return to work. Register today!
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, forensics, digital forensics, Windows forensics, cyber threat intelligence, IT management
27.
 
SANS Security Operations Center Summit & Training 2017
ID
846501
Dates
05 Jun 2017 - 12 Jun 2017
Location
Arlington, United States
Abstract
In light of numerous recent high-profile attacks and data breaches, Security Operations Centers are taking on a more prominent role in organizations as executives aim to improve their security programs. While a Security Operations Center (SOC) is capable of improving security, effectively implementing and managing the many functions of a SOC can be a major challenge. Information security managers must balance people, process, and procedure in order to operate a SOC that is effective and works within the constraints of the organization. The Security Operations Center Summit will bring together top experts for two days of in-depth talks and panel discussions around building, operating, and growing a SOC. Attendees will hear from and interact with top experts who have faced many of the same challenges SOCs encounter within their organizations.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, security operations, SecOps, intrusion detection, network forensics, digital forensics, security operations center
28.
 
SECITC 2017 — The 10th International Conference on IT and Communications Security
ID
866675
Dates
08 Jun 2017 - 09 Jun 2017
Location
Bucharest, Romania
Event website
29.
 
SANS Rocky Mountain 2017
ID
901831
Dates
12 Jun 2017 - 17 Jun 2017
Location
Denver, United States
Abstract
Take a first-hand look at why SANS is the most trusted source for information security training, certification, and research and join us in Denver for SANS Rocky Mountain 2017 (June 12-17). You'll learn the skills needed to protect your organization and advance your career!
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, continuous monitoring, security operations, security ops, web apps, web applications, web app penetration testing, penetration testing, pen testing, network penetration testing, digital forensics, incident response, cyber threat hunting, cyber threat intelligence, management, ICS, industrial control systems, ICS security
30.
 
SANS Charlotte 2017
ID
901895
Dates
12 Jun 2017 - 17 Jun 2017
Location
Charlotte, United States
Abstract
At SANS Charlotte 2017 (June 12-17), leading industry experts offer knowledge and tools to help you advance your IT security career. Arm yourself with the information you need to defend against cyber attackers. Hands-on exercises and labs enable you to practice and retain the course material, so you can apply what you learn the day you return to the office. Register now.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, network penetration testing, forensics, digital forensics, Windows forensics, ICS security, industrial control systems, SCADA
31.
 
Cyber Incident — 2017 International Conference On Cyber Incident Response, Coordination, Containment & Control
ID
856137
Dates
19 Jun 2017 - 20 Jun 2017
Location
London, United Kingdom
Abstract
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control. The aim of the Cyber Incident 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.
Event website
32.
 
Cyber Security — 2017 International Conference On Cyber Security And Protection Of Digital Services
ID
856091
Dates
19 Jun 2017 - 20 Jun 2017
Location
London, United Kingdom
Abstract
The International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2016), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.
33.
 
SANS Digital Forensics Summit & Training 2017
ID
872892
Dates
22 Jun 2017 - 29 Jun 2017
Location
Austin, United States
Abstract
DFIR Superheroes aren't born; they're made... and you've got what it takes. The SANS Annual DFIR Summit is the only event of its kind that gathers the most influential group of experts, the highest quality of training & the greatest opportunities to network with others in the field of Digital Forensics & Incident Response, all in one place! Every year, DFIR Professionals around the world attend the DFIR Summit with a common goal; to learn how to overcome the latest obstacles and share with others what has proven to be effective in their day-to-day investigations. No matter if you just started your career or if you are a seasoned forensicator, the Summit will give you the investigative skills you know you need and the ones you never knew you needed. Don't miss the opportunity to attend the most comprehensive DFIR event of the year! Learn how to defeat your enemy and become a DFIR Superhero in 8 days!
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, forensics, digital forensics, network forensics, Windows forensics, security operations, SecOps, incident response, threat hunting, Mac forensics, memory forensics, cyber threat intelligence, smartphone forensics, malware, reverse-engineering malware
34.
 
