Computer security conference

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

Events

Michael Lynn, a keynote speaker at Black Hat Briefings 2005

Common activities at hacker conventions may include:

List of general computer security conferences

General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

Hacker conferences

A team competing in the CTF competition at DEF CON 17

A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security professionals.

The actual events, time-spans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

List of hacker conferences

Non-annual hacker conventions

References

  1. http://www.chicagocon.com/content/view/33/12. Missing or empty |title= (help)
  2. "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05.
  3. Archived November 20, 2008, at the Wayback Machine.
  4. "Acm Ccs". Sigsac.org. 2012-01-23. Retrieved 2013-04-05.
  5. "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05.
  6. "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05.
  7. "Annual Symposium on Information Assurance (ASIA)". Albany.edu. Retrieved 2013-04-05.
  8. "NYS Division of Homeland Security & Emergency Services - OCS". Cscic.state.ny.us. 2013-02-21. Retrieved 2013-04-05.
  9. "Black Hat". Black Hat. Retrieved 2013-04-05.
  10. "Bluehat Security Briefings". Microsoft.com. Retrieved 2013-04-05.
  11. "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05.
  12. "Bluehat Security Briefings". Technet.microsoft.com. Retrieved 2013-04-05.
  13. http://www.brucon.org. Retrieved 27 April 2015. Missing or empty |title= (help)
  14. "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Cansecwest.com. Retrieved 2013-04-05.
  15. Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Retrieved 2013-04-05.
  16. Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05.
  17. "css.umcs.lublin.pl". css.umcs.lublin.pl. Retrieved 2014-07-17.
  18. "DeepSec 2012". The Ethical Hacker Network. Retrieved 2013-04-05.
  19. "FSec". FSec. Retrieved 2013-04-05.
  20. "grehack.fr". grehack.fr. 2013-11-15. Retrieved 2014-07-17.
  21. "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble". GreHack. Retrieved 2013-04-05.
  22. "Hacker Halted 2012". Hackerhalted.com. 2012-09-21. Retrieved 2013-04-05.
  23. "Hackito Ergo Sum 2013". Hackitoergosum.org. Retrieved 2013-04-05.
  24. conference.hitb.org Archived 2014-06-25 at the Wayback Machine.
  25. "ICISSP International Conference on Information Systems Security and Privacy".
  26. "IEEE Symposium on Security and Privacy". Ieee-security.org. Retrieved 2013-04-05.
  27. "infowarcon.com". infowarcon.com. Retrieved 2014-07-17.
  28. "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05.
  29. "Introduction | New Security Paradigms Workshop". Nspw.org. Retrieved 2013-04-05.
  30. "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05.
  31. "Cyber experts show vulnerability of GSM networks". Zeenews.india.com. 2012-02-19. Retrieved 2013-04-05.
  32. "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05.
  33. "RuhrSec Conference". Hackmanit. 2017. Retrieved 2017-01-05.
  34. "ICS Security Event Calendar". Digitalbond.com. Retrieved 2013-04-05.
  35. "SecurIT 2012 - Cyber Security conference on IoT". Securit.ws. Retrieved 2013-04-05.
  36. "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013-04-05.
  37. "the International Conference on Security of Information and Networks (SINCONF)".
  38. "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05.
  39. "sstic.org". sstic.org. Retrieved 2014-07-17.
  40. "SSTIC2013". Sstic.org. Retrieved 2013-04-05.
  41. "Swiss Cyber Storm". SCS. Retrieved 2014-04-14.
  42. "The IT-Security Conference". Troopers.de. Retrieved 2013-04-05.
  43. "Events by Name: USENIX Security Symposium". USENIX. Retrieved 2015-11. Check date values in: |access-date= (help)
  44. "Virus Bulletin conference". Virus Bulletin. Retrieved 2013-08-29.
  45. "International Security Conference". E7H1C5. 2016-09-03. Retrieved 2013-04-05.
  46. https://web.archive.org/web/20100403092901/http://www.athcon.org/. Archived from the original on April 3, 2010. Retrieved May 3, 2010. Missing or empty |title= (help)
  47. "Security B-Sides". Securitybsides.com. Retrieved 2013-04-05.
  48. "CircleCityCon – The Game of Pwns". circlecitycon.com. Retrieved 2016-03-24.
  49. "Milwaukee's Hacking Conference". CypherCon. Retrieved 2015-09-09.
  50. "Wow! So That Was DerbyCon". Infosecisland.com. 2011-10-03. Retrieved 2013-04-05.
  51. "ekoparty Security Conference". Ekoparty.com.ar. Retrieved 2013-04-05.
  52. "Infosec Island". Infosec Island. Retrieved 2013-04-05.
  53. "Ground Zero Summit". Indian InfoSec Consortium.
  54. "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05.
  55. Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". Guardian. Retrieved 2013-04-05.
  56. "Hackers Day International Information Security Conference". hackersday.org. Retrieved 2015-04-08.
  57. "H2HC 10th Edition". H2hc.org.br. Retrieved 2013-04-05.
  58. https://web.archive.org/web/20140411173256/http://www.icalab.com/hackersidol/. Archived from the original on April 11, 2014. Retrieved December 30, 2013. Missing or empty |title= (help)
  59. "hackfest.ca". hackfest.ca. Retrieved 2014-07-17.
  60. "Hackmiami". Hackmiami. Retrieved 2013-04-05.
  61. "Hacktivity - The IT Security Festival in Central and Eastern Europe". Hacktivity. Retrieved 2013-04-05.
  62. "Infiltrate - Security Conference". Infiltratecon.com. Retrieved 2013-04-05.
  63. "LayerOne 2013 | Los Angeles' premiere security conference". Layerone.org. Retrieved 2013-04-05.
  64. "MalCon - Malware Conference". MalCon. 2012-11-24. Retrieved 2013-04-05.
  65. "NorthSec". NorthSec. Retrieved 2014-11-21.
  66. "Call for papers". www.nuitduhack.com. Retrieved 2013-04-05.
  67. "Phreaknic 12 - October 24th - 25th, 2008". Phreaknic.info. Retrieved 2013-04-05.
  68. "QuahogCon". QuahogCon. Retrieved 2013-04-05.
  69. "RootCon.org". RootCon.org. Retrieved 2014-07-17.
  70. "SkyDogCon". SkyDogCon. Retrieved 2013-04-05.
  71. "t2 infosec conference". T2.fi. Retrieved 2013-04-05.
  72. "The Hackers Conference 2013 - International IT Security Conference". Thehackersconference.com. Retrieved 2013-04-05.
  73. "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05.
  74. "Information Security Conference". ToorCon. Retrieved 2013-04-05.
  75. "Wild West Hackin Fest". Wild West Hackin' Fest. Retrieved 2017-10-27. Check date values in: |access-date= (help)
  76. https://www.icalab.com/zeroaccess. Retrieved May 12, 2014. Missing or empty |title= (help)
  77. "stichtinghxx.nl". stichtinghxx.nl. Retrieved 2014-07-17.
  78. "Hacking at Random". HAR2009. Retrieved 2013-04-05.
  79. "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Ohm2013.org. Retrieved 2013-04-05.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.