Computer security conference

Computer security conference

A computer security conference is a term that describes a convention for individuals involved in computer security. They generally serve as a meeting place for system and network administrators, hackers, and computer security experts.

Contents

Computer security conference events

Common activities at hacker conventions may include:

  • "Boot camps"- offering training and certification in Information Technology.[1]
  • Presentations from keynote speakers, or panels. Common topics include social engineering, lockpicking, penetration testing, and hacking tools.[2][3]

List of general computer security conferences

General security conferences are often held by security product vendor companies or organisations.

  • ACM-CCS (Conferences on Computer and Communications Security)[4], security conference held since 1993.
  • ACSAC, Annual Computer Security Applications Conference[5] - oldest information security conference held annually[6]
  • ASIA or the Annual Symposium on Information Assurance[7] that serves as the academic track for the New York State Cyber Security Conference[8], an annual information security conference held in Albany, NY usually for two days during June targeted at academic, government, and industry participants.
  • Black Hat, a series of conferences held annually in different cities around the world. Black Hat USA, held in Las Vegas immediately before DEF CON, is the largest 'official' computer security event in the world.[9]
  • BlueHat Conference, a twice a year, invitation-only Microsoft security conference aimed at bringing Microsoft security professionals and external security researchers together.[10][11][12]
  • CarolinaCon, in North Carolina, is a regional technology and network security conference usually held during Spring.
  • ChicagoCon, Chicago's Ethical Hacking Conference.[13]
  • CONFidence, A yearly IT Security conference held in Europe.[14][15]
  • Department of Defense Cyber Crime Conference, an annual conference that focuses on the computer security needs of the United States federal government, military, and defense contractors.
  • Hack.lu, an annual conference held in Luxembourg
  • Hacker Halted, Presented by EC-Council, the objective of the global series of Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security.[16]
  • Hack In Paris[17], Annual IT security conference held in Paris
  • Hackito Ergo Sum, Security conference pertaining to research topics, with attendees and speakers from both the industry, the offensive side and the academic circles, held in Paris every April.[18]
  • IEEE Symposium on Security and Privacy[19], top-tier privacy & security conference.
  • NSPW (New Security Paradigms Workshop)[20], a unique, highly-interactive workshop with new ideas in security.
  • WCISC[21], Western Canada Information Security Conference - Annual IT security conference held in Winnipeg Manitoba since 2002.
  • RSA Security Conference, Cryptography and information security-related conference held annually in the San Francisco Bay Area.
  • S4:SCADA Security Scientific Symposium, Security conference pertaining to SCADA held annually by Digital Bond, usually in Miami, FL.[22]
  • SANSFIRE, A yearly conference dedicated to the training of GIAC certified professionals, and networking with members of the SANS Internet Storm Center.[23]
  • SecureWorld Expo, A series of regional IT Security conferences offering education, CPE training opportunities, and networking of security leaders, experts, senior executives, and policy makers who shape the face of security.[24]
  • SOURCE Conference, SOURCE is a computer security conference in Boston, Seattle, and Barcelona that offers education in both the business and technical aspects of the security industry.[25]
  • TROOPERS IT Security Conference, Annual international IT Security event with workshops held in Heidelberg, Germany.[26]
  • USENIX Security[27], annual security conference associated with USENIX.

Hacker conferences

A hacker conference, also known as a hacker con, is a a convention for hackers. These serve as meeting places for phreakers, hackers, and security experts.

The actual events, timespans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

