Computer security conference

From Wikipedia, the free encyclopedia

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

Events

Michael Lynn, a keynote speaker at Black Hat Briefings 2005

Common activities at hacker conventions may include:

  • "Boot camps"- offering training and certification in Information Technology.[1]
  • Presentations from keynote speakers or panels. Common topics include social engineering, lockpicking, penetration testing, and hacking tools.[2][3]

List of general computer security conferences

General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

  • Application Security USA (OWASP) - Focuses on web application security,[4]
  • SIN ACM or the International Conference on Security of Information and Networks,[5]
  • ACM-CCS (Conferences on Computer and Communications Security),[6] security conference held since 1993.
  • ACSAC, Annual Computer Security Applications Conference[7] - oldest information security conference held annually[8]
  • ASIA or the Annual Symposium on Information Assurance[9] that serves as the academic track for the New York State Cyber Security Conference,[10] an annual information security conference held in Albany, NY usually for two days during June targeted at academic, government, and industry participants.
  • Black Hat, a series of conferences held annually in different cities around the world. Black Hat USA, held in Las Vegas immediately before DEF CON, is one of the largest computer security event in the world.[11]
  • BlueHat Conference, a twice a year, invitation-only Microsoft security conference aimed at bringing Microsoft security professionals and external security researchers together.[12][13][14]
  • nullcon Security Conference, a conference in Asia, held annually in Delhi and Goa.[15][16]
  • CarolinaCon, in North Carolina, is a regional technology and network security conference usually held during Spring.
  • DeepSec, in Vienna, Austria covers many security aspects of computing and electronic communications as well as security management and social aspects. DeepSec is visited by a broad international audience, academics, researchers, vendors, finance, public administration etc. (2 days trainings, 2 days conference).[17] Presentations are published on Vimeo and YouTube.
  • Department of Defense Cyber Crime Conference, an annual conference that focuses on the computer security needs of the United States federal government, military, and defense contractors.
  • GreHack.org an annual conference held in Grenoble, French Alps, France. Speakers from academia, industry. Both offensive and defensive security.[18]
  • Hack.lu, an annual conference held in Luxembourg
  • HITBSecConf / Hack In The Box, deep-knowledge security conference held in Malaysia and The Netherlands[19]
  • FSec - Croatian annual security conference held at the Faculty of organization and informatics in Varaždin, Croatia.[20]
  • Hacker Halted, Presented by EC-Council, the objective of the global series of Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security.[21]
  • Hackito Ergo Sum, Security conference pertaining to research topics, with attendees and speakers from both the industry, the offensive side and the academic circles, held in Paris every April.[22]
  • ICMC, a conference focused on cryptographic modules, FIPS 140-2, ISO/IEC 19790 and cryptographic algorithms.[23]
  • IEEE Symposium on Security and Privacy,[24] top-tier privacy & security conference.
  • , Beyond Information Warfare - Offensive Cyber Weapons and Technologies Training Congress
  • NDSS (Network & Distributed System Security Symposium),[25] annual security conference from Internet Society.
  • NSPW (New Security Paradigms Workshop),[26] a workshop with new ideas in security.
  • RSA Security Conference, Cryptography and information security-related conference held annually in the San Francisco Bay Area.
  • S4:SCADA Security Scientific Symposium, Security conference pertaining to SCADA held annually by Digital Bond, usually in Miami, FL.[27]
  • SecureWorld Expo, A series of IT Security conferences offering education, CPE training opportunities, and networking of security leaders, experts, senior executives, and policy makers who shape the face of security.[28]
  • SSTIC Annual French Security Symposium held in Rennes, France.[29]
  • SOURCE Conference, SOURCE is a computer security conference in Boston, Seattle, and Barcelona that offers education in both the business and technical aspects of the security industry.[30]
  • TROOPERS IT Security Conference, Annual international IT Security event with workshops held in Heidelberg, Germany.[31]
  • USENIX Security,[32] annual security conference associated with USENIX.
  • CanSecWest, in Vancouver, Canada is held at the end of March and hosts the Pwn2Own hacking contest.[33][34][35]
  • SecurIT 2012, International Conference on Security of Internet of Things held in mid of August at Amrita Vishwa Vidyapeetham.[36]

Hacker conferences

A team competing in the CTF competition at DEF CON 17

A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security experts.

