RSA Conference Europe

RSA Conference Europe

Amsterdam RAI, Europaplein, NL 1078 GZ, Amsterdam

October 29-31, 2013

Register here: http://www.rsaconference.com/events/eu13/register/rates-and-packages

For more information, visit http://www.rsaconference.com/events/eu13.

RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for Conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies. As the IT security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated.

RSA developed RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of internet security. Today RSA Conference and related, RSA Conference branded activities, are still managed by RSA, The Security Division of EMC, with the support of the industry. Content is selected by an independent Program Committee, comprised of information security industry practitioners and other related professionals, from an open Call for Speakers.

Internet Identity Workshop

Internet Identity Workshop

Mountain View California

Oct 22-24, 2013

Register here: http://iiw17.eventbrite.com/

For more information, visit http://www.internetidentityworkshop.com/.

What is IIW about? We focus on a range of issues related to “user-centric identity” and “personal data” online and in digital networks of all kinds. People coming to the workshop are keen to proactively address the:

Technical challenges –  developing and more importantly implementing open standards
Legal challenges – with a core group of policy and legal talent gathering to develop new paradigms and trust frameworks.
Social challenges –  considering technologies, tools and services that are being developed will impact social interactions.
Usability challenges – How are user interfaces created so that people can navigate different identities and understand their data?
Business model challenges – How can we create a thriving network of businesses and services that are in alignment with the end users interests and needs?
Interoperability challenges  – How do we follow and share with our friends and businesses when we are on different platforms? – How can credentials created by one organization be used by another company?
Device, server, cloud challenges – Where is the right place to host data? and services and how do they work with the whole range of places and devices?

IDESG 6th Plenary Meeting

IDESG 6th Plenary Meeting

National Institute of Standards and Technology (NIST), 100 Bureau Drive, Gaithersburg, MD

October 16-18, 2013

Register to attend in person 
Register to attend remotely

For more information about the event, visit http://www.idecosystem.org/6thPlenary

The Identity Ecosystem Steering Group (IDESG) has been established as a new organization led by the private sector in conjunction with, but independent of the Federal Government.  As a key stakeholder and active participant in the Identity Ecosystem, the government has funded Trusted Federal Systems, Inc., through a competitive grant, to provide technical, administrative and operational support for the Identity Ecosystem Steering Group.  After a period of initial Government support, the Steering Group will soon be establishing a self-sustaining structure capable of allowing continued growth and operational independence.