North America CACS Conference 2017 (an ISACA event)
May
1
May 3

North America CACS Conference 2017 (an ISACA event)

  • Las Vegas, NV USA

North America Computer Audit, Control, and Security (CACS) Conference

Connect with the most dynamic minds and practitioners in information systems audit, control and security.  

Who Should Attend?

  • ISACA Members, and IS Audit, Assurance, Security and Risk Management and Governance Professionals worldwide.
  • The conference offers an unrivalled opportunity to expand your network and build onto your knowledge and skills.
THOTCON - Chicago's Hacking Conference
May
4
May 5

THOTCON - Chicago's Hacking Conference

  • Chicago, IL

THOTCON (pronounced \ˈthȯt\ and taken from THree - One - Two) is a small venue hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a very limited budget. 

THOTCON 0x8 will be have 2 tracks over two days and over 1100 attendees. It will be held on Thursday, May 4th and Friday, 5th, 2017. The after party will be held at the same venue 2 hours after the end of the conference.

Security West 2017
May
9
May 18

Security West 2017

  • Manchester Grand Hyatt Hotel

SANS Security West 2017 (May 9-18) returns to San Diego. Choose from more than 30 hands-on Infosec courses taught by SANS incomparable Instructors plus bonus sessions, Emerging Trends in Cybersecurity discussions, CISO Success Talks, vendor expo, and the challenging Core and DFIR NetWars competitions! Register today! http://www.sans.org

38th IEEE Symposium on Security and Privacy
May
22
May 25

38th IEEE Symposium on Security and Privacy

  • The Fairmont Hotel

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2017 Symposium will mark the 38th annual meeting of this flagship conference.

The Symposium will be held on May 22-24, 2017, and the Security and Privacy Workshops will be held on May 25, 2017. Both events will be in San Jose, CA at the Fairmont Hotel.

2017 Cyber Investing Summit
May
23
8:30 am08:30

2017 Cyber Investing Summit

  • New York Stock Exchange

The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the $100+ billion dollar cyber security industry. Attendees will explore the financial opportunities, trends, challenges, and investment strategies available in the high growth cyber security sector. The 2016 Inaugural Cyber Investing Summit welcomed 180+ of the leading cyber professionals, technology analysts, venture capitalists, fund managers, investment advisors, government experts, and more. New this year: separate panels offered throughout the day highlighting publicly traded firms as well as privately owned entities, opportunities to meet one-on-one with corporate executives, and new panel topics (including Investment Strategies & Opportunities, M&A Landscape, Funding for Startups, Government Spending Review, Cyber Sale Lifecycle, and more). Network with investment professionals, asset managers, industry experts, financial analysts, media and more.

TRUSTe Privacy Risk Summit 2017
Jun
6
8:00 am08:00

TRUSTe Privacy Risk Summit 2017

  • BESPOKE

TRUSTe Privacy Risk Summit 2017

As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.

The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.

We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.

12th Annual Symposium on Information Security (ASIA '17)
Jun
7
Jun 8

12th Annual Symposium on Information Security (ASIA '17)

  • Albany, NY

ASIA is a two-day event that attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. ASIA '16 was held at the Governor Nelson A. Rockefeller Empire State Plaza Convention Center, Albany, NY 12242 on June 8-9, 2016. The event is always held in the first week of June so keep your calendars open for 2017! Through generous sponsorship, we are able to have free registration for all selected presenters, authors of accepted papers, and members of government organizations. All people who participate in ASIA are able to attend the rest of the NYSCSC sessions that typically cover practical applications of information security.

The SANS CyberTalent Fair (SCTF)
Jun
7
10:00 am10:00

The SANS CyberTalent Fair (SCTF)

Need a job in cybersecurity? You should consider attending the next SANS CyberTalent Fair

(SCTF), an online career fair hosted by the SANS Institute coming up on Wednesday, June 7,

2017. You can register now at http://bit.ly/2pe2yMQ

This daylong virtual career fair event will provide employers and jobseekers in cybersecurity

with the opportunity to engage one another in a unique online setting. The event uses a

dynamic, innovative online platform in which jobseekers and employers can chat, share

resumes and job vacancies, and more! All registrants also have the opportunity to take the

SANS CyberTalent Test at no cost, too!

