Security Conferences

Get Started. It's Free
or sign up with your email address
Security Conferences by Mind Map: Security Conferences

1. Conference Name

2. Location

2.1. North America

2.1.1. Canada

2.1.1.1. West Coast

2.1.1.2. East Coast

2.1.1.3. Central

2.1.1.4. South

2.1.2. United States

2.1.2.1. West Coast

2.1.2.2. East Coast

2.1.2.3. Central

2.1.2.4. South

2.2. Europe

2.2.1. Western Europe

2.2.2. Eastern Europe

2.2.3. UK

2.2.4. Russia?

2.3. Middle East

2.4. Asia

2.4.1. China

2.4.2. Japan

2.5. Australia/New Zealand

2.6. South America

3. Audience

3.1. IT Operations

3.2. IT Security

3.3. Business

3.3.1. Service Provider

3.3.2. Consumer

3.4. Hacker/Maker/Breaker

3.5. Academia

3.6. Law Enforcement

3.7. Military

3.8. Intelligence

3.9. Compliance/Audit

3.10. ICS/SCADA

4. Optional Training

4.1. Yes - self pay

4.2. No

4.3. Yes - provided/free

5. Speaker Compensation

5.1. Paid

5.2. No compensation

5.3. Some compensation

5.3.1. Hotel

5.3.2. Travel

5.3.3. Expenses

6. Getting accepted

6.1. Open to all (public CFP)

6.2. Incestuous (who you know)

6.3. Exclusive/Invite

6.4. Paying vendor spot

7. Conference Date

8. Frequency

8.1. Annual

8.2. Monthly

8.3. Quarterly

9. Comments

10. Recorded sessions available

10.1. Yes - free

10.2. No

10.3. Yes - self pay

11. Conference Type

11.1. Vendor

11.2. Industry

11.3. Analyst/Investor/Other Firm

11.4. Community

12. Delivery Method

12.1. Online

12.2. Part of meeting (e.g. HTCIA meeting)

12.3. Organized Event Location

13. Nature of Conference

13.1. IT Operations

13.2. IT Security

13.3. Business

13.4. Hacker/Maker/Breaker

13.5. Academia

13.6. Law Enforcement

13.7. Military

13.8. Intelligence

13.9. Compliance/Audit

13.10. ICS/SCADA

14. Experience Level

14.1. Beginner

14.2. Intermediate

14.3. Seasoned

15. Credibility

15.1. Legitimate

15.2. Over Hyped

15.3. Irrelevant

15.4. On the fence