Visible to the public  Aviation ISAC 2020 Student Cyber Challenge
Sep 23, 2020 8:30 am - 4:30 pm EDT

We are organizing a virtual aviation-focused cybersecurity competition (called the Aviation ISAC Collegiate CTF Competition) on Sept. 23rd (8:30am-4:30pm EDT) at the A-ISAC Virtual Symposia. This is free and open to teams of 3 students from any college/university. There can be multiple teams from each institution. Cash prizes for the top-3 teams. There will be industry mentors virtually assisting, so networking opportunities exist as well.


Visible to the public  HoTSoS 2020 - Virtual
Sep 22, 2020 7:00 am - Sep 23, 2020 6:00 pm CDT

7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium

September 22-24, 2020 | Virtually hosted by the University of Kansas |


Visible to the public  2015 CPS Community Forum (at CPS Week 2015)
Apr 14, 2015 8:00 pm - 9:30 pm PDT

CPS Community Forum

Tuesday, April 14, 2015

8:00 p.m. - 9:30 p.m.


Visible to the public  RTSS 2015
Dec 01, 2015 8:00 am - Dec 04, 2015 5:00 pm CST

The 36th IEEE Real-Time Systems Symposium (RTSS'15)

sponsored by the IEEE Computer Society Technical Committee on Real-Time Systems


Visible to the public  FCST 2021
Dec 06, 2021 7:00 am - Dec 09, 2021 6:00 pm CET

4th IEEE International Symposium on Future Cyber Security Technologies (FCST 2021)

In conjunction with
The 8th International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2021)

Gandia, Spain | December 6-9, 2021 (Virtual) |


Visible to the public  RTSS 2021
Dec 07, 2021 7:00 am - Dec 10, 2021 6:00 pm CET

IEEE Real-Time Systems Symposium (RTSS)

December 7-10, 2021 | Hybrid Format in Dortmund, Germany


Visible to the public  HPCA 2021
Feb 27, 2021 7:00 am - Mar 03, 2021 6:00 pm KST

The 27th IEEE International Symposium on High-Performance Computer Architecture (HPCA-27)

The 27th IEEE International Symposium on High-Performance Computer Architecture (HPCA-27) provides a high-quality forum for scientists and engineers to present their latest research findings in this rapidly-changing field.

HPCA-27 will be held virtually Feb. 27 -- Mar. 3, 2021 in conjunction with PPoPP, CGO, and CC.


Visible to the public  IM 2021
May 17, 2021 7:00 am - May 21, 2021 6:00 pm CEST

IFIP/IEEE International Symposium on Integrated Network Management (IM 2021)

Sponsored by both IEEE Communications Society and IFIP Working Group 6.6

Held in odd-numbered years since 1989, IM 2021 will follow the 33 years tradition of NOMS and IM as the primary IEEE Communications Society's forum for technical exchange on the management of information and communication technology focusing on research, development, integration, standards, service provisioning, and user communities.


Visible to the public  DS3 Summit - Galen Hunt, Microsoft
Nov 18, 2020 9:00 am - 10:30 am CST

The Developing Secure Systems Summit (DS3)
Galen Hunt, Microsoft

Online event broadcast live on YouTube. Held November 18, 2020

Registration is free, but encouraged:


Visible to the public  CSF 2021
Jun 21, 2021 7:00 am - Jun 24, 2021 6:00 pm MSK

34th IEEE Computer Security Foundations Symposium (CSF 2021)

The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled "The Foundations of Computer Security--We Need Some." The meeting became a "symposium" in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSF's home.

The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.