Insider Threat Summit 3
Mar
29
Mar 30

Insider Threat Summit 3

  • Hyatt Regency Monterey Hotel & Spa

The Insider Threat Summit 2017 (iTS3) is about bringing Government and Industry organizations and their cybersecurity leaders together in order to better understand the type of threats that may impact their infrastructure and overall operations.

Our two-day summit will provide insights on the most unique and thought provoking active defenses currently available for physical and personnel security, as well as, cyber threats. By supplying intelligent focus through tailored solutions our presenters and sponsors will be contributing to a forum to discuss ways to mitigate the risk of insider threats. This event allows for a truly unique opportunity to hear from experts in the field talk about their current and future solutions, giving way to an optimal setting for networking.

For more information on speakers, their topics, sponsors and a full agenda please go to insiderthreatevents.com

Women in Cybersecurity (WiCyS) 2017
Mar
31
Apr 1

Women in Cybersecurity (WiCyS) 2017

  • JW Marriott Starr Pass Resort

The WiCyS initiative was launched in 2013 with support from a National Science Foundation grant (Award #1303441, Lead PI: Dr. Ambareen Siraj, Computer Science, Tennessee Tech University) for a collaborative project between Tennessee Tech, University of Memphis (Dr. Judith Simon) and Jackson State Community College (Dr. Tom Pigg and Ms. Lisa Matlock). Since then, with support from various industry, government and academic partners, WiCyS has become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women (students/faculty/researchers/professionals) in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.

INFILTRATE Security Conference
Apr
6
Apr 7

INFILTRATE Security Conference

  • Fontainbleau Hotel

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.

InfoSec Southwest 2017
Apr
7
Apr 8

InfoSec Southwest 2017

  • Norris Conference Center

ISSW was born from the local hacker community collectively wanting to have an information security conference in Austin. Our goal was to create a venue to host the most informative, original, and emerging topics in information security.

ISSW has become a place where anyone is welcome to learn, interact, mingle, and be a part of the community.

Over the years, ISSW has grown and hosted many diverse lectures and events, while the spirit of community and learning continues to be the paragon of our ethos. Team up with and face-off against your fellow attendees to compete in our Capture the Flag contest, try your skills in the Project Mayhem scavenger hunt, or take part in our turbo-talks, where anyone can contribute to the collaborative learning of the community.

SANS Threat Hunting & Incident Response Summit 2017
Apr
18
Apr 19

SANS Threat Hunting & Incident Response Summit 2017

  • New Orleans Downtown Marriott

Will you be the Hunter or the Prey?

Join SANS for the Threat Hunting & Incident Response Summit in New Orleans! This year's Summit features industry talks filled with the most advanced methodologies used by top cyber defense practitioners. Additionally, choose from seven courses taught by experienced instructors who are actively hunting for threats and stopping the most sophisticated, and dangerous attacks against organizations.

WISP + IAPP Women Leading Privacy: Speed Networking
Apr
19
5:30 pm17:30

WISP + IAPP Women Leading Privacy: Speed Networking

  • IAPP Summitt - Dogwood and Scarlett Oak Rooms

Speed Networking @ the IAPP Summit

Join the IAPP’s Women Leading Privacy Section and Women in Security and Privacy (WISP) for a fun evening of networking during the Privacy Bash! A mixture of both informal and organized, this networking activity will definitely be a hit! Did we mention raffle prizes? Bring your business cards and come prepared to mix it up with other women (and men) who are leaders in the field of data protection.

Location: Dogwood and Scarlett Oak Rooms

North America CACS Conference 2017 (an ISACA event)
May
1
May 3

North America CACS Conference 2017 (an ISACA event)

  • Las Vegas, NV USA

North America Computer Audit, Control, and Security (CACS) Conference

Connect with the most dynamic minds and practitioners in information systems audit, control and security.  

Who Should Attend?

