Second semester 2018
Get entrance to the 5 Swiss-CyberSecurity conferences in 2018 and 8 open talks
Get a privileged status in the selection process for speakers
Build relationships with the Community Members
Gain up to 10 CPE credits for your (ISC)² certification (CISSP, SSCP, CCSP, CSSLP, CAP, HCISPP)
Participation at special events with the Community (CyberSec Days, Hacking Days, etc.)
[Conference] Geneva - 25th October, 2018, hosted by PSYND
Data Center Security
Trends in virtualization, cloud computing, software architectures and deployment methods are influencing design and implementation of modern data centers. It is because of these changes that the task of securing modern datacenters is becoming increasingly challenging. Join us to hear from our speakers about security processes and tools to improve security in this environment.
2 CPE credits
[Conference] Geneva - 15th November, 2018
Zero-Day.ch is a platform aiming to share knowledge, to develop leadership skills, to deepen the expertise in the cybersecurity field, and to connect companies with cybersecurity professionals. We are inviting you to join the two main conferences organized per year which cover all those topics that might be supporting your company to improve your Cybersecurity Strategy.
8 CPE credits
[Open talk] Geneva - 22nd November, 2018, hosted by PSYND
Let have a beer together!
This event is free of charge, based on invitation and only for our members. In the case you are interested contact us for details.
[Conference] Geneva - 29th November, 2018, hosted by PSYND
Penetration Testing and Ethical Hacking
"I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again." - Robert Mueller, Former Director of the FBI. Ethical hacking or penetration testing is essential to the process of evaluating an organization’s security posture and maturity. From the outcome of this process, we can determine what preventive and corrective countermeasures can be used to mitigate the risk of a cyber attack. Join us to gain some insights from experts on the processes and tools to use in effectively carrying out these processes.
2 CPE credits
You can subscribe and follow directly from your laptop or smartphone the list of our events.
This is the easiest way to keep updated: you can just follow the following link to be informed about official and unofficial events.