The actual events, timespans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

List of hacker conferences

  • AthCon, the largest hacker conference in South Eastern Europe taking place annually in Athens, Greece.[37]
  • B Sides, community conference that initially started in the US is now global.[38]
  • Chaos Communication Congress, the oldest and Europe's largest hacker conference, held by Chaos Computer Club.
  • Cop CON, is a unique Cyber Policing Conference held Across India, India every year.[39]
  • DEF CON, in Las Vegas, Nevada, is the biggest hacker convention in the United States held during summer (June–August).
  • The Hackers Conference, is India's biggest Cyber Security Conference held in New Delhi, India every Year.[40]
  • Hackers Idol, is a unique Hackers & Cyber Enthusiast Talent Hunt held Across India, India every year.[41]
  • Hack Expo, is a unique conference on Cyber Security and Cyber Policing held in Lucknow, India every year.[42]
  • DerbyCon, an annual hacker conference.[43]
  • Ekoparty, a hacker convention in Argentina and one of the most important in South America, held annually around September in Buenos Aires.[44]
  • GrrCon, an annual hacker conference hosted each September in Grand Rapids, Michigan.[45]
  • Hackers 2 Hackers Conference (H2HC) is the oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.[46]
  • HackMiami Conference, a hacker conference in Miami, Florida organized by the HackMiami hackerspace.[47]
  • Hackfest.ca, in Quebec, Canada, bilingual conferences and hacking games.[48]
  • Hacktivity,[49] in Budapest, Hungary, run every September, the largest hacker conference in the Central and Eastern Europe.
  • Hack in the Box, an annual hacker conference.[50][51]
  • Hackers on Planet Earth (H.O.P.E.), in New York is held by 2600: The Hacker Quarterly in mid-summer (July/August) every other year.
  • INFILTRATE,[52] hosted by Immunity, Inc, is a deep technical security conference that focuses on offensive technical issues. The conference has been held annually in Miami Beach, Florida since 2011.
  • Kiwicon, is a Wellington, New Zealand hacker convention.
  • LayerOne, held every spring in Los Angeles, California.[53]
  • Malcon, the world's first International Malware Conference, hosted in India.[54]
  • Notacon, in Cleveland, Ohio, is an art and technology conference held frequently in mid-April.
  • Nuit Du Hack, in Paris, France, is the oldest and largest hacker conference held frequently in late-June.[55]
  • PhreakNIC, in Nashville, Tennessee, is held by Nashville 2600.[56] around October.
  • Quahogcon, In Providence, Rhode Island is held at the end of April.[57]
  • ROOTCON,[58] Premier Annual Hacker Conference in the Philippines held annually during summer (September - October).
  • RootedCON, in Madrid, Spain, is one of the biggest hacker conference in Europe. This convention started in 2010. (March)
  • ShellCON, is a unique International Cyber Security Conference held in India, India in the Month of April.[59]
  • ShmooCon, a Washington DC convention started in 2005 by The Shmoo Group, and held annually in late winter (usually February).
  • SkyDogCon, A technology conference in Nashville, TN for the individual with the Renaissance Mind. SkyDogCon exists to facilitate learning, information sharing, and mingling with like-minded people in a relaxed atmosphere.[60]
  • Summercon, one of the oldest hacker conventions, held during Summer (frequently in June). It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON.
  • T2 infosec conference, focuses on newly emerging information security research with a balance of topics on auditing and pen-testing, and security and defensive strategies. In general, presentations will address different aspects of information security—all presentations will include demos and be technically oriented and practical.[61]
  • THOTCON, a Chicago based hacker conference held in the Spring each year.[62]
  • ToorCon, San Diego hacker convention that emerged from the 2600 user group frequently in late September.[63]

Non-annual hacker conventions

  • Stichting HAL2001, a not-for-profit organization, holds a quadrennial Dutch hacker convention. They have, so far, held HAL2001 (Hackers at Large) and What the Hack (2005, originally called HEX (referring to the 16th anniversary of the event, as well as an acronym for Hacking Extreme)). The Dutch conferences held prior Stichting HAL2001's existence were Galactic Hacker Party (1989), Hacking at the End of the Universe (1993) and Hacking In Progress (1997), notable for being held simultaneously and in conjunction with Beyond HOPE. The not-for-profit organization 'Stichting Hxx' was organizing the 2009 incarnation of this con; HAR (Hacking at Random).[64] During the summer of 2013 the most recent installment of the series, called OHM (Observe Hack Make)), was held.[65]

