Upcoming Events of Interest
SoS Newsletter- Advanced Book Block
Upcoming Events of Interest |
Mark your calendars!
This section features a wide variety of upcoming security-related conferences, workshops, symposiums, competitions, and events happening in the United States and the world. This list also includes several past events with links to proceedings or summaries of the actual activities.
Note: The events may also be found on the SoS Calendar, located by clicking the 'Calendar' tab on the left-hand navigation bar.
June | July | August | September | October | November | December
June
Security of Things World
Exploring Security and the Internet of Things: A world-class event focused on the next information security revolution. Be part of Security of Things World in June in Berlin to tailor your proposition to respond to the security concerns that preoccupy enterprise customers today and find pragmatic solutions to the most common security threats.
Date: June 27–28
Location: Berlin, Germany
URL: http://securityofthingsworld.com/en/
AppSec Europe 2016
OWASP is a nonprofit community organization with 200 chapters in over 100 countries around the world. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Our wiki has a wealth of security knowledge and we are well known for many of our influential security projects. The OWASP AppSec conferences represent our largest outreach efforts to advance our mission of spreading security knowledge. These events help fund the non-profit organization and provide a great learning experience for everyone involved. Many thanks to our conference sponsors, OWASP foundation sponsors, and most importantly the OWASP community!
Date: June 27–July 1
Location: Rome, Italy
URL: http://2016.appsec.eu/
June | July | August | September | October | November | December
July
European Conference on Cyber Warfare and Security 2016
It is now 15 years since the European Conference on Cyber Warfare and Security (ECCWS) was established. It has been held in Finland, Estonia, Greece, Portugal, England, the Netherlands to mention only a few of the countries that have hosted it. This conference attracts an interesting combination of academic scholars, military personnel, practitioners, and individuals who are engaged in various aspects of the cyber security community. ECCWS is generally attended by participants from more than 30 countries. The Journal of Information Warfare regularly publishes a number of the papers presented at this conference.
Date: July 7–8
Location: Munich, Germany
URL: http://www.academic-conferences.org/conferences/eccws/
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
We invite you to participate in the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016). The event will be held 19-21 July 2016 in the city of Frankfurt, Germany in association with the Eleventh International Network Conference (INC2016). This symposium, the tenth in our series, will bring together leading figures from academia and industry to present and discuss the latest advances in information security from research and commercial perspectives.
Date: July 19–21
Location: Frankfurt, Germany
URL: http://www.haisa.org/
AFCEA Classified Cyber Forum 2016
The AFCEA Classified Cyber Forum is a one-day event focusing on the substantial threats sophisticated adversaries pose to government and industry, computer networks, and data that require the U.S. government to leverage private sector resources and capabilities. The agenda will explore the challenges in accomplishing this goal and highlight where public-private sector cooperation is most needed.
Date: July 21
Location: Chantilly, VA
URL: http://www.afcea.org/event/?q=CyberForum2016
Billington Global Automotive Cybersecurity Summit 2016
The centerpiece of this day-long summit will be the keynote addresses by U.S. Secretary of Transportation Anthony Foxx, the country’s top transportation official, and GM Chairman and CEO Mary Barra, the chief of the country’s largest automaker. The automotive sector is taking some steps to bolster cybersecurity awareness and knowledge. Last year the industry created the Automotive Information Sharing and Analysis Center (Auto-ISAC) to enhance information sharing in the auto sector. In addition, companies are forming “coordinated disclosure programs” which allow security researchers to share cyber threats with the OEMS (Original Equipment Manufacturers.)
Date: July 22
Location: Detroit, MI
URL: http://www.billingtoncybersecurity.com/global-automotive-cybersecurity-summit/
Community College Cyber Summit 2016
The third annual Community College Cyber Summit (3CS) is organized and produced by six Advanced Technological Education (ATE) centers funded by the National Science Foundation (NSF) and involved in cybersecurity. 3CS meets the perceived need for a national academic conference that focuses exclusively on cybersecurity education at the community college level. Faculty, administrators, and other stakeholders in community college cybersecurity education are invited and encouraged to attend.
Date: July 22–24
Location: Pittsburgh, PA
URL: https://www.regonline.com/builder/site/Default.aspx?EventID=1794790
Black Hat USA 2016
Black Hat is the most technical and relevant global information security event series in the world. For more than 18 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe, and Asia, providing a premier venue for elite security researchers and trainers to find their audience.
Date: July 30–August 4
Location: Las Vegas, NV
URL: https://www.blackhat.com/us-16/
June | July | August | September | October | November | December
August
Passwords 16
Passwords is the first and only conference of its kind, where leading researchers, password crackers, and experts in password security from around the globe gather in order to better understand the challenges surrounding digital authentication, and how to adequately address them. While large mainstream conferences tend to focus on current hot topics in the information security industry, Passwords events explore fringe conversations on everything from analysis and education to creating, securing, cracking, and exploiting authentication solutions. And unlike other events where the speaker is rushed in and out, Passwords provides an intimate environment for participants to directly engage speakers before, during, and after their presentations.
