Conferences and Meetings on Information Security and Information Privacy

Conference-Service.com offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

ALL COUNTRIES

1.
 
ACM CPSS'16 — 2nd ACM Cyber-Physical System Security Workshop (with ACM AsiaCCS'16)
ID
779379
Start date
30 May 2016
Location
Xi'an, China
2.
 
IoTPTS 2016 — 2nd ACM International Workshop on IoT Privacy, Trust, and Security
ID
779323
Start date
30 May 2016
Location
Xi'an, China
3.
 
IoTPTS 2016 — 2nd ACM International Workshop on IoT Privacy, Trust, and Security
ID
759231
Start date
30 May 2016
Location
Xian, United States
Abstract
IoTPTS 2016 is held in conjunction with ASIACCS'16. The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning.
Contact
Richard Chow;     Phone: [4086537467];     Email: richard.chow@intel.com
Topics
Privacy and IoT data, Privacy attacks for IoT, Trust management and device discoverability for IoT, Usability of privacy and security systems in IoT, User risk perceptions and modeling for IoT, Policy Management and enforcement for IoT, Authentication and access control for users for IoT, Cryptography for IoT, Attack detection and remediation for IoT, Security architectures for IoT systems and applications
4.
 
IFIP SEC — International Conference on ICT Systems Security and Privacy Protection
ID
759169
Dates
30 May 2016 - 01 Jun 2016
Location
Ghent, Belgium
5.
 
IFIP SEC 2016 — 31st International Conference on ICT Systems Security and Privacy Protection
ID
781537
Dates
30 May 2016 - 01 Jun 2016
Location
Ghent, Belgium
Event website
6.
 
Cryptology2016 — International Cryptology and Information Security Conference
ID
759274
Dates
31 May 2016 - 02 Jun 2016
Location
State of Sabah, Malaysia
Abstract
The International Cryptology and Information Security Conference is an open forum, provided for contributions which cover research on the theoretical foundations, applications and any related issues in cryptology, information security and other underlying technologies.   This conference seeks submissions from the academia and industry presenting research on theoretical and practical aspects of cryptology. We also encourage submissions from other communities such as public agencies, defense and business sectors that represent these communities perspectives on issues related to security.
Topics
Cryptography And Security           - Information Security Education           - Key Management Protocols           - Information Security Management             - Block/Stream Ciphers           - Information Technology Mis-Use and the Law             - Watermarking and Fingerprinting           - Information hiding and watermarking             - Quantum Cryptography           - Malware threat and detection             - Hash Functions           - Mobile and wireless security             - Number Theory           - Access control and authentication             - Electronic Commerce and Payment           - Cloud and big data security             - Elliptic Curve Cryptography           - Critical Infrastructure Protection             - Secret Key Cryptography           - Data and Applications Security             - Public Key Cryptography
7.
 
ASIACCS 2016 — The 11th ACM Asia Conference on Computer and Communications Security
ID
779408
Dates
31 May 2016 - 03 Jun 2016
Location
Xi'an, China
8.
 
eCrime — Symposium on Electronic Crime Research
ID
759409
Dates
01 Jun 2016 - 03 Jun 2016
Location
Toronto, Canada
Abstract
eCrime consists of 3 days of keynote presentations, technical and practical sessions, and interactive panels. This will allow for the academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it.
Related subject(s)
9.
 
CTI — 2016 International Conference on Cyber Threat Intelligence
ID
768585
Dates
01 Jun 2016 - 03 Jun 2016
Location
Manchester, United Kingdom
Abstract
Cyber Threat Intelligence, Information security, Digital Forensic
10.
 
CCCC16 — Copenhagen Cybercrime Conference 2016
ID
802809
Start date
09 Jun 2016
Location
Copenhagen, Denmark
Abstract
The Copenhagen Cybercrime Conference is one of the premier cybersecurity events in the Nordic region. As the cyber security field continues to grow in importance and influence, CCCC plays an integral role in keeping security professionals in northern Europe connected and educated.
Contact
Maria Holla;     Email: mah@csis.dk
Topics
Cybercrime CSIS Kaspersky NASA CERN Trendmicro
Related subject(s)
Event website
11.
 
SECITC 2016 — 9th Int. Conference on Security for Information Technology & Communications
ID
779371
Dates
09 Jun 2016 - 10 Jun 2016
Location
Bucharest, Romania
Event website
12.
 
SANSFIRE 2016
ID
784763
Dates
11 Jun 2016 - 18 Jun 2016
Location
Washington DC, United States
Abstract
For more than 10 years, the Internet Storm Center has been providing free analysis and warning to our community. SANSFIRE 2016 is our annual
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, data breach, data breach prevention, data breach protection, cyber attacks, data breach detection, penetration testing, hacking, cyber threats, cyber threat intelligence, cyber defense, ICS, industrial control systems, incident response, health care cybersecurity, intrusion detection, hacker tools, hacking techniques, exploits, incident handling, security operations, cyber deception, auditing, infrastructure, mobile devices, mobile device security, virtualization, cloud computing, cloud security, exploit writing, coding, secure coding, forensics, Windows forensics, digital forensics, computer forensics, Mac forensics, network forensics, malware, management, data security, SCADA, continuous monitoring
13.
 
Weiterbildung — Kundendatenschutz
ID
754687
Dates
13 Jun 2016 - 14 Jun 2016
Location
Offenbach, Germany
Abstract
Zweitägiger Praxislehrgang zur rechtskonformen Verarbeitung personenbezogener Kundendaten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
14.
 
Weiterbildung — Verfahrensbeschreibungen und Vorabkontrolle im Datenschutz
ID
756477
Start date
16 Jun 2016
Location
Offenbach, Germany
Abstract
Gesetzliche Forderungen in der betrieblichen Praxis umsetzen
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
15.
 
