North America’s top IT security conferences in 2020
Introduction: Why attend conferences?
This year will bring plenty of opportunities for professionals to attend conferences, getting them exposed to new products and tools showcased by companies active in the cybersecurity arena. The socializing opportunities afforded by such gatherings enable attendees to connect with industry experts while they network with like-minded professionals. It’s also during these events that participants will want to partake in hands-on activities, workshops and round-table discussions, enabling members to keep on the cutting edge of best practices and research in their field.
With many IT professions requiring a certain number of continuing education (CE) credits per year in order to maintain their certification or licensure, conferences may also provide some of those needed credits. How many depends on the session and if the conference offers it. This makes conferences an easy way to meet their personal development requirements.
Here is a list of some of the top IT security conferences available in the United States that are really worth your time and money to attend. As you’ll see, there are many options to choose from.
The top IT security events worth attending in the United States
Cyber Security Summit USA | February 5 | Atlanta, GA
The Cyber Security Summit has been ranked as one of the top 50 must-attend conferences by DigitalGuardian. The gathering is held across the US during the year (see upcoming summits) and creates an environment that allows senior-level executives to connect with cyber solution providers. Global experts join together to provide and share the latest in cyber security.
A full day at the Cyber Security Summit will earn attendees 6 CPE credits.
Cost: Registration cost is $50 – $350.
RSA Conference 2020 | February 24–28 | San Francisco, CA
“Be part of a conversation that has the power to change (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Daniel Brecht. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/2LYOaFIxtc4/