ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It, and Bring It On.
To celebrate our 10th anniversary, we are happy to welcome many international experts, including three special guests: Charles Bennett and Gilles Brassard, the early pioneers of quantum cryptography and teleportation (BB84 protocol) and Artur Ekert, the inventor of entanglement based quantum cryptography (E91 protocol).
The Winter School will take place between 20th-26th January 2018 and will feature two tracks:
- The Executive Track will provide a high-level overview of quantum threats and cyber security during the first two days
- The in-depth Technology Track will last the full week and go into all of the technical details
This year, our distinguished faculty guests will include Romain Alléaume, Nicolas Gisin, Jason Hart, Andrew Lord, Vadim Makarov, Michele Mosca, Renato Renner, Sandu Popescu and ID Quantique’s R&D team.
Join us on January 20th, 2018! We are extremely pleased to have D4CS, the Master of Science in Digital Forensics and Cybersecurity program, at John Jay College of Criminal Justice, as a partner in organizing and hosting BSidesNYC and we’re working hard to create another action-packed conference for you – expect even more technical security content by brilliant researchers, workshops, entrepreneur activities, and a brand new style of CTF! To stay updated on volunteer opportunities, and other news, follow us on Twitter @BSidesNYC and sign up for the mailing list.
The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, that concerns to organizations and individuals, thus creating new research opportunities.
The CIO Ireland Dialogue returns for the 6th edition over the 22-23 January 2018 in Dublin, bringing together 60 industry leading CIOs, CDOs, Directors of IT and Transformation from across Ireland, offering exclusive networking and benchmarking opportunities with both your peers, and industry experts.
Researched with your peers, the programme delivers interactive case studies, workshops and one-to-one meetings allowing you to head back to the office with actionable insights to not only develop your strategy, but put it into practice.
Combined with a senior audience of like-minded peers we will cover:
– The ongoing journey of digital transformation
– Securing and analysing your data
– Training talent, nurturing diversity and retaining experience
– Cloud migration and keeping abreast of the latest developments in the CIO role and in technology
A special edition of Microsoft’s leading cyber security conference for top professionals, to be held for the very first time in Tel Aviv, Israel. Over the past 10 years, BlueHat conferences have drawn the brightest minds in security to discuss key industry challenges. And now, BlueHat Israel is here to crank it up by exploring and creating new cyber security thoughts and boundaries. This exclusive, by invitation only, single track event will host top cyber security professionals from around the world, who will come together to tackle the present and peek into the future. It will feature brilliant speakers and focus on breakthrough research, key trends and emerging threats in the field. Clearly, if you live and work in Israel within a Cyber Security role then this would be a fantastic conference to attend.
The international cybersecurity forum is a platform aiming at promoting a pan-european vision of cybersecurity as well as to strengthen the fight against cybercrime. In order to do so, the FIC relies on :
– The trade show, to share knowledge and ideas, recruit new employees and maintain contacts
– The forum, to discuss and debate with experts, to gather ideas and to share professional lessons
– The Observatory, to continue exchanging views and information after the FIC, to explore topics in greater depth and to consolidate our network of experts and like minded throughout the year
Cyber security looms ever-larger on the national security agenda. The paralysing effects of the recent ransomware assault on the NHS point to worrying vulnerabilities in network resilience, vulnerabilities which recur across defence, government and CNI. Unless the cyber threat is tackled head on, information security and operational capability will be severely compromised.
CDANS 2018 will confront the challenge of securing the distributed network. As data-heavy remote assets and cloud storage proliferate, new weaknesses emerge for aggressors to exploit. With cyber now officially a NATO domain of warfare, the combat commander is increasingly sensitive to the need to encrypt his communications and platforms against offensive IW. For CNI, the active targeting of the network by terrorists, lone attackers and foreign governments necessitates a collaborative approach to defence, one which takes advantage of the national cyber security centres which continue to emerge across Europe.
Overview: The problems facing the United States military and government in cyberspace are threat and vulnerability proliferation in our critical infrastructure and national security systems. Strategic thinking about cyberspace needs to move left of threat. Instead of having a reactive strategy, strategic guidance needs to be proactive.
It is conventional wisdom that typical defense-in-depth measures for cybersecurity are breached on a daily basis. From its inception, security has been an afterthought in the design of software and hardware. America is vulnerable because of our dependence on insecure technology infrastructure dependencies.
This inaugural SecAfrica Summit is set to bring together key thought leaders within governemnt, enterprise and key institutions from all corners of the African continent. We will be evaluating the need for cyber awareness programs, the suitability of proposed and regulatory frameworks and how public-private partnerships can transform the cyber security landscape.