  • ISACA Members, and IS Audit, Assurance, Security and Risk Management and Governance Professionals worldwide.
  • The conference offers an unrivalled opportunity to expand your network and build onto your knowledge and skills.
THOTCON - Chicago's Hacking Conference
May
4
May 5

THOTCON - Chicago's Hacking Conference

  • Chicago, IL

THOTCON (pronounced \ˈthȯt\ and taken from THree - One - Two) is a small venue hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a very limited budget. 

THOTCON 0x8 will be have 2 tracks over two days and over 1100 attendees. It will be held on Thursday, May 4th and Friday, 5th, 2017. The after party will be held at the same venue 2 hours after the end of the conference.

38th IEEE Symposium on Security and Privacy
May
22
May 25

38th IEEE Symposium on Security and Privacy

  • The Fairmont Hotel

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2017 Symposium will mark the 38th annual meeting of this flagship conference.

The Symposium will be held on May 22-24, 2017, and the Security and Privacy Workshops will be held on May 25, 2017. Both events will be in San Jose, CA at the Fairmont Hotel.

2017 Cyber Investing Summit
May
23
8:30 am08:30

2017 Cyber Investing Summit

  • New York Stock Exchange

The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the $100+ billion dollar cyber security industry. Attendees will explore the financial opportunities, trends, challenges, and investment strategies available in the high growth cyber security sector. The 2016 Inaugural Cyber Investing Summit welcomed 180+ of the leading cyber professionals, technology analysts, venture capitalists, fund managers, investment advisors, government experts, and more. New this year: separate panels offered throughout the day highlighting publicly traded firms as well as privately owned entities, opportunities to meet one-on-one with corporate executives, and new panel topics (including Investment Strategies & Opportunities, M&A Landscape, Funding for Startups, Government Spending Review, Cyber Sale Lifecycle, and more). Network with investment professionals, asset managers, industry experts, financial analysts, media and more.

TRUSTe Privacy Risk Summit 2017
Jun
6
8:00 am08:00

TRUSTe Privacy Risk Summit 2017

  • BESPOKE

TRUSTe Privacy Risk Summit 2017

As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.

The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.

We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.

12th Annual Symposium on Information Security (ASIA '17)
Jun
7
Jun 8

12th Annual Symposium on Information Security (ASIA '17)

  • Albany, NY

ASIA is a two-day event that attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. ASIA '16 was held at the Governor Nelson A. Rockefeller Empire State Plaza Convention Center, Albany, NY 12242 on June 8-9, 2016. The event is always held in the first week of June so keep your calendars open for 2017! Through generous sponsorship, we are able to have free registration for all selected presenters, authors of accepted papers, and members of government organizations. All people who participate in ASIA are able to attend the rest of the NYSCSC sessions that typically cover practical applications of information security.

Symposium On Usable Privacy and Security (SOUPS) 2017
Jul
12
Jul 14

Symposium On Usable Privacy and Security (SOUPS) 2017

  • Hyatt Regency Santa Clara

The Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) will be co-located with USENIX Annual Technical Conference (ATC) ‘17 and will take place July 12–14, 2017, at the Hyatt Regency Santa Clara in Santa Clara, CA. More information will be available soon.

Black Hat 2017
Jul
21
Jul 27

Black Hat 2017

  • Mandalay Bay Convention Center

Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 20th year. This six day event begins with four days of intense Training for security practitioners of all levels (July 22 - July 25) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (July 26-27).

DEF CON 25
Jul
27
Jul 30

DEF CON 25

  • Caesar's Palace Las Vegas

25th anniversary of the largest annual hacker conference in the world

CSX North America 2017 (an ISACA Cybersecurity event)
Oct
2
Oct 4

CSX North America 2017 (an ISACA Cybersecurity event)

  • Washington, DC USA

Cyber threats affect every enterprise in every industry—no one is too big or too small. Threats don’t take holidays and they are becoming more intrusive and potentially more devastating every day. To help you stay ahead of the most critical issues and find effective solutions, ISACA’s Cybersecurity Nexus (CSX) is hosting the acclaimed CSX 2017 North America Conference.
 
