conference

Filtering by: conference

CryptoChicks Hackathon + Conference
Apr
6
to Apr 8

CryptoChicks Hackathon + Conference

Featuring World's First Blockchain Female Only Hackathon

Plus Conference with Female Speakers and Panelists

 

About

CryptoChicks Hackathon and Conference is an open invitation to women looking to take part in a bold blockchain event. Women are underrepresented in the crypto space and with your help, we want to change that. We are calling for blockchain leaders, mentors, advisors, speakers to be the new faces that will help educate, encourage and inspire women to learn new skills and take on new challenges.

Hackathon

We invite business analysts, designers, developers and hackers who want to develop and present decentralized products or it’s prototype in 36-hour hacking time window. When developing your product you free to choose any blockchain platform. The only requirement is that your team has to be female only. Each team can have a mentor – male or female. Mentors have to apply separately.

Our goal is to make this hackathon as big as possible. We will consider all applications. Even if you have never hacked blockchain before, you can apply to have our sponsor BlockGeeks to provide you free online education if you choose to participate in our hackathon. Registration is free. All hackathon participants have free access to the Conference.  Registration deadline is March 15, 2018.

Conference

It will be three days of workshops and panels. We are inviting world top blockchain leaders to speak at our conference.

Early bird ticket sale will be ending March 15, 2018.
VIP tickets with reserved seating and VIP dinner are available.

Tickets will be available for sale shortly. Contact us at [email protected] to pre-order your tickets.

View Event →
2018 International Privacy + Security Forum
Feb
26
to Feb 27

2018 International Privacy + Security Forum

  • The Marvin Center, George Washington Univ. (map)
  • Google Calendar ICS

The International Privacy+Security Forum is a new annual sister event to the Privacy+Security Forum, an annual event held in October at George Washington University in Washington, DC.  The Forum will be in its 4th year in 2018.  This past year, we had 800 participants. Paul Schwartz and Daniel J. Solove created the International Forum to recognize the profound importance of international privacy and security law, not just abroad, but here in the United States.  The International Forum will be held on Mon, Feb 26 and Tues, Feb 27, 2018 at GW University in Washington DC. 

Schedule: https://www.intlprivacysecurityforum.com/schedule-2018/

Speakers: https://www.intlprivacysecurityforum.com/speakers-2018/

More sessions + speakers to be announced soon.

Get 30% off with code IPSFwisp

View Event →
15th Annual EWF National Conference
Oct
24
to Oct 26

15th Annual EWF National Conference

  • Hyatt Regency Scottsdale (map)
  • Google Calendar ICS

Join us October 24-26, 2017 as we focus on the most complex and critical issues facing companies globally in the fields of Information Security, Risk Management, and Privacy.

Thrive in the Era of Volatility, Uncertainty and Ambiguity: Cybersecurity, Risk and Leadership Solutions

The most comprehensive and unbiased overview of the current industry landscape for women executive decision-makers.  The EWF National Conference provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy.

During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment. 

The Executive Women's Forum Annual Conference provides the most comprehensive and unbiased overview of the current industry landscape for women executive business decision-makers. 

The Executive Women's Forum (EWF) provides an exclusive opportunity to personally interact with more than 400 global thought leaders in the fields of Information Security, Risk Management and Privacy. During this three-day event, members collaborate on round-table exercises, incident simulations, panel discussions and working groups. Exposure to new ideas and approaches, best practice management of everyday issues and learning from observing the best and the brightest is an excellent and abundant return on investment.

Register Now

View Event →
San Francisco Tech Security Conference 2017
Oct
19
8:00 AM08:00

San Francisco Tech Security Conference 2017

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

Data Connectors will be hosting the San Francisco Tech Security Conference on Thursday, Nov. 9th. The event will start at 8:15 AM with a check-in and opening introductions before presentation sessions begin at 8:45. Between the educational sessions that go throughout the day, there will be time to visit vendor booths to obtain information regarding product and service offerings. 

View Event →
CSX North America 2017 (an ISACA Cybersecurity event)
Oct
2
to Oct 4

CSX North America 2017 (an ISACA Cybersecurity event)

Cyber threats affect every enterprise in every industry—no one is too big or too small. Threats don’t take holidays and they are becoming more intrusive and potentially more devastating every day. To help you stay ahead of the most critical issues and find effective solutions, ISACA’s Cybersecurity Nexus (CSX) is hosting the acclaimed CSX 2017 North America Conference.
 
