CSX North America 2017 (an ISACA Cybersecurity event)
Oct
2
to Oct 4

CSX North America 2017 (an ISACA Cybersecurity event)

Cyber threats affect every enterprise in every industry—no one is too big or too small. Threats don’t take holidays and they are becoming more intrusive and potentially more devastating every day. To help you stay ahead of the most critical issues and find effective solutions, ISACA’s Cybersecurity Nexus (CSX) is hosting the acclaimed CSX 2017 North America Conference.
 
CSX 2017 brings together thought leaders, experts and professionals at all levels of cyber security as well as the next generation of cyber defenders. Here you can find new connections, innovations and resources to build your cyber security profile and help defend your enterprise from the ever growing cyber security threat.

View Event →
San Francisco Tech Security Conference 2017
Oct
19
8:00am 8:00am

San Francisco Tech Security Conference 2017

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

View Event →
15th Annual EWF National Conference
Oct
24
to Oct 26

15th Annual EWF National Conference

  • Hyatt Regency Scottsdale (map)
  • Google Calendar ICS

Join us October 24-26, 2017 as we focus on the most complex and critical issues facing companies globally in the fields of Information Security, Risk Management, and Privacy.

Thrive in the Era of Volatility, Uncertainty and Ambiguity: Cybersecurity, Risk and Leadership Solutions

The most comprehensive and unbiased overview of the current industry landscape for women executive decision-makers.  The EWF National Conference provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy.

During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment. 

The Executive Women's Forum Annual Conference provides the most comprehensive and unbiased overview of the current industry landscape for women executive business decision-makers. 

The Executive Women's Forum (EWF) provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy. During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment.

Register Now

View Event →
Oct
30
to Nov 1

O'Reilly Security Conference, New York, NY

The O'Reilly Security Conference provides pragmatic advice on defensive security practices, arming today's infosec practitioners with real-world tools and techniques.

Build better defenses: The O'Reilly Security 

The O'Reilly Security Conference brings together in-the-trenches security practitioners from organizations of every size, across a wide breadth of industries to share actionable insight in a supportive, hype-free environment. If you have an interesting success (or failure), provocative idea, practical how-to, proven best practice, or effective new approach that could benefit other defenders, we want to hear from you.

Have you fended off a targeted attack? Ejected persistent intruders from your environment? Recovered quickly and effectively from a breach? Integrated new technology into your environment, securely and successfully? Figured out how to keep your access controls (to data, network, or cloud) effective at scale—without losing your mind? Helped your management team and BOD understand how your work is crucial to the bottom line? Or all of the above? If so, submit a proposal to speak at the O'Reilly Security Conference by May 18, 2017.

 

 

View Event →

Black Hat 2017
Jul
21
to Jul 27

Black Hat 2017

  • Mandalay Bay Convention Center (map)
  • Google Calendar ICS

Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 20th year. This six day event begins with four days of intense Training for security practitioners of all levels (July 22 - July 25) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (July 26-27).

View Event →
Basics of Lockpicking - Workshop
Jun
27
6:00pm 6:00pm

Basics of Lockpicking - Workshop

Bob and Christine’s Lockpick Extreme provides fun, informative, entertaining hands-on training in the arts of lockpicking and handcuff escape. Participants learn how to open real world locks and handcuffs using professional tools and techniques. Once mastering the basic skills, students can compete against each other in timed pin tumbler competition and daring handcuff escapes.

Christine is a California state Licensed Locksmith and Bob is a veteran Network Security Engineer. Together they share their knowledge and love of lockpicking to audiences. They have trained and entertained audiences at security conferences, non-profit security organizations, and fortune 500 companies

View Event →
Solving People Problems in Cybersecurity
Jun
14
10:00am10:00am

Solving People Problems in Cybersecurity

A good cyber defense requires an informed, resilient, diverse and nimble workforce from the marketing and sales to IT and information security teams. Human error impacts our ability to defend ourselves and is a leading threat to organizations of all sizes and our global economy.