EuropeanSeC2016 — 2016 European Security Conference
ID
784899
Dates
16 Jun 2016 - 17 Jun 2016
Location
Lisbon, Portugal
Abstract
The 2016 European Security Conference is scheduled for June 16-17, 2016, in Lisbon, Portugal. The Conference is the European extension of the Annual Security Conference that has been held in Las Vegas (USA) for over a decade. The conference attracts a nice mix of participants from academia, government and industry. Organizers for the 2016 event is ISEG, University of Lisbon (Portugal). Administrative offices for the conference are at ISEG, University of Lisbon.
Contact
Sergio Nunes;     Email: esc@iseg.ulisboa.pt
Topics
information security, privacy, security, cybersecurity
16.
 
ACNS — International Conference on Applied Cryptography and Network Security
ID
759857
Dates
19 Jun 2016 - 22 Jun 2016
Location
Guildford, United Kingdom
Abstract
ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. Both academic research works with high relevance to real-world problems as well as developments in industrial and technical frontiers fall within the scope of the conference.
17.
 
DSCI — 8th Best Practices Meet 2016
ID
810963
Dates
22 Jun 2016 - 23 Jun 2016
Location
Bengaluru, India
Abstract
Security Data Science is now becoming a founding block of most of the contemporary security solutions. Different use cases of security data science have been developed into solutions and many more are being discovered. DSCI Best Practices Meet (BPM) focuses on the contemporary evolution of security by organising its content and deliberations under a dominant theme. This year’s version will focus on ‘Security Data Science’. Apart from delving into fundamentals, it would extensively deliberate on different use cases of security data science that are shaping the security technology market. The Meet will also provide an opportunity to undertake review of policy development, deliberations on global issues related to security and privacy, and check the progress of cyber security industry development efforts.
Contact
Udita Singh;     Email: udita.singh@dsci.in
Topics
data science, information security, cyber security, data science, data security council of india, infosec, conference india, bengaluru, startup events india
Related subject(s)
18.
 
SANS Digital Forensics & Incident Response Summit 2016
ID
764553
Dates
23 Jun 2016 - 30 Jun 2016
Location
Austin, United States
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, cyber threat intelligence, forensics, digital forensics, Windows forensics, incident response, Mac forensics, memory forensics, network forensics, smartphone forensics, malware, malware analysis
19.
 
SANS ICS Security Summit & Training - Houston 2016
ID
770637
Dates
25 Jun 2016 - 30 Jun 2016
Location
Houston, United States
Abstract
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses. In conjunction with the ICS - Houston training event, SANS is pleased to offer the 4th Annual Industrial Control Systems Security Briefing. This event provides the opportunity to engage in dialog around Industrial Controls Systems Security and learn about key solution capabilities.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, active defense, ICS, industrial control systems, ICS cybersecurity, NERC, infrastructure, infrastructure protection, critical infrastructure, infrastructure security, infrastructure cybersecurity, exploits, control systems, control system security
20.
 
Oil and Gas Cyber Secutiy
ID
794692
Dates
27 Jun 2016 - 28 Jun 2016
Location
Amsterdam, Netherlands
Abstract
SMi are delighted to announce Oil and Gas Cyber Security 2016. An estimated 250% rise in reported industrial control system incidents over the past four years suggests that the oil and gas companies now more than ever need to strengthen their cyber security units. Perfect security for any successful company is impossible. Inevitably, some doors need to be left open. The question the oil and gas companies are currently faced with is which ones are worth leaving open, and how, when open, are they best monitored to ensure the highest level of security in the company. This conference will discuss where and how oil and gas companies should invest in their cyber security. Special focus will be on how companies can optimise the security of their industrial control systems. Strategy is key and therefore the conference will explain how companies can implement the best security strategy. Threat intelligence, threat analytics and many other industry hot topics will be addressed.
Contact
Anna Serazetdinova;     Phone: [+44 20 7827 6180];     Email: aserazetdinova@smi-online.co.uk
Topics
cyber security, oil, gas, control system, security strategy,
21.
 
CSF — 2016 IEEE 29th Computer Security Foundations Symposium
ID
777651
Dates
27 Jun 2016 - 01 Jul 2016
Location
Lisbon, Portugal
Abstract
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security.
22.
 
SANS Salt Lake City 2016
ID
786904
Dates
27 Jun 2016 - 02 Jul 2016
Location
Salt Lake City, United States
Abstract
We are pleased to invite you to SANS Salt Lake City 2016, June 27-July 2. Are you ready to immerse yourself in the most intense computer training experience available anywhere? Do you need to become a more effective leader when implementing security improvements for your organization? Do you need a more in-depth knowledge of the theory and implementation of computer security, hacker tools and incident handling, advanced digital forensics, defending web apps, or ISC/SCADA? This new event has been planned to meet your needs. Start making your plans now to attend SANS Salt Lake City 2016!
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, data breach, cyber threats, cyberattack, cyber attacks, hacking, hacker tools, hacking techniques, forensics, digital forensics, management, cyber defense, web applications, web app security, ICS, SCADA, industrial control systems
23.
 
ACISP — Australasian Conference on Information Security and Privacy
ID
760248
Dates
04 Jul 2016 - 06 Jul 2016
Location
Melbourne, Australia
24.
 
Weiterbildung — Datenschutz Update
ID
752697
Start date
05 Jul 2016
Location
Offenbach, Germany
Abstract
Eintägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
25.
 
