Cybersecurity Resources

Cybersecurity Experts

cybersecurity-expert

Paul Asadoorian

Founder and CEO, Security Weekly

cybersecurity-expert

Richard Bejtlich

Strategist, Tao Security

cybersecurity-expert

Bill Brenner

Cybersecurity Writer, Sophos

cybersecurity-expert

Lesley Carhart

Principal Threat Hunter, Dragos Inc.

“Finally, I predict that we will soon reach a breaking point in internet infrastructure attacks where fundamental problems that have been ignored for decades and lack of redundancy result in expensive enough catastrophes that solutions have to be implemented.” (Source: Tripwire)

cybersecurity-expert

Bob Carver

Manager of Network Security, Verizon Wireless

“Cybercriminals will be concocting new business models and new platforms to execute them. Encryption is becoming old school. Data destruction, data manipulation, being locked out of digital platforms and old-fashioned blackmail could be some of those new criminal activities. It may go into the cloud, automobiles, IoT/IIot/ICS and beyond.” (Source:LinkedIn)

cybersecurity-expert

Anton Cherepanov

Senior Malware Researcher, ESET

cybersecurity-expert

Graham Cluley

Independent Computer Security Expert

cybersecurity-expert

Donna Dodson

Chief Cybersecurity Advisor, NIST

cybersecurity-expert

Andy Ellis

Chief Security Officer, Akamai Technologies

cybersecurity-expert

Marc Goodman

Founder, Future Crimes Institute

cybersecurity-expert

Yotam Gutman

VP Marketing, CyberDB

“Threat intelligence is here to stay.” (Source: Cyberdb)

cybersecurity-expert

Andrew Hay

Co-Founder & CTO, LEO Cybersecurity

cybersecurity-expert

Alex Hutton

Director of Operational Risk, Zions Bancorporation

“If you can’t figure out what your risk management program’s value is up and above audio or being pre-audit, then you really need to take a step back and think if that investment is worth its while,” said Alex Hutton.

cybersecurity-expert

Mikko Hypponen

Global Security Expert, F-Secure

cybersecurity-expert

Jay Jacobs

Chief Data Scientist, Founder and Partner, Cyentia Institute

cybersecurity-expert

Kristin Judge

CEO, Cybercrime Support Network

“The fact that cyber is a part of everything we do now gives us unlimited possibilities and unlimited vulnerabilities at the same time.” (Source: Reddit)

cybersecurity-expert

Eugene Kaspersky

Chairman and CEO, Kaspersky Lab

cybersecurity-expert

Gene Kim

Author, Researcher, Speaker, Director, DevOps

cybersecurity-expert

Brian Krebs

Investigative Reporter, Krebs On Security

“Being safe and secure online fundamentally requires a mindset shift. I’d like to see more Internet users place far less reliance on automated tools for security and take a defensive posture that begins with an appreciation that everything can be hacked but that bad guys are mostly after information of value that isn’t adequately protected. This means educating oneself about the limitations of security tools and taking proactive steps to shore up these defenses.” (Source: Forbes)

Robert M. Lee

Founder/CEO, Dragos Inc.

cybersecurity-expert

Daniel Miessler

Director of Advisory Services, IOActive, Inc.

“Security outcomes will surely improve as we move out of the dark ages and towards a world of standardization and insurance.” (Source: Daniel Miessler Blog)

cybersecurity-expert

Allison Miller

SVP Engineering, Bank of America

cybersecurity-expert

Steve Morgan

Founder and EIC, Cybersecurity Ventures

“While technology advancements are essential, investing into people is the big market shift we’ve seen… In particular, training employees on security awareness in order to reduce spear phishing scams and ransomware attacks. Cross-training IT workers onto cybersecurity.” (Source: Investing News)

cybersecurity-expert

Emily Mossburg

Principal, Deloitte & Touche

“Securing your assets is not enough. Ongoing monitoring is important to understand if the security solutions and processes in place are working. Monitoring is critical in recognizing targeted attacks and, if attacks are effective, an organization must be ready to respond.” (Source: Leaders Mag)

Katie Moussouris

Founder and CEO, Luta Security

“There’s huge momentum not just in the government space, but in private industry, where you’re seeing all types of vendors, not just tech vendors, … working with hackers.” (Source: Wired)

cybersecurity-expert

Wendy Nather

Principal Security Strategist, Duo Security

cybersecurity-expert

Nicole Perlroth

Cybersecurity Journalist, The New York Times

“Cyberthreats are increasing at a rapid pace and the tech industry is responsible for providing secure products, applications and technologies for businesses and consumers alike.” (Source: Matter Now)

cybersecurity-expert

Dale Peterson

Founder and CEO, Digital Bond Inc.

