TRUSTe Privacy Risk Summit 2017
Jun
6
1:00 AM01:00

TRUSTe Privacy Risk Summit 2017

As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.

The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.

We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.

View Event →
Security B-Sides Huntsville 2017
Feb
4
9:00 AM09:00

Security B-Sides Huntsville 2017

  • Dynetics, Inc (Solutions Complex Building) (map)
  • Google Calendar ICS

 BSides Huntsville is an annual security conference located in The Rocket City. Stay tuned as 2017 will be its 4th consecutive year! Previous years were well received and videos are available from IronGeek. All BSides teams are volunteers working hard to put together a productive and enjoyable conference.

The conference seeks submissions for Speakers, to share their views and knowledge on the current topics of Security and privacy.

View Event →
12th Annual Symposium on Information Security (ASIA '17)
Jan
9
to Feb 28

12th Annual Symposium on Information Security (ASIA '17)

NYSCSC is organized jointly by the University at Albany, State University of New York (SUNY) School of Business and Forensics, Analytics, Complexity, Energy, Transportation & Security (FACETS) Center, the NYS Forum, Inc., and the Enterprise Information Security Office (EISO) of the NYS Office of Information Technology Services. This conference provides crucial knowledge that enables the attendees to stay attuned to cyber security threats and effectively meet the challenges we are facing.

Stay tuned in January for our ASIA '17 Call for Papers. Please send an email to [email protected] to submit your papers or if you would like to be put on a listserv to be updated about ASIA events.

View Event →
Securing the Future to Infinity and Beyond: 30 years of Improving Cybersecurity through Awareness, Training, and Education  
Jan
5
8:00 PM20:00

Securing the Future to Infinity and Beyond: 30 years of Improving Cybersecurity through Awareness, Training, and Education  

Call for Presentations

FISSEA 30th Annual Conference

March 14 - 15, 2017

 

FISSEA is seeking presentations for the 2017 Annual Conference. Join us for our 30th year anniversary and share your expertise and creative ideas that address information security, focusing on the awareness and training aspect. 

Topics of interest include:

  • New Techniques for Developing and Conducting Effective, Meaningful Training
  • Cybersecurity Governance
  • Beat the breaches – how do you deal with it
  • Cost- Effective Practices
  • How to take technical training topics and implement it into an OPM business case
  • Building an Insider Threat program
  • How to get leadership buy-in for cybersecurity programs
  • Free Resources, Awareness Ideas – What’s Available
  • What makes a good awareness program – what makes good training- online vs. classroom – what engages people, how do you evaluate, what is the benchmark
  • Effective anti-phishing strategies/exercises
  • Proper use of email/records management - Privacy
  • Role-based Training
  • Where do you generate your training ideas and get subject matter experts
  • Lessons Learned and best practices
  • Where do you see security training evolving to - ideas for the future
  • and more!

Submission Deadline: January 5, 2017
Download the Submission Form here 
Email submission form to [email protected]

FISSEA website:    http://csrc.nist.gov/fissea  

 

 

View Event →
2017 (ISC)² SecureEvents
Dec
19
to Nov 3

2017 (ISC)² SecureEvents

(ISC)² Secure Events are a series of seminars that provide continuing education for our members - cyber, information, software and infrastructure security professionals - on the issues and challenges the industry faces today, and what may loom on the horizon. These events are typically held in one day in various cities across North America.  Secure Events give our members a unique, first-hand experience on emerging issues with engaging speakers, arming them with the latest information on current trends and hot-button topics as well as the opportunity to automatically earn CPEs. Members, as well as our sponsors, inform us that Secure Events are invaluable for networking, learning, and ensuring continued value within the roles that they deliver.  Certification is just the beginning, and we rely upon experts to help keep our members educated and informed. 
  
If you are a proven speaker in this field and offer valuable knowledge and subject matter expertise across cyber, information, software and infrastructure security arena that will help our members, we invite you to share your expertise and join our community.  
  
The Call for Speakers for the 2017 (ISC)² Secure Events is officially open.  Click on the link provided to submit your speaking proposal. 
 

View Event →
Dec
13
5:30 PM17:30

San Francisco Meetup: Dive Into Hyperledger and Blockchain

The details of this meetup will be published soon.

We are looking for speakers for this meetup. If you can provide a deeper look of what Hyperledger is, why Hyperledger, what Hyperledger brings to the table or can share any use cases for Hyperledger - please reach out to the organizer!