Past participating employers include Verizon, General Dynamics (IT), U.S. Department of

Homeland Security, Leidos Cyber, Cisco, Juniper Networks, NTT Security, Stroz Friedberg, EY,

the 780th Military Intelligence Cyber Brigade, Deloitte, and many others! It’s the seventh event

in the series, with over 9,000 jobseekers and 55+ employers having participated to date.

The SANS CyberTalent Fair is open to interested jobseekers at no cost. Please visit

http://bit.ly/2pe2yMQ for more information.

Symposium On Usable Privacy and Security (SOUPS) 2017
Jul
12
Jul 14

Symposium On Usable Privacy and Security (SOUPS) 2017

  • Hyatt Regency Santa Clara

The Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) will be co-located with USENIX Annual Technical Conference (ATC) ‘17 and will take place July 12–14, 2017, at the Hyatt Regency Santa Clara in Santa Clara, CA. More information will be available soon.

Black Hat 2017
Jul
21
Jul 27

Black Hat 2017

  • Mandalay Bay Convention Center

Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 20th year. This six day event begins with four days of intense Training for security practitioners of all levels (July 22 - July 25) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (July 26-27).

DEF CON 25
Jul
27
Jul 30

DEF CON 25

  • Caesar's Palace Las Vegas

25th anniversary of the largest annual hacker conference in the world

CSX North America 2017 (an ISACA Cybersecurity event)
Oct
2
Oct 4

CSX North America 2017 (an ISACA Cybersecurity event)

  • Washington, DC USA

Cyber threats affect every enterprise in every industry—no one is too big or too small. Threats don’t take holidays and they are becoming more intrusive and potentially more devastating every day. To help you stay ahead of the most critical issues and find effective solutions, ISACA’s Cybersecurity Nexus (CSX) is hosting the acclaimed CSX 2017 North America Conference.
 
CSX 2017 brings together thought leaders, experts and professionals at all levels of cyber security as well as the next generation of cyber defenders. Here you can find new connections, innovations and resources to build your cyber security profile and help defend your enterprise from the ever growing cyber security threat.

15th Annual EWF National Conference
Oct
24
Oct 26

15th Annual EWF National Conference

  • Hyatt Regency Scottsdale

Join us October 24-26, 2017 as we focus on the most complex and critical issues facing companies globally in the fields of Information Security, Risk Management, and Privacy.

Thrive in the Era of Volatility, Uncertainty and Ambiguity: Cybersecurity, Risk and Leadership Solutions

The most comprehensive and unbiased overview of the current industry landscape for women executive decision-makers.  The EWF National Conference provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy.

During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment. 

The Executive Women's Forum Annual Conference provides the most comprehensive and unbiased overview of the current industry landscape for women executive business decision-makers. 

The Executive Women's Forum (EWF) provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy. During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment.

Register Now

Oct
30
Nov 1

O'Reilly Security Conference, New York, NY

The O'Reilly Security Conference provides pragmatic advice on defensive security practices, arming today's infosec practitioners with real-world tools and techniques.

Build better defenses: The O'Reilly Security 

The O'Reilly Security Conference brings together in-the-trenches security practitioners from organizations of every size, across a wide breadth of industries to share actionable insight in a supportive, hype-free environment. If you have an interesting success (or failure), provocative idea, practical how-to, proven best practice, or effective new approach that could benefit other defenders, we want to hear from you.

Have you fended off a targeted attack? Ejected persistent intruders from your environment? Recovered quickly and effectively from a breach? Integrated new technology into your environment, securely and successfully? Figured out how to keep your access controls (to data, network, or cloud) effective at scale—without losing your mind? Helped your management team and BOD understand how your work is crucial to the bottom line? Or all of the above? If so, submit a proposal to speak at the O'Reilly Security Conference by May 18, 2017.

 

 

San Francisco Tech Security Conference 2017
Nov
9
8:00 am08:00

San Francisco Tech Security Conference 2017

  • San Francisco CA

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 


WISP + IAPP Women Leading Privacy: Speed Networking
Apr
19
5:30 pm17:30

WISP + IAPP Women Leading Privacy: Speed Networking

  • IAPP Summitt - Dogwood and Scarlett Oak Rooms

Speed Networking @ the IAPP Summit

Join the IAPP’s Women Leading Privacy Section and Women in Security and Privacy (WISP) for a fun evening of networking during the Privacy Bash! A mixture of both informal and organized, this networking activity will definitely be a hit! Did we mention raffle prizes? Bring your business cards and come prepared to mix it up with other women (and men) who are leaders in the field of data protection.