Psychology of the malicious insider (Source: Medium)

cybersecurity-expert

George Rettas

President and CEO, Task Force 7 Radio

cybersecurity-expert

Maya Schirmann

VP Marketing, XM Cyber

“There is a critical need for cybersecurity solutions that provide the level of protection that is being used by finance and healthcare leaders and meets the needs arising from recent developments.” (Source: LinkedIn)

Bruce Schneier

Security Technologist

cybersecurity-expert

Dave Shackleford

Principal Consultant, Voodoo Security

“Without a doubt, the event management, analysis, and security operations skills shortage is the biggest inhibitor, and it’s also the area most organizations rank as the top focus for future spending.” (Source: TDWI)

cybersecurity-expert

Chris Sistrunk

Principal Consultant, Mandiant

cybersecurity-expert

Bobbie Stempfley

Director CERT Division, Carnegie Mellon University

Parisa Tabriz

Engineering Director, Google

cybersecurity-expert

David Ulevitch

SVP/GM, Cisco Security Business

cybersecurity-expert

Caroline Wong

VP of Security Strategy, Cobalt.io

cybersecurity-expert

Chris Wysopal

Chief Technology Officer, Veracode

cybersecurity-expert

Tim Yardley

Associate Director of Technology, Information Trust Institute at UIUC

Kim Zetter

Senior Writer, Wired

“Digital extortion and disruption have proven that the most valuable commodity of today’s connected digital economy is information. Data’s value will continue to rise.” (Source: Forrester)

Cybersecurity Events

The mission of the Air Force Cyber College is to create concepts, theory, strategies and force development support for national cyber endeavors. Our vision is to be a center of knowledge, education, and research for AF and national leaders for cyber.

CYBERTACOS is back and is becoming one of the DC metro area’s biggest cybersecurity networking events! Register today and join us on Wednesday, January 24 for networking, food and drinks, along with the kickoff of our brand new “Meet the Press” panel series. From 6:00-6:45pm hear from local, influential security reporters who will share what they cover, how they choose what to cover and answer any burning questions you may have.

Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the understanding the fundamentals of a HIPAA compliance. If your healthcare practice, business, or organization needs to understand what is required to protect health records or make sure your current safeguards are adequate and can withstand government scrutiny, please join us for this informative and interactive course.

This conference will explore the use of formal methods, empirical analysis, and risk modeling to better understand security and systemic risk in blockchain protocols. We aim to foster multidisciplinary collaboration among practitioners and researchers in blockchain protocols, distributed systems, cryptography, computer security, and risk management. The talks and papers from the previous event in this conference series are available here.

The Houston Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here. The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.

Healthcare providers and medical device companies are currently facing ever growing financial, legal, operational, and patient safety challenges as a result of cybersecurity threats. Malware attacks are evolving and becoming more sophisticated, while preventable privacy breaches are becoming more common in all industries across the globe. The fall in the black market price of stolen data along with improvements in “Black Hat” customer service implies we are facing a mature, evolving, and resilient enemy.

During the 1800s in the American Wild West, outlaws, bandits, and fugitives flocked to a border town at the edge of the frontier—a town nicknamed “Hell on the Border.” Outlaws such as Billy the Kid and Whiskey Bill ran rampant making hideous crimes commonplace. Deputy U.S. Marshals from Fort Smith were sent across the border into Indian Territory to find and arrest those individuals who fled justice from the federal courts.

SparkleCon is a two day event where people from all walks of life come to share and participate in art, science, computers, security, and hacking. It has been hosted at 23b Hackerspace since 2013 and as attendance has grown over the years so has the extremeness of the events contents. Come and enjoy things like 3D body scanning, lock picking, coding, 3D printing, large Tesla coils, and nuclear fusion.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

The CyberUSA Conference will be held in San Antonio, TX at the Henry B. Gonzalez Convention Center on Tuesday, January 30, 2018. A welcome reception will be held on the evening of Monday, January 29, 2018. This one day event will bring the cyber community together to collaborate on the mission purpose of establishing innovation, education, workforce development, enhanced cyber readiness, and resilience.

The Open Web Application Security Project (OWASP) Los Angeles Chapter is teaming up with the Orange County, Inland Empire, San Diego, and San Francisco Bay Area chapters to bring you the Fifth Annual AppSec California.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

Push the Art to a Science: Creating a Professional Discipline. To mature our practice, we need to be able to share our methodologies in a systematic and consistent way. We have many professionals in the security industry, but do not have a professional discipline. We’d like to philosophically discuss concepts in security, push them forward, and model them.

The Tampa Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

BSides Huntsville and NAC-ISSA are joining forces! This will be BSides’s 5th year in the Rocket City and we intend to make it a great event. All the BSides volunteers are working hard to put together an educational and exceptional confrence for an unbeatable price. So if you are just getting started, trying to level up or are already a mad scientist of Cyber Security looking for the next project, go ahead and grab your ticket, their is a hard limit and once they are gone there will be no more. Keep an eye on the site and your email after you grab a ticket, we will be updating the agenda, and you don’t want to miss out on any special offerings we will post up here 1st.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

As defined by the Health Information Portability and Accountability Act (HIPAA), a Business Associate can be any organization or person working in association with or providing services to a Covered Entity who handles or discloses Protected Health Information (PHI) or Personal Health Records (PHR). With certain exceptions, a person or entity that creates, receives, maintains, or transmits PHI for a function or activity regulated by the HIPAA Privacy Rule for a Covered Entity is a Business Associate.

CPX 360 promises to be the premier cyber security summit. For the first time, we will bring our customers and partners together in a mega conference and expo. CPX 360 is where you’ll receive up-to-the-minute intelligence about global-threats and other vital topics from the world’s leading cyber-security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber-security elite. If you attend one cyber security event this year, make it CPX 360.

