Computer security conference
A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.
Events
Common activities at hacker conventions may include:
- Presentations from keynote speakers or panels. Common topics include social engineering, lockpicking, penetration testing, and hacking tools.[1][2]
- Hands-on activities and competitions such as capture the flag (CTF).
- "Boot camps" offering training and certification in Information Technology.[3]
List of general computer security conferences
General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.
- ACM-CCS (Conferences on Computer and Communications Security),[4] security conference held since 1993.
- ACSAC, Annual Computer Security Applications Conference[5] - oldest information security conference held annually.[6]
- ASIA or the Annual Symposium on Information Assurance[7] that serves as the academic track for the New York State Cyber Security Conference,[8] an annual information security conference held in Albany, NY usually for two days during June targeted at academic, government, and industry participants.
- Black Hat, a series of conferences held annually in different cities around the world. Black Hat USA, held in Las Vegas immediately before DEF CON, is one of the largest computer security event in the world.[9]
- BlueHat Conference, a twice a year, invitation-only Microsoft security conference aimed at bringing Microsoft security professionals and external security researchers together.[10][11][12]
- Brucon, yearly conference, previously held in Brussels, since 2012 it is held in Ghent. Lasting 2 days, and preceded by a training.[13]
- CanSecWest, in Vancouver is held at the end of March and hosts the Pwn2Own hacking contest.[14][15][16]
- CSS - International Conference on Cryptography and Security System[17] in Poland.
- DeepSec, in Vienna covers many security aspects of computing and electronic communications as well as security management and social aspects. DeepSec is visited by a broad international audience, academics, researchers, vendors, finance, public administration etc. (2 days trainings, 2 days conference).[18] Presentations are published on Vimeo and YouTube.
- Department of Defense Cyber Crime Conference, an annual conference that focuses on the computer security needs of the United States federal government, military, and defense contractors.
- FSec - Croatian annual security conference held at the Faculty of organization and informatics in Varaždin.[19]
- GreHack.fr[20] an annual conference held in Grenoble,. Speakers from academia, industry. Both offensive and defensive security.[21]
- Hack.lu, an annual conference held in Luxembourg
- Hacker Halted, Presented by EC-Council, the objective of the global series of Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security.[22]
- Hackito Ergo Sum, Security conference pertaining to research topics, with attendees and speakers from both the industry, the offensive side and the academic circles, held in Paris every April.[23]
- HITBSecConf / Hack In The Box, deep-knowledge security conference held in Malaysia and the Netherlands.[24]
- ICISSP International Conference on Information Systems Security and Privacy,[25]
- IEEE Symposium on Security and Privacy,[26] top-tier privacy & security conference.
- INFWARCON[27] Beyond Information Warfare - Offensive Cyber Weapons and Technologies Training Congress.
- IP EXPO Europe, held annually at London's ExCeL Centre
- IP EXPO Nordic, held annually at Stockholm's Waterfront Congress Centre
- NDSS (Network & Distributed System Security Symposium),[28] annual security conference from Internet Society.
- NSPW (New Security Paradigms Workshop),[29] a workshop with new ideas in security.
- nullcon Security Conference held annually in Delhi and Goa.[30][31]
- Open Web Application Security Project (OWASP), Focuses on web application security.[32]
- RSA Security Conference, Cryptography and information security-related conference held annually in the San Francisco Bay Area.
- S4:SCADA Security Scientific Symposium, Security conference pertaining to SCADA held annually by Digital Bond, usually in Miami.[33]
- SecurIT 2012, International Conference on Security of Internet of Things held in mid of August at Amrita Vishwa Vidyapeetham.[34]
- SecureWorld Expo, A series of IT Security conferences offering education, CPE training opportunities, and networking of security leaders, experts, senior executives, and policy makers who shape the face of security.[35]
- SIN ACM, or the International Conference on Security of Information and Networks.[36]
- SOURCE Conference, SOURCE is a computer security conference in Boston, Dublin and Seattle that offers education in both the business and technical aspects of the security industry.[37]
- SSTIC,[38] Annual French Security Symposium held in Rennes.[39]
- Swiss Cyber Storm, International IT Security Conference held in October at KKL Lucerne.[40]
- TROOPERS IT Security Conference, Annual international IT Security event with workshops held in Heidelberg, Germany.[41]
- USENIX Security,[42] annual security conference associated with USENIX.