CSCloud — 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing
ID
853669
Dates
26 Jun 2017 - 28 Jun 2017
Location
New York, NY, United States
Abstract
The increasing usages of Web-based technologies have enabled numerous benefits in people’s daily life, from mobile social applications to heterogeneous high performance computing. The implementations of the Internet-related solutions are considered one of the important approaches for enterprises to grow their businesses. However, novel mechanisms using networking techniques also introduce new threats harming users’ privacy information and operations. Two critical aspects in Web security are cyber security and cloud computing. IEEE CSCloud 2017 focuses on these two aspects and aims to gather recent achievements in cyber security and cloud computing fields. The conference invites those papers that concentrate on new paradigms, algorithms, and applications in cyber security or cloud computing. We also encourage researchers and practitioners to build up the connections between academia and industry.
35.
 
SANS Columbia, MD 2017
ID
901872
Dates
26 Jun 2017 - 01 Jul 2017
Location
Columbia, United States
Abstract
Cyber attackers are targeting you. Do you have the skills needed to defeat them? At SANS Columbia, MD 2017 (June 26-July 1), you will learn the tools and techniques required to protect your organization. Don't miss this opportunity to learn from the best instructors in the industry. Register now and get practical training you can put to work immediately.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, intrusion detection, hacker tools, hacking, hacking techniques, exploits, incident handling, penetration testing, cyber threat intelligence, active defense, industrial control systems, ICS security, incident response
36.
 
MILSATCOM — 2nd MilSatCom USA 2017
ID
875703
Dates
28 Jun 2017 - 29 Jun 2017
Location
Arlington, Virginia, United States
Abstract
The event will explore key topics such as the USA's acquisition process, alongside contemporary and crucial issues such as the Wideband AoA and utilisation of ComSatCom, as well as assessment of threats facing the space domain such as space congestion and debris, EW, jamming, anti-satellite capabilities and cyber.
Contact
Honey de Gracia;     Phone: [+442078276102];     Email: hdegracia@smi-online.co.uk
Topics
MilSatCom USA, Global MilSatCom, Satellite, MilSatCom, Wideband AoA, Satellite Resilience, High Throughput Satellites, Capability, WGS, SatCom Arlington, Space and Cyberspace, Space Threats, Military Communication, Army Communications, Defence Events, Tactical Operations, C4iSR, C4i
37.
 
ACISP2017 — 22nd Australasian Conference on Information Security and Privacy 2017
ID
866630
Dates
03 Jul 2017 - 05 Jul 2017
Location
Auckland, New Zealand
38.
 
ACNS'17 — 15th International Conference on Applied Cryptography and Network Security
ID
866706
Dates
10 Jul 2017 - 12 Jul 2017
Location
Kanazawa, Japan
39.
 
SANS Los Angeles - Long Beach 2017
ID
901958
Dates
10 Jul 2017 - 15 Jul 2017
Location
Long Beach, United States
Abstract
Effective, actionable cybersecurity techniques are crucial to combat today's cyber threats. At SANS Los Angeles - Long Beach 2017 (July 10-15), get hands-on, cutting edge training from the best cybersecurity teachers in the country. At SANS events, you get the kind of immersion-style training that you can put to work immediately, and our top-rated instructors are dedicated to helping you meet your goals. Don't miss this opportunity to strengthen your information security skillset with hands-on training.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, security operations, SecOps, incident response, hacking, hacker tools, hacking techniques, exploits, incident handling, digital forensics, threat hunting, leadership, management, IT management
40.
 
ICCCF — 2017 5th International Conference on Cybercrime and Computer Forensic
ID
843519
Dates
16 Jul 2017 - 18 Jul 2017
Location
Gold Coast, Australia
Abstract
This is a well established international conference for technologists and social scientists to gather and shares their forefront research outcome, to disseminate their research experience, to make the society for better place for humanity.
41.
 
i-Society — 2017 International Conference on Information Society
ID
874562
Dates
17 Jul 2017 - 19 Jul 2017
Location
Dublin, Ireland
Abstract
The i-Society is a global knowledge-enriched collaborative effort that has its roots from both academia and industry.
Event website
42.
 