Information Risk Management is what we do. It’s what we think about, talk about, dream about, and love to hear new ideas about. If you’re obsessed with finding a better way to measure and manage information risk, SIRAcon is the place to be. You’ll find yourself among a community of supportive peers who are eager to help you further develop your ideas.

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here. The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

SecureWorks invites you to join an exclusive gathering of your peers and our security experts at one of our 2017-2018 Client Roadshows! We’re coming to a city near you! These events are prime opportunity for you to learn, share your feedback and collaborate on ideas with SecureWorks. More importantly, it is an opportunity to thank you for entrusting your cyber security to SecureWorks.

The Des Moines Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

d10e is the leading conference on decentralization since 2014. Past editions were hosted in Amsterdam, Bucharest, Davos, Gibraltar, Kyiv, Ljubljana, San Francisco, Singapore, Tel Aviv and Warsaw. Our main focus is exploring the Future of FinTech, ICOs, Blockchain, Sharing Economy, Future of Work & Disruptive Culture.

BSides Tampa is an Information Technology security conference hosted by the Tampa Bay chapter of (ISC)2, a registered 501 (c)3 non-profit organization. The BSides Tampa conference focuses on providing attendees with the latest in information security research, development and exploits. The conference is hosted yearly in Tampa and features various presentations and demonstrations from the best minds in industry and academia.

NDSS fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technology.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

M3AAWG meetings, which are open to members only, are multiple-track events held three times a year and generally attended by more than 300 participants. Leading industry experts, researchers and public policy officials address such diverse topics as bot mitigation practices, social networking abuse, mobile abuse and pending legislation. Each four-day meeting is an exceptional opportunity to discuss the latest in messaging security with other professionals in a focused environment of working sessions and educational panels.

Connecting with our neighbors, business partners, peers, other industries and governments is what allows us to get perspectives that would be otherwise missed. Since 2004, EnergySec has been focused on bringing together people and various organizations to help foster environments of learning. It is our hope and desire to leave each person we meet with at least one take away idea or thought that could potentially make a difference in making our critical infrastructures more secure and resilient.

The San Diego Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

SECURITY TITANS IS A GROUND-BREAKING EVENT, bringing the biggest names in Information Security together – all in one day, on a single stage to give the nation’s cyber security industry access to the very best InfoSec thought leadership in one, focused event.

BSides is a “community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-things are happening.”

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

February 26-28, 2018 The 6th annual CSO50 Awards will recognize 50 organizations (and the people within them) for their security project or initiative that demonstrates outstanding business value and thought leadership. Executives and managers from honored organizations will be recognized among their peers and colleagues at the CSO50 Conference + Awards, to be held February 26 – 28, 2018, at the Scottsdale Resort at McCormick Ranch in Scottsdale, Arizona.

CUISPA facilitates conversations between parties. Whether you’re looking to speak with another similar institution about a new project, a product or an incident CUSIPA can help you contact the right individuals. CUISPA is a resource created specifically for CU Security Professionals (you)!

SOURCE is the premier Infosec event for bringing business and security people together under one roof. Think of us as one part CISO conference, one part hacker conference, and one part career/personal development event. We’re a very different kind of security conference. We just had a very successful event in Boston, and are planning on five great events in 2018.

The Jacksonville Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

A place where, given a total of 36 thrilling hours with your team, your idea, and our fuel (in the form of snacks, drinks, and more), you produce a fantastic project, while forming lasting relationships and chugging more caffeine than you ever thought possible.

The ISSA-LA Information Security Summit is the premier cybersecurity event in Southern California. IT and InfoSec executives, leaders, analysts, and practitioners will be gathering May 18-19, 2017 at the Universal City Hilton to learn from the experts, exchange ideas with their peers, and enjoy conversations with the community. With expected attendance of 1000 or more, this is an event you and your company simply cannot afford to miss.

Now in its 11th edition, the Cyber Security for Critical Assets Summit (USA) boasts a dynamic double-stream agenda alongside opportunities to participate in practical exercises though an exclusive cybersecurity workshop. Places are extremely limited – Book early to avoid disappointment.

The Salt Lake City Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

SnowFROC (Front Range OWASP Conference) is Denver’s premier application security conference and is taking place Thursday March 8th 2018. The location of this event is The Cable Center on the University of Denver campus near I-25 and University.

For the past 13 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings in the form of empirical studies, case histories and other theoretical and practical contributions. In addition doctoral degree candidates find this conference a valuable opportunity to network with others and have the opportunity to present papers and posters.

It’s the same old story. Ransomware and phishing still dominate the headlines. Why are these tactics so successful? Why are organizations still falling victim to the same old tricks? Why have solutions to date failed us? Join us for an in-depth discussion on these and other threats that just won’t go away. What do we need to do as cybersecurity professionals to finally make real progress and force the bad guys to adapt to our defenses instead of us constantly trying to keep up with them? It’s the same old story. Ransomware and phishing still dominate the headlines. Why are these tactics so successful? Why are organizations still falling victim to the same old tricks? Why have solutions to date failed us? Join us for an in-depth discussion on these and other threats that just won’t go away. What do we need to do as cybersecurity professionals to finally make real progress and force the bad guys to adapt to our defenses instead of us constantly trying to keep up with them?