CSX 2017 brings together thought leaders, experts and professionals at all levels of cyber security as well as the next generation of cyber defenders. Here you can find new connections, innovations and resources to build your cyber security profile and help defend your enterprise from the ever growing cyber security threat.

15th Annual EWF National Conference
Oct
24
Oct 26

15th Annual EWF National Conference

  • Hyatt Regency Scottsdale

Join us October 24-26, 2017 as we focus on the most complex and critical issues facing companies globally in the fields of Information Security, Risk Management, and Privacy.

Thrive in the Era of Volatility, Uncertainty and Ambiguity: Cybersecurity, Risk and Leadership Solutions

The most comprehensive and unbiased overview of the current industry landscape for women executive decision-makers.  The EWF National Conference provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy.

During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment. 

The Executive Women's Forum Annual Conference provides the most comprehensive and unbiased overview of the current industry landscape for women executive business decision-makers. 

The Executive Women's Forum (EWF) provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy. During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment.

Register Now

San Francisco Tech Security Conference 2017
Nov
9
8:00 am08:00

San Francisco Tech Security Conference 2017

  • San Francisco CA

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 


Security B-Sides Oklahoma 2017
Mar
23
Mar 24

Security B-Sides Oklahoma 2017

  • OK USA

Security B-Sides Oklahoma is a regional Security B-Sides. It operates under the umbrella principles of Security B-Sides as a larger community project within information security.

Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

Privacy Lab - March event
Mar
22
5:30 pm17:30

Privacy Lab - March event

  • EFF

Our March speaker is Justin Troutman, creator of PocketBlock. Ultimately, PocketBlock is about advancing security education and literacy, using cryptography as a driver.

PocketBlock is the first initiative in a cross-disciplined space he's dubbed CRUX, or cryptography + user experience. PocketBlock's interactive curricula aims to introduce the concepts behind modern cryptography, by scaling down, and sometimes completely stripping away, the mathematical complexities; instead, it relies heavily on visuals and "moves", instead of formulaic calculations. Because of the malleability and scalability of this approach, it's suitable for everyone from an 8-year-old grade schooler all the way to a tenured developer.

Cultivated through various workshops at Cal Poly SLO's EPIC, Facebook's Hacktober and Hacker Girls Summer Camp, and r00tz Asylum at Defcon, PocketBlock serves as a bridge between classical and modern cryptography; it's an effective catalyst within STEAM initiatives for making cryptography accessible as a potential career path, and also encourages more meaningful dialogue between seasoned developers tasked with implementing strong cryptography, yet without prior knowledge.

During Privacy Lab, Justin will take us through a quick look at Pockenacci, an authenticated block cipher for introducing the concepts of key schedules, S-boxes, and P-boxes. He'll also discuss current development of new ciphers, including a scaled down version of the Advanced Encryption Standard. Also in the works is a narrative-driven, episodic interactive Web adventure (e.g., think Zork in 2017) that involves making and breaking ciphers, PocketBlock style, in order to complete missions and level up.

7th ACM CODASPY 2017
Mar
22
Mar 23

7th ACM CODASPY 2017

  • Scottsdale, AZ USA

7th ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2017

With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

Join American Express’ Tech Hiring Event
Mar
13
8:00 am08:00

Join American Express’ Tech Hiring Event

  • American Express

From customer data to microchips in credit cards, technology is leading the way in financial services. As an industry leader, American Express is always looking for smart, talented technology professionals to help us succeed today and in the future. That’s why we’re seeking a diverse group of top technology talent to join us at our hiring event on March 13, 2017 at the American Express New York office.

If you are a Java/Software Engineer, QA Engineer, Technical Project Manager, Service Delivery Analyst or Product Manager looking for a new opportunity, then we would like to meet you.

The Network and Distributed System Security Symposium 2017
Feb
26
Mar 1

The Network and Distributed System Security Symposium 2017

  • Catamaran Resort Hotel & Spa

The Network and Distributed System Security (NDSS) Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technology.