SANSFIRE 2017
ID
901860
Dates
22 Jul 2017 - 29 Jul 2017
Location
Washington DC, United States
Abstract
Information security training in Washington, DC from SANS Institute, the global leader in information security training. At SANSFIRE 2017, SANS offers more than 45 hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANSFIRE 2017 (July 22-29) is Washington Marriott Wardman Park. Many of our courses, which cover all disciplines, are associated with a GIAC Certification and OnDemand Bundles. Nothing beats the SANS live training experience but if you are unable to attend learn how you can attend remotely. Register today.
Contact
Lacee Santos;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber attacks, virtualization, automating infosec, Python, forensics, digital forensics, network forensics, security operations, SecOps, mobile apps, mobile app security, DevOps, Critical Security Controls, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, PowerShell, Linux security, Windows security, Unix security, continuous monitoring, cloud security, penetration testing, web apps, web app penetration testing, network penetration testing, IPv6, active defense, cyber deception, auditing, social engineering, mobile device security, Metasploit, exploit writing, Windows forensics, incident response, threat hunting, memory forensics, cyber threat intelligence, smartphone forensics, malware, reverse-engineering malware, IT management, cybersecurity risk management, security awareness, IT project management, web application security, coding, Java, JEE, infosec law, industrial control systems, ICS security, SCADA, SCADA security
43.
 
SECRYPT 2017 — 14th International Conference on Security and Cryptography
ID
866727
Dates
26 Jul 2017 - 28 Jul 2017
Location
Madrid, Spain
44.
 
WCSF 2017 — 3rd IEEE International Workshop on Cloud Security and Forensics
ID
884882
Dates
01 Aug 2017 - 04 Aug 2017
Location
Sydney, Australia
Abstract
The 3rd IEEE International Workshop on Cloud Security and Forensics is held as part of the the 16th IEEE International Conference on Trust, Security And Privacy In Computing And Communications (TrustCom2017). Cloud computing offers utility oriented Information and Communications Technology (ICT) services to corporate and consumer-level users all over the world. The evolution of cloud computing is driving the design of datacenters by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cyber security and digital forensic practitioners.
Topics
Digital Forensics, Computer Security, Cloud Computing
45.
 
UBICNET 2017 — EAI International Conference on Ubiquitous Communications and Network Computing
ID
845428
Dates
03 Aug 2017 - 05 Aug 2017
Location
Bangalore, India
Abstract
Ubiquitous Communications and Network Computing (UBICNET) are revolutionary concept that aim to provide pervasive and reliable communication and computing services available anytime and anywhere. UBICNET has drawn significant interests from both academia and industry and continues to attract tremendous research efforts due to its promising new business opportunity in information technology and engineering. Ubiquitous communication and computing is the growing trend and became one of the requirements for most of the people around the globe. While ubiquitous communication ensures communication anywhere with anyone, ubiquitous computing devices are completely connected and constantly available. Ubiquitous network computing relies on the convergence of wireless technologies, advanced electronics and Internet and what we can call it as Internet of Things (IoT). This emerging technology is built upon a wide range of key areas including wireless and sensor networks, mobile and distributed computing, embedded systems, IoT, agent technologies, autonomic communication, and information security.
Contact
European Alliance for Innovation;     Email: lenka.oravska@eai.eu
Topics
Topics: Advanced Communications Next Generation Networks Wireless Access Technologies Networked Sensing, and Applications Heterogeneous Networks Cognitive radio Software Defined Networks Virtualization Soft Computing Sensor Networks Mobile Systems and Applications Mobile Data Management and Analytics Mobile Multimedia Mobile User Interfaces and Interaction Technologies Energy Aware Mobile Computing Mobile Cloud Computing Smart and Intelligent Devices Networks Computing Distributed Computing Localization and Tracking Internet of Things – Systems, Data Analytics, and Applications Crowdsourcing – Platforms and Applications Wearable Computing Body Area Networks Security and Privacy
46.
 