QShine 2016 — 12th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
ID
809567
Dates
07 Jul 2016 - 08 Jul 2016
Location
Seoul, South Korea
Abstract
Computer networking has been embracing increased heterogeneity since its inception, in terms of the range of the applications it has to support, the various communication technologies it can run on, and the hierarchical, hybrid and heterogeneous techniques it has to rely on to meet the challenges from both the diverse application requirements and communication technologies.
Topics
Quality-of-Service (QoS) provisioning: architectures, protocols, mechanisms * Quality of Experience (QoE): user-perceived quality, cost-sensitive experience * Reliability and Scalability: performance, adaptation, cognition, extensibility * Security and Privacy: system/network security, user privacy/accountability * Robustness: fault/disruption/disaster-tolerance, resilience, survivability * Cross-Layer Design, Optimization and Implementation: spectrum/energy efficiency * Social and Economic Perspectives: incentive, pricing, billing, governance * New Applications and Communication Technologies: cloud, smart grid, SDN
Related subject(s)
26.
 
Weiterbildung — Datenschutzbeauftragter
ID
752716
Dates
11 Jul 2016 - 14 Jul 2016
Location
Potsdam, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach, Datenschutz Fortbildung, Datens
27.
 
Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte
ID
752743
Dates
11 Jul 2016 - 14 Jul 2016
Location
Potsdam, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten - Datenschutzbeauftragter
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Daten
28.
 
SANS Rocky Mountain 2016
ID
787131
Dates
11 Jul 2016 - 16 Jul 2016
Location
Denver, United States
Abstract
Mile high...mile deep, SANS IT security training! When you attend SANS Rocky Mountain 2016 you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office. With a reputation for being the most trusted source for information security training and an eagerness to help you meet your training objectives, SANS is the best choice for cyber security education. So let your colleagues and friends know about SANS Rocky Mountain 2016. We look forward to seeing you all in Denver!
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, cyber-attacks, data breaches, cyber threats, cyber threat intelligence, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, continuous monitoring, security operations, security ops, penetration testing, auditing, critical security controls, forensics, digital forensics, Windows forensics, management, CISSP, training
29.
 
WiSec — Conference on Security and Privacy in Wireless and Mobile Networks
ID
760351
Dates
18 Jul 2016 - 20 Jul 2016
Location
Darmstadt, Germany
Abstract
As wireless and mobile networking becomes ubiquitous, security and privacy become increasingly critical. The focus of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) is on the security and privacy aspects of wireless communications, mobile networks, and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we also welcome papers focusing on the security and privacy of mobile software platforms and the increasingly diverse range of mobile or wireless applications. The conference welcomes both theoretical as well as systems contributions. 
Related subject(s)
30.
 
SANS San Antonio 2016
ID
790275
Dates
18 Jul 2016 - 23 Jul 2016
Location
San Antonio, United States
Abstract
SANS proudly brings hands-on, immersion-style cybersecurity training courses taught by real-world practitioners to SANS San Antonio 2016, July 18-23, at the Hilton Palacio del Rio, located on the banks of the San Antonio River Walk! Many of the courses are aligned with DoD Directive 8570 and are associated with a GIAC Certification. Get unparalleled cybersecurity training at SANS San Antonio 2016 taught by outstanding instructors who are the best at ensuring you not only learn the material, but that you can apply it immediately when you return to the office.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, cyber-attacks, data breaches, cyber threats, cyber threat intelligence, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, active defense, cyber defense, cyber offense, cyber deception, management
31.
 
SANS Minneapolis 2016
ID
790542
Dates
18 Jul 2016 - 23 Jul 2016
Location
Minneapolis, United States
Abstract
Information security training in Minnesota from SANS Institute, the global leader in information security training. At SANS Minneapolis 2016, July 18-23, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of this event is the Hilton Minneapolis, located in the center of the financial district and within minutes of many of the attractions in the city. Choose from outstanding, cutting-edge courses presented by our top-rated instructors. Now is the time to improve your information security skills. This event features comprehensive hands-on technical training from some of the best instructors in the industry and includes courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans now to attend SANS Minneapolis 2016!
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, cyber-attacks, data breaches, cyber threats, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, digital forensics, management, incident response
32.
 
PETS — Privacy Enhancing Technologies Symposium
ID
760455
Dates
19 Jul 2016 - 22 Jul 2016
Location
Darmstadt, Germany
Abstract
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to discuss recent advances and new perspectives on research in privacy technologies. PETS addresses the design and realization of privacy services for the Internet and other digital systems and communication networks. Suggested topics include but are not restricted to: -    Behavioural targeting -    Building and deploying privacy-enhancing systems -    Crowdsourcing for privacy -    Cryptographic tools for privacy -    Data protection technologies -    Differential privacy -    Economics of privacy and game-theoretical approaches to privacy -    Forensics and privacy -    Human factors, usability and user-centered design for PETs -    Information leakage, data correlation and generic attacks to privacy -    Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology -    Location and mobility privacy -    Measuring and quantifying privacy -    Obfuscation-based privacy -    Policy languages and tools for privacy -    Privacy and human rights -    Privacy in ubiquitous computing and mobile devices -    Privacy in cloud and big-data applications -    Privacy in social networks and microblogging systems -    Privacy-enhanced access control, authentication, and identity management -    Profiling and data mining -    Reliability, robustness, and abuse prevention in privacy systems -    Surveillance -    Systems for anonymous communications and censorship resistance -    Traffic analysis -    Transparency enhancing tools
33.
 
SANS San Jose 2016
ID
793650
Dates
25 Jul 2016 - 30 Jul 2016
Location
San Jose, United States
Abstract
Information security training is coming to Silicon Valley from SANS Institute, the global leader in information security training. At SANS San Jose 2016, July 25-30, 2016, choose from 7 hands-on, immersion-style cybersecurity training courses taught by real-world practitioners. We will see you at The Westin San Jose, located in the heart of downtown San Jose. Now is the time to improve your information security skills. SANS San Jose 2016 features comprehensive hands-on technical training from some of the best instructors in the industry and includes several courses that will prepare you or your technical staff for DoD 8570 and GIAC approved certification exams. Start making your plans to attend now!
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, network security, netsec, IT security, infosec, data breach, cyber threats, cyberattack, cyber attacks, data breach protection, hacking, hacker tools, hacking techniques, exploits, incident handling, penetration testing, web apps, web app penetration testing, network penetration testing, mobile devices, mobile device security, management, development, cyber defense
34.
 