Security B-Sides NoVA 2017
Feb
25
9:00 am09:00

Security B-Sides NoVA 2017

  • CIT Building

Security B-Sides NoVA is a regional Security B-Sides held in Northern Virginia. It operates under the umbrella principles of Security B-Sides as a larger community project within information security.

Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

HIPAA Privacy Rule Compliance-Understanding New Rules and Responsibilities of Privacy Officer: One and half day In-Person Seminar
Feb
23
Feb 24

HIPAA Privacy Rule Compliance-Understanding New Rules and Responsibilities of Privacy Officer: One and half day In-Person Seminar

  • San Francisco

With the recent implementation of new HIPAA regulations in the HIPAA Omnibus Update of 2013, healthcare organizations are reviewing their compliance and making sure they have the proper policies, procedures, and forms in place. HIPAA Privacy Officers have been renewing their compliance activities and reviewing their documentation to make sure they can meet the challenges of the new rules and avoid breaches and penalties for compliance violations.

This session is designed to provide an intensive, one and a half-day training in HIPAA Privacy Rule compliance, covering:

What’s new in the regulations
What needs to change in your organization
What needs to be addressed for compliance by covered entities and business associates
What are the most important privacy issues
What can happen when compliance is not adequate

This seminar will also explain audits and enforcement, and how privacy regulations relate to security and breach regulations, as well as responding to privacy and security breaches and ways to prevent them. Numerous references and sample documents will be provided.

Cyber Futures: What Will Cybersecurity Look Like in 2020 and Beyond?
Feb
21
5:30 pm17:30

Cyber Futures: What Will Cybersecurity Look Like in 2020 and Beyond?

  • UNIVERSITY OF CALIFORNIA, BERKLEY

This month, Privacy Lab will be hosted by the Center for Long-Term Cybersecurity (CLTC) on the UC Berkeley campus. RSVP.

Cyber Futures: What Will Cybersecurity Look Like in 2020 and Beyond?

CLTC will present on Cybersecurity Futures 2020, a report that poses five scenarios for what cybersecurity may look like in 2020, extrapolating from technological, social, and political forces that are already shaping our world today. CLTC grantees will also present findings from their research.

Directions: South Hall is a 15-minute walk from the Berkeley BART Station. Paid parking is available at the parking structure on Telegraph/Channing. There is also street parking available around campus.

 

 

For those who can't attend in person, we hope to livestream and record on Air Mozilla and Passcode. Livestream usually starts about 15 minutes after the event start time. No need to RSVP to watch the livestream.

More info: https://wiki.mozilla.org/Privacy/Privacy_Lab

RSA, WISP, + Salesforce: Security Around the Globe
Feb
17
7:45 am07:45

RSA, WISP, + Salesforce: Security Around the Globe

  • Salesforce Salesforce East Building

We’ve partnered with the Australian Trade and Investment Commission and Salesforce to host this security panel on global perspectives on cybersecurity. As the world becomes increasingly connected, companies are faced with new and emerging ways in which attackers gain access to and can misuse data, as well as the challenges in addressing inconsistencies in cybersecurity laws or policies across nations. This panel will discuss the ways various sectors of the industry can work together to address these challenges.

Agenda:

7:45 - 8:00 am - Registration and Networking

8:00 - 8:05 am - Introduction

8:05 - 8:50 am - Panel Discussion

8:50 - 9:15 am - Q&A and Networking

Moderator:

  • Michelle Price, Chief Operating Officer, Australian Cyber Security Growth Network

Panelists:

  • Aanchal Gupta, Director of Security at Facebook
  • Dr. Cate Jerram, Information Management and Systems Research, Adelaide Business School
  • Jenna Raby, Senior Director Global Strategic Accounts and Managing Director Asia Pacific and Canada at RiskIQ
  • Nicola Watkinson, Australian Senior Trade and Investment Commissioner USA and Canada

Thank you, Salesforce, for hosting the event!

Please check out the event link here to RSVP & for additional information.

To volunteer with WISP during RSA, please sign up here!