Location: Dogwood and Scarlett Oak Rooms

SANS Threat Hunting & Incident Response Summit 2017
Apr
18
Apr 19

SANS Threat Hunting & Incident Response Summit 2017

  • New Orleans Downtown Marriott

Will you be the Hunter or the Prey?

Join SANS for the Threat Hunting & Incident Response Summit in New Orleans! This year's Summit features industry talks filled with the most advanced methodologies used by top cyber defense practitioners. Additionally, choose from seven courses taught by experienced instructors who are actively hunting for threats and stopping the most sophisticated, and dangerous attacks against organizations.

Lock Down Your Login
Apr
11
9:00 am09:00

Lock Down Your Login

  • IT-oLogy Theatre

Hosted by the National Cyber Security Alliance (NCSA):


Lock Down Your Login Events in South Carolina

SC Cyber and NCSA are hosting two events to educate consumers and businesses about adding layers of security to their everyday online activities.

Lock Down Your Login – Columbia
Tuesday, April 11, 9:00 a.m. – 12:00 p.m. (EDT)
IT-oLogy Theatre, 1301 Gervais Street, Columbia, SC

Lock Down Your Login
Apr
10
1:00 pm13:00

Lock Down Your Login

  • Trident Technical College Nursing Auditorium

SC Cyber and NCSA are hosting two events to educate consumers and businesses about adding layers of security to their everyday online activities.

Lock Down Your Login – Charleston
Monday, April 10, 1:00-4:00 p.m. (EDT)
Trident Technical College Nursing Auditorium, 7000 Rivers Avenue,
North Charleston, SC

 

 

 

InfoSec Southwest 2017
Apr
7
Apr 8

InfoSec Southwest 2017

  • Norris Conference Center

ISSW was born from the local hacker community collectively wanting to have an information security conference in Austin. Our goal was to create a venue to host the most informative, original, and emerging topics in information security.

ISSW has become a place where anyone is welcome to learn, interact, mingle, and be a part of the community.

Over the years, ISSW has grown and hosted many diverse lectures and events, while the spirit of community and learning continues to be the paragon of our ethos. Team up with and face-off against your fellow attendees to compete in our Capture the Flag contest, try your skills in the Project Mayhem scavenger hunt, or take part in our turbo-talks, where anyone can contribute to the collaborative learning of the community.

INFILTRATE Security Conference
Apr
6
Apr 7

INFILTRATE Security Conference

  • Fontainbleau Hotel

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.

Women in Cybersecurity (WiCyS) 2017
Mar
31
Apr 1

Women in Cybersecurity (WiCyS) 2017

  • JW Marriott Starr Pass Resort

The WiCyS initiative was launched in 2013 with support from a National Science Foundation grant (Award #1303441, Lead PI: Dr. Ambareen Siraj, Computer Science, Tennessee Tech University) for a collaborative project between Tennessee Tech, University of Memphis (Dr. Judith Simon) and Jackson State Community College (Dr. Tom Pigg and Ms. Lisa Matlock). Since then, with support from various industry, government and academic partners, WiCyS has become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women (students/faculty/researchers/professionals) in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.

Insider Threat Summit 3
Mar
29
Mar 30

Insider Threat Summit 3

  • Hyatt Regency Monterey Hotel & Spa

The Insider Threat Summit 2017 (iTS3) is about bringing Government and Industry organizations and their cybersecurity leaders together in order to better understand the type of threats that may impact their infrastructure and overall operations.

Our two-day summit will provide insights on the most unique and thought provoking active defenses currently available for physical and personnel security, as well as, cyber threats. By supplying intelligent focus through tailored solutions our presenters and sponsors will be contributing to a forum to discuss ways to mitigate the risk of insider threats. This event allows for a truly unique opportunity to hear from experts in the field talk about their current and future solutions, giving way to an optimal setting for networking.

For more information on speakers, their topics, sponsors and a full agenda please go to insiderthreatevents.com

Security B-Sides Oklahoma 2017
Mar
23
Mar 24

Security B-Sides Oklahoma 2017

  • OK USA

Security B-Sides Oklahoma is a regional Security B-Sides. It operates under the umbrella principles of Security B-Sides as a larger community project within information security.

Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

Privacy Lab - March event
Mar
22
5:30 pm17:30

Privacy Lab - March event

  • EFF

Our March speaker is Justin Troutman, creator of PocketBlock. Ultimately, PocketBlock is about advancing security education and literacy, using cryptography as a driver.