CyberSec — 2016 Fifth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic
ID
769409
Dates
26 Jul 2016 - 28 Jul 2016
Location
Manchester, United Kingdom
Abstract
Cyber security,Computer Science and Security, Cyber Welfare
Related subject(s)
35.
 
CCC — Cybersecurity and Cyberforensics Conference
ID
808542
Dates
26 Jul 2016 - 28 Jul 2016
Location
Amman, Jordan
Abstract
Cyber security has become an important research and development area for academia, government, and industry in recent years. The advent of big data, social media and mobile technology growth and the coming of the internet of things (IoT) have led to new opportunities in cyber security and cyber forensic work. To counter this, a multidisciplinary effort involving stakeholders from cyber security, the legal profession, academia, public citizens, and law enforcement agencies is required. The Cyber security and Cyber forensics Conference (CCC 2016) brings together thought-leaders from these separate fields to discuss current and future approaches, technologies and legislation pertinent to the detection, prevention, investigation and prosecution of cybercrime and cyber attacks. The conference offers an interdisciplinary venue to discuss challenges, technologies, and emerging trends.
Contact
Mamoun Alazab, Ameer Al-Nemrat;     Email: Alazab.m@gmail.com
Topics
Cyber security, Cybercrime, Computer security, computer science, Forensic, Criminology
36.
 
SECRYPT 2016 — The 13th International Conference on Security and Cryptography
ID
749335
Dates
26 Jul 2016 - 28 Jul 2016
Location
Lisbon, Portugal
Abstract
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.
Contact
SECRYPT Secretariat;     Phone: [+351 265 520 185];     Email: secrypt.secretariat@insticc.org
Topics
Computer Science, Security, Cryptography
37.
 
SANS Boston 2016
ID
793706
Dates
01 Aug 2016 - 06 Aug 2016
Location
Boston, United States
Abstract
Information security training in Boston from SANS Institute, the global leader in information security training. At SANS Boston 2016, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of our live training event on August 1-6, 2016, is the Omni Parker House, located along the Freedom Trail and at the foot of Beacon Hill, Boston Common, Quincy Market, and Faneuil Hall marketplace.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, network security, netsec, computer security, IT security, infosec, data breach, data breach prevention, data breach protection, data breach detection, intrusion detection, hacking, hacker tools, hacker techniques, exploits, incident handling, monitoring, security operations, web apps, web applications, web app penetration testing, penetration testing, pen testing, mobile devices, mobile device security, forensics, digital forensics, Windows forensics, network forensics, management, security leadership, strategic planning
38.
 
SANS Security Awareness Summit & Training 2016
ID
787396
Dates
01 Aug 2016 - 10 Aug 2016
Location
San Francisco, United States
Abstract
The 3rd annual SANS Security Awareness Summit is on, and it is bigger and better than ever before. First, the summit has been designed for experienced security awareness officers who want to take their security awareness program to the next level. Our promise is to provide actionable lessons you can take back and apply right away within your own organization, with a focus on your industry, employee base, and current maturity level. Second, we have expanded the event to two days to support additional talks, add new interactive sessions and host numerous networking events.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, data breach, data breach prevention, data breach protection, data breach detection, cyber attacks, critical security controls, auditing, CISSP, risk management, risk awareness, security awareness
39.
 
SANS Dallas 2016
ID
793693
Dates
08 Aug 2016 - 13 Aug 2016
Location
Dallas, United States
Abstract
Information security training in Texas from SANS Institute, the global leader in security training. The site of our live training event is The Westin Dallas Downtown, located downtown next to Belo Garden and a mile from the Kay Bailey Convention Center! With a course line-up including core fundamentals, penetration testing, digital forensics, and security management, SANS Dallas 2016, August 8-13, is sure to have a course that meets your needs.

All of our courses for this event are associated with a GIAC Certification. Get outstanding information security training from SANS world-class instructors at SANS Dallas 2016.

Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyberattack, cyber attacks, data breach protection, intrusion detection, penetration testing, hacking, network penetration testing, networks, forensics, network forensics, malware, auditing
40.
 
SANS Portland 2016
ID
797377
Dates
08 Aug 2016 - 13 Aug 2016
Location
Portland, United States
Abstract
Information security training in Portland from SANS Institute, the global leader in cybersecurity training. SANS Portland 2016, August 8 - 13, offers hands-on, immersion-style security training courses taught by real-world practitioners and leading experts working in security today. The site of our event is the DoubleTree by Hilton Portland, located in the heart of Portland's thriving metro area - close to public transportation and within walking distance to top city attractions. Get unparalleled information security training from SANS in Portland.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, infrastructure, critical infrastructure, industrial control systems, ICS, penetration testing, network penetration testing, hacking, forensics, digital forensics, incident response, management
41.
 
ICCS 2016 — International Conference on Cyber Security (ICCS) 2016
ID
794989
Dates
13 Aug 2016 - 14 Aug 2016
Location
Kota, Rajasthan, India
Abstract
The International Conference on Cyber Security (ICCS) 2016 is an unparalleled opportunity to discuss cyberthreat analysis, operations, research, and law enforcement to coordinate various efforts to create a more secure world.
Topics
Database Security, Big Data Techniques in Cyber Security, Digital Signature Techniques, Forensic Analysis of Cyber Crimes, Secure User Authentication, Spam Protection, Advance Persistent Threat, Secret Sharing, Key Management, Security in Mobile Networks, Hardware Security, Cloud Security, Cyber Physical System, Network Protocols, Next-generation Communication Networks, Mobile & Ubiquitous Communication Networks, Mobile Cloud, Secure Routing, Naming/Addressing, Network Management, Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs, Security & Privacy in Peer-to-Peer and Overlay Networks, Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks, Security & Isolation in Cloud, Data Center and Software-Defined Networks
42.
 