 

RSA Women's Leadership Reception
Feb
14
5:00 pm17:00
CyberTini @ RSA 2017
Feb
14
4:30 pm16:30

CyberTini @ RSA 2017

  • Infusion Lounge

One of the premier CyberHive networking events celebrating the cybersecurity industry is the “CyberTini”. The CyberTini is a high end C-level cocktail party, which includes announcements and comments by the “movers and shakers” in the cybersecurity world. The [email protected] Cyber Incubator will be co-hosting a CyberTini with the Maryland Department of Commerce as a networking event coinciding with the RSA Conference on February 14, 2017 at the North Bar inside the Infusion Lounge in San Francisco. The Infusion Lounge is just a few blocks from the Moscone Center where the RSA Conference is taking place, and is located within the Fusion Hotel. Attendance at the CyberTini is estimated to be in excess of 125. The event will begin at 4:30pm on Day Two of the RSA Conference and will run until approximately 6:30pm. Contact Sarah Purdum ([email protected]) regarding sponsorship opportunities.

 

RSA + WISP - Securing Diversity: Women in Cybersecurity
Feb
13
2:00 pm14:00

RSA + WISP - Securing Diversity: Women in Cybersecurity

  • RSA - Moscone West

Come to this energizing seminar on the power and opportunity of women in security, and the continuing need for increased diversity in this industry. The speakers include an array of accomplished women, from founders to C-Suite members to interns, who will help us explore the power of diversity to lead us towards achieving a stronger cyber-workforce.

Speakers: Dr. Uma Gupta (UmaGupta.com); Mischel Kwon (MKACyber); Jennifer Minella (Carolina Advanced Digital, Inc.); Valerie Plame (VEW, LLC); Leyla D. Seka (Salesforce AppExchange); Rachael Skillman (Intern); Jennifer Steffens (IOActive); Bobbie Stempfley (The MITRE Corporation); and DR. Chenxi Wang (Twistlock).

Note: this event is
not hosted by WISP. It is part of the RSA program. However, WISP members can attend for free. Please check out the event for more information, including an agenda. Please explain that you are a WISP member at the door.

WISP is an official RSA partner. 

RSA Conference 2017
Feb
13
Feb 17

RSA Conference 2017

  • Moscone Center

RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow.

At RSA Conference 2017, you will learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.

Security B-Sides Huntsville 2017
Feb
4
9:00 am09:00

Security B-Sides Huntsville 2017

  • Dynetics, Inc (Solutions Complex building)

BSides Huntsville is an annual security conference located in The Rocket City. Stay tuned as 2017 will be its 4th consecutive year! Previous years were well received and videos are available from IronGeek. All BSides teams are volunteers working hard to put together a productive and enjoyable conference.

WISP + LWT Career Workshop: Salary Negotiations
Feb
1
5:30 pm17:30

WISP + LWT Career Workshop: Salary Negotiations

  • Linkedin

Join us for the 3rd and final career event co-sponsored by Women in Security and Privacy (WISP) and Leading Women in Technology (LWT). 

To a candidate, compensation negotiation is the most important and lasting aspect associated with a hiring process. You need to know what to expect, what to plan, what to calculate, and how to execute. Discover how it commences before you apply, how it plays out when you first interview, and how it progresses from the initial offer to the finale of the counteroffer. Build your confidence by learning a systematic approach and the nuances of the negotiation dialect. 

SANS Cyber Threat Intelligence Summit 2017
Jan
31
Feb 1

SANS Cyber Threat Intelligence Summit 2017

  • Renaissance Arlington Capital View Hote

The Cyber Threat Intelligence Summit & Training is back for another year of in-depth talks, world-class SANS Training, DFIR NetWars, and exclusive networking opportunities! This year's Summit aims to provide specific analysis techniques and capabilities that can be utilized to properly create and maintain Cyber Threat Intelligence in your organization.

While Cyber Threat Intelligence is a relatively new field, we can draw upon classic intelligence approaches to better secure our organizations. Throughout the Summit, we'll be going old school by examining traditional intelligence methods and techniques; and applying them to cyber threat intelligence.