We are looking to learn anything related Hyperledger, its use cases and applications:

• How-To’s

• Reviews of tools, services and APIs offered by the Hyperledger ecosystem

• Best Practices in Application Architecture

• Do’s and Don’ts

• Application Templates

• Security in the decentralized world

If you are willing to share how you are solving some of the hard problems that exist in the world using Hyperledger, you are the hero we need for next meetups!

View Event →
Security Engineering Tech Talk @ UBER Palo Alto
Dec
12
6:00 PM18:00

Security Engineering Tech Talk @ UBER Palo Alto

There's never been a more exciting or challenging time to focus on Security Engineering. Come join members of the Uber EngSec team to share perspectives on what's working and what's coming next.

Agenda:

John "Four" Flynn, CISO: "Where can Security teams have the biggest impact in 2017?"

Karen Hsu, Sr Software Engineer: "Rethinking Customer Authentication for Microservices"

Luis Guzman, Manager, Security Response: "Data-Driven Intrusion Detection and Rapid Response"

Q&A

Networking

View Event →
CISSE 2017
Dec
2
5:00 PM17:00

CISSE 2017

Serving the Global Cybersecurity Education Community- Call for Papers and Presentations

For 21 years The Colloquium for Information Security Education (CISSE) has supported Cyber Security educators, researchers and practitioners in their efforts to improve curricula and foster discussion of current & emerging trends.

CISSE 2017 Session Proposals-Due 12/1/2016

Submission of proposals for participation in CISSE 2017 June 12-14 at the J.W. Marriott, Las Vegas, NV.  Submission topics can be related to career, graduate school, research, or education in the field of Cybersecurity. You can submit in more than one category, please make sure it is not a commercial for your program or company but rather something that we can all learn from.  

Call for Papers:  Please submit your unpublished original paper in the field of Cyber Security/Information Assurance with a focus on education.
 

Academic Papers- Due March 15, 2017
 
If your paper is chosen for presentation at our conference it will also be published in our Journal, The Colloquium for Information Systems Security Education and available on amazon.com.  Check out last year’s edition at: https://www.amazon.com/Journal-Colloquium-Information-Security-Education-ebook/  it is available as an e-book and softcover book.
 
All submissions must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to make their submissions geographically and institutionally anonymous and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review. 

Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will  require that at least one of the authors register and attend the conference to present the paper. 


Student Papers: Criteria for eligibility-All the following criteria must be met:Submitting author must opt-in to the competition during the regular submission process and follow all the instructions provided on the submission site.

The presenting author must be an undergraduate or graduate student of an educational institution of collegiate grade who is devoting more than half-time to studies within the institution, at the time the paper was written.
The Student must present the paper during the conference.
One lucky Student Paper will be selected for the Erich Spengler Student Cyber Paper-award!  The awardee will receive free registration, plus a travel and hotel stipend.

More Information about our 21st Annual Conference can be found at :  http://www.CISSE.INFO

View Event →
Security B-Sides NoVA 2017
Nov
15
11:59 PM23:59

Security B-Sides NoVA 2017

  • Center for Innovative Technology (map)
  • Google Calendar ICS

BSides NoVA aims to provide a diverse range of talks covering both conventional cybersecurity topics as well as emerging threats and technologies. Topics can range from completed or near-complete research, tool development, best practices, lessons learned and experiences. BSides conferences are designed to be conversations and should allow for interaction with the attendees, as lectures are nice from time to time, but new insights or ancillary work often comes from dialogue.

Important Dates of Note

  • August 31st, 2016: CFP will open
  • November 15th, 2016: CFP closes
View Event →
Women in Cybersecurity (WiCyS) 2017
Nov
6
11:59 PM23:59

Women in Cybersecurity (WiCyS) 2017

  • JW Marriott Tucson Starr Pass Resort & Spa, (map)
  • Google Calendar ICS

Submission of proposals for participation are in the following session categories (open until November 6th, 2016). Submission topics can be related to career, graduate school, research, or education in the field of Cybersecurity. 

  • Presentations
  • Birds of a Feather (BoF) Sessions 
  • Panels 
  • Workshops
  • Lightening Talks
  • Posters
View Event →
38th IEEE Symposium on Security and Privacy
Nov
4
11:59 PM23:59

38th IEEE Symposium on Security and Privacy

Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems.