Date: August 2–3
Location: Las Vegas, NV
URL: https://passwordscon.org/
TechNet Augusta 2016
TechNet Augusta provides a forum for key military professionals from the U.S. Defense Department, armed services, and U.S. Coast Guard to discuss issues and share ideas. Government, industry and academic speakers address a range of topics and focus on the importance of the network, security issues, and training to enable operational forces to modernize and be ready to meet emerging challenges in 2025 and beyond.
Date: August 2–4
Location: Augusta, GA
URL: http://events.afcea.org/Augusta16/Public/Enter.aspx
USENIX Security 2016
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 25th USENIX Security Symposium will be held August 10–12, 2016, in Austin, TX.
Date: August 10–12
Location: Austin, TX
URL: https://www.usenix.org/conference/usenixsecurity16
International Conference on Cyber Security 2016
The International Conference on Cyber Security (ICCS) 2016 is an unparalleled opportunity to discuss cyberthreat analysis, operations, research, and law enforcement to coordinate various efforts to create a more secure world. The ICCS 2016 serves as a platform for researchers and practitioners from academia, industry, and government to present, discuss, and exchange ideas that address real-world problems with Cyber Security. The conference program will include special sessions, presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. ICCS 2016 is going to be a premier cybersecurity event spanning two days with distinguished speakers from government, the private sector, and academia. The speakers bring unique insights from their expertise in the disciplines of emerging technologies, operations and enforcement, academic, and pragmatic experience.
Date: August 13–14
Location: Kota, India
URL: http://www.iccs2016.iaasse.org/
HAKON AFRICA–2016
The Cyber Security Summit “HAKON ARFICA–2016 is a unique event, where the best brains in information security, leaders in the hacking world and the cyber society, along with government officials in cyber security, meet to join their efforts offensively or defensively to cooperate in addressing the most assessed topics in the field of Information Security. The threat landscape is more and more complex. As the security profession in Asian and African Countries matures, ever-higher standards apply and new questions of ethics and duty of care are raised. At the same time, economic uncertainty means pressure remains on both security budgets and the need to prove the value of security to the organizations. This convention seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global threat landscape.
Date: August 23–25
Location: Johannesburg, South Africa
URL: http://www.hakonafrica.com/
2016 HTCIA International Conference & Training Expo
The purpose of this conference is to provide high-quality education and networking opportunities for security professionals. Our multiple day, multiple track format offers a self-directed, facilitated learning environment with education sessions, interactive forums, and, exhibits. Education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing security practitioners and others who are responsible for security. Presentations are designed for all levels of experience–from fundamental to intermediate to advanced topics.
Date: August 28–31
Location: Las Vegas, NV
URL: https://www.htcia.org/event-registration/?ee=23
The Air Force Information Technology & Cyberpower Conference 2016
After a 4-year hiatus, what was once a must-attend event for so many IT leaders is returning to Montgomery, Alabama this August. The Air Force Information Technology & Cyberpower Conference, known as AFITC, is bringing together Air Force IT experts, prominent IT academics, and America’s best cybersecurity vendors for 3 days of exhibits, speakers, education, and discussions about the ways we can better defend America from cyber-attacks, advanced persistent threats, and proactively lead in this increasingly digital world.
Date: August 29–31
Location: Montgomery, AL
URL: http://www.afitc-event.com/
June | July | August | September | October | November | December
September
Intelligence & National Security Summit 2016
Hosted by the two leading professional associations—AFCEA International (AFCEA) and the Intelligence and National Security Alliance (INSA)—this is the premier gathering of senior decision makers from government, military, industry, and academia. In its first two years the summit drew more than 3,000 attendees, exhibitors and journalists. This two-day, unclassified summit boasts an impressive agenda again in 2016 with top federal agency leaders and policymakers sharing their assessments and priorities for U.S. intelligence over five plenary sessions. In addition, nine breakout sessions divided into three tracks—Cyber, Policy, and Enduring Issues—will allow for additional emphasis and discussion of contemporary challenges and opportunities. The Summit’s collection of influential speakers and attendees makes this an event intelligence- and cyber-related companies cannot afford to miss as an attendee, exhibitor, or sponsor.
Date: September 7–8
Location: Washington DC
URL: http://events.jspargo.com/inss16/public/enter.aspx
Rock Stars of Cybersecurity/Threats and Counter Measures
What do Google, Adobe, Intel Health and Life Sciences, and PayPal know about cybersecurity that you need to know? Lots! The attackers have gotten more sophisticated. No company or person is safe. The only way to protect your organization and your personal data in 2016 is with a strong cybersecurity solution. At Rock Stars of Risk-based Security, we have brought together the real leaders in this critical technology—Google, Adobe, PayPal, Intel Health and Life Sciences, and others—to talk about the trends, cybersecurity programs, and advice on how you can develop real-world security solutions that work for your organization and that don’t disrupt your operations.
