|
CSRC
Homepage
CSRC Site Map
Search
CSRC:
CSD
Publications:
- Special
Publications
- FIPS Pubs
- ITL Security
Bulletins
- NIST IRs
CSD
Focus Areas:
- Cryptographic Standards
& Application
- Security Testing
- Security Research
/
Emerging
Technologies
- Security Management
&
Guidance
- Outreach Awareness
&
Education
- FISMA Implementation
Project
General
Information:
- Site
Map
- List of Acronyms
- Archived
Projects
&
Conferences
- Virus Information
- ICAT Alerts
Search
NIST's ICAT
Vulnerability Archive:
|
|
If you are holding, attending an event or know about a computer security
conference, seminar, or workshop, and would like to see it posted on this
page, please send e-mail about the event and an URL where we can link
to webmaster-csrc@nist.gov
We will try to post the event on our page as long as it follows within
our web policy. Thanks.
Upcoming NIST Computer
/ Network Security Events:
October 6-7, 2004
: Common
Criteria Users' Forum (CCUF)
Crowne Plaza Hotel located
at 14th and K Street, NW, Washington, DC.
NIST, with co-sponsorship from Department
of Homeland Security (DHS) and the National Cyber Security Partnership's Coordinating
Committee, will hold a Common
Criteria Users' Forum (CCUF) at Crowne Plaza Hotel located at 14th and K
Street, NW, Washington, DC. The CCUF complement and supplements two studies
that address issues related to the use of the Common Criteria and to the U.S.
NIAP process that implements Common Criteria. These studies are: 1) the ongoing
NIAP Review (sponsored by DoD & DHS) and 2) the completed National
Cyber Security Partnership Technical Standards Task Force Report on Common Criteria.
Common Criteria related stakeholders, including customers, vendors, Common Criteria
evaluators and NIAP representatives, are invited to attend the Common Criteria
Users' Forum.
2004
SEPTEMBER:
26-30 : The
Conference and Expo on Mobile and Wireless Security
Boston, Massachusetts USA.
Conference runs September 27-29
Optional Workshops runs September 26, 29-30
Expo runs September 27-28
You'll learn:
The latest WLAN technologies and emerging wireless standards; WAP - WEP - WPA
- WPA2 - 802.11 - 3G - Bluetooth and much more; Wireless Authentication Options:
Biometrics, PKI, Smart Cards and Digital Certificates; How To Manage Identities
on Wireless LANs; How To Secure Mobile Workers in Wireless Hotspots; Real-World
Solutions for Protecting Your Data from Hackers
To learn more about this conference, please visit website - link provided above.
27-29 : ConSec
04- The Southwest Regional Symposium on Business Continuity, Information Security,
and It Audit
University of Texas JJ
Pickle Research Center Austin, Texas USA.
This symposium will focus on: Conducting Business
in a Regulatory Environment. Recent events have highlighted the importance of
preserving an agency or company's infrastructure. The ConSec Steering Committee
is once again lining up numerous nationally known speakers in the areas of business
continuity planning, IT audit, and IT security.
For more information about this symposium, please call 1(877) 451-8700 or visit
website, link provided above.
OCTOBER:
4-6 : 24th
Annual Conference & Expo on Control and Audit of Information Technology
Marriott Chicago Downtown
/ Chicago, Illinois
Optional Workshops: October 3, 6 and 7. To learn
more about this conference, visit website - link provided above.
5-6 : How
to Be an Effective Information Security Professional
Richardson, Texas - Fujitsu
USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
6-7 : Common
Criteria Users' Forum (CCUF)
Crowne Plaza Hotel located
at 14th and K Street, NW, Washington, DC
NIST, with co-sponsorship from Department
of Homeland Security (DHS) and the National Cyber Security Partnership's Coordinating
Committee, will hold a Common Criteria Users'
Forum (CCUF) at LCrowne Plaza Hotel located at 14th and K Street, NW, Washington,
DC. The CCUF complement and supplements two studies that address issues related
to the use of the Common Criteria and to the U.S. NIAP process that implements
Common Criteria. These studies are: 1) the ongoing NIAP Review (sponsored by
DoD & DHS) and 2) the completed National
Cyber Security Partnership Technical Standards Task Force Report on Common Criteria.
Common Criteria related stakeholders, including customers, vendors, Common Criteria
evaluators and NIAP representatives, are invited to attend the Common Criteria
Users' Forum.
7-8 : Defense
Against Social Engineering
Richardson, Texas - Fujitsu
USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
8 : Wireless
Network Security
Rome, Italy.
Got Wireless? Get Security Certified! This 5-day
class measures the IT professional's knowledge of how to defend a wireless LAN
from attacks. Students learn from basic to advanced anti-hacking tactics for
wireless networks in 13 escalating technical workshops & hands-on labs. Deploy
70K in wireless hardware from handling unauthorized access, information theft,
wired hijacking and wireless hacking. Install multiple cards, configure WAN
bridges, WEP to LEAP security, develop & implement security policies, defend
wireless attacks, and locate unauthorized access points with AirMagnet. To register,
call 203-357-7744, email info@securityuniversity.net,
or register online at https://ssl20.pair.com/secuniv/reg.php
19-20 : Hands-on
Wireless Security
Portland, Oregon USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
21-22 : How
to Perform a Technical Network Vulnerability Assessment
Portland, Oregon USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
26-28 : Federal
Information Assurance Conference (FIAC) 2004 "Achieving Security Through Knowledge"
The Inn and Conference
Center University of Maryland University College 3501 University
Blvd East Adelphi, Maryland 20783
Contact Information: Bob Jeffers Federal Events
Manager Federal Business Council, Inc., (301) 206-2940,
bj1@fbcdb.com
The 4th Annual Federal Information Assurance Conference (FIAC)
is designed to meet the real-world information assurance needs of the Federal
Government and its workforce. This two-day event will provide useful information
and educational opportunities for federal managers, acquisition and procurement
officials, network and systems administrators, and information security professionals.