DSC — 2017 IEEE Conference on Dependable and Secure Computing
ID
837776
Dates
07 Aug 2017 - 10 Aug 2017
Location
Taipei, Taiwan
Abstract
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems.
Related subject(s)
47.
 
ISSA — 2017 Information Security for South Africa
ID
895283
Dates
16 Aug 2017 - 17 Aug 2017
Location
Johannesburg, South Africa
Abstract
The conference focuses on all aspects of information security and invites participation across the Information Security spectrum including but not being limited to functional, business, managerial, theoretical and technological issues.
48.
 
Crypto — Crypto 2017
ID
866660
Dates
20 Aug 2017 - 24 Aug 2017
Location
Santa Barbara, United States
49.
 
CSF — 2017 IEEE 30th Computer Security Foundations Symposium
ID
849135
Dates
21 Aug 2017 - 25 Aug 2017
Location
Santa Barbara, CA, United States
Abstract
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security.
50.
 
TrustBus 2017 — 14th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS
ID
883216
Dates
28 Aug 2017 - 31 Aug 2017
Location
Lyon, France
Abstract
TrustBus’17 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to security, trust and privacy.
Topics
security, privacy, trust, anonymity, business, digital, cryptography
51.
 
S-CI 2017 — International Workshop on Securing Critical Infrastructures to be held in conjunction with the ARES EU Projects Symposium 2017, held at ARES 2017
ID
883092
Start date
29 Aug 2017
Location
Reggio Calabria, Italy
Abstract
Critical Infrastructures (Communication, Transportation, Banking, e-Commerce, Utilities etc) increasingly and inextricably depend on IT-technologies to provide for both functionality and efficiency. However, the cost of the IT-reliance is the consequent exposure of the Critical Infrastructure (CI) to IT-based security vulnerabilities. The state of the practice often has different CI’s developing customized security solutions to meet their specific needs. While this is judicious, the CI’s can benefit from sharing approaches to intrusion detection, threat classification, diagnostics, mitigation schema, security architectures and many others. The workshop aims to bring together viewpoints from diverse CI’s to explore the commonalities of security problems and solutions for advancing the collective science and practice of CI security protection.
Contact
Apostolos Fournaris;     Email: apofour@ece.upatras.gr
Topics
Security requirements, Threat models for critical infrastructures and communication networks, Threat detection, classification and profiling, Incident management, Security architectures and frameworks for critical infrastructures, Risk assessment – co-mingling of safety and security, Security validation, Experience reports and best practices from different infrastructure domains, Data sharing
52.
 
ARES 2017 — The 12th International Conference on Availability, Reliability and Security
ID
876029
Dates
29 Aug 2017 - 01 Sep 2017
Location
Reggio Calabria, Austria
Abstract
The 12th International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
Contact
Bettina Bauer;     Email: bbauer@sba-research.org
Topics
Authorization, Authentication, and Access Control Availability, Dependability, and Resilience Botnets and Botnet Monitoring Business Continuity & Resilience Cost/Benefit Analysis Cryptography Dependability Aspects for Special Applications Dependability Aspects of e-Government Dependability and Resilience in Open Source Software Designing Security Requirements Digital Forensics E-Commerce Dependability Identity Management IPR of Security Technology Incident Response and Prevention Information Flow Control Information Hiding and Steganograhpy Interoperability Aspects Intrusion Detection and Fraud Detection Legal Issues related to Security and Privacy Mobile Security Network and Organizational Vulnerability Analysis Network Security Privacy-Enhancing Technologies Process based Security Models and Methods Resilience and Security for Critical Infrastructures Resilience of Computing Systems Resilience, Security, and Privacy for Smart Grids Resilience, Security, and Privacy for the Internet of Things RFID Security and Privacy Risk planning, Analysis & Awareness Safety Critical Systems Secure Enterprise Architectures Security and Privacy for Ubiquitous Systems Security and Privacy in E-Health Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications Security and Usability Security as Quality of Service Security in Distributed Systems / Distributed Databases Security in Electronic Payments Security in Electronic Voting Software Engineering of Dependable Systems Software Security Threats and Attack Modelling Trusted Computing Tools for Dependable System Design and Evaluation Trust Models and Trust Management Wireless Security
53.
 