Join the National Cyber Security Alliance (NCSA) and Nasdaq for an “outside the box” and data-driven discussion about Americans’ cybersecurity knowledge base, how to minimize human error in the workplace and solutions for addressing the looming cyber-workforce crisis.

View Event →
Intro to Crypto Workshop
Jun
7
6:00pm 6:00pm

Intro to Crypto Workshop

Women in Security and Privacy (WISP) would like to invite you to Intro to Crypto Workshop. Come hear from Whitney Merrill, founder of the Crypto & Privacy Village at DEF CON about what to expect in Vegas this year. She'll also provide tips for submitting to their CFP which closes on June 15.

We're also delighted to welcome Justin Troutman, founder of PocketBlock, who will guide attendees through the basics of how encryption works with an interactive, hands-on workshop

View Event →
The SANS CyberTalent Fair (SCTF)
Jun
7
10:00am10:00am

The SANS CyberTalent Fair (SCTF)

Need a job in cybersecurity? You should consider attending the next SANS CyberTalent Fair

(SCTF), an online career fair hosted by the SANS Institute coming up on Wednesday, June 7,

2017. You can register now at http://bit.ly/2pe2yMQ

This daylong virtual career fair event will provide employers and jobseekers in cybersecurity

with the opportunity to engage one another in a unique online setting. The event uses a

dynamic, innovative online platform in which jobseekers and employers can chat, share

resumes and job vacancies, and more! All registrants also have the opportunity to take the

SANS CyberTalent Test at no cost, too!

Past participating employers include Verizon, General Dynamics (IT), U.S. Department of

Homeland Security, Leidos Cyber, Cisco, Juniper Networks, NTT Security, Stroz Friedberg, EY,

the 780th Military Intelligence Cyber Brigade, Deloitte, and many others! It’s the seventh event

in the series, with over 9,000 jobseekers and 55+ employers having participated to date.

The SANS CyberTalent Fair is open to interested jobseekers at no cost. Please visit

http://bit.ly/2pe2yMQ for more information.

View Event →
12th Annual Symposium on Information Security (ASIA '17)
Jun
7
to Jun 8

12th Annual Symposium on Information Security (ASIA '17)

ASIA is a two-day event that attracts practitioners, researchers, and vendors providing opportunities for business and intellectual engagement among attendees. ASIA '16 was held at the Governor Nelson A. Rockefeller Empire State Plaza Convention Center, Albany, NY 12242 on June 8-9, 2016. The event is always held in the first week of June so keep your calendars open for 2017! Through generous sponsorship, we are able to have free registration for all selected presenters, authors of accepted papers, and members of government organizations. All people who participate in ASIA are able to attend the rest of the NYSCSC sessions that typically cover practical applications of information security.

View Event →
TRUSTe Privacy Risk Summit 2017
Jun
6
8:00am 8:00am

TRUSTe Privacy Risk Summit 2017

TRUSTe Privacy Risk Summit 2017

As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.

The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.

We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.

View Event →
Maximum Overdrive: a discussion on AI and self driving vehicles
May
31
6:00pm 6:00pm

Maximum Overdrive: a discussion on AI and self driving vehicles

On the road to self-driving cars, privacy and security concerns present potential speed bumps and opportunities to reach new heights. Industry players are handling emerging federal, state and international regulatory requirements, creating industry standards in infrastructure, communications, etc., as well as being challenged to obtain and maintain customer trust.

Join Women in Security and Privacy (WISP) for a lively and thoughtful panel discussion with leaders across the self-driving car industry to learn about developments in addressing these and other topics important to self-driving cars.

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

View Event →
May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash
May
23
5:30pm 5:30pm

May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash

Zcash is the first open-source and decentralized cryptocurrency offering strong privacy in the form of shielded transactions, which are made possible by a novel form of zero-knowledge cryptography called zk-SNARKs. Like Bitcoin, Zcash payments are published on a public blockchain, except the sender, recipient, and amount of a transaction may remain fully private. In this talk, we will provide an uncomplicated overview of Zcash, how it works, the history of the protocol and its conception by a talented group of academics, cryptographers and scientists in the original "Zerocoin" paper, what’s happened since it finally launched in late 2016, and what’s in store for the future of ZEC. We'll also look at the current state of the network and discuss the remarkable way we generated the public parameters required to construct and verify shielded transactions, in the so-called parameter generation ceremony.

