Cyber Security Conferences & Events

The most complete calendar of Cyber Security events and conferences

Conferences

May
14
Mon
NorthSec @ Marché Bonsecours
May 14 – May 20 all-day
NorthSec @ Marché Bonsecours

As NorthSec 2018 shapes up, we’re excited to launch our new Website and open registrations and CFP at the same time.

This year, the event will take place in the same great venue that is the Marché Bonsecours, in Old Montreal, Canada. As you all know, Montreal is an exceptional city, often cited as one of the best party/hedonistic city & regularly named as part of the best traveller’s choice.

secureCISO San Francisco
May 14 – May 20 all-day
secureCISO San Francisco

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here. The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.It’s no longer if – but when. Our attendees leave equipped with the power, knowledge and experience of a community.

May
18
Fri
Hack Miami
May 18 – May 20 all-day
Hack Miami

The HackMiami 2018 Hackers Conference seeks to bring together the brightest minds within the information security industry and the
digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global
threatscape.

The conference features a jam packed schedule of tracks that will appeal to both novice hackers and seasoned professionals.

HackMiami seeks to develop and harness the participation of the information security community through regular meetings,
presentations, labs and competitions. These events allow the hacker community a forum to present their research, develop new techniques
and methodologies, and at the same time provides valuable a networking resource for contracting opportunities.

NolaCon
May 18 – May 20 all-day
NolaCon

NolaCon is an Information Security/Hacker conference for professionals and enthusiasts alike located in New Orleans, offering training as well interesting and inventive talks and workshops.

The talks will cover a variety of topics focused on today’s infosec needs including: malware, exploits, vulnerabilities, social engineering, forensics and usually at least one new 0-Day.

May
20
Sun
2018 IEEE Symposium on Security and Privacy (SP) @ The Hyatt Regency
May 20 – May 24 all-day
2018 IEEE Symposium on Security and Privacy (SP) @ The Hyatt Regency

The new paradigms and tremendous advances in computing, communications and control have provided and supported wide range of applications in all domains of life, in particular, bridging the physical components and the cyber space leading to the Cyber Physical Systems (CPS). The notion of CPS is to use recent computing, communication, and control methods to design and operate intelligent and autonomous systems using cutting edge technologies. This requires the use of computing resources for sensing, processing, analysis, predicting, understanding of data, and then communication resources for interaction, intervention, and interface management, and finally provide control for systems so that they can inter-operate, evolve, and run in a stable evidence-based environment. CPS has extraordinary significance for the future of several industrial domains and hence, it is expected that the complexity in CPS will continue to increase due to the integration of cyber components with physical and industrial systems.

IEEE International Workshop on Communication, Computing, and Networking in Cyber Physical Systems (CCNCPS)
May 20 – May 24 all-day
IEEE International Workshop on Communication, Computing, and Networking in Cyber Physical Systems (CCNCPS)

The new paradigms and tremendous advances in computing, communications and control have provided and supported wide range of applications in all domains of life, in particular, bridging the physical components and the cyber space leading to the Cyber Physical Systems (CPS). The notion of CPS is to use recent computing, communication, and control methods to design and operate intelligent and autonomous systems using cutting edge technologies. This requires the use of computing resources for sensing, processing, analysis, predicting, understanding of data, and then communication resources for interaction, intervention, and interface management, and finally provide control for systems so that they can inter-operate, evolve, and run in a stable evidence-based environment. CPS has extraordinary significance for the future of several industrial domains and hence, it is expected that the complexity in CPS will continue to increase due to the integration of cyber components with physical and industrial systems.

SANS Northern VA Reston Spring 2018 @ Hyatt Regency Reston
May 20 @ 1:20 pm – May 25 @ 2:20 pm
SANS Northern VA Reston Spring 2018 @ Hyatt Regency Reston

At SANS Northern VA Reston Spring 2018 (May 20-25) get top-notch training from the best InfoSec instructors in the industry. Learn effective, actionable cyber security techniques crucial to combatting today’s cyber threats. Hands-on exercises and labs enable you to practice and retain the course material, so you can apply what you learn the day you return to the office. Choose from nine top-notch information security courses.

May
21
Mon
Ignite 2018
May 21 – May 24 all-day
Ignite 2018

As the world’s most disruptive security company, we want our users to get their hands on our disruptive technology as soon as possible. There’s no better place for this than at one of our annual Ignite network security and cybersecurity conferences. If you’re looking for the latest thought leadership, technology, and know-how in cloud security, network, security or endpoint security, an Ignite Security Conference is the place to find it all. This year, for the first time, we’ll be bringing our unique brand of hands-on disruption to Anaheim, Amsterdam and Washington, D.C.

This year’s Ignite security conferences will feature highly technical information, industry luminaries, 1:1 sessions, specialized course tracks, networking with peers, certification exams and the largest number of interactive training sessions we’ve ever offered.

You’ll walk away with the latest best practices, tips and strategies from industry experts and fellow Palo Alto Networks® customers for safely enabling applications while preventing successful cyber breaches across your networks, endpoints, and public and private clouds.

May
23
Wed
Infosecurity Mexico 2018
May 23 – May 24 all-day
Infosecurity Mexico 2018

Infosecurity Mexico is the most relevant Information Security event for Mexico and Latin America where CISOs, CIOs, CTOs and Heads of IT gather to discuss current and future issues, find innovative solutions to safeguard their companies and communities against cyber-criminals, and share information to develop a global culture of information security.

The event offers conferences, panels, workshops and certifications presented by opinion and industry leaders from all sectors focusing on understanding how to face, detect, respond, protect and recover from cybersecurity threats.

May
24
Thu
1st Deep Learning and Security (DLS)
May 24 all-day
1st Deep Learning and Security (DLS)

Over the past decade, machine learning methods have found their way into a large variety of computer security applications, including accurate spam detection, scalable discovery of new malware families, identifying malware download events in vast amounts of web traffic, detecting software exploits, blocking phishing web pages, and preventing fraudulent financial transactions, just to name a few.

At the same time, machine learning methods themselves have evolved. In particular, Deep Learning methods have recently demonstrated great improvements over more “traditional” learning approaches on a number of important tasks, including image and audio classification, natural language processing, machine translation, etc. Moreover, areas such as program induction and neural abstract machines have made it possible to generate and analyze programs in depth. It is therefore natural to ask how the success of these deep learning methods may be translated to advancing the state-of-the-art in security applications.

This workshop is aimed at academic and industrial researchers interested in the application of deep learning methods to computer security problems.