Crypto — Crypto 2016
ID
670717
Dates
14 Aug 2016 - 18 Aug 2016
Location
Santa Barbara, United States
43.
 
SANS Data Breach Summit 2016
ID
805225
Start date
18 Aug 2016
Location
Chicago, United States
Abstract
For every organization, data breach is a major risk. It's not a matter of whether your organization will be breached; it's when, and - most importantly - how bad the damage will be. You likely have a response plan in place. In fact, your organization has purchased insurance against this eventuality. But your response in the first hours after initially discovering the
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats
44.
 
SP4SC — International Workshop on Signal Processing for Secure Communications
ID
772976
Dates
22 Aug 2016 - 24 Aug 2016
Location
Vienna, Austria
45.
 
SANS Chicago 2016
ID
797364
Dates
22 Aug 2016 - 27 Aug 2016
Location
Chicago, United States
Abstract
We are pleased to invite you to the Palmer House Hilton in downtown Chicago - our campus for SANS Chicago 2016 this August. Why attend? Attackers are targeting you with increasing viciousness and stealth, and it's essential you understand the tools and techniques and learn the skills needed to protect your organizations. Get the training you need from SANS - the most trusted and by far the largest source for information security training in the world. When you attend SANS Chicago 2016, you will see the SANS promise in action - what you learn in the classroom, you will be able to use immediately upon returning to the office.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, cyber threat intelligence, hacking, hacking tools, hacker techniques, exploits, incident handling, cyber defense, active defense, cyber deception, forensics, digital forensics, Windows forensics, management, data security, law, investigations, industrial control systems, ICS, SCADA
46.
 
SANS Virginia Beach 2016
ID
799198
Dates
22 Aug 2016 - 02 Sep 2016
Location
Virginia Beach, United States
Abstract
Information security training in Virginia Beach from SANS Institute, the global leader in information security training. At SANS Virginia Beach 2016, August 22- September 2, SANS offers two weeks of the hands-on, immersion-style security training courses taught by real-world practitioners. The site of our event is the Hilton Virginia Beach Oceanfront is located right on Virginia Beach.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, security operations, continuous monitoring, penetration testing, pen testing, network penetration testing, mobile device security, forensics, network forensics, digital forensics, Mac forensics, Windows forensics, smartphone forensics, management, CISSP, leadership, industrial control systems, active defense, incident response
Related subject(s)
47.
 
IEEE TrustCom-16 — 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
ID
769441
Dates
23 Aug 2016 - 26 Aug 2016
Location
Tianjin, China
Abstract
This conference is created to provide a prime international forum for researchers, industry practitioners and domain experts to exchange the latest advances in trusted computing and communications, concurrent and parallel systems, and Big Data and broadly related areas.
Related subject(s)
48.
 
TRUST 2016 — The 9th International Conference on Trust & Trustworthy Computing
ID
797132
Dates
29 Aug 2016 - 30 Aug 2016
Location
Vienna, Austria
Abstract
TRUST 2016 is an international conference that explores new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discusses experiences in building, designing, using and understanding trustworthy computing systems.
Contact
Somayeh Salimi;     Email: somayen@kth.se
Topics
Architectures for trustworthy infrastructures, Trustworthy applications, Security analysis and formal techniques for trusted/trustworthy computing, Usability of trusted/trustworthy computing solutions, Trust management, Software engineering techniques for trustworthiness, Operating system security, Cryptography for trusted computing and related applications, Intrusion detection and resilience leveraging trusted computing
49.
 
ARES — International Conference on Availability, Reliability and Security
ID
773117
Dates
29 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
The  International Conference on Availability, Reliability and Security  (“ARES”) will bring  together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security –  with special  focus on the crucial linkage between availability, reliability and security. The  International Conference on Availability, Reliability and Security  (“ARES”) will bring  together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security –  with special  focus on the crucial linkage between availability, reliability and security. ARES  aims at a full and detailed discussion of the research issues of security as an  integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.  
Related subject(s)
50.
 
WMA 2016 — First Workshop on Malware Analysis
ID
788186
Dates
31 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
MWA aims to bring together experts from academia, industry, government, and law enforcement who are interested in advancing the state of the art in malware analysis by exchanging their knowledge, results, ideas, and experiences. The goal of the workshop is to provide a relaxed atmosphere that promotes discussion and free exchange of ideas, with a sound academic backing. The focus of this workshop is not restricted to techniques for malware detection, but also includes discussion of new models of malware and guidelines for limiting malware diffusion that can be utilized by governments, industries, and other organizations to defend against cyber attacks.Best papers will be selected for publication in a Special Issue of the Journal in Computer Virology and Hacking Techniques, published by Springer Verlag.
Contact
Aaron visaggio;     Email: visaggio@unisannio.it
Topics
Theoretical aspects and new directions in Broad Spectrum Malware related research, Novel malware detection techniques, Targeted Attacks, Smartphone Malware, Analysis and measurements of real malware incidents, Worms, viruses and other propagating Malware, Spyware, keystroke loggers, information theft Malware, Honeypots and other sample collection methodologies, Botnet attacks, detection/tracking and defense, Malware economics and black market studies, Code reverse engineering tools and practices, Malware performance, analysis and capture tools, Anti-spam and anti-phishing techniques and practices, Malware for SCADA Systems, Malware and its impact in social networking and cloud computing, Rootkit and virtualization techniques, Malware in wireless mobile devices
51.
 