 

View Event →
2017 Cyber Investing Summit
May
23
8:30am 8:30am

2017 Cyber Investing Summit

The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the $100+ billion dollar cyber security industry. Attendees will explore the financial opportunities, trends, challenges, and investment strategies available in the high growth cyber security sector. The 2016 Inaugural Cyber Investing Summit welcomed 180+ of the leading cyber professionals, technology analysts, venture capitalists, fund managers, investment advisors, government experts, and more. New this year: separate panels offered throughout the day highlighting publicly traded firms as well as privately owned entities, opportunities to meet one-on-one with corporate executives, and new panel topics (including Investment Strategies & Opportunities, M&A Landscape, Funding for Startups, Government Spending Review, Cyber Sale Lifecycle, and more). Network with investment professionals, asset managers, industry experts, financial analysts, media and more.

View Event →
Detecting and Blocking Bots and Non Human Visitors (Workshop)
May
22
5:30pm 5:30pm

Detecting and Blocking Bots and Non Human Visitors (Workshop)

Women in Security and Privacy (WISP) is proud to partner with PerimeterX to offer a 90 minutes hands-on web security workshop that discusses the threats from the latest generation of malicious Bots (nonhuman automated tools) and puts you into the drivers’ seat to learn on how to protect your web application.

Today up to 50% of a company’s web traffic can come from Bots and create a real threat to websites and applications. Bots are ideal workers for repetitive and complex tasks and can easily and efficiently run on different hosts and cloud services—or invisible as malware on infected machines. Bad Bots are participating in different types of attacks impacting all types of applications and businesses—performing the entire scale of attacks from web scraping, account abuse (account creation or account takeover), credit card and coupon guessing scalping, and click fraud. Bots range in complexity and abilities from simple scripts to full browser-based tools that can render complex pages and even solve CAPTCHA challenges.

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

View Event →
38th IEEE Symposium on Security and Privacy
May
22
to May 25

38th IEEE Symposium on Security and Privacy

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2017 Symposium will mark the 38th annual meeting of this flagship conference.

The Symposium will be held on May 22-24, 2017, and the Security and Privacy Workshops will be held on May 25, 2017. Both events will be in San Jose, CA at the Fairmont Hotel.

View Event →
Privacy by Design workshop (Seattle May 2017)
May
18
8:30am 8:30am

Privacy by Design workshop (Seattle May 2017)

Enterprivacy Consulting Group’s Privacy by Design workshop is a half day workshop to help companies build privacy considerations into their product offerings. Privacy by Design is an international concept championed by regulators and industry alike as a means of building trust into interactions with consumers. Called data protection by design by the recently enacted European Union General Data Protection Regulation (GDPR), privacy by design can be an effective tool for not only regulatory compliance but building better products. 

The half day workshop consists of training around the conceptual foundations of Privacy by Design, followed by training on a practical process to achieve it. The process is based on the 5 i’s: Identifying the Individual,the Invader, and the Invasion and then Implementing controls to mitigate that privacy invasion. Participants will learn how to identify invasions from a particular use case and then control selection based on risks to the individual, proportionality of the risk to the benefits and legitimacy of the use. Several case studies will be presented and discussed.

Workshops are limited to 20 participants. 

View Event →
Women in Security and Privacy Happy Hour + Tandem Networking Event
May
10
5:30pm 5:30pm

Women in Security and Privacy Happy Hour + Tandem Networking Event

Join Women in Security and Privacy (WISP) and 23andMe for a Happy Hour + Tandem Networking event in Mountain View.

Enjoy delicious wine, food, and great company at WISP's first event in Silicon Valley!

We'll also have a fun networking session and opportunity to learn more about WISP Tandems (our peer-to-peer mentorship program), and connect with a Tandem partner in person!

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

Our WISP events are casual and informal — a chance for all of us to get together as privacy and security professionals to relax, share our experiences, and catch up.

