You! If you’re in IT or cyber security. We’ve built a reputation as the best event for cloud, infrastructure and cyber security pros in Europe. But now we want you to tell your colleagues working in data analytics, AI and software development as well as anyone working on IOT or Blockchain projects that IP EXPO … Read more
The FT Cyber Security Summit Europe 2015 will bring together boardroom directors, chief executives, senior management and chief information security officers to discuss the current threats in cyberspace and what more should be done to build safer and more resilient businesses. Following on from the inaugural FT Cyber Security Summit 2014, and the FT Cyber … Read more
44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.
Black Hat is excited to debut its Black Hat Mobile Security Summit on June 16-17, 2015 in London, England. This two-day summit, a part of London Technology Week will bring together some of the brightest minds in the industry to focus on mobile security. In addition, we’re featuring a Black Hat Security Zone on the … Read more
Security BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event … Read more
Infosecurity Europe is the sourcing and knowledge hub for Europe’s information and cyber security community. Featuring an interactive exhibition floor with over 400 cutting-edge suppliers, a far-reaching conference programme and a host of networking opportunities, the event brings information and cyber security to life. Brought to you by Infosecurity Group, with over 23 years of … Read more
44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional. Why do 44CON? (1) To bring the best in international Security training + speaking (as well as the best of local talent) to the UK at a reasonable cost. (2) … Read more
We are assembling another strong roster of expert faculty to address the very latest developments in data privacy taking place in Germany and throughout Europe. Once again, all sessions will be delivered in parallel tracks−one in German, the other in English.
Advisen again brings its acclaimed Cyber Risk Insights Conference series to Europe with a full-day event in London addressing the critical privacy, network security and cyber insurance issues confronting risk professionals and their organizations. An expert faculty comprised of leaders in network security, regulation, law enforcement, risk management and cyber risk insurance will offer their … Read more
Real World Crypto Symposium aims to bring together cryptography researchers with developers implementing cryptography in real-world systems. The conference goal is to strengthen the dialogue between these two communities. Topics covered focus on uses of cryptography in real-world environments such as the Internet, the cloud, and embedded devices. The programme consists of invited and contributed … Read more
This conference is intended to cover the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST, security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific … Read more
The WorldCIS is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS … Read more
Co-located with IP EXPO Europe, Cyber Security EXPO has been designed to provide CISOs and IT security staff the tools, new thinking and policies to meet the 21st century business cyber security challenge. At Cyber Security EXPO, discover how to build trust across the enterprise to securely manage disruptive technologies. This is one of the … Read more
This conference aims to explore some of the urgent issues faced by the growing threat of cybercrime, offering current insight into case law, governmental policy, as well as the crucial practical issues of how such crime can be detected, investigated, prosecuted and managed.
RANT is an end user only, informal networking event for senior professionals working within the Information Security and Risk Management market. Each month a different speaker is appointed to kick-start the event, openly discussing a hot topic, in which the audience is encouraged to pitch in with their opinions and suggestions. The evening always provides … Read more
Suits and Spooks is a one of a kind, limited attendance cyber security event owned by Taia Global and founded in 2011. Every event draws decision makers and thought leaders from the private, public, defense, intelligence sectors and law enforcement and who come to have knowledge about and discuss some of the key security challenges … Read more
The aim of RANT is to provide a platform for all members to discuss and debate Information Security related issues in an open format. The relaxed networking environment provides guests with the opportunity to discuss relevant issues and to network with like-minded individuals. Launched over nine years ago, RANT aims to provide the community with … Read more
The exponential growth of data and the resources needed to manage it is one of the most pressing issues facing business today. And it’s not just the amount of data. It’s where it lives and how it travels between private clouds, public clouds and back to on premises. In these increasingly complex IT environments, it’s … Read more
The event focuses on fast and secure primitives for symmetric cryptography which includes the designing and analyzing of block ciphers, encryption schemes, stream ciphers, authenticated encryption schemes, hash functions, message authentication codes, (cryptographic) permutations, analysis and evaluation tools, issues and solutions regarding their secure implementation.