ARES 2016 — International Conference on Availability, Reliability and Security
ID
788993
Dates
31 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security – with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.
Contact
Email: office@ares-conference.eu
Topics
Authorization and Authentication, Availability and Reliability, Business Continuity & Resilience, Cost/Benefit Analysis, Cryptography, Dependability Aspects for Special Applications (e.g. ERP-Systems, Logistics), Dependability Aspects of Electronic Government (e-Government), Dependability Administration, Dependability in Open Source Software, Designing Security, Requirements, Digital Forensics, E-Commerce Dependability, Failure Prevention, Identity Management, IPR of Security Technology, Incident Response and Prevention, Information Flow Control, Information Hiding, Internet Dependability, Interoperability Aspects, Intrusion Detection and Fraud Detection, Legal Issues, Mobile Security, Network and Organizational Vulnerability Analysis, Network Security, Privacy-Enhancing Technologies, Process based Security Models and Methods, RFID Security and Privacy, Risk planning, Analysis & Awareness, Safety Critical Systems, Secure Enterprise Architectures, Security Issues for Ubiquitous Systems, Security and Privacy in E-Health, Security and Trust Management in P2P and Grid applications Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications, Security and Usability, Security as Quality of Service, Security in Distributed Systems / Distributed Databases, Security in Electronic Payments, Security in Electronic Voting Software Engineering of Dependable Systems, Software Security, Standards, Guidelines and Certification, Survivability of Computing Systems, Temporal Aspects of Dependability, Threats and Attack Modelling, Trusted Computing, Tools for Dependable System Design and Evaluation, Trust Models and Trust Management, VOIP, Wireless Security
52.
 
ARES EU Projects Symposium 2016
ID
789058
Dates
31 Aug 2016 - 02 Sep 2016
Location
Salzburg, Austria
Abstract
Based on the success of the workshops for the projects CyberROAD, AU2EU, MUSA, CLARUS and INTER-TRUST in conjunction with ARES 2015 in Toulouse, we cordially invite EU project partners to organize a workshop at “The ARES EU Projects Symposium” – a co-located event of the 11th International Conference on Availability, Reliability and Security (ARES).
Contact
Email: office@ares-conference.eu
53.
 
SANS Northern Virginia - Crystal City 2016
ID
806468
Dates
06 Sep 2016 - 11 Sep 2016
Location
Arlington, United States
Abstract
You are invited to return to Arlington, Virginia on September 6-11. Why not get your Cybersecurity training in close to DC at SANS Northern Virginia - Crystal City 2016? We are bringing our top courses and instructors to make this the perfect training event for you! Gain the skills and learn about the tools you need to protect your organization from security breaches and attack risk.

Put the skills you'll learn to practical use and join more than 79,000 GIAC certified professionals who use their training to keep their assets safe!

Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, hacking, hacker techniques, exploits, incident handling, penetration testing, web applications, web app penetration testing, forensics, digital forensics, Windows forensics, management, strategic planning
54.
 
BalkanCryptSec 2016 — International Conference on Cryptography and Information Security
ID
779442
Dates
08 Sep 2016 - 09 Sep 2016
Location
Bucharest, Romania
55.
 
SANS Network Security 2016
ID
799219
Dates
10 Sep 2016 - 19 Sep 2016
Location
Las Vegas, United States
Abstract
We are pleased to invite you and your colleagues to attend SANS Network Security 2016 at the magnificent Caesars Palace, Las Vegas, on September 10-19. SANS Network Security is your annual networking opportunity! SANS will bring you the best in network security training, certification, and up-to-the-minute research on the most important topics in the industry today.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, penetration testing, pen testing, social engineering, cyber threat intelligence, cyber threats, cyber attacks, critical security controls, intrusion detection, hacking, hacker tools, hacking techniques, exploits, incident handling, PowerShell, continuous monitoring, security operations, cloud security, web app penetration testing, physical penetration testing, active defense, cyber deception, network penetration testing, industrial control systems, auditing, Python, mobile device security, virtualization, exploit writing, forensics, network forensics, digital forensics, Windows forensics, incident response, Mac forensics, memory forensics, smartphone forensics, malware, management, CISSP, risk management, security awareness, strategic planning, project management, web application security, secure coding, auditing, SCADA, active defense
56.
 
Oceania CACS 2016
ID
800313
Dates
11 Sep 2016 - 13 Sep 2016
Location
Gold Coast, Australia
Abstract
Learn from world-changing thinkers and innovators in information systems audit, control and security Oceania CACS 2016 is the premier event in our region for IS Governance, IS Security and IS Assurance professionals.
57.
 
IWSEC 2016 — The 11th International Workshop on Security
ID
774287
Dates
12 Sep 2016 - 14 Sep 2016
Location
Tokyo, Japan
Abstract
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2016. Topics of interest for IWSEC 2016 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:

- Big Data Analysis for Security

- Critical Infrastructure Security

- Cryptanalysis

- Cryptographic Protocols

- Cybersecurity Economics

- Digital Forensics

- Enriched Cryptography

- Formal Methods

- IoT security

- Machine Learning for Security

- Malware Countermeasures

- Measurements for Cybersecurity

- Multiparty Computation

- Post Quantum Cryptography

- Privacy Preserving

- Real World Cryptography

- Visualization for Security

Contact
Email: iwsec2016-staff@klab.is.sci.toho-u.ac.jp
Topics
Cybersecurity, Internet of Things, security engineering, risk management, HCI, privacy
Related subject(s)
58.
 
Rock Stars of Risk Based Security
ID
793582
Start date
13 Sep 2016
Location
Seattle, Washington, United States
Abstract
What Do Google, Adobe, Intel Health and Life Sciences, and PayPal Know About Risk-based Security That You Need to Know?

Lots!

The attackers have gotten more sophisticated. No company or person is safe. The only way to protect your organization and your personal data in 2016 is with a strong risk-based security solution. At Rock Stars of Risk-based Security, we’ve brought together the real leaders in this critical technology – Google, Adobe, PayPal, Intel Health and Life Sciences, and others – to talk about the trends, risk-based security programs and advice on how you can develop real-world security solutions that work for your organization – and that don’t disrupt your operations.

