January 27, 2015 By Fran Howarth 3 min read

If you could only choose five security conferences to attend in 2015, which would they be? The following are some of the top conferences in the security industry this year that you should consider putting on your calendar:

IBM InterConnect

A good place to start the year is at IBM InterConnect 2015, which will be held from Feb. 22 to Feb. 26 in Las Vegas. This event brings together three annual IBM conferences — Impact, Innovate and Pulse — and focuses on cloud, security, service and asset management. Of particular interest to security professionals will be the security intelligence track, which features application and data security strategies, identity and access management for the enterprise, mobile and cloud, infrastructure protection, security analytics and fraud protection.

Infosec World

Infosec World 2015, held from March 23 to March 25 in Orlando, hosted by the MIS Training Institute, is considered to be a flagship event of the year for information security professionals. The U.S. event features a conference and expo, as well as three summits on the themes of cloud security, executive security for chief information security officers and IT audit management. This conference is unusual because of its focus on IT audit professionals and offers sessions with varying levels of technical content and hands-on sessions for lab-driven learning.

RSA Conference

The annual RSA Conference is considered by many to be a top security conference, with more than 28,500 attendees in 2014 and 400 companies showcasing their wares at the associated RSA Expo. The 2015 conference will be held from April 20 to April 24 in San Francisco and will feature 15 keynote speeches from a diverse range of speakers.

Every year, the conference is organized around a particular theme. This year’s theme is “Change: Challenge Today’s Security Thinking.” The idea behind this premise is that organizations need to find new ways to respond to sophisticated security incidents in light of an increasingly complex threat landscape by sharing insights. This is essential for continuing to innovate and creating opportunities for business improvement.

Black Hat USA

Black Hat USA 2015 is being held from Aug. 1 to Aug. 6 in Las Vegas. In 2014, there were more than 9,000 attendees and nearly 150 sponsors. The conference is not for the fainthearted: It is renowned for the security limitations and vulnerabilities that are exposed, and it even highlights the lax security practices of its attendees. Previous conferences have exposed how many things can be hacked, from enterprise security systems to smartphones, ATMs and even insulin pumps. A core focus in 2014 was around the security of the Internet of Things (IoT), encompassing all manners of devices from medical equipment and devices to power systems such as home automation, smart cities and transport systems. This year’s conference promises to be just as insightful.

Gartner Symposium and ITxpo

Perhaps the most general event of these recommended security conferences is the Gartner Symposium and ITxpo 2015, which will be held from Oct. 4 to Oct. 8 in Orlando. This event brings together executives from the IT industry and features a number of themed tracks. Of most interest to security professionals will be the security and risk management track, which presents new opportunities for challenging traditional security models to counter the risks that accompany the growth of digital business and rapid innovation. Among the themes within this track are security and risk management responses to the challenges posed by digital business, the need for more trusted identities and the security challenges of the IoT.

Security conferences provide an ideal venue for information sharing, networking with peers and learning about the latest technological innovations affecting the security market.

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today