January 30, 2015 By Fran Howarth 3 min read

If my inbox is anything to go by, there are many 2015 conferences and events related to security happening throughout the year. The following are those that will be of the most interest to security practitioners:

General Information Security Events

Some events focus on information security in general, including Infosec Europe, to be held in June in London. This is a must-visit event of the year for security practitioners in Europe and features a variety of technical sessions and a multitude of exhibiting vendors in the expo. There are also some smaller, local events, such as Infosec Belgium, also in March. These events are run by Infosecurity Magazine, which also offers virtual conferences for online viewers.

The Security B-Sides conference in London will be held at the same time as Infosecurity Europe. Security B-Sides conferences are growing in popularity. They generally draw a smaller crowd but are held in high regard for being highly interactive, fostering audience participation and offering good networking opportunities. These conferences will be held in a variety of locations worldwide in 2015.

In a similar vein to Infosecurity Europe, the annual RSA Conference, to be held in San Francisco in April, is a must for security practitioners in the United States, with a full conference program and a massive associated exhibition. An RSA event is also being held in Singapore this year. Though events were previously held in Europe, one was not held there in 2014, and there is no evidence that there will be one in 2015.

More Specialized 2015 Conferences for Information Security

For those of a more technical bent, there are three Black Hat conferences in 2015. There will be one in Singapore in March, one in Las Vegas in April and one in Amsterdam in November. These events are famous for showcasing the latest security innovations and exposing security limitations and vulnerabilities.

Immediately following Black Hat is DEF CON, the world’s largest hacker conference. It offers a mix of tracks related to security and hacking subjects, social events and contests for skills such as picking locks and various forms of hacking.

For those looking for a broader perspective on security, ASIS International goes beyond information security and addresses a wide spectrum of topics, including physical security, supply chain security, terrorism and industry-specific technology such as oil and gas security. Events are being held in Dubai, United Arab Emirates, in February; Frankfurt, Germany, in March; New York in April; and Singapore in November.

Various associations are putting on 2015 conferences related to specialized areas within the security industry. The Cloud Security Alliance has its Cloud Expo Europe in London in March, with a dedicated theater for presentations around security and governance issues. ISACA, which is dedicated to advancing the IT profession through education, has a handful of events that will be of interest to security professionals. The Internet Security Foundation also has a variety of events, both physical and online, covering specific areas of interest within the security field.

General IT Events Featuring Security Tracks

Among analyst firms, Gartner offers the most events, with security and risk management summits in Maryland in June, Sydney in August and London in September, as well as an identity and access management summit in London in March. It also puts on the annual Symposium/ITxpos, of which there are eight in 2015. These will be held in Dubai in May; Cape Town, South Africa, in September; Orlando, Sao Paulo, the Australian Gold Coast and Tokyo in October; and in Goa, India, and Barcelona, Spain, in November. These are more general IT events, but there is a specific security and risk management track and tracks related to specific security industries.

Another general IT event is CeBIT, which will feature 322 exhibitors of business security wares at the flagship event in Hannover, Germany, in 2015. Business security is one of nine focus areas at this huge, sprawling exhibition, covering 27 halls. There are further CeBIT events in Sydney in May; Porto Alegre, Brazil, in August; Bangalore, India, in October; and Istanbul in December.

IBM InterConnect

IBM InterConnect 2015 will be held in Las Vegas in February and focus on the cloud, security, service and asset management. Of particular interest to security professionals will be the security intelligence track, which features application and data security strategies, identity and access management for the enterprise, mobile and cloud, infrastructure protection and security analytics and fraud prevention.

Though it may seem daunting to pick from all the security conferences that will be held this year, the good news is that professionals will have plenty to choose from and can find the conference that will best fit their needs — and the needs of their organization.

More from Intelligence & Analytics

Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing

12 min read - For the last year and a half, IBM X-Force has actively monitored the evolution of Hive0051’s malware capabilities. This Russian threat actor has accelerated its development efforts to support expanding operations since the onset of the Ukraine conflict. Recent analysis identified three key changes to capabilities: an improved multi-channel approach to DNS fluxing, obfuscated multi-stage scripts, and the use of fileless PowerShell variants of the Gamma malware. As of October 2023, IBM X-Force has also observed a significant increase in…

Email campaigns leverage updated DBatLoader to deliver RATs, stealers

11 min read - IBM X-Force has identified new capabilities in DBatLoader malware samples delivered in recent email campaigns, signaling a heightened risk of infection from commodity malware families associated with DBatLoader activity. X-Force has observed nearly two dozen email campaigns since late June leveraging the updated DBatLoader loader to deliver payloads such as Remcos, Warzone, Formbook, and AgentTesla. DBatLoader malware has been used since 2020 by cybercriminals to install commodity malware remote access Trojans (RATs) and infostealers, primarily via malicious spam (malspam). DBatLoader…

New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware

8 min read - IBM X-Force uncovered a new phishing campaign likely conducted by Hive0117 delivering the fileless malware DarkWatchman, directed at individuals associated with major energy, finance, transport, and software security industries based in Russia, Kazakhstan, Latvia, and Estonia. DarkWatchman malware is capable of keylogging, collecting system information, and deploying secondary payloads. Imitating official correspondence from the Russian government in phishing emails aligns with previous Hive0117 campaigns delivering DarkWatchman malware, and shows a possible significant effort to induce a sense of urgency as…

X-Force releases detection & response framework for managed file transfer software

5 min read - How AI can help defenders scale detection guidance for enterprise software tools If we look back at mass exploitation events that shook the security industry like Log4j, Atlassian, and Microsoft Exchange when these solutions were actively being exploited by attackers, the exploits may have been associated with a different CVE, but the detection and response guidance being released by the various security vendors had many similarities (e.g., Log4shell vs. Log4j2 vs. MOVEit vs. Spring4Shell vs. Microsoft Exchange vs. ProxyShell vs.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today