IWSEC 2017 — The 12th International Workshop on Security
ID
854667
Dates
30 Aug 2017 - 01 Sep 2017
Location
Hiroshima, Japan
Abstract
IWSEC (International Workshop on Security) is organized by ISEC (Information Security) and CSEC (Computer Security Group). ISEC is a technical group on information security of IEICE (The Institute of Electronics, Information and Communication Engineers) and CSEC is SIG (Special Interest Groups) of IPSJ (Information Processing Society of Japan).
Contact
Email: iwsec2017-inquiry@klab.is.sci.toho-u.ac.jp
Topics
Big Data Analysis for Security, Critical Infrastructure Security, Cryptanalysis, Cryptographic Protocols, Cybersecurity Economics, Digital Forensics, Enriched Cryptography, Financial Security, Formal Methods, Information Law and Ethics, IoT security, Machine Learning for Security, Malware Countermeasures, Measurements for Cybersecurity, Multiparty Computation, Post Quantum Cryptography, Privacy Preserving, Rational Cryptography, Real World Cryptography, Security Management, Visualization for Security
54.
 
EST — 2017 Seventh International Conference on Emerging Security Technologies
ID
895214
Dates
06 Sep 2017 - 08 Sep 2017
Location
Canterbury, United Kingdom
Abstract
The conference invites security-oriented contributions in information technologies, robotics, cognitive systems, biotechnologies, and nanotechnologies. Novel concepts related to hardware and software implementations are equally welcomed. Previous editions included papers in biometrics and forensics, personal mobile/ wireless security, robotic and unmanned vehicle system security, perimeter, border, and homeland security, Internet and cyber-security (i.e., detection and prevention of cyber-crimes and identity theft), security of critical infrastructure systems (e.g., financial, public utilities, transportation, etc.), emergency response systems (e.g., combining space-based systems with geographical information systems), and hybrid security systems. Papers on the security of emerging fields like the internet of things, pervasive computing and body wearable health devices can also be submitted.
55.
 
EDCN — ESORICS Doctoral Consortium 2017 – COINS Nordic Ph.D. Workshop
ID
902474
Dates
14 Sep 2017 - 15 Sep 2017
Location
Oslo, Norway
Abstract
The doctoral consortium will be held in Oslo, Norway, in conjunction with the European Symposium on Research in Computer Security (ESORICS) in September 2017, and is sponsored by the Norwegian COINS Research School of Computer and Information Security. The Doctoral consortium intends to bring together early stage researchers within the field of information security, providing them the opportunity to communicate and explore their research fields under the guidance of distinguished researchers.
Topics
Access control, Applied cryptography, Authentication, Biometrics, Critical infrastructure resilience, Cyber security, Data integrity, Defense in depth, Digital forensics, Distributed systems security, Hardware Security, Information security management, Intrusion detection and visualization, Malware, Network security, Privacy and Anonymity, Real time monitoring and supervision, Risk analysis and management, Secure Firmware, Security architectures, Security models and metrics, Security policies, Secure communication protocols, Threat modeling, Trust management, Vulnerability assessment and metrics, Wireless security
56.
 
RCD 2017 — 4th Romanian Cryptology Days Conference
ID
866670
Dates
18 Sep 2017 - 20 Sep 2017
Location
Bucharest, Romania
57.
 
QCrypt'17 — 7th international conference on quantum cryptography
ID
866768
Dates
18 Sep 2017 - 22 Sep 2017
Location
Cambridge, United Kingdom
Event website
58.
 