- Virus Bulletin conference, annual security conference held late September or early October since 1989.[43]
- 0SecCon Zero Security Conference held in Kerala.[44]
Hacker conferences
A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security professionals.
The actual events, time-spans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).
Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.
List of hacker conferences
- AthCon, the largest hacker conference in South Eastern Europe taking place annually in Athens, Greece.[45]
- BSides, community conference that initially started in the US is now global.[46]
- CarolinaCon, in North Carolina, is a regional technology and network security conference usually held during Spring.
- Chaos Communication Congress, the oldest and Europe's largest hacker conference, held by Chaos Computer Club.
- CircleCityCon is a security and technology conference held annually in June in Indianapolis.[47]
- Cop CON, is a unique Cyber Policing Conference held across India every year by Indian Cyber Army.[48]
- CypherCon, a Milwaukee based hacker conference held late winter each year.[49]
- DEF CON, in Las Vegas, Nevada, is the biggest hacker convention in the United States held during summer (June–August).
- DerbyCon, an annual hacker conference based in Louisville, KY.[50]
- Ekoparty, a hacker convention in Argentina and one of the most important in South America, held annually around September in Buenos Aires.[51]
- GrrCon, an annual hacker conference hosted each September in Grand Rapids, Michigan.[52]
- GroundZero Summit ,an annual hacker conference hosted each November in Hotel Ashoka,New Delhi.[53]
- Hack in the Box, an annual hacker conference.[54][55]
- Hackers Day which was previously known as DEFCON Lucknow based in Lucknow, is one of the best hacking conferences in India held frequently in January–February every year.[56]
- Hackers 2 Hackers Conference (H2HC) is the oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.[57]
- Hackers Idol, is a unique Hackers & Cyber Enthusiast Talent Hunt held across India every year by Indian Cyber Army.[58]
- Hackers on Planet Earth (HOPE), in New York City is held by 2600: The Hacker Quarterly in mid-summer (July/August) every other year.
- Hackfest.ca, in Quebec, Canada, bilingual conferences and hacking games.[59]
- HackMiami Conference, a hacker conference in Miami, Florida organized by the HackMiami hackerspace.[60]
- Hacktivity,[61] in Budapest, Hungary, run every September, the largest hacker conference in the Central and Eastern Europe.
- INFILTRATE,[62] hosted by Immunity, Inc, is a deep technical security conference that focuses on offensive technical issues. The conference has been held annually in Miami Beach, Florida since 2011.
- Kiwicon, is a Wellington, New Zealand hacker convention.
- LayerOne, held every spring in Los Angeles, California.[63]
- Malcon, the world's first International Malware Conference, hosted in India.[64]
- NorthSec, in Montreal, Quebec, is an applied security event held yearly mid-May, featuring two days of conference followed by a 48h on-site CTF.[65]
- Notacon, in Cleveland, Ohio, is an art and technology conference held frequently in mid-April.
- Nuit Du Hack, in Paris, France, is the oldest and largest hacker conference held frequently in late-June.[66]
- PhreakNIC, in Nashville, Tennessee, is held by Nashville 2600.[67] around October.
- Quahogcon, In Providence, Rhode Island is held at the end of April.[68]
- ROOTCON,[69] Premier Annual Hacker Conference in the Philippines held annually during summer (September - October).
- RootedCON, in Madrid, Spain, is one of the biggest hacker conference in Europe. This convention started in 2010. (March)
- ShmooCon, a Washington DC convention started in 2005 by The Shmoo Group, and held annually in late winter (usually February).
- SkyDogCon, A technology conference in Nashville, TN for the individual with the Renaissance Mind. SkyDogCon exists to facilitate learning, information sharing, and mingling with like-minded people in a relaxed atmosphere.[70]
- Summercon, one of the oldest hacker conventions, held during Summer (frequently in June). It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON.