Date: September 13
Location: Seattle, WA
URL: https://www.computer.org/web/rock-stars/cybersec-seattle#fans
The Security Leaders Summit
The Executive Alliance “Security Leaders Summit Boston” will be held on Tuesday, September 13, 2016 at theBoston Park Plaza Hotel and will bring together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and will provide opportunities to collaborate with leaders in the industry. Throughout the day, the summit hosts, representing companies across a diversity of industries and sizes, will share their insights and knowledge with the distinguished group of attendees through their presentations, interviews, and breakout roundtable discussions.
Date: September 13
Location: Boston, MA
URL: http://itsecurityleaders.com/security-leaders-summit-2016-boston/
Global Identity Summit 2016
The Global Identity Summit (GIS) provides an immersive environment where identity professionals from the federal government, private sector, and academia can dedicate three continuous days to strategic planning, information sharing, needs analysis, collaboration, and relationship building. GIS venues are chosen to support this environment (rather than drive-by participation), and enable concurrent presentation tracks, workshops, exhibition space, dining, and private events.
Date: September 19–22
Location: Tampa, FL
URL: http://events.afcea.org/GlobalID16/Public/enter.aspx
CYBERSEC EU Forum 2016
The CYBERSEC EU Forum is the first conference of its kind in Poland and one of just a few regular public policy conferences devoted to the strategic issues of cyberspace and cybersecurity in Europe. We promote practical recommendations that increase resilience to cyberthreats at both micro and macro levels (specific economic sectors, countries, EU as a whole). Through a dialogue-oriented and targeted approach to specific challenges, we provide a strong cross-stakeholder impulse for increased awareness and urgency in developing solutions that reach beyond national borders and enhance collaborative efforts. In particular, our recommendations help strengthen cooperation between the Visegrad Group, the Baltic countries, and other countries of Central Europe.
Date: September 26–28
Location: Kraków, Poland
URL: http://cybersecforum.eu/en/
IEEE Intelligence and Security Informatics (ISI) 2016
Intelligence and Security Informatics (ISI) is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. ISI supports counterterrorism and homeland security’s missions of anticipation, prevention, preparedness, and response to security events, in physical, cyber, enterprise, and societal spaces. The 2016 conference will be held in Tucson, Arizona. This year, special workshops will provide participants with even more opportunities for information exchange, networking, and cross-domain problem-solving.
Date: September 27–30
Location: Tucson, AZ
URL: http://www.isi-conf.org/
June | July | August | September | October | November | December
October
SAINTCON 2016
SAINTCON is a nonprofit conference devoted to security training and awareness, and is presented by the UtahSAINT Organization. SAINTCON was founded in 2001; it was originally designed to provide security training to Utah-based public entities. Today, the conference has grown into a large gathering of security professionals, students, and interested individuals. From security to community, we focus on working together to promote security in all areas of technology. Many of the attendees of SAINTCON include computer security professionals, IT professionals, security researchers, students, or anyone with a general interest in technology and security-related topics. The conference consists of several tracks of speakers presenting on a variety of security-related content, in-depth training on tools and techniques used in the security field, and a variety of security-related competitions and events to promote awareness and encourage involvement.
Date: October 11–14
Location: Provo, Utah
URL: https://www.saintcon.org/
O’Reilly Security Conference
Every company now has a website live on the Internet, meaning every company is now vulnerable to an attack. And for most companies, the website is the tip of the iceberg when it comes to technology they're depending on. How can you fend off the malware and spear-phishers and DDoS attacks without burning out the team or breaking the budget? The O’Reilly Security Conference is the best place for security professionals like you to connect with people who do what you do day in and day out, exchange ideas with experts, and share best practices and lessons learned.
Date: October 30 - November 2
Location: New York, NY
URL: http://conferences.oreilly.com/security/network-data-security-ny
June | July | August | September | October | November | December
November
MILCOM 2016
MILCOM is the one conference where command, control, and communication challenges are presented and discussed end to end—from research and development through existing solutions to future needs. It offers industry the opportunity to understand the breadth of requirements, the pace of change, and the state of play in a variety of C4I markets serving DOD as well as federal agencies, and multinational entities. Leaders across government, industry, and academia will address their needs, their issues, and their solutions in the rapidly evolving Cyber domain.
Date: November 1–3
Location: Baltimore, MD
URL: http://events.afcea.org/milcom16/public/enter.aspx
WorldCIS–2016
The World Congress on Internet Security (WorldCIS) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The WorldCIS is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and computer networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Date: November 14–15
Location: London, United Kingdom
URL: http://www.worldcis.org/
June | July | August | September | October | November | December
December
There are currently no events listed for the month of December.
(ID#:16-11364)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.