References

  1. "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05. 
  2. "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05. 
  3. "the International Conference on Security of Information and Networks (SINCONF)". 
  4. "Acm Ccs". Sigsac.org. 2012-01-23. Retrieved 2013-04-05. 
  5. "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05. 
  6. "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05. 
  7. "Annual Symposium on Information Assurance (ASIA)". Albany.edu. Retrieved 2013-04-05. 
  8. "NYS Division of Homeland Security & Emergency Services - OCS". Cscic.state.ny.us. 2013-02-21. Retrieved 2013-04-05. 
  9. "Black Hat". Black Hat. Retrieved 2013-04-05. 
  10. "Bluehat Security Briefings". Microsoft.com. Retrieved 2013-04-05. 
  11. "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05. 
  12. "Bluehat Security Briefings". Technet.microsoft.com. Retrieved 2013-04-05. 
  13. "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05. 
  14. "Cyber experts show vulnerability of GSM networks". Zeenews.india.com. 2012-02-19. Retrieved 2013-04-05. 
  15. "DeepSec 2012". The Ethical Hacker Network. Retrieved 2013-04-05. 
  16. "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble, France". GreHack. Retrieved 2013-04-05. 
  17. "Hitbsecconf - Netherlands / Malaysia". Conference.hitb.org. Retrieved 2013-04-05. 
  18. "FSec". FSec. Retrieved 2013-04-05. 
  19. "Hacker Halted 2012". Hackerhalted.com. 2012-09-21. Retrieved 2013-04-05. 
  20. "Hackito Ergo Sum 2013". Hackitoergosum.org. Retrieved 2013-04-05. 
  21. "ICMC". International Cryptographic Module Conference. Retrieved 2013-04-05. 
  22. "IEEE Symposium on Security and Privacy". Ieee-security.org. Retrieved 2013-04-05. 
  23. "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05. 
  24. "Introduction | New Security Paradigms Workshop". Nspw.org. Retrieved 2013-04-05. 
  25. "ICS Security Event Calendar". Digitalbond.com. Retrieved 2013-04-05. 
  26. "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013-04-05. 
  27. "SSTIC2013". Sstic.org. Retrieved 2013-04-05. 
  28. "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05. 
  29. "The IT-Security Conference". Troopers. Retrieved 2013-04-05. 
  30. "Events by Name: USENIX Security Symposium". USENIX. 2012-05-19. Retrieved 2013-04-05. 
  31. "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Cansecwest.com. Retrieved 2013-04-05. 
  32. Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Retrieved 2013-04-05. 
  33. Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05. 
  34. "SecurIT 2012 - Cyber Security conference on IoT". Securit.ws. Retrieved 2013-04-05. 
  35. "Security B-Sides". Securitybsides.com. Retrieved 2013-04-05. 
  36. http://www.icalab.com/copcon
  37. "The Hackers Conference 2013 - International IT Security Conference". Thehackersconference.com. Retrieved 2013-04-05. 
  38. https://www.icalab.com/hackersidol
  39. http://www.hackexpo.org
  40. "Wow! So That Was DerbyCon". Infosecisland.com. 2011-10-03. Retrieved 2013-04-05. 
  41. "ekoparty Security Conference". Ekoparty.com.ar. Retrieved 2013-04-05. 
  42. "Infosec Island". Infosec Island. Retrieved 2013-04-05. 
  43. "H2HC 10th Edition". H2hc.org.br. Retrieved 2013-04-05. 
  44. "Hackmiami". Hackmiami. Retrieved 2013-04-05. 
  45. HackFest.ca
  46. "Hacktivity - The IT Security Festival in Central and Eastern Europe". Hacktivity. Retrieved 2013-04-05. 
  47. "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05. 
  48. Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". Guardian. Retrieved 2013-04-05. 
  49. "Infiltrate - Security Conference". Infiltratecon.com. Retrieved 2013-04-05. 
  50. "LayerOne 2013 | Los Angeles' premiere security conference". Layerone.org. Retrieved 2013-04-05. 
  51. "MalCon - Malware Conference". MalCon. 2012-11-24. Retrieved 2013-04-05. 
  52. "Call for papers". www.nuitduhack.com. Retrieved 2013-04-05. 
  53. "Phreaknic 12 - October 24th - 25th, 2008". Phreaknic.info. Retrieved 2013-04-05. 
  54. "QuahogCon". QuahogCon. Retrieved 2013-04-05. 
  55. RootCon.org
  56. https://www.icalab.com/shellcon
  57. "SkyDogCon". SkyDogCon. Retrieved 2013-04-05. 
  58. "t2 infosec conference". T2.fi. Retrieved 2013-04-05. 
  59. "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05. 
  60. "Information Security Conference". ToorCon. Retrieved 2013-04-05. 
  61. "Hacking at Random". HAR2009. Retrieved 2013-04-05. 
  62. "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Ohm2013.org. Retrieved 2013-04-05. 

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.