CSX 2017 brings together thought leaders, experts and professionals at all levels of cyber security as well as the next generation of cyber defenders. Here you can find new connections, innovations and resources to build your cyber security profile and help defend your enterprise from the ever growing cyber security threat.

View Event →
Solving People Problems in Cybersecurity
Jun
14
10:00 AM10:00

Solving People Problems in Cybersecurity

A good cyber defense requires an informed, resilient, diverse and nimble workforce from the marketing and sales to IT and information security teams. Human error impacts our ability to defend ourselves and is a leading threat to organizations of all sizes and our global economy.

Join the National Cyber Security Alliance (NCSA) and Nasdaq for an “outside the box” and data-driven discussion about Americans’ cybersecurity knowledge base, how to minimize human error in the workplace and solutions for addressing the looming cyber-workforce crisis.

View Event →
TRUSTe Privacy Risk Summit 2017
Jun
6
8:00 AM08:00

TRUSTe Privacy Risk Summit 2017

TRUSTe Privacy Risk Summit 2017

As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.

The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.

We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.

View Event →
May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash
May
23
5:30 PM17:30

May 2017 Privacy Lab - Privacy on the Blockchain: An Introduction to Zcash

Zcash is the first open-source and decentralized cryptocurrency offering strong privacy in the form of shielded transactions, which are made possible by a novel form of zero-knowledge cryptography called zk-SNARKs. Like Bitcoin, Zcash payments are published on a public blockchain, except the sender, recipient, and amount of a transaction may remain fully private. In this talk, we will provide an uncomplicated overview of Zcash, how it works, the history of the protocol and its conception by a talented group of academics, cryptographers and scientists in the original "Zerocoin" paper, what’s happened since it finally launched in late 2016, and what’s in store for the future of ZEC. We'll also look at the current state of the network and discuss the remarkable way we generated the public parameters required to construct and verify shielded transactions, in the so-called parameter generation ceremony.

 

View Event →
2017 Cyber Investing Summit
May
23
8:30 AM08:30

2017 Cyber Investing Summit

The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the $100+ billion dollar cyber security industry. Attendees will explore the financial opportunities, trends, challenges, and investment strategies available in the high growth cyber security sector. The 2016 Inaugural Cyber Investing Summit welcomed 180+ of the leading cyber professionals, technology analysts, venture capitalists, fund managers, investment advisors, government experts, and more. New this year: separate panels offered throughout the day highlighting publicly traded firms as well as privately owned entities, opportunities to meet one-on-one with corporate executives, and new panel topics (including Investment Strategies & Opportunities, M&A Landscape, Funding for Startups, Government Spending Review, Cyber Sale Lifecycle, and more). Network with investment professionals, asset managers, industry experts, financial analysts, media and more.

View Event →
Detecting and Blocking Bots and Non Human Visitors (Workshop)
May
22
5:30 PM17:30

Detecting and Blocking Bots and Non Human Visitors (Workshop)

Women in Security and Privacy (WISP) is proud to partner with PerimeterX to offer a 90 minutes hands-on web security workshop that discusses the threats from the latest generation of malicious Bots (nonhuman automated tools) and puts you into the drivers’ seat to learn on how to protect your web application.

Today up to 50% of a company’s web traffic can come from Bots and create a real threat to websites and applications. Bots are ideal workers for repetitive and complex tasks and can easily and efficiently run on different hosts and cloud services—or invisible as malware on infected machines. Bad Bots are participating in different types of attacks impacting all types of applications and businesses—performing the entire scale of attacks from web scraping, account abuse (account creation or account takeover), credit card and coupon guessing scalping, and click fraud. Bots range in complexity and abilities from simple scripts to full browser-based tools that can render complex pages and even solve CAPTCHA challenges.

Please feel free to invite your fellow privacy and security colleagues, but hurry! Space is limited.

View Event →
Privacy by Design workshop (Seattle May 2017)
May
18
8:30 AM08:30

Privacy by Design workshop (Seattle May 2017)

Enterprivacy Consulting Group’s Privacy by Design workshop is a half day workshop to help companies build privacy considerations into their product offerings. Privacy by Design is an international concept championed by regulators and industry alike as a means of building trust into interactions with consumers. Called data protection by design by the recently enacted European Union General Data Protection Regulation (GDPR), privacy by design can be an effective tool for not only regulatory compliance but building better products. 