TEC, presented by PSA Security Network, is the premier education and networking event for all professional systems integrators. TEC features industry leading education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

The New Jersey Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The North Dakota Cyber Security Conference brings together community members from education, government and industry to share strategies, best practices and innovative solutions to address today’s challenges in cyber security. The vast scope of modern cyber threats calls for active participation from individuals and organizations across the state.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

For more than 20 years security professionals have made InfoSec World the “business of security” conference. To manage today’s threats, security practitioners must have the skills to be both a business partner and enabler, and have the technical expertise to prevent, detect and respond to security challenges. InfoSec World features a world-class program and expert speakers from the field to help you do just that. Here’s what you’ll gain from attending InfoSec World:

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

The 3rd Annual Billington International Cybersecurity Summit on March 21 in Washington, D.C. at the National Press Club, will attract over 400 attendees at the leading forum on global cybersecurity in the nation’s capital.

The Los Angeles Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Future-forward examinations of today’s most imminent challenges and real-time insight into successes of industry leadership.

The Distribution Security Forum is a conference focused on security issues in power distribution systems. This event will focus on improving security for the electric distribution infrastructure. Join us in Washington, DC, March 22nd and 23rd, for discussion panels, distribution presentations, and networking with peers facing similar threats.

In spite of the growing demand and tremendous chances in the job market, Cyber Security remains an area where there is lack of skilled professionals nationally, regionally and internationally. Even worse, women’s representation in this male ruled field of security is low. Through the WiCyS community and exercises, we expect to raise awareness about the significance and nature of Cyber Security profession. We want to generate interest among students to consider Cyber Security as a possible and promising career option.

The second BloomCON Forensics and Security conference! Will be held March 23-25, 2018. At Bloomsburg University in Kehr Union, PA (USA). BloomCon is a once in a life time experience! It is established around those whom are interested in cyber security. There will be many speakers, and you will have a chance to compete in unique workshops and cybersecurity challenges for prizes.

Join us for three full days of talks and trainings from the finest peeps in the security world! Come enjoy the benefits of a small conference where you won’t get lost in the crowd and you get time to interact directly with the speakers and your security peers. Attending the talks on Friday is FREE, so you have no excuse!

BSides Chattanooga is an information security event in the Security BSides pattern where local information security professionals share content, build community, engage in conversations, and further their careers.

The 14th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE’18) brings together researchers and practitioners from different computer systems domains to interact and share ideas in order to advance the state of the art of virtualization, systems programming and programming languages.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

The nature and scope of the Information Security field is evolving. We are no longer are we just concerned with protecting the technical edifice. Our emphasis has become more holistic, and we tend to consider both the organizational and technical aspects of information protection to be equally important. The 17th Annual Security Conference provides a forum for discourses in Security, Assurance and Privacy that enhance the understanding of current events, but also nurture future dialogues related to cybersecurity.

The IAPP is the largest and most comprehensive global information privacy community and resource. Founded in 2000, the IAPP is a not-for-profit organization that helps define, support and improve the privacy profession globally.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

Cyberspace is fundamental to our national prosperity, as it has become critical to commerce, research, education, and government. Realizing the benefits of this shared environment requires that we are able to properly balance the risks and rewards, understand and communicate threats to security and privacy, and rapidly adapt any resulting approach to a changing adversarial environment. The 13th Annual Cyber and Information Security Research Conference at Oak Ridge National Laboratory in Oak Ridge, Tennessee will bring together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

Welcome to HOU.SEC.CON. We are humbled that our little conference has grown to level we have reached in the Houston community. We started the conference back in 2010 and we have grown each and every year in number of presenters and attendees.

During the 2018 SEC Academic Conference, we will explore three themes within cyber security: the underlying computer and communication technology; the economic and physical systems that are controlled by technology; and the policies and laws that govern and protect the use of information that is stored in, transmitted by, and processed with technology.

The aim of PQCrypto is to serve as a forum for researchers to present results and exchange ideas on the topic of cryptography in an era with large-scale quantum computers.

The Security Professionals Conference is the premier forum for connecting with higher education information security and privacy professionals.

InfoSec Southwest is an annual information security and hacking conference held in Austin, Texas. ISSW provides an environment for attendees to benefit from the broad scope of topics and open forums offered.

The Detroit Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here. The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.

Welcome to CypherCon 3.0. Wisconsin’s Hacker Conference! Our conference provides hackers with an outlet to openly demonstrate and experience creativity and ingenuity through hands-on enlightening activities and thought provoking presentations and technical projects. Come listen to over a dozen security speakers, learn at our mind-blowing, but approachable villages (specializations), and relax with friends in a casual environment.

NIST has initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. Deadline for submissions is November 30, 2017. Submitter’s of each “complete and proper” submission package will be invited to publicly discuss and explain their submitted algorithm.

BSides Oklahoma is a free information security conference focused on practical, hands-on training for improving security. Our featured keynote speaker will be Tim Medin of Red Siege.

CarolinaCon was started in 2005 and has been held every year since. With each passing year the conference continues to grow and attract more attendees and speakers. As has always been the case, CarolinaCon is put together and run by an all-volunteer staff. CarolinaCon is proudly brought to you by “The CarolinaCon Group”. The CarolinaCon Group is a non-profit organization registered in the state of NC, dedicated to educating the local and global communities about technology, information/network/computer security, and information rights.