PocketBlock is the first initiative in a cross-disciplined space he's dubbed CRUX, or cryptography + user experience. PocketBlock's interactive curricula aims to introduce the concepts behind modern cryptography, by scaling down, and sometimes completely stripping away, the mathematical complexities; instead, it relies heavily on visuals and "moves", instead of formulaic calculations. Because of the malleability and scalability of this approach, it's suitable for everyone from an 8-year-old grade schooler all the way to a tenured developer.

Cultivated through various workshops at Cal Poly SLO's EPIC, Facebook's Hacktober and Hacker Girls Summer Camp, and r00tz Asylum at Defcon, PocketBlock serves as a bridge between classical and modern cryptography; it's an effective catalyst within STEAM initiatives for making cryptography accessible as a potential career path, and also encourages more meaningful dialogue between seasoned developers tasked with implementing strong cryptography, yet without prior knowledge.

During Privacy Lab, Justin will take us through a quick look at Pockenacci, an authenticated block cipher for introducing the concepts of key schedules, S-boxes, and P-boxes. He'll also discuss current development of new ciphers, including a scaled down version of the Advanced Encryption Standard. Also in the works is a narrative-driven, episodic interactive Web adventure (e.g., think Zork in 2017) that involves making and breaking ciphers, PocketBlock style, in order to complete missions and level up.

7th ACM CODASPY 2017
Mar
22
Mar 23

7th ACM CODASPY 2017

  • Scottsdale, AZ USA

7th ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2017

With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

Join American Express’ Tech Hiring Event
Mar
13
8:00 am08:00

Join American Express’ Tech Hiring Event

  • American Express

From customer data to microchips in credit cards, technology is leading the way in financial services. As an industry leader, American Express is always looking for smart, talented technology professionals to help us succeed today and in the future. That’s why we’re seeking a diverse group of top technology talent to join us at our hiring event on March 13, 2017 at the American Express New York office.

If you are a Java/Software Engineer, QA Engineer, Technical Project Manager, Service Delivery Analyst or Product Manager looking for a new opportunity, then we would like to meet you.

The Network and Distributed System Security Symposium 2017
Feb
26
Mar 1

The Network and Distributed System Security Symposium 2017

  • Catamaran Resort Hotel & Spa

The Network and Distributed System Security (NDSS) Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technology.

Security B-Sides NoVA 2017
Feb
25
9:00 am09:00

Security B-Sides NoVA 2017

  • CIT Building

Security B-Sides NoVA is a regional Security B-Sides held in Northern Virginia. It operates under the umbrella principles of Security B-Sides as a larger community project within information security.

Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

HIPAA Privacy Rule Compliance-Understanding New Rules and Responsibilities of Privacy Officer: One and half day In-Person Seminar
Feb
23
Feb 24

HIPAA Privacy Rule Compliance-Understanding New Rules and Responsibilities of Privacy Officer: One and half day In-Person Seminar

  • San Francisco

With the recent implementation of new HIPAA regulations in the HIPAA Omnibus Update of 2013, healthcare organizations are reviewing their compliance and making sure they have the proper policies, procedures, and forms in place. HIPAA Privacy Officers have been renewing their compliance activities and reviewing their documentation to make sure they can meet the challenges of the new rules and avoid breaches and penalties for compliance violations.

This session is designed to provide an intensive, one and a half-day training in HIPAA Privacy Rule compliance, covering:

What’s new in the regulations
What needs to change in your organization
What needs to be addressed for compliance by covered entities and business associates
What are the most important privacy issues
What can happen when compliance is not adequate

This seminar will also explain audits and enforcement, and how privacy regulations relate to security and breach regulations, as well as responding to privacy and security breaches and ways to prevent them. Numerous references and sample documents will be provided.

Cyber Futures: What Will Cybersecurity Look Like in 2020 and Beyond?
Feb
21
5:30 pm17:30

Cyber Futures: What Will Cybersecurity Look Like in 2020 and Beyond?

  • UNIVERSITY OF CALIFORNIA, BERKLEY

This month, Privacy Lab will be hosted by the Center for Long-Term Cybersecurity (CLTC) on the UC Berkeley campus. RSVP.

Cyber Futures: What Will Cybersecurity Look Like in 2020 and Beyond?

CLTC will present on Cybersecurity Futures 2020, a report that poses five scenarios for what cybersecurity may look like in 2020, extrapolating from technological, social, and political forces that are already shaping our world today. CLTC grantees will also present findings from their research.

