Skip to main content
cyber.uk
  • Areas of Cyber Security
    • Overview
    • Physical Cyber Security
      • Overview
      • Internet of Things – Case Study
      • Internet of Things (IoT)
    • Technical Cyber Security
      • Overview
      • AI and Machine Learning
      • Cryptography
      • Quantum Computing
      • Vulnerabilities
      • Vulnerabilities - Case Study
    • Human Cyber Security
      • Overview
      • Social Engineering and Scams
      • Social Engineering – Case Study
    • Cyber Security Threat Groups
      • Overview
      • Collateral Damage
      • Collateral Damage Case Study – Maersk
      • Financially Motivated Threats
      • Financially Motivated Threats – Case Study
      • Hacktivists
      • Hacktivists – Case Study
      • Malicious Insiders
      • Malicious Insiders Case Study – Ex Cisco Employee
      • Nation State Hackers
      • Nation State Hackers Case Study: Bangladesh Bank Heist
      • Non-Malicious Insiders
      • Non Malicious Insiders Case Study – British Airways
      • Script Kiddies
      • Script Kiddies – Case Study
      • Supply Chain Attacks
      • Supply Chain Attacks – Case Study
  • Protection for Organisations
    • Overview
    • Technical Cyber Security for Organisations
      • Overview
      • Technical Assessments for Organisations
      • Firewalls
      • Logging and Monitoring
      • Patching
      • Segmentation
    • Human Cyber Security for Organisations
      • Overview
      • Awareness Raising
      • Policies
      • Security Culture
      • Security Champions
      • Open Source Intelligence (OSINT)
      • Social Engineering Assessments
    • Physical Cyber Security for Organisations
      • Overview
      • Perimeter Defences
      • Internal Defences
      • Red Team Assessments
    • Cyber Security Governance for Organisations
      • Overview
      • Cyber Security for the Board
      • Security Frameworks
      • Regulations and Legislation
  • Protection for Individuals and Families
    • Overview
    • Passwords
    • Multi-Factor Authentication
    • Protecting Against Scams
    • Cyber Security in the Home
    • Buying Online
    • Online Gaming
  • Careers in Cyber Security
    • Overview
    • Cyber Security in Different Industries
    • Certifications
    • Ethics
    • Technical Cyber Security Careers
    • Human Cyber Security Careers
    • Physical Cyber Security Careers
    • Business and Governance Cyber Security Careers
    • Getting a Job in Cyber Security
  • About
    • Dr Jessica Barker
  1. Home
  2. /
  3. Blog Post
  4. /
  5. UK cybersecurity events: summer...

UK cybersecurity events: summer and autumn 2016

July 15, 2016March 5, 2023 cyberdotuk

Conference season is in full swing, with a very successful Bsides London in June and Steelcon looking great for this weekend. To help plan ahead to autumn, check out our summary below. The cfp for the Sans European Security Awareness Summit ends today and more Manchester Bsides tickets will be available on Sunday.

Let me know if I’ve missed any cool events or if you’d like your event featured in future!

Summer Autumn CybSecCons v1

Post navigation

Cyber by any other name would smell as insecure: the language of security at Bsides London 2016
Inside out: managing the insider threat

cyber.uk is a set of resources, guides and case studies to help individuals and organisations to understand the world of cyber security.

The site covers a wide variety of areas across 'technical' cyber security, 'physical' cyber security, 'human' cyber security, as well as other areas including governance, and information on one of the fastest-growing and highly interesting areas of work: cyber security careers.

Follow us

  • Twitter cyberdotuk

twitter.com/cyberdotuk

cyber.uk All rights reserved.