Nashville’s a great city and we have a growing community of information security professionals and hobbyists. Bsides Nashville is a 100% volunteer run and organized conference. We learn, teach, experience, befriend and reconnect in a comfortable environment. Whether you’re a Blue teamer, Red Teamer or a Green newbie, all are welcome and we have a place for you. This is the neutral ground between Developers, Sysadmins, Security practitioners, DBAs and even CISSPs! This is a fun time and we want everyone with an interest to come and be a part of the community.

BSidesIowa was founded in 2012 by Ken Johnson and has held 3 events in Iowa. In 2016 tragically Ken passed in a car accident. Since that time a few active members in Iowa InfoSec/SecDSM have taken the reigns to continue the work that Ken started.

BSides SF is a non-profit organization designed to advance the body of Information Security knowledge, by providing an annual, two day, open forum for discussion and debate for security engineers and their affiliates. We produce a conference that is a source of education, collaboration, and continued conversation for information technologists and those associated with this field. The technical and academic presentations at BSides SF are given in the spirit of peer review and advanced knowledge dissemination. This allows the field of Information Security to grow in breadth and depth, and continue in its pursuit of highly advanced scientifically based knowledge.

CT-RSA, or Cryptographers Track RSA Conference, is the venue for scientific papers on cryptography within the RSA Conference. For those who have never been the RSA Conference is the main trade show for the security industry; over 40,000 people attend the exhibition floor, keynote addresses, events, seminars, training events and the various technical tracks. CT-RSA is the track devoted to scientific papers on cryptography. As such CT-RSA is a great venue to ensure that scientific results not only get published to the wider cryptologic community, but also get exposed to technical attendees from industry, government and wider afield.

RSA Conference 2018, the world’s leading infosecurity event, will be held April 16–20, 2018 at the Moscone Center in San Francisco. Learn from industry leaders, discover innovative solutions and network with infosec professionals. Mark your calendar and register your interest for RSA Conference 2018. Save $100 off a Full Conference Pass by registering your interest today!

Last year we had some awesome villages that included lockpicking, car hacking, IoT hacking, and enterprise hacking. This year we will likely add a “kid’s village” to go along with our student track. We are awaiting confirmations from everyone who can attend this year and we’ll provide details as they become available.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

The ICCSCPS 2018: 20th International Conference on Cyber Security of Cyber Physical Systems aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Cyber Security of Cyber Physical Systems. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Cyber Security of Cyber Physical Systems.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

The Baltimore Area Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. Groundbreaking researchers focused on the latest technical issues will demonstrate techniques that you cannot find elsewhere. INFILTRATE is the single-most important event for those who are focused on the technical aspects of offensive security issues, for example, computer and network exploitation, vulnerability discovery, and rootkit and trojan covert protocols. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.

BSidesCharm is a regional Security B-Sides held in Baltimore, MD. It operates under the umbrella principles of Security B-Sides as a larger community project within information security. The goal of BSides is to offer small, intimate events where all participants can engage each other to help develop connections, friendships, and network with different industry professionals.

It is more crucial than ever for you to stay ahead of trends and tools. Join us at North America CACS 2018, 30 April-2 May in Chicago, Illinois, and be a part of the top conference for IS audit and security professionals!

Future-forward examinations of today’s most imminent challenges and real-time insight into successes of industry leadership.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

With the increasing risk and sophistication of cyber attacks, there is a continuous need to adapt your business strategy to protect sensitive business and personal information. This inaugural Cyber Security Conference brings national and international experts to the state and is sponsored by the Management Science and Information Systems Department and the Center for Executive and Professional Development, Spears School of Business, Oklahoma State University.

THOTCON is a hacking conference based in Chicago IL, USA. This is a non-pr ofit, non-commercial event looking to provide the best conference possible on a limited budget.

Following the success of the one-day Secure Events and Security Congress in EMEA, 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community. It will enable delegates to drive the thinking around the issues and concerns professionals are facing today.

The recent flood of data breach news may numb us to the threat of attacks with kinetic effects–direct or indirect physical damage, injury, or death. Hack NYC focus’ on our preparation for, and resilience to, the genuine potential for Kinetic Cyber attack. Be part of defining solutions and illuminate risks aimed at Critical National Infrastructure

The RMISC is the only conference of its kind in the Rocky Mountain region. A convenient, affordable knowledge-builder for IT security, audit and compliance professionals at all levels. RMISC provides the perfect blend of education, networking and opportunities that are critical to your success in today’s economy and security climate!

The New Orleans Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

The Boston event is our flagship event and we have an outstanding selection of speakers and activities each year. When people call Boston “Title Town,” they usually refer to the city’s national dominance in sports. However, Boston could easily rack up accolades as “Title Town” for Business as well. The vibrant academic environment makes Boston arguably one of the world’s top intellectual capitals for innovation in information security application and research. With 30 fortune 1000 companies in the greatest Boston area, there is no shortage of need for cyber security solutions and talent.

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here. The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

BSides Cincinnati is a one day information security conference for the community, by the community. Scroll down to see past events and more info about this years event.

NH-ISAC’s mission is to enable and preserve the global public trust by advancing health sector cyber and physical security protection and the ability to prepare for and respond to cyber and physical threats and vulnerabilities.