- T2 infosec conference, focuses on newly emerging information security research with a balance of topics on auditing and pen-testing, and security and defensive strategies. In general, presentations will address different aspects of information security—all presentations will include demos and be technically oriented and practical.[71]
- The Hackers Conference, is India's biggest Cyber Security Conference held in New Delhi, India every Year.[72]
- THOTCON, a Chicago based hacker conference held in the Spring each year.[73]
- ToorCon, San Diego hacker convention that emerged from the 2600 user group frequently in late September.[74]
- ZeroAccess, is a unique International Cyber Security Conference held in India, India in the Month of April by Indian Cyber Army[75]harendra>kumar yaday
Non-annual hacker conventions
- Stichting HAL2001, a not-for-profit organization, holds a quadrennial Dutch hacker convention. They have, so far, held HAL2001 (Hackers at Large) and What the Hack (2005, originally called HEX (referring to the 16th anniversary of the event, as well as an acronym for Hacking Extreme)). The Dutch conferences held prior Stichting HAL2001's existence were Galactic Hacker Party (1989), Hacking at the End of the Universe (1993) and Hacking In Progress (1997), notable for being held simultaneously and in conjunction with Beyond HOPE. The not-for-profit organization 'Stichting Hxx'[76] was organizing the 2009 incarnation of this con; HAR (Hacking at Random).[77] During the summer of 2013 the most recent installment of the series, called OHM (Observe Hack Make), was held.[78]
References
- ↑ http://www.chicagocon.com/content/view/33/12. Missing or empty
|title=
(help) - ↑ "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05.
- ↑ Archived November 20, 2008, at the Wayback Machine.
- ↑ "Acm Ccs". Sigsac.org. 2012-01-23. Retrieved 2013-04-05.
- ↑ "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05.
- ↑ "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05.
- ↑ "Annual Symposium on Information Assurance (ASIA)". Albany.edu. Retrieved 2013-04-05.
- ↑ "NYS Division of Homeland Security & Emergency Services - OCS". Cscic.state.ny.us. 2013-02-21. Retrieved 2013-04-05.
- ↑ "Black Hat". Black Hat. Retrieved 2013-04-05.
- ↑ "Bluehat Security Briefings". Microsoft.com. Retrieved 2013-04-05.
- ↑ "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05.
- ↑ "Bluehat Security Briefings". Technet.microsoft.com. Retrieved 2013-04-05.
- ↑ http://www.brucon.org. Retrieved 27 April 2015. Missing or empty
|title=
(help) - ↑ "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Cansecwest.com. Retrieved 2013-04-05.
- ↑ Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Retrieved 2013-04-05.
- ↑ Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05.
- ↑ "css.umcs.lublin.pl". css.umcs.lublin.pl. Retrieved 2014-07-17.
- ↑ "DeepSec 2012". The Ethical Hacker Network. Retrieved 2013-04-05.
- ↑ "FSec". FSec. Retrieved 2013-04-05.
- ↑ "grehack.fr". grehack.fr. 2013-11-15. Retrieved 2014-07-17.
- ↑ "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble". GreHack. Retrieved 2013-04-05.
- ↑ "Hacker Halted 2012". Hackerhalted.com. 2012-09-21. Retrieved 2013-04-05.
- ↑ "Hackito Ergo Sum 2013". Hackitoergosum.org. Retrieved 2013-04-05.
- ↑ conference.hitb.org
- ↑ "ICISSP International Conference on Information Systems Security and Privacy".
- ↑ "IEEE Symposium on Security and Privacy". Ieee-security.org. Retrieved 2013-04-05.
- ↑ "infowarcon.com". infowarcon.com. Retrieved 2014-07-17.
- ↑ "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05.
- ↑ "Introduction | New Security Paradigms Workshop". Nspw.org. Retrieved 2013-04-05.
- ↑ "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05.
- ↑ "Cyber experts show vulnerability of GSM networks". Zeenews.india.com. 2012-02-19. Retrieved 2013-04-05.
- ↑ "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05.
- ↑ "ICS Security Event Calendar". Digitalbond.com. Retrieved 2013-04-05.
- ↑ "SecurIT 2012 - Cyber Security conference on IoT". Securit.ws. Retrieved 2013-04-05.
- ↑ "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013-04-05.
- ↑ "the International Conference on Security of Information and Networks (SINCONF)".