  • Abstract submission deadline November 4, 2016  No Extensions
  • Paper submission deadline November 11, 2016  No Extensions
  • Early-reject notification and author appeal period January 13, 2017
  • Acceptance notification February 9, 2017
View Event →
SANS Threat Hunting & Incident Response Summit 2017
Oct
21
11:59 PM23:59

SANS Threat Hunting & Incident Response Summit 2017

The Threat Hunting and Incident Response Summit (April 18-19, 2017) offers speakers opportunities for exposure and recognition as an industry leader. If you have something substantive, challenging, and original to offer, you are encouraged to submit a proposal. CFP submissions should detail how the proposed Threat Hunting and Incident Response case study, tool or technique can be utilized by attendees to increase their security posture. All Threat Hunting and Incident Response Summit presentations will be 30 minutes with 5 minutes for questions. 

View Event →
2017 IAPP Global Privacy Summit
Oct
2
11:59 PM23:59

2017 IAPP Global Privacy Summit

Set in Washington, DC, the Global Privacy Summit is the world’s premier privacy conference, your go-to for innovative, world-class education, fantastic networking and privacy training and certification. We’re seeking engaging speakers to share privacy expertise in sessions that will delight attendees and leave them wanting more!  

We get our topics from you! Submit your proposal on a topic you view as critical or emerging, and the themes of the Summit will develop from the best submissions we receive. You’ll help drive the programming of the event if your proposal is accepted.

Deadline: October 2, 2016

View Event →
7th ACM CODASPY 2017
Sep
18
11:59 PM23:59

7th ACM CODASPY 2017

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area.

 

The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. 

View Event →
PrivacyCon
Sep
16
to Oct 3

PrivacyCon

The FTC is seeking research presentations on consumer privacy and security issues. We are seeking empirical research, rather than opinion pieces on law and policy. You must transmit your submission, together with your confidentiality request, only through our Accellion secure file transfer system. To do so, you must first send an email by no later than 11:59pm Eastern Time onSeptember 28, 2016, to [email protected]

(link sends e-mail) with the subject line “PrivacyCon - Request for Confidential Treatment of Research Submission.” You should receive a reply email within two business days with instructions for the secure electronic submission of encrypted documents using Accellion.  We must receive your submission and confidentiality request through Accellion by no later than 11:59pm Eastern Time on October 3, 2016. Your confidentiality request must identify the specific portions of your submission for which confidential treatment is being requested, and the legal or factual basis for your request.  See Commission Rule 4.9(c). If the General Counsel grants your request for confidential treatment, your submission will not be made publicly available, except as required by law.  

View Event →
DEF CON 25
Sep
16
to Jul 27

DEF CON 25

  • Caesar's Palace Las Vegas (map)
  • Google Calendar ICS

We're back again for DEF CON 24! You've had a year to absorb the possibilities that our new venue has to offer, now what are you gonna do about it? Do you want to drop the bass till it melts your face? Awesome, everyone loves tinnitus. Do that! Want to rent a million arcade machines and pretend it's 1986? Sounds great Daddy Warbucks. We love it. Do that!

Do you want to get together a group of like minded individuals and talk about current events? That sounds super boring, but we're not here to judge. Do that! The point is, we love your creativity, and we love what you guys bring to the table every year. We've got space to use up, and we want you to use it. So show us what you've got DEF CON.

Once again, we'll be paying the cost for all bars this year. Not the cost of the booze, just the cost of the bartender. This will allow you to spend the money you would've spent on having a bartender on site for 4+ hours, on pacifiers, Mardi Gras beads, a small pony, or whatever instead. So start filling out the questions below and get them submitted. We'll pick the best ideas, and give them a space to turn their nerdtastic fantasies, into a reality, if only for a night. The Call for Parties...is open.

View Event →
Black Hat 2017
Sep
16
to Oct 30

Black Hat 2017

  • Mandalay Bay Convention Center (map)
  • Google Calendar ICS

Call for Papers opens: September 7, 2016
Call for Papers closes: October 31, 2016
Notifications to Authors Start: Week of January 16, 2017
Terms are subject to change

Submit proposals by completing a submission form on the Call for Papers (CFP) server at https://asia-briefings-cfp.blackhat.com/. All applicants must read and agree to the Call for Papers Submission Requirements prior to making a submission. All submissions must be received on or before October 31, 2016 at 23:59 Pacific Time.

WHAT ARE THE BLACK HAT BRIEFINGS?