59.
 
Weiterbildung — Datenschutzbeauftragter
ID
752726
Dates
19 Sep 2016 - 22 Sep 2016
Location
Offenbach, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach, Datenschutz Fortbildung, Datens
60.
 
Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte
ID
752808
Dates
19 Sep 2016 - 22 Sep 2016
Location
Offenbach, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten - Datenschutzbeauftragter
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Daten
61.
 
SANS ICS London 2016
ID
807575
Dates
19 Sep 2016 - 25 Sep 2016
Location
London, United Kingdom
Event website
62.
 
SANS Security Leadership Summit 2016
ID
811070
Dates
27 Sep 2016 - 04 Oct 2016
Location
Dallas, United States
Abstract
The Security Leadership Summit's aim is for you to explore and take away ideas that will help you succeed in securing your organization. SANS will bring together top security leaders and experts for two days of in-depth talks loaded with crucial insights, experiences, and advice. During the event, you will have the opportunity to engage with top experts and network with fellow CISOs and security leaders. Time and again, we have been told by attendees that the connections made at the summit have been invaluable to their careers.
Contact
SANS Institute;     Phone: [(301) 654-7267];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, cyber threats, management, IT management, stragetic planning, risk assessment, critical security controls
63.
 
HAKON — HAKON- International Information Security Meet
ID
806240
Dates
30 Sep 2016 - 02 Oct 2016
Location
Indore, India
Abstract
The International Information Security Meet “ Hakon’2016, UNCOVER THE EBOLA OF UNDERGROUND BLACK MARKET – A NEW ERA OF DIGITAL TERRORISM. HAKON- International Information Security meet is a unique event, where the best brains in Cyber Security Society with mandatory Steps TO SECURE DIGITAL INDIA – Moving Forward with the Information Security Leaders to make the dream of Digital INDIA SUCCESSFULLY. HAKON International Information Security Meet will be a stepping stone for young professionals, information security enthusiasts, hackers, coders, programmers, security and network professionals, web developers, government, specially Cyber Cell Officers and enterprise people and for all who cares about Information Security Seriously. We have successfully completed 2 years, with a vision to spread awareness among the society & Nation; we are on our Journey to bring together, the brightest mind within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global threat landscape.
Contact
Sadhana Ojha;     Phone: [+917771888835];     Email: ojhasadhana85@gmail.com
Topics
Information Security Meet, Information Security Conference, Cyber Security Summit, IT Security Conference, Digital Forensics, Workshop, Security Conference
64.
 
HAKON- International Information Security Meet
ID
799368
Start date
02 Oct 2016
Location
Indore, India
Abstract
The International Information Security Meet “ Hakon’2016, UNCOVER THE EBOLA OF UNDERGROUND BLACK MARKET – A NEW ERA OF DIGITAL TERRORISM. HAKON- International Information Security meet is a unique event, where the best brains in Cyber Security Society with mandatory Steps gather TO SECURE DIGITAL INDIA – Moving Forward with the Information Security Leaders to make the dream of Digital INDIA SUCCESSFULLY. HAKON International Information Security Meet will be a stepping stone for young professionals, information security enthusiasts, hackers, coders, programmers, security and network professionals, web developers, government, specially Cyber Cell Officers and enterprise people and for all who cares about Information Security Seriously. We have successfully completed 2 years, with a vision to spread awareness among the society & Nation; we are on our Journey to bring together, the brightest mind within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global threat landscape. Ninja’s Information Security convention is a platform for security analysts, ethical hackers, professionals, and students to present their technical research papers and show case their skills , Attendees to be the witness of the most advanced talks in the field of Information Security with outstanding Speakers.
Contact
Sadhana Ojha;     Phone: [+917771818845];     Email: director@ninjasecurity.co.in
Topics
IT Security Meet, Information Security Meet, Information Security Conference, Information Security Convention, Cyber Security Meet, Cyber Security Conference, Cyber Security Convention, IT Security Conference, Digital Forensics Workshop, Conference for Digital Forensics, Research Paper for IT
65.
 
SANS Oslo 2016
ID
807658
Dates
03 Oct 2016 - 08 Oct 2016
Location
Oslo, Norway
66.
 
SANS DFIR Prague 2016
ID
807667
Dates
03 Oct 2016 - 15 Oct 2016
Location
Czech Republic, Czech Republic
67.
 
Chief Data & Analytics Officer Forum, Hong Kong
ID
809573
Dates
04 Oct 2016 - 05 Oct 2016
Location
Hong Kong, China
Abstract
The Chief Data and Analytics Officer Forum Hong Kong will bring to the forefront, the core issues needed to be discussed, debated and challenged to facilitate this momentum toward greater data adoption. Key issues to be covered include:

• Data leadership and leading from the front – the role of c-level executives, business leaders and IT practitioners

• Unlocking the keys toward greater commercially driven acceptance and the economics around big data and analytics investment

• Embracing innovation and new technologies in a risk adverse environment

• Addressing the challenges in organisational culture and the approaches toward sourcing the right talent

• Identifying solutions toward common challenges relating to data management, data quality, data privacy and data security currently acting as roadblocks

As big data usage across Asia escalates, this is a must attend event to gain the practical insights and strategies your organisation will need to leap frog the competition. Hear from leading Chief Data Officers, Chief Analytics Officers and Chief Data Scientists and network with over 150+ likeminded industry professionals all at the vanguard of the data movement in the region. Combining international keynotes with our unique, highly regarded interactive discussion groups, this comprehensive forum is not to be missed.

http://www.cdaohongkong.com/

Register here: http://bit.ly/1TCDAOHKEL

Contact: info@coriniumintelligence.com

Contact
Kye Ling Gan;     Email: info@coriniumintelligence.com
68.
 