- ↑ "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05.
- ↑ "sstic.org". sstic.org. Retrieved 2014-07-17.
- ↑ "SSTIC2013". Sstic.org. Retrieved 2013-04-05.
- ↑ "Swiss Cyber Storm". SCS. Retrieved 2014-04-14.
- ↑ "The IT-Security Conference". Troopers.de. Retrieved 2013-04-05.
- ↑ "Events by Name: USENIX Security Symposium". USENIX. Retrieved 2015-11. Check date values in:
|access-date=
(help) - ↑ "Virus Bulletin conference". Virus Bulletin. Retrieved 2013-08-29.
- ↑ "International Security Conference". E7H1C5. 2016-09-03. Retrieved 2013-04-05.
- ↑ https://web.archive.org/web/20100403092901/http://www.athcon.org/. Archived from the original on April 3, 2010. Retrieved May 3, 2010. Missing or empty
|title=
(help) - ↑ "Security B-Sides". Securitybsides.com. Retrieved 2013-04-05.
- ↑ "CircleCityCon – The Game of Pwns". circlecitycon.com. Retrieved 2016-03-24.
- ↑
- ↑ "Milwaukee's Hacking Conference". CypherCon. Retrieved 2015-09-09.
- ↑ "Wow! So That Was DerbyCon". Infosecisland.com. 2011-10-03. Retrieved 2013-04-05.
- ↑ "ekoparty Security Conference". Ekoparty.com.ar. Retrieved 2013-04-05.
- ↑ "Infosec Island". Infosec Island. Retrieved 2013-04-05.
- ↑ "Ground Zero Summit". Indian InfoSec Consortium.
- ↑ "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05.
- ↑ Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". Guardian. Retrieved 2013-04-05.
- ↑ "Hackers Day International Information Security Conference". hackersday.org. Retrieved 2015-04-08.
- ↑ "H2HC 10th Edition". H2hc.org.br. Retrieved 2013-04-05.
- ↑ https://web.archive.org/web/20140411173256/http://www.icalab.com/hackersidol/. Archived from the original on April 11, 2014. Retrieved December 30, 2013. Missing or empty
|title=
(help) - ↑ "hackfest.ca". hackfest.ca. Retrieved 2014-07-17.
- ↑ "Hackmiami". Hackmiami. Retrieved 2013-04-05.
- ↑ "Hacktivity - The IT Security Festival in Central and Eastern Europe". Hacktivity. Retrieved 2013-04-05.
- ↑ "Infiltrate - Security Conference". Infiltratecon.com. Retrieved 2013-04-05.
- ↑ "LayerOne 2013 | Los Angeles' premiere security conference". Layerone.org. Retrieved 2013-04-05.
- ↑ "MalCon - Malware Conference". MalCon. 2012-11-24. Retrieved 2013-04-05.
- ↑ "NorthSec". NorthSec. Retrieved 2014-11-21.
- ↑ "Call for papers". www.nuitduhack.com. Retrieved 2013-04-05.
- ↑ "Phreaknic 12 - October 24th - 25th, 2008". Phreaknic.info. Retrieved 2013-04-05.
- ↑ "QuahogCon". QuahogCon. Retrieved 2013-04-05.
- ↑ "RootCon.org". RootCon.org. Retrieved 2014-07-17.
- ↑ "SkyDogCon". SkyDogCon. Retrieved 2013-04-05.
- ↑ "t2 infosec conference". T2.fi. Retrieved 2013-04-05.
- ↑ "The Hackers Conference 2013 - International IT Security Conference". Thehackersconference.com. Retrieved 2013-04-05.
- ↑ "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05.
- ↑ "Information Security Conference". ToorCon. Retrieved 2013-04-05.
- ↑ https://www.icalab.com/zeroaccess. Retrieved May 12, 2014. Missing or empty
|title=
(help) - ↑ "stichtinghxx.nl". stichtinghxx.nl. Retrieved 2014-07-17.
- ↑ "Hacking at Random". HAR2009. Retrieved 2013-04-05.
- ↑ "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Ohm2013.org. Retrieved 2013-04-05.
External links
- Hacker Convention Comparison based on internet connectivity and attendees