Your Local InfoSec Events
Join Our Newsletter
Alerts, Ticket Discounts and More...
|OWASP Boston Area||ISSA New England||ISACA New England|
|Cloud Security World||SANS Boston||Executive Alliance’s Security Leaders Summit BOSTON|
|ACSC Cyber Security and Information Technology Fall Intern Fair||Data Connectors Boston Tech-Security Information Security Conference||UNITED Security Summit|
|USENIX Symposium on Networked Systems Design and Implementation|
OWASP Boston meets the first wednesday of every month, 6:30 to 9 pm. The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Their mission is to make application security “visible,” so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under an open source license.
The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications and peer interaction opportunities that enhance the knowledge, skills and professional growth of its members information security professionals. The primary goal of ISSA Is to promote management practices that will ensure availability, integrity and confidentiality of organizational resources. Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.
The aim of this chapter is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout New England. The New England Chapter of ISACA was founded in 1976. From the modest beginnings of its first meeting — which was held at Valle’s Steak House on Route 9 in Newton, the New England Chapter has grown to over 1400 members across four Massachusettss (MA, NH, ME, VT). The primary objective of the New England Chapter of ISACA is to provide quality IS-related education to its members. The IS audit profession is based and dependent on technological expertise, therefore the Association seeks to keep its members abreast of rapid changes that vitally affect the Massachusetts of the computing art.
Unlike other meetups, you will not be expected to pay dues, “join up”, or stomach another vendor spiel to attend. Beansec takes place the third Wednesday of every month. BeanSec! is an informal meetup of information security professionals, researchers and academics in the Greater Boston area.
The SOURCE Conference is a unique set of events that bring information security professionals, business executives, and researchers together in one room. SOURCE Boston combines business, technology and software development in a collaborative environment that provides security experts an opportunity to share insights and best practices for addressing security needs in the face of the evolving threat landscape.
SecureWorld Expo brings together the security leaders, experts, senior executives, and policy makers who are shaping the very face of security. SecureWorld is at the intersection of Information Security, Physical Security, Compliance, IT Audit, Computer Forensics, Enterprise Risk Management, Business Continuity and Security Management. SecureWorld conferences provide more resources and facilitate more connections than any other cybersecurity event in North America. Their 14 regional conferences equip and inspire IT professionals on the front lines. Beyond events, SecureWorld Media is a premier source of cybersecurity content, including breaking industry news, original articles and research, web conferences, and training courses.
Cloud security is re-emerging as a critical area of concern. For a time, security teams scrambled to bolt on security to third-party software, worrying that the data was outside owners’ control. Now, a new architecture is emerging, one in which companies have the opportunity to bake security into critical apps and cloud storage from inception. With automation and Cloud Access Security Brokers leading the way, there is an opportunity to make our systems and data more secure than ever before. We had this chance with virtualization and missed the boat; this time, will you hop on board or let cloud security float on by?
SANS offer some of the best cyber security training events that you can attend.
The event will bring together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and will provide opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, will share their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.
This job fair is for companies that are looking for undergraduates and graduates students in Cybersecurity and Information Technology fields for full-time positions or internships.
Data Connectors is a cyber security career-networking event. Most of the events are valid for CEU/ CPD credits – but we’d encourage you to check first.
Packed with relevant talks, trainings and intensives, you’ll learn about the challenges and opportunities that impact you, so you can feel empowered to drive your security program forward, faster.
This year’s conference will focus on the design principles, implementation, and practical evaluation of networked and distributed systems. The main goal is to unite researchers from across the networking and systems community to foster a broad approach to addressing overlapping research challenges.