Visible to the public Upcoming Events of Interest

SoS Newsletter- Advanced Book Block

SoS Logo

Upcoming Events

Mark your calendars!

This section features a wide variety of upcoming security-related conferences, workshops, symposiums, competitions, and events happening in the United States and the world. This list also includes several past events with links to proceedings or summaries of the actual activities.

Note: The events may also be found on the SoS Calendar, located by clicking the 'Calendar' tab on the left-hand navigation bar.

International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC 2015)
International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC 2015) is the first annual conference in the area of cyber security focusing on the industry control system, cloud platform and smart cities. City and industrial control infrastructures are changing with new interconnected systems for monitoring, control and automation. The goal of SSIC is to attract cyber security researchers, industry practitioners, policy makers, and users to exchange ideas, techniques and tools, and share experience related to all practical and theoretical aspects of communications and network security.
Date: August 5 - 7
Location: Shanghai, China

SAC Summer School (S3)
In 2015, for the first time, SAC will be preceded by the SAC Summer School (S3). The purpose of S3 is to provide participants with an opportunity to gain in-depth knowledge of specific areas of cryptography related to the current SAC topics by bringing together world-class researchers who will give extended talks in their areas of specialty. S3 is designed to create a focused learning environment that is also relaxed and collaborative. The SAC Summer School is open to all attendees, and may be of particular interest to students, postdocs, and other early researchers.
Date: August 10 - 12
Location: New Brunswick, Canada

24th USENIX Security Symposium
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks
Date: August 12 - 14
Location: Washington D.C.

5th Annual Cyber Security Training & Technology Forum (CSTTF)
CSTTF is designed to further educate Cyber, Information Assurance, Information Management Officers', Information Technology, and Communications professionals. This will be accomplished through a number of in-depth cyber and technology sessions, as well as hands on government/industry exhibits and demos. Don't miss this local, educational, and cost effective, cyber and technology event.
Date: August 19 - 20
Location: Colorado Springs, CO

HTCIA Conference 2015
Bringing together experts from all over the world to share their latest research and techniques related to cybersecurity, Incident Response and Computer Forensics.
Date: August 30 - September 2
Location: Orlando, FL

44CON London
44CON London is the UK's largest combined annual Security Conference and Training event. We will have a fully dedicated conference facility, including secure wi-fi with high bandwidth Internet access, catering, private bar and daily Gin O'Clock break. 44CON London will comprise of two main presentation tracks, two workshop tracks and a mixed presentation/workshop track over the two full days covering Technical topics. The Hidden track is run under the Chatham House Rule and we're not going to tell you about that.
Date: September 9 - 11
Location: London, United Kingdom

New York Cyber Security Summit 2015
The Cyber Security Summit, an exclusive C-Suite conference series, connects senior level executives responsible for protecting their companies' critical infrastructures with innovative solution providers and renowned information security experts. This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation's leading solution providers and discover the latest products and services for enterprise cyber defense.
Date: September 18
Location: New York, NY

Global Identity Summit
The Global Identity Summit focuses on identity management solutions for the corporate, defense and homeland security communities.
Date: September 21 - 24
Location: Tampa, Fl

DerbyCon 5.0
Welcome to DerbyCon 5.0 - "Unity". This is the place where security professionals, hobbyists, and anyone interested in security come to hang out. DerbyCon V will be held September 23-27th, 2015 at the Hyatt Regency in downtown Louisville Kentucky. Training is held on Wednesday and Thursday (September 23rd and 24th) and the conference the Friday, Saturday, and Sunday (September 25th - 27th). DerbyCon 4.0 pulled in over 2,000 people with an amazing speaker lineup and a family-like feel. We continue to make the conference better each year and have a ton of new and exciting things planned for this year. Please excuse the website as it is currently under construction and planning for DerbyCon 5.0!
Date: September 23 - 27
Location: Louisville, Ky

World Congress on Internet Security (WorldCIS-2015)
The World Congress on Internet Security (WorldCIS-2015) is Technical Co-sponsored by IEEE UK/RI Computer Chapter. The WorldCIS is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
Date: October 19 - 21
Location: Dublin, Ireland



Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.