Directions: South Hall is a 15-minute walk from the Berkeley BART Station. Paid parking is available at the parking structure on Telegraph/Channing. There is also street parking available around campus.

 

 

For those who can't attend in person, we hope to livestream and record on Air Mozilla and Passcode. Livestream usually starts about 15 minutes after the event start time. No need to RSVP to watch the livestream.

More info: https://wiki.mozilla.org/Privacy/Privacy_Lab

RSA, WISP, + Salesforce: Security Around the Globe
Feb
17
7:45 am07:45

RSA, WISP, + Salesforce: Security Around the Globe

  • Salesforce Salesforce East Building

We’ve partnered with the Australian Trade and Investment Commission and Salesforce to host this security panel on global perspectives on cybersecurity. As the world becomes increasingly connected, companies are faced with new and emerging ways in which attackers gain access to and can misuse data, as well as the challenges in addressing inconsistencies in cybersecurity laws or policies across nations. This panel will discuss the ways various sectors of the industry can work together to address these challenges.

Agenda:

7:45 - 8:00 am - Registration and Networking

8:00 - 8:05 am - Introduction

8:05 - 8:50 am - Panel Discussion

8:50 - 9:15 am - Q&A and Networking

Moderator:

  • Michelle Price, Chief Operating Officer, Australian Cyber Security Growth Network

Panelists:

  • Aanchal Gupta, Director of Security at Facebook
  • Dr. Cate Jerram, Information Management and Systems Research, Adelaide Business School
  • Jenna Raby, Senior Director Global Strategic Accounts and Managing Director Asia Pacific and Canada at RiskIQ
  • Nicola Watkinson, Australian Senior Trade and Investment Commissioner USA and Canada

Thank you, Salesforce, for hosting the event!

Please check out the event link here to RSVP & for additional information.

To volunteer with WISP during RSA, please sign up here!

 

RSA Women's Leadership Reception
Feb
14
5:00 pm17:00
CyberTini @ RSA 2017
Feb
14
4:30 pm16:30

CyberTini @ RSA 2017

  • Infusion Lounge

One of the premier CyberHive networking events celebrating the cybersecurity industry is the “CyberTini”. The CyberTini is a high end C-level cocktail party, which includes announcements and comments by the “movers and shakers” in the cybersecurity world. The [email protected] Cyber Incubator will be co-hosting a CyberTini with the Maryland Department of Commerce as a networking event coinciding with the RSA Conference on February 14, 2017 at the North Bar inside the Infusion Lounge in San Francisco. The Infusion Lounge is just a few blocks from the Moscone Center where the RSA Conference is taking place, and is located within the Fusion Hotel. Attendance at the CyberTini is estimated to be in excess of 125. The event will begin at 4:30pm on Day Two of the RSA Conference and will run until approximately 6:30pm. Contact Sarah Purdum ([email protected]) regarding sponsorship opportunities.

 

RSA + WISP - Securing Diversity: Women in Cybersecurity
Feb
13
2:00 pm14:00

RSA + WISP - Securing Diversity: Women in Cybersecurity

  • RSA - Moscone West

Come to this energizing seminar on the power and opportunity of women in security, and the continuing need for increased diversity in this industry. The speakers include an array of accomplished women, from founders to C-Suite members to interns, who will help us explore the power of diversity to lead us towards achieving a stronger cyber-workforce.

Speakers: Dr. Uma Gupta (UmaGupta.com); Mischel Kwon (MKACyber); Jennifer Minella (Carolina Advanced Digital, Inc.); Valerie Plame (VEW, LLC); Leyla D. Seka (Salesforce AppExchange); Rachael Skillman (Intern); Jennifer Steffens (IOActive); Bobbie Stempfley (The MITRE Corporation); and DR. Chenxi Wang (Twistlock).

Note: this event is
not hosted by WISP. It is part of the RSA program. However, WISP members can attend for free. Please check out the event for more information, including an agenda. Please explain that you are a WISP member at the door.

WISP is an official RSA partner. 

RSA Conference 2017
Feb
13
Feb 17

RSA Conference 2017

  • Moscone Center

RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow.

At RSA Conference 2017, you will learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.

