Cyber Security Conferences & Events

The most complete calendar of Cyber Security events and conferences

Conferences

Nov
15
Thu
Real-time 2018: “Real-Time and Security”
Nov 15 – Nov 16 all-day
Real-time 2018: "Real-Time and Security"

REAL TIME is the annual workshop of the “Real-time Systems” technical committee of the German Informatics Society, held since 1980 (in the beginning as PEARL Workshop). The proceedings will be published by Springer Verlag in the series ‘Informatik aktuell’.

Nov
16
Fri
Qubit Sofia @ Hotel Expo Sofia
Nov 16 all-day
Qubit Sofia @ Hotel Expo Sofia

The Cybersecurity Conference in SEE region
Practical workshops, excellent speakers, educational session, news & networking.

Nov
18
Sun
The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018) @ NOVOTEL Athenes Hotel
Nov 18 – Nov 22 all-day
The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018) @ NOVOTEL Athenes Hotel

The increased size and complexity of the communications and the networking infrastructures are making it difficult the investigation of the resiliency, security assessment, safety and crimes. Mobility, anonymity, counterfeiting, are characteristics that add more complexity in Internet of Things and Cloud-based solutions. Cyber-physical systems exhibit a strong link between the computational and physical elements. Techniques for cyber resilience, cyber security, protecting the cyber infrastructure, cyber forensic and cyber crimes have been developed and deployed. Some of new solutions are nature-inspired and social-inspired leading to self-secure and self-defending systems. Despite the achievements, security and privacy, disaster management, social forensics, and anomalies/crimes detection are challenges within cyber-systems.

CYBER 2018, The Third International Conference on Advances in Cyber-Technologies and Cyber-Systems, continues the inaugural event covering many aspects related to cyber-systems and cyber-technologies considering the issues mentioned above and potential solutions. It is also intended to illustrate appropriate current academic and industry cyber-system projects, prototypes, and deployed products and services.

Nov
21
Wed
Cryptography and Security in Computing Systems (CS)
Nov 21 all-day

The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them.

Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems.

The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.

Nov
26
Mon
NH-ISAC Fall Summit
Nov 26 – Nov 29 all-day
NH-ISAC Fall Summit

We help you engage in and increase your networking opportunities with many member driven activities. Bi-Annual Summits, foster physical and cyber security enrichment as well as the fellowship of like-minded colleagues. Breakout sessions offer members the opportunity to distribute high-level security practices to non-members seeking assistance in many sub sectors of HPH.

Nov
28
Wed
AVAR International Anti-Virus Security Conference
Nov 28 – Nov 30 all-day
AVAR International Anti-Virus Security Conference

AVAR (Association of anti Virus Asia Researchers) was formed in June, 1998 with a mission to prevent the spread of malware and the damage caused by it. AVAR aims to do this by developing cooperative relationships among anti-malware experts in Asia. AVAR is an independent and non-profit organization which focuses on the Asia Pacific region and consists of prominent experts from 17 territories including Australia, China, Hong Kong, India, Japan, Korea, Philippines, Singapore, Taiwan, UK, and the USA.

AVAR’s independence is crucial in the global fight against malware and in raising user awareness on computer security issues. AVAR has a constitution and a code of conduct, and is committed to improving members’ knowledge and skills.

Nov
29
Thu
Data Connectors Phoenix Tech-Security
Nov 29 @ 8:00 am – 5:00 pm
Data Connectors Phoenix Tech-Security

The Phoenix Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Dec
5
Wed
Data Connectors Dallas Tech-Security
Dec 5 all-day
Data Connectors Dallas Tech-Security

The Dallas Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Dec
6
Thu
Data Connectors Washington, D.C. Tech-Security
Dec 6 all-day
Data Connectors Washington, D.C. Tech-Security

The Washington, D.C. Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Jan
7
Mon
FloCon 2019 @ Royal Sonesta New Orleans
Jan 7 – Jan 10 all-day
FloCon 2019 @ Royal Sonesta New Orleans

FloCon provides a forum for exploring large-scale, next-generation data analytics in support of security operations.  FloCon is geared toward operational analysts, tool developers, researchers, security professionals, and others interested in applying cutting-edge techniques to analyze and visualize large datasets for protection and defense of networked systems.

FloCon focuses on applying analytics to ANY large-scale dataset to enhance security, not just network flow data.  Everyone who is interested in data-driven security is invited to attend this conference. We are particularly interested in new, innovative ways to use Big Data to address thorny security problems.

If you’ve attended FloCon before, welcome back!  Network data analysis is still an important part of FloCon. You’ll now have the opportunity to network and share your work with a wider cross-section of data analysts and security professionals.