WISP+IAPP European Data Protection Training Event
Nov
16
to Nov 17

WISP+IAPP European Data Protection Training Event

wisplogo.jpg

Join Women in Security and Privacy for a two-day training course presented by IAPP which will help prepare you to become certified in European data protection. The CIPP/E credential shows that you have the comprehensive General Data Protection Regulation (GDPR) knowledge, perspective and understanding to ensure compliance and data protection success in Europe—and to take advantage of the career opportunity this sweeping legislation represents.

WISP has secured a discounted rate for this course, which is $1,036.00 per participant. When you register via Eventbrite, WISP will provide your contact information to IAPP. IAPP will apply this discount and send you an invoice for payment in the amount of $1,036.00. By registering for this event via Eventbrite, you authorize IAPP to bill you directly for the course.

Payment must be received by November 15.

About the course:

cipp-1.png

What You'll Learn:

  • Introduction to European Data Protection
  • European Regulatory Institutions
  • Legislative Framework
  • Compliance with European Data Protection Law and Regulation
  • International Data Transfers

The CIPP is the global industry standard for professionals entering and working in the field of privacy. Achieving a CIPP/E credential demonstrates understanding of a principles-based framework and knowledge base in information privacy within the European context, including critical topics like the EU-U.S. Privacy Shield and GDPR (including Mandatory DPOs).

The course fee includes lunch for the participants, as well as instruction by an IAPP Professional Privacy Facilitator, a participant guide, textbooks, and sample test questions. Note: the course does not include administration of the exam, which participants can register on the IAPP's website to take at their convenience (for an additional fee of $550).

View Event →
Oct
30
to Nov 1

O'Reilly Security Conference, New York, NY

The O'Reilly Security Conference provides pragmatic advice on defensive security practices, arming today's infosec practitioners with real-world tools and techniques.

Build better defenses: The O'Reilly Security 

The O'Reilly Security Conference brings together in-the-trenches security practitioners from organizations of every size, across a wide breadth of industries to share actionable insight in a supportive, hype-free environment. If you have an interesting success (or failure), provocative idea, practical how-to, proven best practice, or effective new approach that could benefit other defenders, we want to hear from you.

Have you fended off a targeted attack? Ejected persistent intruders from your environment? Recovered quickly and effectively from a breach? Integrated new technology into your environment, securely and successfully? Figured out how to keep your access controls (to data, network, or cloud) effective at scale—without losing your mind? Helped your management team and BOD understand how your work is crucial to the bottom line? Or all of the above? If so, submit a proposal to speak at the O'Reilly Security Conference by May 18, 2017.

 

 

View Event →
Dead Drop SF Meetup
Oct
26
6:00 PM18:00

Dead Drop SF Meetup

Join Michael Tan in Dead Drop SF

Amanda.jpg

Led by

Amanda Rousseau

AKA Malware Unicorn

 

Details

This is a meet up for cybersecurity researchers and enthusiasts to come together to share intel around vulnerability research, malware analysis, threat intelligence, pentesting (redteam), defensive strategy (blueteam), data analytics, and machine learning.

View Event →
15th Annual EWF National Conference
Oct
24
to Oct 26

15th Annual EWF National Conference

  • Hyatt Regency Scottsdale (map)
  • Google Calendar ICS

Join us October 24-26, 2017 as we focus on the most complex and critical issues facing companies globally in the fields of Information Security, Risk Management, and Privacy.

Thrive in the Era of Volatility, Uncertainty and Ambiguity: Cybersecurity, Risk and Leadership Solutions

The most comprehensive and unbiased overview of the current industry landscape for women executive decision-makers.  The EWF National Conference provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy.

During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment. 

The Executive Women's Forum Annual Conference provides the most comprehensive and unbiased overview of the current industry landscape for women executive business decision-makers. 

The Executive Women's Forum (EWF) provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy. During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment.

Register Now

View Event →
San Francisco Tech Security Conference 2017
Oct
19
8:00 AM08:00

San Francisco Tech Security Conference 2017

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

View Event →
CSX North America 2017 (an ISACA Cybersecurity event)
Oct
2
to Oct 4

CSX North America 2017 (an ISACA Cybersecurity event)

Cyber threats affect every enterprise in every industry—no one is too big or too small. Threats don’t take holidays and they are becoming more intrusive and potentially more devastating every day. To help you stay ahead of the most critical issues and find effective solutions, ISACA’s Cybersecurity Nexus (CSX) is hosting the acclaimed CSX 2017 North America Conference.
 