View Event →
Security West 2017
May
9
to May 18

Security West 2017

  • Manchester Grand Hyatt Hotel (map)
  • Google Calendar ICS

SANS Security West 2017 (May 9-18) returns to San Diego. Choose from more than 30 hands-on Infosec courses taught by SANS incomparable Instructors plus bonus sessions, Emerging Trends in Cybersecurity discussions, CISO Success Talks, vendor expo, and the challenging Core and DFIR NetWars competitions! Register today! http://www.sans.org

View Event →
THOTCON - Chicago's Hacking Conference
May
4
to May 5

THOTCON - Chicago's Hacking Conference

THOTCON (pronounced \ˈthȯt\ and taken from THree - One - Two) is a small venue hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a very limited budget. 

THOTCON 0x8 will be have 2 tracks over two days and over 1100 attendees. It will be held on Thursday, May 4th and Friday, 5th, 2017. The after party will be held at the same venue 2 hours after the end of the conference.

View Event →
Cyber Risk Management Facing Boards,  C-Suites & General Counsel:  Prevention, Crisis Management, and Mitigating Personal Liability
May
1
11:00am11:00am

Cyber Risk Management Facing Boards, C-Suites & General Counsel: Prevention, Crisis Management, and Mitigating Personal Liability

Seyfarth Shaw, AlixPartners and Directors Roundtable invite you to attend "Cyber Risk Management Facing Boards, C-Suites & General Counsel: Prevention, Crisis Management, and Mitigating Personal Liability," a program for corporate directors, executive officers and general counsels, focused on approaches and strategies to forensic preservation of electronically stored information as well as an expert summary of forensic technologies and methodologies used in the field.

The distinguished speakers will address key topics, including:

Cyber Attacks and Defenses

Governance, Compliance & Disclosure Issues

Potential Liability to Government and Shareholders

Litigation Defense and Insurance Coverage

Prioritizing Risk Management Dollars

Different Risks for Different Data Types and Industries

Incidence Response and Planning

Who should attend

This program is designed for directors, senior executives, general counsel, and others with internal oversight of compliance.

 

View Event →
North America CACS Conference 2017 (an ISACA event)
May
1
to May 3

North America CACS Conference 2017 (an ISACA event)

North America Computer Audit, Control, and Security (CACS) Conference

Connect with the most dynamic minds and practitioners in information systems audit, control and security.  

Who Should Attend?

  • ISACA Members, and IS Audit, Assurance, Security and Risk Management and Governance Professionals worldwide.
  • The conference offers an unrivalled opportunity to expand your network and build onto your knowledge and skills.
View Event →
WISP + IAPP Women Leading Privacy: Speed Networking
Apr
19
5:30pm 5:30pm

WISP + IAPP Women Leading Privacy: Speed Networking

  • IAPP Summitt - Dogwood and Scarlett Oak Rooms (map)
  • Google Calendar ICS

Speed Networking @ the IAPP Summit

Join the IAPP’s Women Leading Privacy Section and Women in Security and Privacy (WISP) for a fun evening of networking during the Privacy Bash! A mixture of both informal and organized, this networking activity will definitely be a hit! Did we mention raffle prizes? Bring your business cards and come prepared to mix it up with other women (and men) who are leaders in the field of data protection.

Location: Dogwood and Scarlett Oak Rooms

View Event →
SANS Threat Hunting & Incident Response Summit 2017
Apr
18
to Apr 19

SANS Threat Hunting & Incident Response Summit 2017

  • New Orleans Downtown Marriott (map)
  • Google Calendar ICS

Will you be the Hunter or the Prey?

Join SANS for the Threat Hunting & Incident Response Summit in New Orleans! This year's Summit features industry talks filled with the most advanced methodologies used by top cyber defense practitioners. Additionally, choose from seven courses taught by experienced instructors who are actively hunting for threats and stopping the most sophisticated, and dangerous attacks against organizations.

