The nature and scope of the Information Security field is evolving. We are no longer are we just concerned with protecting the technical edifice. Our emphasis has become more holistic, and we tend to consider both the organizational and technical aspects of information protection to be equally important. The 18th Annual Security Conference provides a forum for discourses in Security, Assurance and Privacy that enhance the understanding of current events, but also nurture future dialogues related to cybersecurity.
The conference is scheduled for April 29 – May 1, 2019, in Las Vegas, NV, USA. The 18th Annual Security Conference is part of the Vegas Conferences organized by the Information Institute. Co-organizers for the 2018 event are the University of North Carolina at Greensboro, Plymouth University, Augusta University and DePaul University. Administrative offices for the conference are at the University of North Carolina at Greensboro.
SANS Pen Test Austin is six days of in-depth, hands-on ethical hacking, penetration testing, and exploit development training for professionals who need to know how to find vulnerabilities within their organizations, understand risk, and prioritize resources based on potential real-world attacks. Choose from 11 courses designed to help you develop pen test skills.
Infosecurity Denmark 2019 entail more than 100 seminares, 20 keynotes and 80+ exhibitors. Two days with lots of professional knowledge and networking.
The programme in the eight conference theatres covers compliance, cybercrime, IoT, enterprise mobility and cloud security and will offer a unique insight into the latest IT security challenges on a high professional level. As a participant you will be updated on the newest technical conquests, gain insight into current threats described by some of the best advisors in the world, and talk about your user experiences with some of Denmark’s best known security brands.
The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations. The IoT network can generate large amounts of data in a variety of formats and using different protocols which can be stored and processed in the cloud. The conference looks to address the issues surrounding IoT devices, their interconnectedness and services they may offer, including efficient, effective and secure analysis of the data IoT produces using machine learning and other advanced techniques, models and tools, and issues of security, privacy and trust that will emerge as IoT technologies mature and become part of our everyday lives.
Big Data (BD) has core values of volume, velocity, variety and veracity. After collecting much data from IoT, BD can be jointly used with machine learning, AI, statistical and other advanced techniques, models and methods, which can create values for people and organizations adopting it, since forecasting, deep analysis and analytics can help identify weaknesses and make improvements based on different analysis.
Maintaining a high level of security and privacy for data in IoT are crucial and we welcome recommendations, solutions, demonstrations and best practices for all forms of security and privacy for IoT and BD.
Devopsdays is a worldwide series of technical conferences covering topics of software development, IT infrastructure operations, and the intersection between them. Each event is run by volunteers from the local area.
Most devopsdays events feature a combination of curated talks (see open calls for proposals ) and self organized open space content. Topics often include automation, testing, security, and organizational culture.
INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.
THOTCON is a hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a limited budget. Once you attend a THOTCON event, you will have experienced one of the best information security conferences in the world combined with a uniquely casual and social experience. THOTCON 0xA is the tenth incarnation of this event and will be held on a Friday and Saturday, May 3th and 4th, 2019. The conference will be held at a location only to be disclosed to attendees and speakers during the week before the event.
A premier event. WeRockIT Conf is an annual two-day conference that features all disciplines of technology and shows how they all can interconnect. We’ll highlight a wide range of speakers to educate and inspire our guests. Our mission is to showcase and grow diverse voices in technology.
This conference is being organized by a group of passionate developers who are dedicated to enriching the Huntsville, AL tech community. WeRockIT Conf will include a mix of panel discussions, keynotes, speakers, and hands-on workshops.
This year the topics will focus on: Cloud Computing, Big Data, Web Development, CyberSecurity, and Embedded Systems.
Rapid proliferation of computing and communication systems with increasing computational power and connectivity into every sphere of modern life has brought security to the forefront of system design, test, and validation processes. The emergence of new application spaces for these systems in the internet-of-things (IoT) regime is creating new attack surfaces as well as new requirements for secure and trusted system operation. Additionally, the design, manufacturing and the distribution of microchip, PCB, as well as other electronic components are becoming more sophisticated and globally distributed with a number of potential security vulnerabilities. Therefore, hardware plays an increasingly important and integral role in system security with many emerging system and application vulnerabilities and defense mechanisms relating to hardware.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) aims to facilitate the rapid growth of hardware-based security research and development. HOST highlights new results in the area of hardware and system security. Relevant research topics include techniques, tools, design/test methods, architectures, circuits, and applications of secure hardware.