The Black Hat Briefings were created more than 20 years ago to provide computer security professionals a place to learn the very latest in information security risks, research, and trends. Presented by the brightest in the industry, the Briefings cover everything from critical information infrastructure to widely used enterprise computer systems to the latest InfoSec research and development and everything in between. The Briefings are vendor-neutral, allowing the presenters to speak candidly about real problems and potential solutions across both the public and private sectors.

SESSION TYPES

25-minute presentations
50-minute presentations

View Event →
SANS Cyber Threat Intelligence Summit 2017
Sep
15
to Jan 30

SANS Cyber Threat Intelligence Summit 2017

  • Renaissance Arlington Capital View Hotel (map)
  • Google Calendar ICS

While Cyber Threat Intelligence is a relatively new field, we can draw upon classic intelligence approaches to better secure our organizations. Throughout the Summit, we'll be going old school by examining traditional intelligence methods and techniques; and applying them to cyber threat intelligence.

The Summit & Training will explore the following:

How classic intelligence approaches are applied to CTI analysis and production
Interesting perspectives and case studies that challenge CTI assumptions and result in a shift in understanding
Classic methods of producing Cyber Threat Intelligence
Implementing and making decisions based off of intelligence
Case studies on the application of cyber threat intelligence to a security or business problem
Innovative ways to utilize or analyze CTI with classic techniques
New tools developed to support or enable CTI

View Event →
OWASP AppSec California 2017
Sep
15
to Jan 22

OWASP AppSec California 2017

  • Annenberg Community Beach House (map)
  • Google Calendar ICS

A full day of training on various subjects by expert trainers kicks off the conference on January 23rd. World renowned speakers follow on days two and three.

New friendships will be born, new techniques for securing your environments and applications will be shared, as you become inspired by your peers.

View Event →
North America CACS Conference 2017 (an ISACA event)
Sep
15
to Nov 16

North America CACS Conference 2017 (an ISACA event)

  • 3708 Las Vegas Boulevard South Las Vegas Boulevard Las Vegas, NV, 89109 United States (map)
  • Google Calendar ICS

re you an industry expert, thought-leader or passionate professional willing to share your experiences, insights and knowledge with colleagues and peers? Be a part of the North America CACS 2017 program!

The Call for Speakers is open from now until 17 November, 2016!Take advantage of this great opportunity for you to lead a hot-button session and expand your business network. Selected speakers will receive complimentary conference registration along with many other valuable perks.

Find out more on the North America CACS Call for Speakers page.

View Event →
B-Sides San Diego 2017
Sep
15
to Nov 24

B-Sides San Diego 2017

January 13th and 14th, 2017 hosted by National University!
The Call for Papers is out now!!!
 Sign up now to give your talk. All are welcome! First timers, experienced speakers, students; bring your ideas, and share! https://goo.gl/4fL09K

CFP - https://docs.google.com/forms/d/e/1FAIpQLSeno0rT8pbeSiNgUVUuHsVYQVcH_1lyEQLvKCMpKBP-FEdldg/viewform?c=0&w=1

 the call for papaers will close on November 25 2016. 

View Event →
FTC's PrivacyCon 2017
Sep
15
to Jan 11

FTC's PrivacyCon 2017

he FTC is now issuing a new Call for Presentations for the next PrivacyCon. The Call for Presentations asks a number of specific questions to stimulate further research and build on the success of the first PrivacyCon. 

In addition to expanding upon the previous research presented, we hope to delve into areas we were not able to focus on at this year’s forum, such as the harms associated with privacy violations, attack vectors and trends, uptake of ad blocker tools, and the costs of malware.

Researchers, academics and others who wish to submit a presentation for review can access the Call for Presentations, which also provides information on how to submit your presentation to the FTC for consideration.

Email questions to [email protected](link sends e-mail).   

The FTC is looking forward to the next PrivacyCon and to receiving presentation proposals.