SecDev — 2017 IEEE Cybersecurity Development
ID
872568
Dates
24 Sep 2017 - 26 Sep 2017
Location
Cambridge, MA, United States
Abstract
EEE Cybersecurity Development (SecDev) is a new venue for presenting ideas, research, and experience about how to develop secure systems. SecDev is distinguished by its focus on how to “build security in” (and not simply discover the absence of security). Its goal is to encourage and disseminate ideas for secure system development among both academia and industry. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. We anticipate that attendees from academic conferences like IEEE S&P, USENIX Security, PLDI, FSE, ISSTA, SOUPS, and many others could contribute ideas to SecDev, as could attendees of industrial conferences like AppSec, RSA, Black Hat, and Shmoocon.
Event website
59.
 
CHES 2017 — Cryptographic Hardware and Embedded Systems 2017
ID
866767
Dates
25 Sep 2017 - 28 Sep 2017
Location
Taipei, Taiwan
60.
 
CNS — 2017 IEEE Conference on Communications and Network Security
ID
843350
Dates
09 Oct 2017 - 11 Oct 2017
Location
Las Vegas, NV, United States
Abstract
IEEE Conference on Communications and Network Security (CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security.
61.
 
Cyber Security Chicago
ID
875028
Dates
18 Oct 2017 - 19 Oct 2017
Location
McCormick Place, Chicago, United States
Abstract
Cyber Security Chicago offers invaluable security insight for both IT managers & security specialists. Hear from cyber securities finest on how you can build stronger defenses against cyber-attacks & how to recover if your systems are breached. Cyber Security Chicago allows you access to a wealth of insight and solutions to help you protect your employees, organization and country from criminal gangs and cyber terrorism. Learn from industry experts at thought-provoking seminars and discover solutions on all facets of cyber security and risk mitigation, from perimeter firewalls to the latest threat intelligence solutions. Attendees will have the unique opportunity to network with IT security visionaries and practitioners that are changing the face of cybersecurity. Don’t miss your chance to attend this industry leading event series.
Topics
Cyber Security Chicago, Cyber-attacks, Cyber criminals, Cyber terrorism, Cyber terrorist
62.
 
ProvSec 2017 — The 11th International Conference on Provable Security
ID
866766
Dates
23 Oct 2017 - 25 Oct 2017
Location
Xi'an, China
63.
 
ASID — 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification
ID
896619
Dates
23 Oct 2017 - 25 Oct 2017
Location
Xiamen, China
Topics
* Wearable Electronics and Health & Leisure * Micro/Nano-sensor and BioMEMS * IC Design and System Integration * Multi-core Processor and Reconfigurable Computing * Cloud Computing & Internet of Things (IoT) * Cryptographic Algorithm and Security Management * Next Generation Networking and IPv6 * Wireless Communication and Networking Engineering * Cognitive Radio and Software Defined Radio * EMC Theory and RFID Techniques * Pattern Recognition and Applications
64.
 
DASC 2017 — The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
ID
853050
Dates
06 Nov 2017 - 10 Nov 2017
Location
Orlando, Florida, United States
Abstract
IEEE DASC 2017 will be held in November 6-10, 2017 in Orlando, Florida, USA, co-located with CyberSciTech 2017, IEEE DataCom 2017 and IEEE PiCom 2017 (the event location is very close to the Walt Disney World, which is in walking distance). IEEE DASC 2017 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems.
Topics
Autonomic Computing Theory, Models, Architectures and Communications, Cloud Computing and Fog/edge Computing with Autonomic and Trusted Environment, Dependable Automatic Control Techniques and Systems, Dependability Models and Evaluation Algorithms, Dependable Sensors, Devices, Embedded Systems, Dependable Electronic-Mechanical Systems, Optic-Electronic Systems, Self-improvement in Dependable Systems, Self-healing, Self-protection and Fault-tolerant Systems, Hardware and Software Reliability, Verification and Testing, Software Engineering for Dependable Systems, Safety-critical Systems in Transportation and Power System, Security Models and Quantifications, Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS, Self-protection and Intrusion-detection in Security, DRM, Watermarking Technology, IP Protection, Context-aware Access Control, Virus Detections and Anti-Virus Techniques/Software, Cyber Attack, Crime and Cyber War, Human Interaction with Trusted and Autonomic Computing Systems, Security, Dependability and Autonomic Issues in Ubiquitous Computing, Security, Dependability and Autonomic Issues in Cyber-Physical System, Security, Dependability and Autonomic Issues in Big Data, SDN, and IoT Systems, QoS in Communications and Services, Information and System Security, Reliable Computing and Trusted Computing, Wireless Emergency and Security Systems, Information Technology in Biomedicine, Multimedia Security Issues over Mobile and Wireless Networks, Multimedia in Mobile Computing: Issues, System Design and Performance Evaluation, Software Architectures and Design for Emerging Systems, Software Engineering for Emerging Networks, Systems, and Mobile Systems
65.
 
