Cyber Security Conferences & Events

The most complete calendar of Cyber Security events and conferences

Conferences

Jan
25
Thu
The 3rd Annual China Automotive Cyber Security Summit @ Jin Jiang Tower Hotel No. 161 Chang
Jan 25 – Jan 26 all-day
The 3rd Annual China Automotive Cyber Security Summit @ Jin Jiang Tower Hotel No. 161 Chang

Due to more and more Automotive OEMs need network and cyber information security solutions to protect connected and autonomous vehicles from hacker intrusions, the industry need further networking and cooperation. Against that background “(ACSS2018) The 3rd Annual China Automotive Cyber Security Summit 2018”organized by Genesis Resourcing Consulting China will be held on the 25th -26th January 2018 in Shanghai.

ACSS2018 will as always provide networking and cooperation platform for Automotive OEMs, Tier 1s and network and cyber security solutions providers to together explore the latest network vulnerability, Enterprise IT safety, the updated laws and regulations and end-to-end cloud safety etc. hot topics. Automotive technology has always been in the forefront of various innovative applications; Block Chain and Machine Learning and other new technologies will soon be applied to the field of automotive network information security.

Mar
8
Thu
International Conference on Cyber Security and Connected Technologies (ICCSCT) 2018
Mar 8 – Mar 10 all-day
International Conference on Cyber Security and Connected Technologies (ICCSCT) 2018

ICCSCT 2018 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security & connected technologies to come together and exchange ideas. This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.

Please consider submitting to this conference. We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.

Prospective authors are invited to submit original technical papers by the deadline for publication in the ICCSCT 2018 Conference Proceedings and for presentation(s) in the symposia listed below. Deadlines will be strictly matched and late papers will be summarily rejected. The conference welcomes papers on the following (but not limited to) research topics.

Jun
27
Wed
7th International Workshops on Database and Data Mining (ICDDM)
Jun 27 – Jun 29 all-day
7th International Workshops on Database and Data Mining (ICDDM)

In today’s information society, we witness an explosive growth of the amount of information becoming available in electronic form and stored in large databases. . For example, many companies operate huge data warehouses collecting many different types of information about their customers. As the workshops of ICIVC conference, ICDDM is for presenting novel and fundamental advances in the fields of Database and Data Mining. It also serves to foster communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in improving Database and Data Mining related techniques.

Aug
12
Sun
The 1st International Conference on Science of Cyber Security (SciSec)
Aug 12 – Aug 14 all-day
The 1st International Conference on Science of Cyber Security (SciSec)

The 1st International Conference on Science of Cyber Security (SciSec 2018) will be held August 12-14, 2018 in Beijing, China. The conference is organized by the Institute of Information Engineering, Chinese Academy of Sciences. This new forum aims to catalyze the research collaborations between the relevant communities and disciplines that can work together to deepen our understanding of, and build a firm foundation for, the emerging Science of Cyber Security. Publications in this venue would distinguish themselves from others by taking or thinking from a holistic perspective about cyber security, rather than the building-block perspective. Each submission will be reviewed (double blind) by at least 3 reviewers. The program committee plans to select and award a Best Paper and a Best Student Paper. The post-conference proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series.

Oct
22
Mon
HITBSECCONF2018 – Beijing
Oct 22 – Oct 26 all-day
HITBSECCONF2018 – Beijing

The first ever HITB Security Conference in Beijing, featuring 3-days of hands on technical training sessions, a 2-day triple track conference and a 2-day Capture the Flag competition, technology exhibition with hackerspaces, Artificial Intelligence and hardware related exhibits plus a free-to-attend track of 30 and 60 minute talks! The first round of speakers will be announced in January. For the latest event updates and news, please follow @HITBSecConf on Twitter.

Nov
18
Sun
The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018) @ NOVOTEL Athenes Hotel
Nov 18 – Nov 22 all-day
The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018) @ NOVOTEL Athenes Hotel

The increased size and complexity of the communications and the networking infrastructures are making it difficult the investigation of the resiliency, security assessment, safety and crimes. Mobility, anonymity, counterfeiting, are characteristics that add more complexity in Internet of Things and Cloud-based solutions. Cyber-physical systems exhibit a strong link between the computational and physical elements. Techniques for cyber resilience, cyber security, protecting the cyber infrastructure, cyber forensic and cyber crimes have been developed and deployed. Some of new solutions are nature-inspired and social-inspired leading to self-secure and self-defending systems. Despite the achievements, security and privacy, disaster management, social forensics, and anomalies/crimes detection are challenges within cyber-systems.

CYBER 2018, The Third International Conference on Advances in Cyber-Technologies and Cyber-Systems, continues the inaugural event covering many aspects related to cyber-systems and cyber-technologies considering the issues mentioned above and potential solutions. It is also intended to illustrate appropriate current academic and industry cyber-system projects, prototypes, and deployed products and services.

Apr
13
Sat
International Conference on Security and Privacy in New Computing Environments (SPNCE)
Apr 13 – Apr 14 all-day
International Conference on Security and Privacy in New Computing Environments (SPNCE)

European Alliance for Innovation is a non-profit organization and a professional community established in cooperation with the European Commission to empower the global research and innovation, and to promote cooperation between European and International ICT communities.

Apr
14
Sun
International Conference on Practice and Theory of Public Key Cryptography
Apr 14 – Apr 17 all-day
May
2
Thu
4th International Conference on Internet of Things, Big Data and Security
May 2 – May 4 all-day
4th International Conference on Internet of Things, Big Data and Security

The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations. The IoT network can generate large amounts of data in a variety of formats and using different protocols which can be stored and processed in the cloud. The conference looks to address the issues surrounding IoT devices, their interconnectedness and services they may offer, including efficient, effective and secure analysis of the data IoT produces using machine learning and other advanced techniques, models and tools, and issues of security, privacy and trust that will emerge as IoT technologies mature and become part of our everyday lives.

Big Data (BD) has core values of volume, velocity, variety and veracity. After collecting much data from IoT, BD can be jointly used with machine learning, AI, statistical and other advanced techniques, models and methods, which can create values for people and organizations adopting it, since forecasting, deep analysis and analytics can help identify weaknesses and make improvements based on different analysis.

Maintaining a high level of security and privacy for data in IoT are crucial and we welcome recommendations, solutions, demonstrations and best practices for all forms of security and privacy for IoT and BD.