The IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) has a distinctive approach to accidental and malicious faults under a common body of knowledge. Today, it is the most prestigious international forum for presenting advanced and innovative research results, problem solutions, practices, and insights on new challenges in the field of dependable and secure computing.
DSN is the flagship conference for research furthering robustness and resilience of today’s wide spectrum of computing systems. Indeed, dependability and security concerns can no longer be tackled in isolation, from general IT to the internet-of-things, cyber-physical systems and application areas.
The Eleventh Conference on Security and Cryptography for Networks (SCN 2018) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.
The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them.
Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems.
The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.
Disobey wish to encourage hacker culture and bring together like-minded individuals at a gathering to share information and to train the skills our adversaries use against us. The goal is to foster a vibrant community of creators, makers and breakers.
They value encouragement, creativity and sharing and believe everyone can teach us something about the world.
Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.
SecOps Europe’s concept is to develop and enhance cyber security awareness with both offensive and defensive presentations and workshops by sharing stories and experience with real cyber warriors from both sides, while following closely the International Cyber Competition where the competing teams discuss the strategic and tactic responses to a major cyber-attack on the day after the incident occurred.
Following the successful events of 2017 and 2018, Cybertech proudly announces our return to Panama for the two-day Cybertech LATAM at the City of Knowledge, Panama City. The conference and exhibition serves as a regional and global meeting place for key players in the cybersecurity arena, including government officials, industry leaders, C-level executives and entrepreneurs, all under one roof. Cybertech LATAM will be held on February 21, 2019.
ICNT 2019 will offer an extensive program of interest to academia, government and industry. It will include several distinguished keynote speakers and three conference days full of parallel sessions, Cairo city visiting, etc. A series of exciting speeches to develop skills in and advance awareness of requirements engineering practices is of particular interest to industry.
This groundbreaking Summit is designed for senior security thought leaders working in Italy to help trigger productive discussions and promote best practices with the aim of putting together robust policies and standards that will shape a more secure future for Italian infrastructure and assets. The ItaliaSec summit is brought to you by Qatalyst Global.
Electronic communication networks and interconnected digital services have become ubiquitous as they have permeated every fold of everyday life. At a time when automated profiling and electronic surveillance have become commodities, citizens and businesses alike may face limitations and threats when they have personal data processed or seek to protect their privacy on the internet or when using general communication services. Limitations in the transparency, the functionality and interconnectivity of online and communication services increases the risk of having personal data processed out of control of any accountable person or organization or simply becoming exposed to all sorts of privacy threats.
The recalibrated legal framework in the EU as manifested by the promulgation of the General Data Protection Regulation (GDPR), is key in an effort to better control the processing of personal data. Additionally, the forthcoming Regulation on Privacy and Electronic Communications is expected to give new impetus to the way privacy is protected in electronic communications. Even the best legislative efforts cannot keep up to speed with the pace of innovative technology and business models that challenge the way personal data is processed and privacy is protected across the EU and beyond; therefore, examining what is at stake and where threats thereto originate from becomes of paramount importance.
In the light of the above, ENISA, DG CONNECT, the University of Rome Tor Vergata and LUISS University are organizing the Annual Privacy Forum (APF) 2019.