Enigma 2017
Jan
30
Feb 1

Enigma 2017

  • Oakland Marriott City Center

ENIGMA IS A NEW CONFERENCE ON EMERGING THREATS AND NOVEL ATTACKS
It's time for the security community to take a step back and get a fresh perspective on threat assessment and attacks. This is why in 2016 the USENIX Association launched Enigma, a new security conference geared towards those working in both industry and research. Enigma will return in 2017 to keep pushing the community forward.

Expect three full days of high-quality speakers, content, and engagement for which USENIX events are known. 

Data Privacy Day
Jan
28
12:00 am00:00

Data Privacy Day

  • Everywhere

Data Privacy Day is an international holiday that occurs every January 28. The purpose of this holiday is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, and 47 European countries.

Twitter hashtag: #privacyaware

WISP is a proud Champion Organization of Data Privacy Day

Jan
26
11:00 am11:00

Live from Twitter HQ: Data Privacy Day Event 2017

Join the National Cyber Security Alliance to watch these exciting TED-style talks, segments and interviews focusing on the latest privacy issues for consumers and business.

The event will be available online for the world to watch on Livestream, Periscope and Facebook Live. 

Not-to-be-missed segments include:

  • Scams, ID Theft and Fraud, Oh My – And Ways to Fight Back

  • How to Read a Privacy Policy in Less Than 60 Seconds – Even If It Was Written For a Lawyer

  • Privacy and the Next President

  • Growing Up Online and the Need for Teaching Privacy in Schools

Elena Elkina, WISP Board Member and Vice Chair, will be moderating two of the panels.

Jan
25
9:30 am09:30

Art into Science: A Conference for Defense

  • University of Texas - Trinity Hall

ACOD GOALS:

Push the art to a science: Creating a professional discipline 

To mature our practice, we need to be able to share our methodologies in a systematic and consistent way. 

We have many professionals in the security industry, but do not have a professional discipline. We'd like to philosophically discuss concepts in security, push them forward, and model them. 

Glorify the defense: Tools, techniques, and ideas people can leave the conference with and implement 

Security conferences glorify the attacker, and accept attack-oriented talks. We'd like to put defense on a pedestal and take in talks that interest us - operational talks on defense. 

As a field, we need practitioners to offer implementable ideas and or reference implementations to reduce the amount of work that someone has to do to implement what they learn.

ACOD IS A WORKING CONFERENCE

In the "Glorify the defense" (operations) track we will have talks of interest on various investigations and case studies on the one hands, and tools and ideas used to defend our environments on the other. 

The "Push the art into a science" (philosophy) track will be dedicated to working tracks, where the members introduce their own concepts, and then discuss specifics. Most importantly, finish the day with a summary that can be used to push our field into the future.

or more information and to register, visit: http://artintoscience.com

WISP Event: The State of Cybersecurity under the New Administration
Jan
24
6:00 pm18:00

WISP Event: The State of Cybersecurity under the New Administration

  • Deloitte

The State of Cybersecurity Under the New Administration

Cybersecurity is an increasingly critical issue in our everyday lives. Hacking is easy to conduct and immensely profitable for attackers. Defense, on the other hand, is difficult, reactive, and expensive. Cybersecurity remains a significant challenge for public, companies, and government. 

How will the new Washington administration approach cybersecurity in today's global economy? Will we see more collaboration between industry and government? How will the new administration’s policies affect the state of cybersecurity and our individual rights and liberties? And what can the public do to move the conversation forward? 

Join us for an evening of discussion on the future of cybersecurity under the new administration. We'll discuss evolving challenges, and how industry, the government, and the public can work together to advance the field.