View Event →
Lock Down Your Login
Apr
11
9:00am 9:00am

Lock Down Your Login

Hosted by the National Cyber Security Alliance (NCSA):


Lock Down Your Login Events in South Carolina

SC Cyber and NCSA are hosting two events to educate consumers and businesses about adding layers of security to their everyday online activities.

Lock Down Your Login – Columbia
Tuesday, April 11, 9:00 a.m. – 12:00 p.m. (EDT)
IT-oLogy Theatre, 1301 Gervais Street, Columbia, SC

View Event →
Lock Down Your Login
Apr
10
1:00pm 1:00pm

Lock Down Your Login

  • Trident Technical College Nursing Auditorium (map)
  • Google Calendar ICS

SC Cyber and NCSA are hosting two events to educate consumers and businesses about adding layers of security to their everyday online activities.

Lock Down Your Login – Charleston
Monday, April 10, 1:00-4:00 p.m. (EDT)
Trident Technical College Nursing Auditorium, 7000 Rivers Avenue,
North Charleston, SC

 

 

 

View Event →
InfoSec Southwest 2017
Apr
7
to Apr 8

InfoSec Southwest 2017

ISSW was born from the local hacker community collectively wanting to have an information security conference in Austin. Our goal was to create a venue to host the most informative, original, and emerging topics in information security.

ISSW has become a place where anyone is welcome to learn, interact, mingle, and be a part of the community.

Over the years, ISSW has grown and hosted many diverse lectures and events, while the spirit of community and learning continues to be the paragon of our ethos. Team up with and face-off against your fellow attendees to compete in our Capture the Flag contest, try your skills in the Project Mayhem scavenger hunt, or take part in our turbo-talks, where anyone can contribute to the collaborative learning of the community.

View Event →
INFILTRATE Security Conference
Apr
6
to Apr 7

INFILTRATE Security Conference

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.

View Event →
QuBit Cybersecurity Conference
Apr
4
to Apr 6

QuBit Cybersecurity Conference

In celebration of International Women´s Day 2017, QuBit is sharing the stories of women who work in cybersecurity, to encourage women to enter the space.  One person who submits a story will be awarded by a Conference Pass for the 2017 QuBit Cybersecurity Conference, in Prague.

Campaign informationhttps://qubitconference.com/Women-Day/2017.htm

View Event →
Women in Cybersecurity (WiCyS) 2017
Mar
31
to Apr 1

Women in Cybersecurity (WiCyS) 2017

  • JW Marriott Starr Pass Resort (map)
  • Google Calendar ICS

The WiCyS initiative was launched in 2013 with support from a National Science Foundation grant (Award #1303441, Lead PI: Dr. Ambareen Siraj, Computer Science, Tennessee Tech University) for a collaborative project between Tennessee Tech, University of Memphis (Dr. Judith Simon) and Jackson State Community College (Dr. Tom Pigg and Ms. Lisa Matlock). Since then, with support from various industry, government and academic partners, WiCyS has become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women (students/faculty/researchers/professionals) in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.

View Event →
Insider Threat Summit 3
Mar
29
to Mar 30

Insider Threat Summit 3

  • Hyatt Regency Monterey Hotel & Spa (map)
  • Google Calendar ICS

The Insider Threat Summit 2017 (iTS3) is about bringing Government and Industry organizations and their cybersecurity leaders together in order to better understand the type of threats that may impact their infrastructure and overall operations.

Our two-day summit will provide insights on the most unique and thought provoking active defenses currently available for physical and personnel security, as well as, cyber threats. By supplying intelligent focus through tailored solutions our presenters and sponsors will be contributing to a forum to discuss ways to mitigate the risk of insider threats. This event allows for a truly unique opportunity to hear from experts in the field talk about their current and future solutions, giving way to an optimal setting for networking.

For more information on speakers, their topics, sponsors and a full agenda please go to insiderthreatevents.com

View Event →
Security B-Sides Oklahoma 2017
Mar
23
to Mar 24

Security B-Sides Oklahoma 2017

Security B-Sides Oklahoma is a regional Security B-Sides. It operates under the umbrella principles of Security B-Sides as a larger community project within information security.

Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

View Event →