Cyber Security Conferences & Events

The most complete calendar of Cyber Security events and conferences


Africa Cyber Defense Summit 2018
Jul 9 – Jul 10 all-day
Africa Cyber Defense Summit 2018

The African market has been evolving at a gradual pace and has seen huge economic transformations in the recent years. Kenya has been one of the key drivers in the African economy to bring out drastic initiatives. Information and communications technology and the cyber space platforms have become he core pillars and key enablers of Kenya’s Vision 2030 considering its emphasis on transforming Kenya into an industrialized and secure country by laying its foundation on science, technology, and innovation. However, cyber security breaches and attacks are incumbent commonplace threats to organizations and individuals across the globe and are becoming impediments to Kenya’s transformation. It is of paramount importance to urgently and consistently drive national and regional cyber security dialog, and enhance our efforts to secure critical infrastructures and sensitive data. The success of cyber security heavily depends on multiple tangible and intangible factors such as the development of standards, policies and legal frameworks; assessments of risks, governance and compliance; law enforcement and legal interception; sharing and disseminating critical information and alerts; and most importantly create further education and regular awareness amongst the key stakeholders. In order to address the issues of cyber security, and to provide strategic thrusts to protect the critical infrastructure and sensitive information, Naseba, in partnership with the African Cyberspace Network, will organize the Pan-African Cyber Defense Summit (ACDS) in Nairobi, Kenya.

The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018) @ NOVOTEL Athenes Hotel
Nov 18 – Nov 22 all-day
The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018) @ NOVOTEL Athenes Hotel

The increased size and complexity of the communications and the networking infrastructures are making it difficult the investigation of the resiliency, security assessment, safety and crimes. Mobility, anonymity, counterfeiting, are characteristics that add more complexity in Internet of Things and Cloud-based solutions. Cyber-physical systems exhibit a strong link between the computational and physical elements. Techniques for cyber resilience, cyber security, protecting the cyber infrastructure, cyber forensic and cyber crimes have been developed and deployed. Some of new solutions are nature-inspired and social-inspired leading to self-secure and self-defending systems. Despite the achievements, security and privacy, disaster management, social forensics, and anomalies/crimes detection are challenges within cyber-systems.

CYBER 2018, The Third International Conference on Advances in Cyber-Technologies and Cyber-Systems, continues the inaugural event covering many aspects related to cyber-systems and cyber-technologies considering the issues mentioned above and potential solutions. It is also intended to illustrate appropriate current academic and industry cyber-system projects, prototypes, and deployed products and services.

4th International Conference on Internet of Things, Big Data and Security
May 2 – May 4 all-day
4th International Conference on Internet of Things, Big Data and Security

The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations. The IoT network can generate large amounts of data in a variety of formats and using different protocols which can be stored and processed in the cloud. The conference looks to address the issues surrounding IoT devices, their interconnectedness and services they may offer, including efficient, effective and secure analysis of the data IoT produces using machine learning and other advanced techniques, models and tools, and issues of security, privacy and trust that will emerge as IoT technologies mature and become part of our everyday lives.

Big Data (BD) has core values of volume, velocity, variety and veracity. After collecting much data from IoT, BD can be jointly used with machine learning, AI, statistical and other advanced techniques, models and methods, which can create values for people and organizations adopting it, since forecasting, deep analysis and analytics can help identify weaknesses and make improvements based on different analysis.

Maintaining a high level of security and privacy for data in IoT are crucial and we welcome recommendations, solutions, demonstrations and best practices for all forms of security and privacy for IoT and BD.