Cyber Security (SCSC — Cyber Security Conclave - India's two-day Cyber Security Event
ID
872930
Dates
22 Nov 2017 - 23 Nov 2017
Location
Hyderabad, India
Contact
Srinivas Rao;     Phone: [+91 40 2311 9888 \ 6522 1616];     Email: srao@kenes-exhibitions.com
Topics
Protection, Business protection, internal and external Cyber Threats, Mitigation risk, people and financial performance, Understanding the holistic nature of Cyber Security, cyber security, cyber and the political context, Sharing situational awareness of the Threats, cyber threads, Gain knowledge of legislation, compliance requirements, consequences of breaches, Knowing best practice strategy and policies, understanding Cyber Security roles and responsibilities throughout the organization, Cyber Security optimization
Related subject(s)
66.
 
ISPEC 2017 — 13th International Conference on Information Security Practice and Experience
ID
866754
Dates
29 Nov 2017 - 01 Dec 2017
Location
Melbourne, Austria
Abstract
The 13th International Conference on Information Security Practice and Experience (ISPEC 2017) will be held in Melbourne on 29 Nov - 01 Dec 2017, organised by Deakin University and Monash University. The ISPEC conference is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
67.
 
ICAC3 — 2017 International Conference on Advances in Computing, Communication and Control
ID
856253
Dates
01 Dec 2017 - 02 Dec 2017
Location
Mumbai, India
Abstract
Network Security:• Mobile Network Security • Security in CDN (Contents Distribution Networks) • Virtual Private Network (VPN) • Security in Grid • Transport-Level Security • Wireless Network Security • IP Security • Electronic Mail security • Security Protocols • Cryptographic Technologies • Block and Stream Ciphers • Public Key Cryptology • Message Authentication and Hash Functions • Digital Signature Schemes • Secret Sharing • Cryptanalysis • Novel Biometric Methods • Bio inspired Security methods • Digital Forensic • Biometrics for Security • Feature Extraction and pattern Matching Algorithms • Embedded Systems Security • Side Channel Attacks • Fault Attacks • Hardware Tamper Resistance • Secure Storage Devices • Firewall Systems • Hacking Techniques and Related Issues • Intrusion Detection System (IDS) • Honey-pot • Self replicating algorithms • Malware Analysis • Intrusion Detection • Denial of service issues • Trust networks on semantic web • Self recovery algorithms
68.
 
ICITST-2017 — The 12th International Conference for Internet Technology and Secured Transactions
ID
879048
Dates
11 Dec 2017 - 14 Dec 2017
Location
Cambridge, United Kingdom
Contact
Holly Green;     Phone: [01268 523262];     Email: info@icitst.org
Topics
Curriculum, Research and Development, Educational Foundations, Learning, Teaching Methodologies, Assessment, Pedagogy
Related subject(s)
Event website
69.
 
World Congress on Internet Security - Technical Co-Sponsored by IEEE UK/RI Computer Chapter
ID
898511
Dates
11 Dec 2017 - 14 Dec 2017
Location
Cambridge, United Kingdom
Abstract
The WorldCIS-2017 is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and to fostering discussions on information technologies, information systems and global security applications. The WorldCIS-2017 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation.