Now in its third year, the Cyber Investing Summit is an all-day conference focused on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the next five years from 2017 to 2021, according to Cybersecurity Ventures’s quarterly Cybersecurity Market Report.

The Philadelphia Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here. The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

The HackMiami 2018 Hackers Conference seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global threatscape.

NolaCon is an Information Security/Hacker conference for professionals and enthusiasts alike located in New Orleans, offering training as well interesting and inventive talks and workshops.

BlueRidgeCon is Western North Carolina’s premier Information Security conference. Our goal is to attract well-known subject matter experts from all over the country for an intimate, high-quality conference in a gorgeous mountain setting. We’re very excited about our May 19, 2018 event because we know it’s going to be an amazing experience. BlueRidgeCon is a place where everyone with an interest in Information Security can come together to learn, share, and have a great time.

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2018 Symposium will mark the 39th annual meeting of this flagship conference.

The new paradigms and tremendous advances in computing, communications and control have provided and supported wide range of applications in all domains of life, in particular, bridging the physical components and the cyber space leading to the Cyber Physical Systems (CPS). The notion of CPS is to use recent computing, communication, and control methods to design and operate intelligent and autonomous systems using cutting edge technologies. This requires the use of computing resources for sensing, processing, analysis, predicting, understanding of data, and then communication resources for interaction, intervention, and interface management, and finally provide control for systems so that they can inter-operate, evolve, and run in a stable evidence-based environment. CPS has extraordinary significance for the future of several industrial domains and hence, it is expected that the complexity in CPS will continue to increase due to the integration of cyber components with physical and industrial systems.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

Ignite ’18 will be the sixth – and the most exciting, most technically advanced – Palo Alto Networks Ignite cybersecurity conference! This event will be overflowing with highly technical 1:1 sessions, the latest in network security, endpoint security and cloud security, specialized course tracks, technological disruption, expert speakers, outstanding networking opportunities, Ultimate Test Drives, Hands-On Workshops, PSE and PCNSE certification exams, and more Cyber Range trainings than we’ve ever offered.

The workshop invites two types of submissions: full research papers and extended abstracts. Full papers are expected to present completed work and will be published in the workshop’s IEEE proceedings. On the other hand, extended abstract submissions are intended to encourage the presentation of preliminary research ideas or case studies around challenges and solutions related to the use of deep learning systems in real-world security applications. While accepted extended abstracts will not be part of the formal IEEE proceedings, they will be preserved as an online open publication (e.g., on arxiv.org) and the authors will be free to submit an extended version of their work to other venues.

Co-hosted by the SC Chamber, the US Chamber, and SC Cyber, this conference was designed with both small and large businesses in mind. Broadband and information technology are powerful factors impacting reach into new markets and increased productivity and efficiency. However, businesses need a cybersecurity strategy to protect both organizational infrastructure and customer data from growing cybersecurity threats. This event will teach businesses to mitigate cybersecurity risks and to identify and prepare for potential threats. It will also provide a primer on the ecomomic impact of cybersecurity and how it can affect our state’s infrastructure.

The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

The San Antonio Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations you face. Like no other time before, data security is crucial to you and your corporate executives. With an avalanche of massive data breaches that compromised millions of users’ data and cost senior-level executives their jobs and the endless other types of attacks that leveraged both new and traditional techniques, 2017 seemed yet another banner year for the infosec industry. We expect this year will be just as active as our attendees will face the challenge of both the criminal element and nation states stepping up their aggressive activities. On top of these, insider threats, supply chain vulnerabilities, regulatory demands and increasing dependence on IoT, AI, cloud apps, mobile devices and still other technologies will continue to convolute your tactical and strategic cybersecurity aims.

CircleCityCon is about the community. Our signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Three tracks, incredible entertainment, and technical villages help round out the CircleCityCom experience. Of course, don’t forget the chance to meet and talk with your peers about all topics including security, hacking, and the latest superhero movies.

The 2018 Techno Security & Digital Forensics Conference will be held June 3–6 in sunny Myrtle Beach at the Marriott Resort at Grande Dunes. This conference, previously known as the Techno Security & Forensics Investigations Conference held in conjunction with Mobile Forensics World, welcomes corporate network security professionals, federal, state and local law enforcement digital forensic specialists, corporate and private forensic examiners, and industry leaders from the U.S. and around the world.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

Conference Brings 1,100 Cyber Security Leaders to Albany to Learn About Latest Trends and Issues in Cyber Security to Better Equip Organizations with the Skills They Need to Combat Cyber Threats

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation’s infrastructure from the ever-evolving cyber threat. Held in Huntsville, Alabama, one of the nation’s largest technological hubs, the Summit attracts both government and commercial participants. Long known as the home to Department of Defense organizations and civilian departments and agencies including DHS, NIST, NASA, TVA, NSA and DOE, Huntsville also has many other industries represented. Companies are diverse and include healthcare, automotive and energy industries, academia, genetic research and high technology.

The ICCSE 2018: 20th International Conference on Cyber Security Exercises aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Cyber Security Exercises. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Cyber Security Exercises.

The Seattle Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

SecureWorld conferences provide more content and facilitate more professional connections than any other event in the cybersecurity industry. Join your fellow security professionals for affordable, high-quality training and education. Attend featured keynotes, panel discussions, and breakout sessions—all while networking with local peers. Earn 12-16 CPE credits through 60+ educational elements, learning from nationally recognized industry leaders.