FIAC brings together a variety of resources from government, industry, and academia.
This year's conference will discuss key security policies and guidelines, information
assurance (IA) technologies, and implementation of IA programs. To learn more
about FIAC, visit www.fbcinc.com/fiac.
28 : Anti-Hacking
for Computer Security
Washington DC.
This 3 day class is designed for today's IT manager
looking to understand the critical security threats to your company assets from
the Internet. This intense vendor-neutral class takes you from defending OS
vulnerabilities to designing best practices for safeguarding DNS and DHCP implementations,
and you will learn where Encryption and PKI are essential tools for secure networks
& enterprise infrastructures. Build ""Defense in Depth"" strategy templates
in 8+ escalating workshops to perk-up your current security policy and improve
physical security requirements. Quickly get up to speed on the anti-hacker tricks
and resources and build your own little “Worst Case Scenario” black book for
Computer Security. To register, call 203-357-7744, email info@securityuniversity.net,
or register online at https://ssl20.pair.com/secuniv/reg.php
NOVEMBER:
4-5 : HiverCon
2004
The Davenport Hotel, Dublin, Ireland
Abstract: Now in its third year, the HiverCon
Corporate Security Conferences have positioned themselves as an unmissable event
on the European security calendar. The only high level event of its type, the
HiverCon conferences strive to teach the hacker mentality while providing real
world technical knowledge on how best to combat emerging threats.
6-7 : CSI
31st Annual Conference - Hands-On Linux Security
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
6-7 : CSI
31st Annual Conference - Introduction to Computer & Network Security
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
6-7 : CSI
31st Annual Conference - How to Develop a Winning Security Architecture
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
6-7 : CSI
31st Annual Conference - How to Develop Information Security Policies
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
6-7 : CSI
31st Annual Conference - CISSP Official Common Body of Knowledge Overview
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
6-7 : CSI
31st Annual Conference - Secure Cisco PIX Firewall - Advanced
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
7 : CSI
31st Annual Conference - Wireless Security in the Enterprise
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
8-10 : CPM
2004 EAST
Marriott Wardman Park Hotel, Washington, DC.
CPM (Contingency Planning & Management)
is dedicated to the convergence of business continuity/continuity of operations,
security and emergency management, as each of these related disciplines need
to work together in order to create a complete risk management program for business
or government. www.ContingencyPlanningExpo.com
8-10 : CSI
31st Annual Computer Security Conference & Exhibition
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
10 : Introduction
to PKI
Rome, Italy.
In this 3-day class, you explore certification authorities
(CA) and public key infrastructure (PKI) technologies, learning to recognize, assess,
analyze, and audit PKI and access security measures. After a public key crypto review,
you drill down to the elements of a PKI, including key histories, key backup and recovery,
CRL’s, certificate policies and practice statements. 6 workshops review PKI implementation
strategies, and how to effectively deploy and implement the new access, authentication
and identity management system. To register, call 203-357-7744, email
info@securityuniversity.net, or
register online at https://ssl20.pair.com/secuniv/reg.php
11-12 : CSI
31st Annual Conference - How to Create and Sustain a Quality Security Awareness Program
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
11-12 : CSI
31st Annual Conference - Hands-On Hacking
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
11-12 : CSI
31st Annual Conference - Return on Investment for Information Security
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
11-12 : CSI
31st Annual Conference - How to Develop Information Security Standards & Procedures
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
11-12 : CSI
31st Annual Conference - Managing a Privacy Governance Program
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
11-12 : CSI
31st Annual Conference - A Structured Approach to Incident Response
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
11-12 : CSI
31st Annual Conference - A Survey of Computer Forensics Tools and How to Make them Work
for You
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
13 : Catching
the Hackers Intro to IDS
Rome Italy
This 3-day class investigates the strengths and
weaknesses of the leading network, host and anomaly based intrusion detection
systems (IDS). Demos of hacker attack methods illustrate port scans, buffer overruns,
and other network assaults in action. Learn sensor types, where to position sensors
and consoles on the network and how to effectively build a computer security event
correlation system. Use IDS countermeasures to build a custom alert criteria /
response database and incident response team for your company. To register, call
203-357-7744, email info@securityuniversity.net,
or register online at https://ssl20.pair.com/secuniv/reg.php
18-19 : Awareness
Peer Group - CSI
Washington, DC USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
Nov. 30 - Dec. 1 : Outsourcing
and Organizational Change: A Security Survival Guide
CSI Training Center - New York, New York USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
DECEMBER:
Nov. 30 - Dec. 1 : Outsourcing
and Organizational Change: A Security Survival Guide
CSI Training Center - New
York, New York USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
2-3 : Defense
Against Social Engineering
CSI Training Center - New
York, New York USA.
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
2005
JANUARY:
FEBRUARY:
MARCH:
APRIL:
MAY:
24-26 : CPM
2005 WEST
The Mirage Hotel, Las Vegas, Nevada
CPM (Contingency Planning & Management) is dedicated
to the convergence of business continuity/continuity of operations, security
and emergency management, as each of these related disciplines need to work
together in order to create a complete risk management program for business
or government. www.ContingencyPlanningExpo.com
JUNE:
13-15 : NetSec'05
Scottsdale, Arizona USA. - The Phoenician
For more information regarding this event please
visit Computer Security Institute's website. Link provided above.
JULY:
AUGUST:
SEPTEMBER:
OCTOBER:
NOVEMBER:
DECEMBER:
|