The half day workshop consists of training around the conceptual foundations of Privacy by Design, followed by training on a practical process to achieve it. The process is based on the 5 i’s: Identifying the Individual,the Invader, and the Invasion and then Implementing controls to mitigate that privacy invasion. Participants will learn how to identify invasions from a particular use case and then control selection based on risks to the individual, proportionality of the risk to the benefits and legitimacy of the use. Several case studies will be presented and discussed.

Workshops are limited to 20 participants. 

View Event →
Security West 2017
May
9
to May 18

Security West 2017

  • Manchester Grand Hyatt Hotel (map)
  • Google Calendar ICS

SANS Security West 2017 (May 9-18) returns to San Diego. Choose from more than 30 hands-on Infosec courses taught by SANS incomparable Instructors plus bonus sessions, Emerging Trends in Cybersecurity discussions, CISO Success Talks, vendor expo, and the challenging Core and DFIR NetWars competitions! Register today! http://www.sans.org

View Event →
Cyber Risk Management Facing Boards,  C-Suites & General Counsel:  Prevention, Crisis Management, and Mitigating Personal Liability
May
1
11:00 AM11:00

Cyber Risk Management Facing Boards, C-Suites & General Counsel: Prevention, Crisis Management, and Mitigating Personal Liability

Seyfarth Shaw, AlixPartners and Directors Roundtable invite you to attend "Cyber Risk Management Facing Boards, C-Suites & General Counsel: Prevention, Crisis Management, and Mitigating Personal Liability," a program for corporate directors, executive officers and general counsels, focused on approaches and strategies to forensic preservation of electronically stored information as well as an expert summary of forensic technologies and methodologies used in the field.

The distinguished speakers will address key topics, including:

Cyber Attacks and Defenses

Governance, Compliance & Disclosure Issues

Potential Liability to Government and Shareholders

Litigation Defense and Insurance Coverage

Prioritizing Risk Management Dollars

Different Risks for Different Data Types and Industries

Incidence Response and Planning

Who should attend

This program is designed for directors, senior executives, general counsel, and others with internal oversight of compliance.

 

View Event →
North America CACS Conference 2017 (an ISACA event)
May
1
to May 3

North America CACS Conference 2017 (an ISACA event)

North America Computer Audit, Control, and Security (CACS) Conference

Connect with the most dynamic minds and practitioners in information systems audit, control and security.  

Who Should Attend?

  • ISACA Members, and IS Audit, Assurance, Security and Risk Management and Governance Professionals worldwide.
  • The conference offers an unrivalled opportunity to expand your network and build onto your knowledge and skills.
View Event →
WISP + IAPP Women Leading Privacy: Speed Networking
Apr
19
5:30 PM17:30

WISP + IAPP Women Leading Privacy: Speed Networking

  • IAPP Summitt - Dogwood and Scarlett Oak Rooms (map)
  • Google Calendar ICS

Speed Networking @ the IAPP Summit

Join the IAPP’s Women Leading Privacy Section and Women in Security and Privacy (WISP) for a fun evening of networking during the Privacy Bash! A mixture of both informal and organized, this networking activity will definitely be a hit! Did we mention raffle prizes? Bring your business cards and come prepared to mix it up with other women (and men) who are leaders in the field of data protection.

Location: Dogwood and Scarlett Oak Rooms

View Event →
SANS Threat Hunting & Incident Response Summit 2017
Apr
18
to Apr 19

SANS Threat Hunting & Incident Response Summit 2017

  • New Orleans Downtown Marriott (map)
  • Google Calendar ICS

Will you be the Hunter or the Prey?

Join SANS for the Threat Hunting & Incident Response Summit in New Orleans! This year's Summit features industry talks filled with the most advanced methodologies used by top cyber defense practitioners. Additionally, choose from seven courses taught by experienced instructors who are actively hunting for threats and stopping the most sophisticated, and dangerous attacks against organizations.

View Event →
InfoSec Southwest 2017
Apr
7
to Apr 8

InfoSec Southwest 2017

ISSW was born from the local hacker community collectively wanting to have an information security conference in Austin. Our goal was to create a venue to host the most informative, original, and emerging topics in information security.