View Event →
FTC Fall Technology Series: Smart TVs
Sep
15
to Dec 6

FTC Fall Technology Series: Smart TVs

Consumers enjoy recommendations based on their television viewing habits (“viewers who watched Mr. Robot… may enjoy Fight Club”), but who else knows what you’re watching? The golden age of television has arrived with the golden age of television tracking. In 2016, virtually all television delivery systems – smart TVs, streaming devices, game consoles, apps, and even old-fashioned set top boxes – track consumers’ viewing habits, and sometimes in new and unexpected ways. Television and streaming device manufacturers, software developers, and the advertising industry are collaborating to learn more about what consumers are watching. These collaborations are allowing advertisers to precisely target consumers and better understand what ads are working. Consumers may even find advertisements based on their television viewing habits appearing on their phones and desktop browsers. The Smart TV workshop will explore the following questions:

What are the roles of hardware manufacturers and software developers in creating tracking technologies?
What do consumers understand about how their entertainment preferences are being tracked, disclosed, and used for various purposes?
How are entertainment preferences being linked to individuals or to individuals’ device graphs?
How is the advertising industry using this information?
What are some best practices for addressing consumer privacy on entertainment systems?

View Event →
2016 ACSAC: Security & Privacy in the Internet of Things
Sep
15
to Dec 4

2016 ACSAC: Security & Privacy in the Internet of Things

  • Hilton Los Angeles/Universal City (map)
  • Google Calendar ICS

ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.

We solicit submissions that address the application of security technology, the implementation of systems, and lessons learned. While we are interested in a variety of topics, we especially encourage submissions in the area of our Hard Topic Theme for 2016, Security and Privacy in the Internet of Things

View Event →
Security B-Sides Philly 2016
Sep
15
to Oct 30

Security B-Sides Philly 2016

  • Drexel University Cybersecurity Institute (map)
  • Google Calendar ICS

The technical and academic presentations at BSides Philadelphia are given in the spirit of peer review and advanced knowledge dissemination. This allows the field of Information Security to grow in breadth and depth and continue in its pursuit of knowledge and insight.

there will be multiple tracks for talks. topics can range from complete or partial research, tool developments, best practice and lessons learned. topics can include-
information technology, mobile security, network security, web application security, biometrics, malware, hardware hacking, massive abuse of technology etc.
call for papers will close on October 31 2016. 

View Event →
Security B-Sides Boise 2016
Sep
15
to Sep 30

Security B-Sides Boise 2016

WHAT: Security BSides Boise 2016 Call for Presentations/Papers
WHO: Your awesome 45 minute presentation on a security/tech/hacking topic. 
WHEN: Deadline for submissions: September 30th 23:59:59 MST
Poster Tracks: New this year will be a Poster Tracks. There will be three 45-60 minute blocks of time where accepted posters and their creators will be available to discuss their topic with attendees in a social setting. The goal of these poster sessions will be to help the community build a solid foundation of security knowledge and also to help younger/less experienced speakers to work on public speaking. The setting of this will be a social hour where attendees can visit each poster and presenter while having a refreshment.  

View Event →
SecureWorld Seattle
Sep
15
to Nov 8

SecureWorld Seattle

Speakers receive a Speaker Conference Pass, which provides access to all standard sessions, keynotes, panels, and complimentary lunch. Additionally, speakers will receive extensive exposure in the SecureWorld conference program and on the SecureWorld website. Speaking at SecureWorld creates an excellent opportunity to meet and network with fellow presenters, colleagues, and peers. Speakers are not provided a speaking fee nor reimbursed for travel costs.

All submissions should include a title, a brief abstract of the proposed topic, and the speaker's bio. Please define the target audience (i.e. CISOs, security directors, IT auditors), and the level of intended audience knowledge: Introductory or Advanced, and Technical or Non-Technical. Submissions will be selected based upon the relevance and timeliness of the topic, the depth and organization of the abstract, and the qualifications of the speaker.

 

View Event →
Security B-Sides DFW 2016
Sep
14
to Sep 29

Security B-Sides DFW 2016

Security B-Sides Dallas/Fort Worth (BSidesDFW) 2016 Call for Papers Presentation of approx 45 minutes (including time for Q&A). aNY KIND OF Product/Service Marketing/Advertising presentations will be rejected.Conference language is English WHEN: Deadline for submissions: Midnight CDT 30 Sep 2016 Event date, 05 Nov 2015 Speakers must provide their own lodging and transportation. Speakers must provide notice of cancellation in the event of conflict. All information should be emailed to [email protected]
 

View Event →
Security of Things World USA 2016
Sep
14
to Nov 2

Security of Things World USA 2016

  • Hard Rock Hotel San Diego (map)
  • Google Calendar ICS

60+ end user speakers will share their expertise at Security of Things World USA. We are working on getting the most innovative and forward thinking end users and solution providers to offer you real case studies and hands on world café workshops on how Cyber Security is changing the business world as we know it.

View Event →