Security B-Sides Huntsville 2017
Feb
4
9:00 am09:00

Security B-Sides Huntsville 2017

  • Dynetics, Inc (Solutions Complex building)

BSides Huntsville is an annual security conference located in The Rocket City. Stay tuned as 2017 will be its 4th consecutive year! Previous years were well received and videos are available from IronGeek. All BSides teams are volunteers working hard to put together a productive and enjoyable conference.

WISP + LWT Career Workshop: Salary Negotiations
Feb
1
5:30 pm17:30

WISP + LWT Career Workshop: Salary Negotiations

  • Linkedin

Join us for the 3rd and final career event co-sponsored by Women in Security and Privacy (WISP) and Leading Women in Technology (LWT). 

To a candidate, compensation negotiation is the most important and lasting aspect associated with a hiring process. You need to know what to expect, what to plan, what to calculate, and how to execute. Discover how it commences before you apply, how it plays out when you first interview, and how it progresses from the initial offer to the finale of the counteroffer. Build your confidence by learning a systematic approach and the nuances of the negotiation dialect. 

SANS Cyber Threat Intelligence Summit 2017
Jan
31
Feb 1

SANS Cyber Threat Intelligence Summit 2017

  • Renaissance Arlington Capital View Hote

The Cyber Threat Intelligence Summit & Training is back for another year of in-depth talks, world-class SANS Training, DFIR NetWars, and exclusive networking opportunities! This year's Summit aims to provide specific analysis techniques and capabilities that can be utilized to properly create and maintain Cyber Threat Intelligence in your organization.

While Cyber Threat Intelligence is a relatively new field, we can draw upon classic intelligence approaches to better secure our organizations. Throughout the Summit, we'll be going old school by examining traditional intelligence methods and techniques; and applying them to cyber threat intelligence.

Enigma 2017
Jan
30
Feb 1

Enigma 2017

  • Oakland Marriott City Center

ENIGMA IS A NEW CONFERENCE ON EMERGING THREATS AND NOVEL ATTACKS
It's time for the security community to take a step back and get a fresh perspective on threat assessment and attacks. This is why in 2016 the USENIX Association launched Enigma, a new security conference geared towards those working in both industry and research. Enigma will return in 2017 to keep pushing the community forward.

Expect three full days of high-quality speakers, content, and engagement for which USENIX events are known. 

Data Privacy Day
Jan
28
12:00 am00:00

Data Privacy Day

  • Everywhere

Data Privacy Day is an international holiday that occurs every January 28. The purpose of this holiday is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, and 47 European countries.

Twitter hashtag: #privacyaware

WISP is a proud Champion Organization of Data Privacy Day

Jan
26
11:00 am11:00

Live from Twitter HQ: Data Privacy Day Event 2017

Join the National Cyber Security Alliance to watch these exciting TED-style talks, segments and interviews focusing on the latest privacy issues for consumers and business.

The event will be available online for the world to watch on Livestream, Periscope and Facebook Live. 

Not-to-be-missed segments include:

  • Scams, ID Theft and Fraud, Oh My – And Ways to Fight Back

  • How to Read a Privacy Policy in Less Than 60 Seconds – Even If It Was Written For a Lawyer

  • Privacy and the Next President

  • Growing Up Online and the Need for Teaching Privacy in Schools

Elena Elkina, WISP Board Member and Vice Chair, will be moderating two of the panels.

Jan
25
9:30 am09:30

Art into Science: A Conference for Defense

  • University of Texas - Trinity Hall

ACOD GOALS:

Push the art to a science: Creating a professional discipline 

To mature our practice, we need to be able to share our methodologies in a systematic and consistent way. 

We have many professionals in the security industry, but do not have a professional discipline. We'd like to philosophically discuss concepts in security, push them forward, and model them. 

Glorify the defense: Tools, techniques, and ideas people can leave the conference with and implement 

Security conferences glorify the attacker, and accept attack-oriented talks. We'd like to put defense on a pedestal and take in talks that interest us - operational talks on defense. 

As a field, we need practitioners to offer implementable ideas and or reference implementations to reduce the amount of work that someone has to do to implement what they learn.

ACOD IS A WORKING CONFERENCE

In the "Glorify the defense" (operations) track we will have talks of interest on various investigations and case studies on the one hands, and tools and ideas used to defend our environments on the other. 

The "Push the art into a science" (philosophy) track will be dedicated to working tracks, where the members introduce their own concepts, and then discuss specifics. Most importantly, finish the day with a summary that can be used to push our field into the future.

or more information and to register, visit: http://artintoscience.com