ISSW has become a place where anyone is welcome to learn, interact, mingle, and be a part of the community.

Over the years, ISSW has grown and hosted many diverse lectures and events, while the spirit of community and learning continues to be the paragon of our ethos. Team up with and face-off against your fellow attendees to compete in our Capture the Flag contest, try your skills in the Project Mayhem scavenger hunt, or take part in our turbo-talks, where anyone can contribute to the collaborative learning of the community.

View Event →
INFILTRATE Security Conference
Apr
6
to Apr 7

INFILTRATE Security Conference

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.

View Event →
QuBit Cybersecurity Conference
Apr
4
to Apr 6

QuBit Cybersecurity Conference

In celebration of International Women´s Day 2017, QuBit is sharing the stories of women who work in cybersecurity, to encourage women to enter the space.  One person who submits a story will be awarded by a Conference Pass for the 2017 QuBit Cybersecurity Conference, in Prague.

Campaign informationhttps://qubitconference.com/Women-Day/2017.htm

View Event →
Women in Cybersecurity (WiCyS) 2017
Mar
31
to Apr 1

Women in Cybersecurity (WiCyS) 2017

  • JW Marriott Starr Pass Resort (map)
  • Google Calendar ICS

The WiCyS initiative was launched in 2013 with support from a National Science Foundation grant (Award #1303441, Lead PI: Dr. Ambareen Siraj, Computer Science, Tennessee Tech University) for a collaborative project between Tennessee Tech, University of Memphis (Dr. Judith Simon) and Jackson State Community College (Dr. Tom Pigg and Ms. Lisa Matlock). Since then, with support from various industry, government and academic partners, WiCyS has become a continuing effort to recruit, retain and advance women in cybersecurity. It brings together women (students/faculty/researchers/professionals) in cybersecurity from academia, research and industry for sharing of knowledge/experience, networking and mentoring.

View Event →
Security B-Sides Oklahoma 2017
Mar
23
to Mar 24

Security B-Sides Oklahoma 2017

Security B-Sides Oklahoma is a regional Security B-Sides. It operates under the umbrella principles of Security B-Sides as a larger community project within information security.

Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

View Event →
7th ACM CODASPY 2017
Mar
22
to Mar 23

7th ACM CODASPY 2017

7th ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2017

With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

View Event →
Security B-Sides NoVA 2017
Feb
25
9:00 AM09:00

Security B-Sides NoVA 2017

Security B-Sides NoVA is a regional Security B-Sides held in Northern Virginia. It operates under the umbrella principles of Security B-Sides as a larger community project within information security.

Each Security B-Sides is a community-driven framework for building events for, and by, information security practitioners. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

View Event →
RSA, WISP, + Salesforce: Security Around the Globe
Feb
17
7:45 AM07:45

RSA, WISP, + Salesforce: Security Around the Globe

  • Salesforce Salesforce East Building (map)
  • Google Calendar ICS

We’ve partnered with the Australian Trade and Investment Commission and Salesforce to host this security panel on global perspectives on cybersecurity. As the world becomes increasingly connected, companies are faced with new and emerging ways in which attackers gain access to and can misuse data, as well as the challenges in addressing inconsistencies in cybersecurity laws or policies across nations. This panel will discuss the ways various sectors of the industry can work together to address these challenges.

Agenda:

7:45 - 8:00 am - Registration and Networking

8:00 - 8:05 am - Introduction

8:05 - 8:50 am - Panel Discussion

8:50 - 9:15 am - Q&A and Networking

Moderator:

  • Michelle Price, Chief Operating Officer, Australian Cyber Security Growth Network

Panelists:

  • Aanchal Gupta, Director of Security at Facebook
  • Dr. Cate Jerram, Information Management and Systems Research, Adelaide Business School
  • Jenna Raby, Senior Director Global Strategic Accounts and Managing Director Asia Pacific and Canada at RiskIQ
  • Nicola Watkinson, Australian Senior Trade and Investment Commissioner USA and Canada

Thank you, Salesforce, for hosting the event!

Please check out the event link here to RSVP & for additional information.

To volunteer with WISP during RSA, please sign up here!

