Introduction: Why attend conferences?
Conferences are a great way to gain information and knowledge about advances on cutting-edge technologies but are also opportunities to meet and connect with industry-foremost experts. Participants, in fact, can learn of innovative ideas and new solutions as well as share experiences of security challenges with like-minded people.
With so many conferences happening every year, how can professionals pick the right symposium? Here are a few things to consider:
- Where’s this conference (North America, Europe, Asia) located?
- What’s the cost to attend?
- Who will be the speakers from the security industry?
- Who organized it?
- Which workshops will be available?
As expected, there are many different information security (infosec) and cybersecurity (cybersec) conferences in 2020 and you may have trouble deciding which ones are going to benefit your business or personal interests. In order to make it easier to ﬁnd the right conferences for you, here’s a list of options by month.
Which conferences should you go to?
RSA Conference 2020 | February 24-28 | San Francisco, CA
The world’s largest cybersecurity event that showcases innovative companies and information security solutions to practitioners around the world. The amount of shared information on current available ways to protect organizations from cyberthreats makes this conference one of those must-attend events for information-, cyber- and network-security professionals.
Speakers: Keynote speakers for this conference are renowned IT professionals, including Steve Grobman, Senior VP and CTO of McAfee; Wendy Nather, Head of Advisory CISOs at Cisco; Professor Rivest of MIT; Mary O’Brien, General Manager of IBM Security and many more. They will be discussing topics like cryptography, fear associated with cybersecurity, hacking, genomics in privacy and security, investing in staff to increase security, open-source security and many other evergreen topics.
Connected events/workshops: Emerging trends are discussed in expert-led track sessions, (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Daniel Brecht. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/LIbsz2LeGjM/