RVAsec is the first Richmond, Virginia, security convention to bring top speakers to the mid-atlantic region. The conference will be held on Thursday, June 7th and Friday June 8th at the Commonwealth Ballroom at VCU’s University Commons. There will be no training classes this year.

Known as the Show Me State, Missouri is home to St. Louis-based ethical hacking firm, Parameter Security, and security training company, Hacker University. Together, they are bringing you a one-of-a-kind event that will Show You the State of security from a unique perspective – the hacker’s viewpoint.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

For over twenty years, the Colloquium for Information Systems Security Education (CISSE) has been the sole forum in which the members of the academic field of cybersecurity have gathered to present and discuss new ideas. CISSE was first established to provide a single place to conduct productive conversations between a variety of government, industry, and academic on the topic of cybersecurity education. Ideas arising from those discussions have led to new and improved content and curricula for cybersecurity teaching.c

Whether it’s Software as a Service (SaaS), Infrastructure as a Service (IaaS) or Platform as a Service (PaaS), cloud computing has been with us long before the media had a catchy name for it. Join us for this session to learn how cloud security has evolved and what that means to varied environments. You’ll learn practical and actionable advice from the field that you can take back to your organization and begin using immediately, building on the collective experience of our profession.

Welcome to the first ever social engineering conference in Rhode Island!

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

Woot! We just finished the contract with Doe Bay and will be back there for ToorCamp 2018. We’re keeping the format similar to last time. General admission includes camping in the designated fields. Cabins, yurts, domes, or premium campsites are an additional fee. We will be releasing a booking code for those reservations through Doe Bay later in 2017. Hope to see you there!

The Minneapolis Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Our Cyber Security for Defense series has proved to present the hottest and most critical topics within the Cyber Defense sector. Our three successful iterations have brought in a combined total of 600 attendees & speakers.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

Join us as we extend our Credit Union conference to offer cybersecurity awareness across the entire Financial Services industry June 26 – 29, 2018.

The Portland Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Summit & Training events provide an immersive training experience that arms attendees with deep-knowledge and actionable information and has a lasting impact on their careers and their organizations’ security programs.

USENIX ATC ’18 will bring together leading systems researchers for cutting-edge systems research and unlimited opportunities to gain insight into a variety of must-know topics, including virtualization, system and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. The 2018 USENIX Annual Technical Conference (USENIX ATC ‘18) will take place July 11–13, 2018, at the Westin Copley Place in Boston, MA, USA.

The San Jose Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here. The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.

Join us in Washington, DC for SANSFIRE 2018 (July 14-21), and choose from over 40 cutting-edge cyber security courses. This exceptional event gives you the opportunity to learn new aspects of information security from industry experts and improve your organization’s security posture with practical skills you can implement immediately.

DFRWS USA 2018 registration includes access to all presentations, a copy of the printed proceedings, breakfasts, a welcome reception, and entrance to the famous rodeo challenge. Additionally, registered attendees may attend a banquet (including presentation of best paper awards).

The Hartford Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Raleigh Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Cincinnati Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

BSidesLV is a non-profit educational organization designed to advance the body of Information Security knowledge, by providing an annual, two day, open forum for discussion and debate for security engineers and their affiliates. We produce a conference that is a source of education, collaboration, and continued conversation for information technologists and those associated with this field. The technical and academic presentations at BSidesLV are given in the spirit of peer review and advanced knowledge dissemination. This allows the field of Information Security to grow in breadth and depth, and continue in its pursuit of highly advanced scientifically based knowledge.

BlackHat USA returns to Las Vegas for its 21st year

The Sacramento Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Originally started in 1993, it was a meant to be a party for member of “Platinum Net”, a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I’ll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can’t remember. Why not invite everyone on #hack? Good idea!

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 27th USENIX Security Symposium (USENIX Security ’18) will take place August 15–17, 2018, at the Baltimore Marriott Waterfront in Baltimore, MD, USA.

The Pittsburgh Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The New York City Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Again in 2017, cyber attacks and threats are shaping events and policy. Continued fallout from 2016 as well as the global WannaCry ransomware attack and the more recent hacking of British MP’s email accounts, underscore the critical importance that cyber security holds in the safety and well being of any nation. With more than 100 exhibitors and 3200 attendees, the reemergence of the AFITC was a much needed and welcomed event. AFITC 2017 was larger in scale, more well attended, and even more important then ever.

The Denver Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

In 2015 we hosted our first DevSecCon conference in London. It was so successful that now, in 2017, DevSecCon takes place in four locations across the globe. It’s the world’s only conference dedicated to DevSecOps – the practice of building security into development processes. Our conferences and training courses are packed with inspiring presentations by industry experts and networking opportunities, making it an invaluable event for anyone working in Development, DevOps and Security.

PFIC 2018 is going back to its roots in the Utah mountains. This 2-day event brings together industry experts on a variety of topics in both lectures and labs. The best part of PFIC is as an attendee you get to attend 100% of the content with the unique rotating format of A and B days. One day you attend all the lectures the next you attend all the labs. Life couldn’t be better with this unique training event. Register early seats are limited.

