44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional. Why do 44CON? (1) To bring the best in international Security training + speaking (as well as the best of local talent) to the UK at a reasonable cost. (2) … Read more
We are assembling another strong roster of expert faculty to address the very latest developments in data privacy taking place in Germany and throughout Europe. Once again, all sessions will be delivered in parallel tracks−one in German, the other in English.
Advisen again brings its acclaimed Cyber Risk Insights Conference series to Europe with a full-day event in London addressing the critical privacy, network security and cyber insurance issues confronting risk professionals and their organizations. An expert faculty comprised of leaders in network security, regulation, law enforcement, risk management and cyber risk insurance will offer their … Read more
Real World Crypto Symposium aims to bring together cryptography researchers with developers implementing cryptography in real-world systems. The conference goal is to strengthen the dialogue between these two communities. Topics covered focus on uses of cryptography in real-world environments such as the Internet, the cloud, and embedded devices. The programme consists of invited and contributed … Read more
This conference is intended to cover the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST, security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific … Read more
The WorldCIS is an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS … Read more
Co-located with IP EXPO Europe, Cyber Security EXPO has been designed to provide CISOs and IT security staff the tools, new thinking and policies to meet the 21st century business cyber security challenge. At Cyber Security EXPO, discover how to build trust across the enterprise to securely manage disruptive technologies. This is one of the … Read more
This conference aims to explore some of the urgent issues faced by the growing threat of cybercrime, offering current insight into case law, governmental policy, as well as the crucial practical issues of how such crime can be detected, investigated, prosecuted and managed.
RANT is an end user only, informal networking event for senior professionals working within the Information Security and Risk Management market. Each month a different speaker is appointed to kick-start the event, openly discussing a hot topic, in which the audience is encouraged to pitch in with their opinions and suggestions. The evening always provides … Read more
Suits and Spooks is a one of a kind, limited attendance cyber security event owned by Taia Global and founded in 2011. Every event draws decision makers and thought leaders from the private, public, defense, intelligence sectors and law enforcement and who come to have knowledge about and discuss some of the key security challenges … Read more
The aim of RANT is to provide a platform for all members to discuss and debate Information Security related issues in an open format. The relaxed networking environment provides guests with the opportunity to discuss relevant issues and to network with like-minded individuals. Launched over nine years ago, RANT aims to provide the community with … Read more
The exponential growth of data and the resources needed to manage it is one of the most pressing issues facing business today. And it’s not just the amount of data. It’s where it lives and how it travels between private clouds, public clouds and back to on premises. In these increasingly complex IT environments, it’s … Read more
The event focuses on fast and secure primitives for symmetric cryptography which includes the designing and analyzing of block ciphers, encryption schemes, stream ciphers, authenticated encryption schemes, hash functions, message authentication codes, (cryptographic) permutations, analysis and evaluation tools, issues and solutions regarding their secure implementation.