CSX 2017 brings together thought leaders, experts and professionals at all levels of cyber security as well as the next generation of cyber defenders. Here you can find new connections, innovations and resources to build your cyber security profile and help defend your enterprise from the ever growing cyber security threat.

View Event →
Black Hat 2017
Jul
21
to Jul 27

Black Hat 2017

  • Mandalay Bay Convention Center (map)
  • Google Calendar ICS

Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 20th year. This six day event begins with four days of intense Training for security practitioners of all levels (July 22 - July 25) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (July 26-27).

View Event →
Basics of Lockpicking - Workshop
Jun
27
6:00 PM18:00

Basics of Lockpicking - Workshop

Bob and Christine’s Lockpick Extreme provides fun, informative, entertaining hands-on training in the arts of lockpicking and handcuff escape. Participants learn how to open real world locks and handcuffs using professional tools and techniques. Once mastering the basic skills, students can compete against each other in timed pin tumbler competition and daring handcuff escapes.

Christine is a California state Licensed Locksmith and Bob is a veteran Network Security Engineer. Together they share their knowledge and love of lockpicking to audiences. They have trained and entertained audiences at security conferences, non-profit security organizations, and fortune 500 companies

View Event →
Solving People Problems in Cybersecurity
Jun
14
10:00 AM10:00

Solving People Problems in Cybersecurity

A good cyber defense requires an informed, resilient, diverse and nimble workforce from the marketing and sales to IT and information security teams. Human error impacts our ability to defend ourselves and is a leading threat to organizations of all sizes and our global economy.

Join the National Cyber Security Alliance (NCSA) and Nasdaq for an “outside the box” and data-driven discussion about Americans’ cybersecurity knowledge base, how to minimize human error in the workplace and solutions for addressing the looming cyber-workforce crisis.

View Event →
Intro to Crypto Workshop
Jun
7
6:00 PM18:00

Intro to Crypto Workshop

Women in Security and Privacy (WISP) would like to invite you to Intro to Crypto Workshop. Come hear from Whitney Merrill, founder of the Crypto & Privacy Village at DEF CON about what to expect in Vegas this year. She'll also provide tips for submitting to their CFP which closes on June 15.

We're also delighted to welcome Justin Troutman, founder of PocketBlock, who will guide attendees through the basics of how encryption works with an interactive, hands-on workshop

View Event →
The SANS CyberTalent Fair (SCTF)
Jun
7
10:00 AM10:00

The SANS CyberTalent Fair (SCTF)

Need a job in cybersecurity? You should consider attending the next SANS CyberTalent Fair

(SCTF), an online career fair hosted by the SANS Institute coming up on Wednesday, June 7,

2017. You can register now at http://bit.ly/2pe2yMQ

This daylong virtual career fair event will provide employers and jobseekers in cybersecurity

with the opportunity to engage one another in a unique online setting. The event uses a

dynamic, innovative online platform in which jobseekers and employers can chat, share

resumes and job vacancies, and more! All registrants also have the opportunity to take the

SANS CyberTalent Test at no cost, too!

Past participating employers include Verizon, General Dynamics (IT), U.S. Department of

Homeland Security, Leidos Cyber, Cisco, Juniper Networks, NTT Security, Stroz Friedberg, EY,

the 780th Military Intelligence Cyber Brigade, Deloitte, and many others! It’s the seventh event

in the series, with over 9,000 jobseekers and 55+ employers having participated to date.

The SANS CyberTalent Fair is open to interested jobseekers at no cost. Please visit

http://bit.ly/2pe2yMQ for more information.

View Event →
12th Annual Symposium on Information Security (ASIA '17)
Jun
7
to Jun 8

12th Annual Symposium on Information Security (ASIA '17)

ASIA is a two-day event that attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. ASIA '16 was held at the Governor Nelson A. Rockefeller Empire State Plaza Convention Center, Albany, NY 12242 on June 8-9, 2016. The event is always held in the first week of June so keep your calendars open for 2017! Through generous sponsorship, we are able to have free registration for all selected presenters, authors of accepted papers, and members of government organizations. All people who participate in ASIA are able to attend the rest of the NYSCSC sessions that typically cover practical applications of information security.