Rock Stars of Pervasive, Predictive Analytics
ID
793657
Start date
18 Oct 2016
Location
Mountain View, California, United States
Abstract
The Rock Stars of Pervasive, Predictive Analytics

Want to know how to avoid the 4 biggest problems of predictive analytics – from the Principal Data Scientist at Microsoft? Take a little time to discover how predictive analytics are used in the real world, like at Orbitz Worldwide or Halliburton. You can stop letting traditional perspectives limit you with help from Mashable’s chief data scientist.

69.
 
SANS Munich Autumn 2016
ID
807703
Dates
24 Oct 2016 - 29 Oct 2016
Location
Munich, Germany
70.
 
Weiterbildung — Datenschutzmanager
ID
752701
Dates
07 Nov 2016 - 08 Nov 2016
Location
Offenbach, Germany
Abstract
Zweitägiger Praxislehrgang zum Datenschutzmanagement
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
71.
 
Weiterbildung — Kundendatenschutz
ID
754719
Dates
14 Nov 2016 - 15 Nov 2016
Location
Offenbach, Germany
Abstract
Zweitägiger Praxislehrgang zur rechtskonformen Verarbeitung personenbezogener Kundendaten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
72.
 
WorldCIS-2016 — World Congress on Internet Security
ID
803511
Dates
14 Nov 2016 - 16 Nov 2016
Location
London, United Kingdom
Abstract
The WorldCIS-2016 is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Contact
Email: info@worldcis.org
Topics
Cyber Security, Internet Security, Web Services and Performance, Data Security, Software Architectures, Biometrics
Related subject(s)
Event website
73.
 
Weiterbildung — Datenschutzbeauftragter
ID
752769
Dates
14 Nov 2016 - 17 Nov 2016
Location
Hamburg, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Datenübermittlung, Umweltinstitut Offenbach, Datenschutz Fortbildung, Datens
74.
 
Weiterbildung — Datenschutzseminar für Betriebs- und Personalräte
ID
752774
Dates
14 Nov 2016 - 17 Nov 2016
Location
Hamburg, Germany
Abstract
Viertägiger Lehrgang im Sinne des § 4f des Bundesdatenschutzgesetz (BDSG) zur Erlangung der Fachkunde zum Datenschutzbeauftragten - Datenschutzbeauftragter
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
Topics
Datenschutzbeauftragter, Datenschutzbeauftragte, Datenschutz, Schutz, Daten, Datendschutz-Seminar, BDSG, § 4f Bundesdatenschutzgesetz, Betriebsrat, Personalrat, § 37 Abs. 6 BetrVG bzw. § 46 Abs. 6 BPersVG, Fachkunde, Intern, Extern, Datenerhebung, Datenspeicherung, Daten
75.
 
SANS Healthcare Cyber Security Summit & Training 2016
ID
802909
Dates
14 Nov 2016 - 21 Nov 2016
Location
Houston, United States
Abstract
SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the new healthcare environment. You'll have the opportunity to meet with leaders from top organizations and see what really works in securing healthcare.
Contact
SANS Institute;     Phone: [(301) 654-SANS (7267)];     Email: info@sans.org
Topics
cybersecurity, information security, computer security, IT security, infosec, network security, netsec, data breach, healthcare IT, healthcare cybersecurity, healthcare security, hacking, hacking tools, hacker techniques, exploits, incident handling, management
76.
 
DependSys 2016 — The Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys2016)
ID
811268
Dates
16 Nov 2016 - 18 Nov 2016
Location
Zhangjiajie,, China
Contact
Md Zakirul Alam Bhuiyan;     Email: zakirulalam@gmail.com
77.
 
Weiterbildung — Verfahrensbeschreibungen und Vorabkontrolle im Datenschutz
ID
756443
Start date
17 Nov 2016
Location
Offenbach, Germany
Abstract
Gesetzliche Forderungen in der betrieblichen Praxis umsetzen
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
78.
 
Mycrypt 2016 — Int'l Conference on Cryptology & Malicious Security
ID
779494
Dates
01 Dec 2016 - 02 Dec 2016
Location
Kuala Lumpur, Malaysia
79.
 
Asiacrypt — Asiacrypt 2016
ID
670727
Dates
04 Dec 2016 - 08 Dec 2016
Location
Hanoi, Vietnam
80.
 
ICITST-2016 — The 11th International Conference for Internet Technology and Secured Transactions
ID
803604
Dates
05 Dec 2016 - 07 Dec 2016
Location
Barcelona, Spain
Abstract
The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Contact
Sean Mears;     Phone: [01268523262];     Email: info@icitst.org
Event website
81.
 
Weiterbildung — Datenschutz Update
ID
752696
Start date
07 Dec 2016
Location
Offenbach, Germany
Abstract
Eintägiges Seminar zur Aktualisierung der Fachkunde für Datenschutzbeauftragte
Contact
Umweltinstitut Offenbach GmbH;     Phone: 069/810679;     Email: mail@umweltinstitut.de
82.
 
ICCWS 2017 — 12th International Conference on Cyber Warfare and Security
ID
802796
Dates
02 Mar 2017 - 03 Mar 2017
Location
Dayton, United States
Abstract
For the past 10 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings in the form of empirical studies, case histories and other theoretical and practical contributions. In addition doctoral degree candidates find this conference a valuable opportunity to network with others and have the opportunity to present papers and posters.
Contact
Elaine Hayne;     Phone: [01189724148];     Email: elaine@academic-conferences.org
Topics
Cyber Warfare Cyber Defence Cyber Terrorism Cyber Security Cyber Crime Cloud Security Social networking threats Big Data Security Psychological Warfare Digital Forensics

Good to know...

You can advertise your event or services in this space.

Last updated: 30 October 2071