ICCWS uniquely addresses cyber security, cyber warfare and information warfare.
For the past 14 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings in the form of empirical studies, case histories and other theoretical and practical contributions. In addition doctoral degree candidates find this conference a valuable opportunity to network with others and have the opportunity to present papers and posters.
Over the years the Conference has been attended by a variety of security and military organisations including Cyber Security Policy Research Institute, more than 10 national defence colleges, NATO, SHAPE etc.
Zer0Con is POC’s NEW ‘CLOSED’ international security conference. It focuses on finding, analyzing, and exploiting vulnerabilities. Zer0Con aims to have high-level technical presentations.
? It is a high-level and closed conference.
? It only focuses on finding, analyzing, exploiting vulnerabilities.
? Only speakers, attendees, and sponsors will share vulnerabilities information.
? Zer0Con attendees can share various information and establish unique community.
? Training courses also focus on finding, analyzing, exploiting vulnerabilities.
? If you have certain level of ability to find bugs and make exploit code, you will improve yourself through Zer0Con.
Infosecurity Denmark 2019 entail more than 100 seminares, 20 keynotes and 80+ exhibitors. Two days with lots of professional knowledge and networking.
The programme in the eight conference theatres covers compliance, cybercrime, IoT, enterprise mobility and cloud security and will offer a unique insight into the latest IT security challenges on a high professional level. As a participant you will be updated on the newest technical conquests, gain insight into current threats described by some of the best advisors in the world, and talk about your user experiences with some of Denmark’s best known security brands.
The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations. The IoT network can generate large amounts of data in a variety of formats and using different protocols which can be stored and processed in the cloud. The conference looks to address the issues surrounding IoT devices, their interconnectedness and services they may offer, including efficient, effective and secure analysis of the data IoT produces using machine learning and other advanced techniques, models and tools, and issues of security, privacy and trust that will emerge as IoT technologies mature and become part of our everyday lives.
Big Data (BD) has core values of volume, velocity, variety and veracity. After collecting much data from IoT, BD can be jointly used with machine learning, AI, statistical and other advanced techniques, models and methods, which can create values for people and organizations adopting it, since forecasting, deep analysis and analytics can help identify weaknesses and make improvements based on different analysis.
Maintaining a high level of security and privacy for data in IoT are crucial and we welcome recommendations, solutions, demonstrations and best practices for all forms of security and privacy for IoT and BD.
This groundbreaking Summit is designed for senior security thought leaders working in Italy to help trigger productive discussions and promote best practices with the aim of putting together robust policies and standards that will shape a more secure future for Italian infrastructure and assets. The ItaliaSec summit is brought to you by Qatalyst Global.
Electronic communication networks and interconnected digital services have become ubiquitous as they have permeated every fold of everyday life. At a time when automated profiling and electronic surveillance have become commodities, citizens and businesses alike may face limitations and threats when they have personal data processed or seek to protect their privacy on the internet or when using general communication services. Limitations in the transparency, the functionality and interconnectivity of online and communication services increases the risk of having personal data processed out of control of any accountable person or organization or simply becoming exposed to all sorts of privacy threats.
The recalibrated legal framework in the EU as manifested by the promulgation of the General Data Protection Regulation (GDPR), is key in an effort to better control the processing of personal data. Additionally, the forthcoming Regulation on Privacy and Electronic Communications is expected to give new impetus to the way privacy is protected in electronic communications. Even the best legislative efforts cannot keep up to speed with the pace of innovative technology and business models that challenge the way personal data is processed and privacy is protected across the EU and beyond; therefore, examining what is at stake and where threats thereto originate from becomes of paramount importance.
In the light of the above, ENISA, DG CONNECT, the University of Rome Tor Vergata and LUISS University are organizing the Annual Privacy Forum (APF) 2019.