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 1,500 attendance to allow us to provide those things other events leave out. Whether you are a Fortune 500 executive, security researcher, industry professional, student, or a hacker of “flexible” morals you will find something for you at GrrCON.

The San Francisco Bay Area Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Security of Things World USA is coming back in September 2018 as THE forum for IT , OT , IoT and Cyber Security experts coming together to define the future role of security in the interconnected and smart world of the Internet of Things for businesses.

Cyber Security Chicago offers invaluable security insight for both IT managers & security decision makers. Hear from industry experts on how you can build stronger defenses against cyber-attacks & how to recover if your systems are breached.

The Austin Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The St. Louis Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Anaheim Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

CSX 2018 enables you to: Stay on top of the latest cyber security trends, further your cyber career, and make new connections with professionals around the world. Join a global conversation with professionals facing the same challenges as you at the nexus—where all things cyber security meet. Embrace fresh insights, better understand your enemy and discover solutions that will help you safeguard the future of your organization. Go from prevention and protection to possibilities that will add to your personal value and enterprise’s competitive advantage.

Join us for DC CyberWeek (October 16 – 20, 2017), a week-long SXSW-style festival in our nation’s capital bringing together leaders, experts, and decision makers from the gov and tech communities. The festival features dozens of community events, complemented by core conferences and parties created by the festival organizer, CyberScoop. DC CyberWeek is about big ideas and coming together to make an impact on the greater good of our connected world.

Future-forward examinations of today’s most imminent challenges and real-time insight into successes of industry leadership.

The Milwaukee Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Our flagship global event offers attendees an opportunity to discuss and find solutions to current security challenges, and gain practical advice from peers and leading industry experts from around the world. Join over 1,000 global senior executives at a series of keynote presentations, workshops and networking sessions where you can share knowledge, best practice and thought leadership in a confidential peer-group environment.

The Kansas City Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Orlando Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Nashville Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

STLCyberCon 2018 is a cybersecurity conference for students, researchers, practitioners, and job seekers bringing together ideas and people from around the St. Louis region. It features presentations, panel discussions, and keynotes by distinguished speakers.

NH-ISAC’s mission is to enable and preserve the global public trust by advancing health sector cyber and physical security protection and the ability to prepare for and respond to cyber and physical threats and vulnerabilities.

The Phoenix Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Dallas Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Washington, D.C. Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

The Ft. Lauderdale Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.

Cybersecurity Job Resources

Cybersecurity Engineer

Cybersecurity engineers develop, implement, and upgrade security measures geared towards prohibiting cyber attacks. Almost every business that handles digital data employs cybersecurity experts to keep hackers from accessing information or crashing the businesses’ web-based infrastructure.

Cybersecurity Consultant

Cybersecurity consultants monitor computer networks, design and oversee implementation of the best security solutions for an organization’s needs. They protect the security and integrity of data by ensuring safeguards are in place to protect sensitive information and proprietary data from cyber criminals.

Cybersecurity Specialist

Cybersecurity specialists may be involved in security measures from entry through intermediate-level IT. They are often are responsible for designing, testing, implementing, and monitoring security measures. These duties may include, but are not limited to, analyzing and establishing security requirements, defending systems against unauthorized access, reporting violations, training fellow employees in security awareness, conducting security audits, and recommending security upgrades.

Cybersecurity Analyst

Cybersecurity analysts plan and carry out security measures to protect an organization’s computer networks and systems. They monitor computer networks and ensure security measures are in place to protect proprietary data and sensitive information.

Cybersecurity Software Developer

Cybersecurity software developers design and maintain organizational security. They keep computer systems running smoothly, prevent the theft of financial and personal information, and block intruders from accessing and divulging proprietary data. Often working with a team of developers, they employ their knowledge of databases, networks, hardware, firewalls, and encryption to design software tools that prevent attacks.

Incident Responder

Incident responders addresses security issues and threats within an organization and prevent attacks from occurring or escalating. They might work as independent consultants or be employed within an organization. They actively monitor systems and networks, identify security vulnerabilities, perform malware analysis, establish security issue protocols, and produce incident reports.

Penetration Tester

Penetration testers often work within an IT or cybersecurity team. They conduct security tests, collect relevant data, and communicate information to other members of the team. They have comprehensive knowledge of complex security measures, software, and requisite tools.

Cybersecurity Education Resources

https://www.coursera.org/learn/cyber-security-domain

Operating System
Networking
Systems Administration

Reviewing the Issues at Hand
Online vs. Offline Password Management
LastPass
KeePass Password Safe
Conclusions

https://www.udemy.com/not-another-password/?dtcode=iSJj2G02UiZM
https://www.udemy.com/security-awareness-campaigns/?dtcode=0Epx3eR2UiZM
https://www.coursera.org/learn/hardware-security
https://www.coursera.org/learn/software-security
https://www.coursera.org/learn/usable-security
https://www.coursera.org/learn/internet-history
https://www.coursera.org/learn/cryptography
https://www.udemy.com/how-to-get-a-job-in-cyber-security/

Computer Security Principles
Introduction to Cryptography
Secure Programming Techniques

https://computersecurity.stanford.edu/courses/software-security-foundations
https://computersecurity.stanford.edu/courses/network-security

Get started
Discover blockchain
Leverage blockchain benefits
Transform your business with blockchain
Demo: blockchain asset transfer
Lab: transfer assets