List of hacker conferences

  • 44Con, large annual conference with training in London, UK.[28]
  • Brucon, annual conference in Brussels, Belgium.[29]
  • BrumCon, annual conference in Birmingham UK, held by Brum2600.[30]
  • CanSecWest, large annual convention held in Vancouver, Canada.[31]
  • Chaos Communication Congress, the oldest and Europe's largest hacker conference, held by Chaos Computer Club.
  • ClubHack, India's hacker convention.[32]
  • DEF CON, in Las Vegas, is the biggest hacker convention in the United States held during summer (June–August).
  • DefCamp, first and largest underground and technical security conference in Romania. [33]
  • DerbyCon, a hacker con started in 2011 held in Louisville, Kentucky [34]
  • C0c0n - Where Hack3rs Unite - Con.[35]
  • Ekoparty, a hacker convention in Argentina and one of the most important in South America, held annually around September in Buenos Aires.[36]
  • HackSE - Greece's biggest hacking convention, organized by GHS since 1993, New York, US and Athems, Thessaloniki, Xanthi, Greece.
  • GrrCON, a hacker convention in Michigan, held annually around September.[37]
  • HackCon - Norway's biggest security convention, held in Oslo, Norway.
  • nullcon - Community driven Security and hacking conference[38](by null - The open security community[39]).
  • Hack In The Box, a security conference, Asia's largest network security conference held annually in Kuala Lumpur, Malaysia and more recently the Middle East.[40]
  • Hackers 2 Hackers Conference, a Brazilian conference, started 2004. [41]
  • Hackfest, a Quebec, Canada, bilingual conferences and hacking games.[42]
  • Hacktivity [43], in Budapest, Hungary, run every September, the largest hacker conference in the Central and Eastern Europe.
  • Hackers on Planet Earth (H.O.P.E.), in New York is held by 2600: The Hacker Quarterly in mid-summer (July/August) every other year.
  • Hacks In Taiwan Conference (HITCON)[44], in Taipei, is the biggest hacker convention in Taiwan held by Chroot Group[45] in late July.
  • Kiwicon, is a Wellington, New Zealand hacker convention.
  • LayerOne, run every spring in Los Angeles, California.
  • MalCon, world's first International Malware Conference, hosted in India.[46]
  • Notacon, in Cleveland, Ohio, is an art and technology conference held frequently in mid-April.
  • Nuit du Hack[47], the first and oldest French annual hacker conference, held by HZV[48]
  • PhreakNIC, in Nashville, Tennessee, is held by Nashville 2600.[49] around October.
  • Pumpcon, in Philadelphia, Pennsylvania, is held around October.[50]
  • Pwn2Own, in Vancouver, Canada is held at the end of March, started 2007. Targets: web browsers and web related software.
  • Quahogcon, In Providence, Rhode Island is held at the end of April.[51]
  • ROOTCON, in Cebu, Philippines is held around September–October. Philippines' premier hacker conference.[52] For more info check also their blog.
  • RootFest, in Minneapolis, Minnesota was first held in 1999 and 2000 and returns for 2012.[53]
  • Ruxcon, in Melbourne, Australia -- Ruxcon is the premier technical security conference in Australia. In 2011, Ruxcon will be held on November 19th and 20th Nov 2011.[54]
  • SEC-T, a hacking and security convention in Stockholm, Sweden.[55]
  • SecTor, a Toronto convention, founded in 2007 and seemingly held around October.[56]
  • ShakaCon, in Honolulu, Hawaii convention started in 2007 by Secure DNA held every spring.
  • ShmooCon, a Washington DC convention started in 2005 by The Shmoo Group, and held annually in late winter (usually February).
  • SkyDogCon, a Nashville, Tennessee convention started in 2011. The name is temporary, and the convention will probably be renamed..[57]
  • Summercon, one of the oldest hacker conventions, held during Summer (frequently in June). It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON.
  • T2 infosec conference, focuses on newly emerging information security research with a balance of topics on auditing and pen-testing, and security and defensive strategies. In general, presentations will address different aspects of information security—all presentations will include demos and be technically oriented and practical.[58]
  • THOTCON, a Chicago based hacker conference held in the Spring each year.[59]
  • ToorCon, San Diego hacker convention that emerged from the 2600 user group frequently in late September.[60]
  • Recon, A hacker convention primarily focused on Reverse Engineering. Held in or around July annually in Montréal, Québec.
  • Nola X Con, a New Orleans based hacker conference that will debut in 2012.[61]
  • YSTS, in Sao Paulo - SP, Brazil a very exclusive, mostly invite-only conference, started 2007. [62] Held at an almost secret location only announced to whom it may concern a one week before the con. The speakers receive a challenge-coin that guarantees your entry to yStS for as long as the conference exists. [63]
  • IL.Hack, an Israel based hacker conference.[64]
  • 8.8, The first technical security conference in Chile. Held annually around November in Santiago.[65]

Non-annual hacker conventions

  • Stichting HAL2001, a not-for-profit organization, holds a quadrennial Dutch hacker convention. They have, so far, held HAL2001 (Hackers at Large) and What the Hack (2005, originally called HEX (referring to the 16th anniversary of the event, as well as an acronym for Hacking Extreme)). The Dutch conferences held prior Stichting HAL2001's existence were Galactic Hacker Party (1989), Hacking at the End of the Universe (1993) and Hacking In Progress (1997), notable for being held simultaneously and in conjunction with Beyond HOPE. The not-for-profit organization 'Stichting Hxx' was organizing the 2009 incarnation of this con; HAR (Hacking at Random).[66]