SUBMISSION INSTRUCTIONS:

* You can submit your research paper at http://www.worldcis.org/paper-submission/ or email your paper to papers@worldcis.org

* You can submit your extended abstract via email extendedabstract@worldcis.org

* You can submit your poster via email posters@Worldcis.org

* You can submit your workshop or special track via email workshop@worldcis.org or specialtrack@worldcis.org

IMPORTANT DATES:

*Extended Abstract (Work in Progress) Submission Date: May 1, 2017

*Notification of Extended Abstract Acceptance/Rejection: May 15, 2017

*Full Paper Submission Date: May 25, 2017

*Notification of Paper Acceptance/Rejection: June 15, 2017

*Camera Ready Paper Due: September 15, 2017

*Workshops and Tutorials Submission Date: May 15, 2017

*Notification of Workshop and Tutorial Acceptance: June 01, 2017

*Special Track Submission Date: May 15, 2017

*Notification of Special Track Acceptance: June 01, 2017

*Poster/Demo Submission Date: May 25, 2017

*Notification of Poster/Demo Acceptance: May 25, 2017

*Notification of Industrial Presentation Acceptance: June 15, 2017

*Early Registration Deadline: August 15, 2017

*Late Registration Deadline (Authors only): October 15, 2017

*Late Registration Deadline (Participants only): November 01, 2017

*Conference Dates: December 11 - 14, 2017

For further details, please visit conference website http://www.worldcis.org

Contact
Holly Green;     Phone: [01268 523262];     Email: info@worldcis.org
Topics
Internet Security Security, Privacy, Trust and Data Security, Web services and performance, Biometrics, Secured Database Systems, Data management for U-commerce, Virtual Reality, Education
Event website
70.
 
SPAC — 2017 International Conference on Security, Pattern Analysis, and Cybernetics
ID
895956
Dates
15 Dec 2017 - 17 Dec 2017
Location
Shenzhen, China
Abstract
The 2017 International Conference on Security, Pattern Analysis, and Cybernetics provides an international forum that brings together those actively involved in information science and engineering, security, cybernetics, and pattern analysis, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of security, pattern analysis and cybernetics.
71.
 
ICDIS — 2018 1st International Conference on Data Intelligence and Security
ID
895779
Dates
08 Apr 2018 - 10 Apr 2018
Location
South Padre Island, TX, United States
Abstract
ICDIS 2018 will be an academic research conference on the advances in all fields related to big data, data intelligence and cybersecurity. Topics of interest include but are not limited to: big data analytics, predicate analytics, data mining, computational statistics, data driven intelligence, cyber security.
Event website
72.
 
SP — 2018 IEEE Symposium on Security and Privacy
ID
838356
Dates
20 May 2018 - 24 May 2018
Location
San Francisco, CA, United States
Abstract
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
73.
 
Crypto 2018
ID
866786
Dates
19 Aug 2018 - 23 Aug 2018
Location
Santa Barbara, United States
74.
 
SecDev — 2018 IEEE Cybersecurity Development
ID
872148
Dates
23 Sep 2018 - 25 Sep 2018
Location
Cambridge, MA, United States
Abstract
IEEE Cybersecurity Development (SecDev) is a new venue for presenting ideas, research, and experience about how to develop secure systems. SecDev is distinguished by its focus on how to "build security in" (and not simply discover the absence of security). Its goal is to encourage and disseminate ideas for secure system development among both academia and industry. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. We anticipate that attendees from academic conferences like IEEE S&P, USENIX Security, PLDI, FSE, ISSTA, SOUPS, and many others could contribute ideas to SecDev, as could attendees of industrial conferences like AppSec, RSA, Black Hat, and Shmoocon.
Event website
75.
 
SP — 2019 IEEE Symposium on Security and Privacy
ID
856716
Dates
19 May 2019 - 23 May 2019
Location
San Francisco, CA, United States
Abstract
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
76.
 
Crypto 2019
ID
866829
Dates
18 Aug 2019 - 22 Aug 2019
Location
Santa Barbara, United States

Good to know...

You can advertise your event or services in this space.

Last updated: 24 April 2017