AppSec USA (OWASP National Conference), Denver Colorado

16 – 19 September 2014:

AppSec USA is a  software security conference for developers, security auditors, risk managers, executive management, government, press, law enforcement, entrepreneurs, technologists and entrepreneurs gathering with the world’s top practitioners to share the latest research and practices. AppSec global conferences are a key fundraiser for the Open Web Application Security Project (OWASP) Foundation to help advance all of the free, open source OWASP projects we all rely upon. OWASP is an open-source, not-for-profit  application security organization made up of corporations, educational organizations and individuals from around the world. Providing free, vendor-neutral, practical, cost-effective application security  guidance, the OWASP Foundation is the de-facto standards body for web application security used by developers and organizations globally.

Global Identity Summit, Tampa, Florida

16 – 18 September 2014:

Presented by the Biometric Consortium and the Armed Forces Computer and Electronics Association (AFCEA), the 2014 Global Identity Summit & Technology Expo is designed to promote information exchanges on S&T advancements, operational requirements, and future strategic directions of the biometric and identity communities. Federal agencies and private sector organizations co-locate program reviews, planning sessions, and product demonstrations at the conference venue, making the Global Identity Summit an incredibly efficient and cost-effective means for the federal government and the private sector to exchange information, drive innovation, and ensure continued advancement of the identity community.

TechNet Augusta, Augusta, Georgia

9 – 11 September 2014:

The overall focus of TechNet Augusta is on Army ground forces, including joint component interface, other Department of Defense organizations, inter-agency, industry, and academia.  Presentations, panels, and track sessions will highlight empowerment of soldiers on the battlefield through training, different methodologies for connecting through enhanced technology, and command and control functions to enable the U.S. Armed Forces to dominate the battlefield. This conference will address the transformation of Fort Gordon to the Cyber Center of Excellence as well as highlight the continuation of signal training. Government, industry, and academia speakers will address a broad range of topics and focus on the importance of the network, security issues, and training to enable operational forces to modernize and be ready to meet emerging challenges in 2020 and beyond.

VMworld, San Francisco, California

25 – 28 August 2014:

This VMworld conference features over 500 unique sessions; countless hands on labs, workshops, group discussions; and booth demonstrations on  tools and technologies for automating virtualized data centers and extending them to the cloud. “Discover how to deliver apps efficiently and provide secure virtual workspaces. Gain insights from organizations and a vibrant ecosystem of partners and industry experts on how to redefine IT with software.”

CRYPTO 2014, Santa Barbara, California

17 – 24 August 2014:  

The 34th International Cryptology Conference, CRYPTO 2014, is held at University of Santa Barbara, California (UCSB) and is sponsored by the International Association for Cryptologic Research (IARC), in cooperation with the UCSB Computer Science Department. The academic program covers all aspects of cryptology.  Electronic versions of the proceedings, published by Springer, will be provided to all registered attendees at the conference. In addition, paper proceedings can be purchased through online registration.

Insider Threat Summit, Monterey, California

16 – 17 March 2015:

The focus of the Insider Threat Summit is to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation of privileged identities and technical physical security considerations. A heightened awareness of insider threats due to numerous newsworthy attacks and unauthorized leaks has brought us together for one main purpose.