External links

References

  1. ^ http://www.chicagocon.com/content/view/97/7/
  2. ^ http://www.chicagocon.com/content/view/33/12/
  3. ^ http://www.sxconference.com/
  4. ^ http://www.sigsac.org/ccs.html
  5. ^ http://www.acsac.org
  6. ^ http://www.acsac.org/archive/
  7. ^ http://www.albany.edu/iasymposium
  8. ^ http://www.cscic.state.ny.us/security/conferences/
  9. ^ http://www.blackhat.com
  10. ^ http://www.microsoft.com/technet/security/bluehat/default.mspx
  11. ^ http://news.cnet.com/Microsoft-meets-the-hackers/2009-1002_3-5747813.html
  12. ^ http://technet.microsoft.com/en-us/security/cc261637.aspx
  13. ^ http://www.chicagocon.com/
  14. ^ http://www.gnucitizen.org/blog/confidence-2009-coming-up-soon/
  15. ^ http://2009.confidence.org.pl/
  16. ^ http://www.hackerhalted.com/
  17. ^ http://www.hackinparis.com
  18. ^ http://www.hackitoergosum.org/
  19. ^ http://www.ieee-security.org/TC/SP-Index.html
  20. ^ http://www.nspw.org/
  21. ^ http://www.wcisc.ca
  22. ^ http://www.digitalbond.com/index.php/events/
  23. ^ http://www.sans.org/sansfire-2010/
  24. ^ http://www.secureworldexpo.com/
  25. ^ http://www.sourceconference.com/
  26. ^ http://www.troopers.de
  27. ^ http://www.usenix.org/events/byname/security.html
  28. ^ http://www.44con.com/
  29. ^ http://www.brucon.org
  30. ^ http://www.brum2600.net/info.php
  31. ^ http://cansecwest.com/index.html
  32. ^ http://clubhack.com
  33. ^ http://defcamp.ro
  34. ^ http://www.derbycon.com
  35. ^ http://www.informationsecurityday.com/c0c0n/
  36. ^ http://www.ekoparty.com.ar
  37. ^ http://GrrCON.com
  38. ^ http://nullcon.net
  39. ^ http://null.co.in
  40. ^ http://www.hackinthebox.org/
  41. ^ http://www.h2hc.com.br
  42. ^ http://www.hackfest.ca
  43. ^ www.hacktivity.com
  44. ^ http://blog.hitcon.org
  45. ^ http://www.chroot.org
  46. ^ http://www.malcon.org
  47. ^ http://www.nuitduhack.com
  48. ^ http://www.hackerzvoice.net
  49. ^ http://phreaknic.info/pn12/
  50. ^ http://pumpcon.org/
  51. ^ http://quahogcon.org/
  52. ^ http://rootcon.org/
  53. ^ http://www.rootfest.org/
  54. ^ http://www.ruxcon.org.au/
  55. ^ http://www.sec-t.org
  56. ^ http://www.sector.ca/
  57. ^ http://www.skydogcon.com/
  58. ^ http://t2.fi
  59. ^ http://www.thotcon.org
  60. ^ http://www.toorcon.org/
  61. ^ http://www.nolaxcon.com
  62. ^ http://www.ysts.org
  63. ^ http://www.ysts.org/cfp-eng.html
  64. ^ http://www.ilhack.org/2009/index79e3.html?page_id=235
  65. ^ http://www.8dot8.org
  66. ^ https://www.har2009.org/

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Computer Security Institute — The Computer Security Institute (CSI) is a professional membership organization serving practitioners of information, network, and computer enabled physical security, from the level of system administrator to the chief information security… …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events …   Wikipedia

  • Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… …   Wikipedia

  • Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp …   Wikipedia

  • Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… …   Wikipedia

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • Tom Cross (computer security) — Infobox Scientist name = Tom Cross box width = image width = 170px caption = Tom Cross at the Emperor (Happy Valley) Hotel in Hong Kong in 2001 birth date = 1976 birth place = Toronto, Canada death date = death place = residence = citizenship =… …   Wikipedia

  • Computer science — or computing science (abbreviated CS) is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems. Computer scientists invent algorithmic… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”