View Event →
TRUSTe Privacy Risk Summit 2017
Jun
6
8:00 AM08:00

TRUSTe Privacy Risk Summit 2017

TRUSTe Privacy Risk Summit 2017

As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.

The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.

We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.

View Event →
Maximum Overdrive: a discussion on AI and self driving vehicles
May
31
6:00 PM18:00

Maximum Overdrive: a discussion on AI and self driving vehicles

On the road to self-driving cars, privacy and security concerns present potential speed bumps and opportunities to reach new heights. Industry players are handling emerging federal, state and international regulatory requirements, creating industry standards in infrastructure, communications, etc., as well as being challenged to obtain and maintain customer trust.

Join Women in Security and Privacy (WISP) for a lively and thoughtful panel discussion with leaders across the self-driving car industry to learn about developments in addressing these and other topics important to self-driving cars.

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

View Event →
May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash
May
23
5:30 PM17:30

May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash

Zcash is the first open-source and decentralized cryptocurrency offering strong privacy in the form of shielded transactions, which are made possible by a novel form of zero-knowledge cryptography called zk-SNARKs. Like Bitcoin, Zcash payments are published on a public blockchain, except the sender, recipient, and amount of a transaction may remain fully private. In this talk, we will provide an uncomplicated overview of Zcash, how it works, the history of the protocol and its conception by a talented group of academics, cryptographers and scientists in the original "Zerocoin" paper, what’s happened since it finally launched in late 2016, and what’s in store for the future of ZEC. We'll also look at the current state of the network and discuss the remarkable way we generated the public parameters required to construct and verify shielded transactions, in the so-called parameter generation ceremony.

 

View Event →
2017 Cyber Investing Summit
May
23
8:30 AM08:30

2017 Cyber Investing Summit

The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the $100+ billion dollar cyber security industry. Attendees will explore the financial opportunities, trends, challenges, and investment strategies available in the high growth cyber security sector. The 2016 Inaugural Cyber Investing Summit welcomed 180+ of the leading cyber professionals, technology analysts, venture capitalists, fund managers, investment advisors, government experts, and more. New this year: separate panels offered throughout the day highlighting publicly traded firms as well as privately owned entities, opportunities to meet one-on-one with corporate executives, and new panel topics (including Investment Strategies & Opportunities, M&A Landscape, Funding for Startups, Government Spending Review, Cyber Sale Lifecycle, and more). Network with investment professionals, asset managers, industry experts, financial analysts, media and more.

View Event →
Detecting and Blocking Bots and Non Human Visitors (Workshop)
May
22
5:30 PM17:30

Detecting and Blocking Bots and Non Human Visitors (Workshop)

Women in Security and Privacy (WISP) is proud to partner with PerimeterX to offer a 90 minutes hands-on web security workshop that discusses the threats from the latest generation of malicious Bots (nonhuman automated tools) and puts you into the drivers’ seat to learn on how to protect your web application.

Today up to 50% of a company’s web traffic can come from Bots and create a real threat to websites and applications. Bots are ideal workers for repetitive and complex tasks and can easily and efficiently run on different hosts and cloud services—or invisible as malware on infected machines. Bad Bots are participating in different types of attacks impacting all types of applications and businesses—performing the entire scale of attacks from web scraping, account abuse (account creation or account takeover), credit card and coupon guessing scalping, and click fraud. Bots range in complexity and abilities from simple scripts to full browser-based tools that can render complex pages and even solve CAPTCHA challenges.

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

View Event →
38th IEEE Symposium on Security and Privacy
May
22
to May 25

38th IEEE Symposium on Security and Privacy

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2017 Symposium will mark the 38th annual meeting of this flagship conference.

The Symposium will be held on May 22-24, 2017, and the Security and Privacy Workshops will be held on May 25, 2017. Both events will be in San Jose, CA at the Fairmont Hotel.

View Event →
Privacy by Design workshop (Seattle May 2017)
May
18
8:30 AM08:30

Privacy by Design workshop (Seattle May 2017)

Enterprivacy Consulting Group’s Privacy by Design workshop is a half day workshop to help companies build privacy considerations into their product offerings. Privacy by Design is an international concept championed by regulators and industry alike as a means of building trust into interactions with consumers. Called data protection by design by the recently enacted European Union General Data Protection Regulation (GDPR), privacy by design can be an effective tool for not only regulatory compliance but building better products. 

