Computer security conference

A computer security conference is a term that describes a convention for individuals involved in computer security. They generally serve as a meeting place for system and network administrators, hackers, and computer security experts.

Contents

Computer security conference events

Common activities at hacker conventions may include:

List of General Computer Security Conferences

General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

Hacker conferences

A hacker conference, also known as a hacker con, is a a convention for hackers. These serve as meeting places for phreakers, hackers, and security experts.

The actual events, timespans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

List of hacker conferences

[26]

Non-annual hacker conventions

External links

References

  1. ^ http://www.chicagocon.com/content/view/97/7/
  2. ^ http://www.chicagocon.com/content/view/33/12/
  3. ^ http://www.sxconference.com/
  4. ^ http://www.sigsac.org/ccs.html
  5. ^ http://www.acsac.org
  6. ^ http://www.acsac.org/archive/
  7. ^ http://www.albany.edu/iasymposium
  8. ^ http://www.cscic.state.ny.us/security/conferences/
  9. ^ http://www.blackhat.com
  10. ^ http://www.microsoft.com/technet/security/bluehat/default.mspx
  11. ^ http://news.cnet.com/Microsoft-meets-the-hackers/2009-1002_3-5747813.html
  12. ^ http://technet.microsoft.com/en-us/security/cc261637.aspx
  13. ^ http://www.hackerhalted.com/
  14. ^ http://www.hackitoergosum.org/
  15. ^ http://www.ieee-security.org/TC/SP-Index.html
  16. ^ http://www.nspw.org/
  17. ^ http://www.digitalbond.com/index.php/events/
  18. ^ http://www.sans.org/sansfire-2010/
  19. ^ http://www.secureworldexpo.com/
  20. ^ http://www.sourceconference.com/
  21. ^ http://www.troopers.de
  22. ^ http://www.usenix.org/events/byname/security.html
  23. ^ http://www.44con.com/
  24. ^ http://www.brucon.org
  25. ^ http://www.brum2600.net/info.php
  26. ^ http://www.securitybsides.com
  27. ^ http://cansecwest.com/index.html
  28. ^ http://clubhack.com
  29. ^ http://defcamp.ro
  30. ^ http://www.derbycon.com
  31. ^ http://www.informationsecurityday.com/c0c0n/
  32. ^ http://www.ekoparty.com.ar
  33. ^ http://GrrCON.com
  34. ^ http://nullcon.net
  35. ^ http://null.co.in
  36. ^ http://www.hackinthebox.org/
  37. ^ http://www.h2hc.com.br
  38. ^ http://www.hackfest.ca
  39. ^ www.hacktivity.com
  40. ^ http://blog.hitcon.org
  41. ^ http://www.chroot.org
  42. ^ http://www.layerone.org
  43. ^ http://www.malcon.org
  44. ^ http://www.nuitduhack.com
  45. ^ http://www.hackerzvoice.net
  46. ^ http://phreaknic.info/pn12/
  47. ^ http://pumpcon.org/
  48. ^ http://quahogcon.org/
  49. ^ http://rootcon.org/
  50. ^ http://www.rootfest.org/
  51. ^ http://www.ruxcon.org.au/
  52. ^ http://www.sec-t.org
  53. ^ http://www.sector.ca/
  54. ^ http://www.skydogcon.com/
  55. ^ http://t2.fi
  56. ^ http://www.thotcon.org
  57. ^ http://www.toorcon.org/
  58. ^ http://www.nolaxcon.com
  59. ^ http://www.ysts.org
  60. ^ http://www.ysts.org/cfp-eng.html
  61. ^ http://www.ilhack.org/2009/index79e3.html?page_id=235
  62. ^ http://www.8dot8.org
  63. ^ https://www.har2009.org/