Agenda:

6:00 - 6:30 pm - Registration and Networking

6:30 - 6:40 pm - Introduction

6:45 - 8:00 pm - Panel Discussion

8:00 - 8:30 pm - Q&A and Networking

Moderator:

  • Kate Conger, TechCrunch

Our Panelists:

  • Hala V. Furst, Cybersecurity and Technology Business Liaison, DHS Private Sector Office
  • Jamie Lee Williams, Staff Attorney, Electronic Frontier Foundation
  • Masha Sedova, President/Chief Strategy Officer, Elevate Security
  • Melissa Bishop, Director, Information Security, Risk and Controls Programs, Autodesk
OWASP AppSec California 2017
Jan
23
Jan 25

OWASP AppSec California 2017

  • Annenberg Community Beach House

The Open Web Application Security Project (OWASP) Los Angeles Chapter is teaming up with the Orange County, Santa Barbara and San Diego chapters to bring you the fourth annual AppSec California 2017. The event is a one of a kind experience for information security professionals, developers, and QA and testing professionals, as they gather at the beach from around the world to learn and share knowledge and experiences about secure systems and secure development methodologies.

SFASIS January Chapter Meeting: Enterprise Security Risk Management (ESRM)
Jan
19
9:30 am09:30

SFASIS January Chapter Meeting: Enterprise Security Risk Management (ESRM)

  • Microsoft Silicon Valley Campus

As you may know, ASIS International has decided to make Enterprise Security Risk Management (ESRM) a global strategic priority for our Society. According to ASIS International, ESRM is both a philosophy and a management system that recognizes that security issues should not be stove-piped. It is a risk-based approach to holistically managing the varied security risks in an organization through the application of globally established and accepted risk principles. ESRM embraces all aspects of security management: physical security, cyber security, information security, loss prevention, asset management, threat management, resilience, workplace violence, fraud, brand protection, travel safety, and so on.

B-Sides San Diego 2017
Jan
14
Jan 15

B-Sides San Diego 2017

  • San Diego, CA USA

Each BSides is a community-driven framework for building events for and by information security community members.  The goal is to expand the spectrum of conversation beyond the traditional confines of space and time.  It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening. 

ShmooCon 2017
Jan
13
Jan 15

ShmooCon 2017

  • The Washington Hilton

ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically 40 different talks and presentations on a variety of subjects related to computer security and cyberculture. Multiple events are held at the convention related to cryptography and computer security such as Shmooganography, Hack Fortress, and Ghost in the Shellcode.

FTC's PrivacyCon 2017
Jan
12
6:00 am06:00

FTC's PrivacyCon 2017

  • Washington, DC

The Federal Trade Commission’s next PrivacyCon will take place on January 12, 2017 in Washington, D.C.  The agency’s second PrivacyCon will seek to continue and expand collaboration among leading whitehat researchers, academics, industry representatives, consumer advocates, and the government to address the privacy and security implications of emerging technologies.

This event is free and will be publicly accessible via a live webcast. 

(ISC)2 SecureDallas 2016
Dec
8
9:00 am09:00

(ISC)2 SecureDallas 2016

  • Embassy Suites Dallas - DFW International Airport

Securing the Power of the Cloud

As cloud environments differ industry to industry and company to company, shifting from complex, manually managed infrastructures to automated, flexible cloud environments could pose devastating risks for the most seasoned security professionals. Tackling the myriad of threats requires a fundamental understanding of evolving security principles as well as communication  among the security community in regards to best practices. Join (ISC)2 on December 8th for a one day program at the Embassy Suites DFW airport as we dive into effectively managing the next generation of cyber threats for cloud environments.

FTC Fall Technology Series: Smart TVs
Dec
7
1:00 pm13:00

FTC Fall Technology Series: Smart TVs

  • Constitution Center

Consumers enjoy recommendations based on their television viewing habits (“viewers who watched Mr. Robot… may enjoy Fight Club”), but who else knows what you’re watching? The golden age of television has arrived with the golden age of television tracking. In 2016, virtually all television delivery systems – smart TVs, streaming devices, game consoles, apps, and even old-fashioned set top boxes – track consumers’ viewing habits, and sometimes in new and unexpected ways. Television and streaming device manufacturers, software developers, and the advertising industry are collaborating to learn more about what consumers are watching. These collaborations are allowing advertisers to precisely target consumers and better understand what ads are working. Consumers may even find advertisements based on their television viewing habits appearing on their phones and desktop browsers.