The half day workshop consists of training around the conceptual foundations of Privacy by Design, followed by training on a practical process to achieve it. The process is based on the 5 i’s: Identifying the Individual,the Invader, and the Invasion and then Implementing controls to mitigate that privacy invasion. Participants will learn how to identify invasions from a particular use case and then control selection based on risks to the individual, proportionality of the risk to the benefits and legitimacy of the use. Several case studies will be presented and discussed.

Workshops are limited to 20 participants. 

View Event →
Women in Security and Privacy Happy Hour + Tandem Networking Event
May
10
5:30 PM17:30

Women in Security and Privacy Happy Hour + Tandem Networking Event

Join Women in Security and Privacy (WISP) and 23andMe for a Happy Hour + Tandem Networking event in Mountain View.

Enjoy delicious wine, food, and great company at WISP's first event in Silicon Valley!

We'll also have a fun networking session and opportunity to learn more about WISP Tandems (our peer-to-peer mentorship program), and connect with a Tandem partner in person!

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

Our WISP events are casual and informal — a chance for all of us to get together as privacy and security professionals to relax, share our experiences, and catch up.

View Event →
Security West 2017
May
9
to May 18

Security West 2017

  • Manchester Grand Hyatt Hotel (map)
  • Google Calendar ICS

SANS Security West 2017 (May 9-18) returns to San Diego. Choose from more than 30 hands-on Infosec courses taught by SANS incomparable Instructors plus bonus sessions, Emerging Trends in Cybersecurity discussions, CISO Success Talks, vendor expo, and the challenging Core and DFIR NetWars competitions! Register today! http://www.sans.org

View Event →
THOTCON - Chicago's Hacking Conference
May
4
to May 5

THOTCON - Chicago's Hacking Conference

THOTCON (pronounced \ˈthȯt\ and taken from THree - One - Two) is a small venue hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a very limited budget. 

THOTCON 0x8 will be have 2 tracks over two days and over 1100 attendees. It will be held on Thursday, May 4th and Friday, 5th, 2017. The after party will be held at the same venue 2 hours after the end of the conference.

View Event →
Cyber Risk Management Facing Boards,  C-Suites & General Counsel:  Prevention, Crisis Management, and Mitigating Personal Liability
May
1
11:00 AM11:00

Cyber Risk Management Facing Boards, C-Suites & General Counsel: Prevention, Crisis Management, and Mitigating Personal Liability

Seyfarth Shaw, AlixPartners and Directors Roundtable invite you to attend "Cyber Risk Management Facing Boards, C-Suites & General Counsel: Prevention, Crisis Management, and Mitigating Personal Liability," a program for corporate directors, executive officers and general counsels, focused on approaches and strategies to forensic preservation of electronically stored information as well as an expert summary of forensic technologies and methodologies used in the field.

The distinguished speakers will address key topics, including:

Cyber Attacks and Defenses

Governance, Compliance & Disclosure Issues

Potential Liability to Government and Shareholders

Litigation Defense and Insurance Coverage

Prioritizing Risk Management Dollars

Different Risks for Different Data Types and Industries

Incidence Response and Planning

Who should attend

This program is designed for directors, senior executives, general counsel, and others with internal oversight of compliance.

 

View Event →
North America CACS Conference 2017 (an ISACA event)
May
1
to May 3

North America CACS Conference 2017 (an ISACA event)

North America Computer Audit, Control, and Security (CACS) Conference

Connect with the most dynamic minds and practitioners in information systems audit, control and security.  

Who Should Attend?

  • ISACA Members, and IS Audit, Assurance, Security and Risk Management and Governance Professionals worldwide.
  • The conference offers an unrivalled opportunity to expand your network and build onto your knowledge and skills.
View Event →
WISP + IAPP Women Leading Privacy: Speed Networking
Apr
19
5:30 PM17:30

WISP + IAPP Women Leading Privacy: Speed Networking

  • IAPP Summitt - Dogwood and Scarlett Oak Rooms (map)
  • Google Calendar ICS

Speed Networking @ the IAPP Summit

Join the IAPP’s Women Leading Privacy Section and Women in Security and Privacy (WISP) for a fun evening of networking during the Privacy Bash! A mixture of both informal and organized, this networking activity will definitely be a hit! Did we mention raffle prizes? Bring your business cards and come prepared to mix it up with other women (and men) who are leaders in the field of data protection.

Location: Dogwood and Scarlett Oak Rooms

View Event →