 

View Event →
RSA + WISP - Securing Diversity: Women in Cybersecurity
Feb
13
2:00 PM14:00

RSA + WISP - Securing Diversity: Women in Cybersecurity

Come to this energizing seminar on the power and opportunity of women in security, and the continuing need for increased diversity in this industry. The speakers include an array of accomplished women, from founders to C-Suite members to interns, who will help us explore the power of diversity to lead us towards achieving a stronger cyber-workforce.

Speakers: Dr. Uma Gupta (UmaGupta.com); Mischel Kwon (MKACyber); Jennifer Minella (Carolina Advanced Digital, Inc.); Valerie Plame (VEW, LLC); Leyla D. Seka (Salesforce AppExchange); Rachael Skillman (Intern); Jennifer Steffens (IOActive); Bobbie Stempfley (The MITRE Corporation); and DR. Chenxi Wang (Twistlock).

Note: this event is
not hosted by WISP. It is part of the RSA program. However, WISP members can attend for free. Please check out the event for more information, including an agenda. Please explain that you are a WISP member at the door.

WISP is an official RSA partner. 

View Event →
RSA Conference 2017
Feb
13
to Feb 17

RSA Conference 2017

RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow.

At RSA Conference 2017, you will learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.

View Event →
SANS Cyber Threat Intelligence Summit 2017
Jan
31
to Feb 1

SANS Cyber Threat Intelligence Summit 2017

  • Renaissance Arlington Capital View Hote (map)
  • Google Calendar ICS

The Cyber Threat Intelligence Summit & Training is back for another year of in-depth talks, world-class SANS Training, DFIR NetWars, and exclusive networking opportunities! This year's Summit aims to provide specific analysis techniques and capabilities that can be utilized to properly create and maintain Cyber Threat Intelligence in your organization.

While Cyber Threat Intelligence is a relatively new field, we can draw upon classic intelligence approaches to better secure our organizations. Throughout the Summit, we'll be going old school by examining traditional intelligence methods and techniques; and applying them to cyber threat intelligence.

View Event →
Enigma 2017
Jan
30
to Feb 1

Enigma 2017

  • Oakland Marriott City Center (map)
  • Google Calendar ICS

ENIGMA IS A NEW CONFERENCE ON EMERGING THREATS AND NOVEL ATTACKS
It's time for the security community to take a step back and get a fresh perspective on threat assessment and attacks. This is why in 2016 the USENIX Association launched Enigma, a new security conference geared towards those working in both industry and research. Enigma will return in 2017 to keep pushing the community forward.

Expect three full days of high-quality speakers, content, and engagement for which USENIX events are known. 

View Event →
Jan
25
9:30 AM09:30

Art into Science: A Conference for Defense

  • University of Texas - Trinity Hall (map)
  • Google Calendar ICS

ACOD GOALS:

Push the art to a science: Creating a professional discipline 

To mature our practice, we need to be able to share our methodologies in a systematic and consistent way. 

We have many professionals in the security industry, but do not have a professional discipline. We'd like to philosophically discuss concepts in security, push them forward, and model them. 

Glorify the defense: Tools, techniques, and ideas people can leave the conference with and implement 

Security conferences glorify the attacker, and accept attack-oriented talks. We'd like to put defense on a pedestal and take in talks that interest us - operational talks on defense. 

As a field, we need practitioners to offer implementable ideas and or reference implementations to reduce the amount of work that someone has to do to implement what they learn.

ACOD IS A WORKING CONFERENCE

In the "Glorify the defense" (operations) track we will have talks of interest on various investigations and case studies on the one hands, and tools and ideas used to defend our environments on the other. 

The "Push the art into a science" (philosophy) track will be dedicated to working tracks, where the members introduce their own concepts, and then discuss specifics. Most importantly, finish the day with a summary that can be used to push our field into the future.

or more information and to register, visit: http://artintoscience.com

View Event →
OWASP AppSec California 2017
Jan
23
to Jan 25

OWASP AppSec California 2017

  • Annenberg Community Beach House (map)
  • Google Calendar ICS

The Open Web Application Security Project (OWASP) Los Angeles Chapter is teaming up with the Orange County, Santa Barbara and San Diego chapters to bring you the fourth annual AppSec California 2017. The event is a one of a kind experience for information security professionals, developers, and QA and testing professionals, as they gather at the beach from around the world to learn and share knowledge and experiences about secure systems and secure development methodologies.

View Event →