Computer security conference

From Wikipedia, the free encyclopedia - View original article

 
Jump to: navigation, search

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

Events[edit]

Michael Lynn, a keynote speaker at Black Hat Briefings 2005

Common activities at hacker conventions may include:

List of general computer security conferences[edit]

General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

Hacker conferences[edit]

A team competing in the CTF competition at DEF CON 17

A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security experts.

The actual events, timespans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

List of hacker conferences[edit]

Non-annual hacker conventions[edit]

References[edit]

  1. ^ [1][dead link]
  2. ^ [2][dead link]
  3. ^ "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05. 
  4. ^ "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05. 
  5. ^ "the International Conference on Security of Information and Networks (SINCONF)". 
  6. ^ "Acm Ccs". Sigsac.org. 2012-01-23. Retrieved 2013-04-05. 
  7. ^ "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05. 
  8. ^ "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05. 
  9. ^ "Annual Symposium on Information Assurance (ASIA)". Albany.edu. Retrieved 2013-04-05. 
  10. ^ "NYS Division of Homeland Security & Emergency Services - OCS". Cscic.state.ny.us. 2013-02-21. Retrieved 2013-04-05. 
  11. ^ "Black Hat". Black Hat. Retrieved 2013-04-05. 
  12. ^ "Bluehat Security Briefings". Microsoft.com. Retrieved 2013-04-05. 
  13. ^ "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05. 
  14. ^ "Bluehat Security Briefings". Technet.microsoft.com. Retrieved 2013-04-05. 
  15. ^ "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05. 
  16. ^ "Cyber experts show vulnerability of GSM networks". Zeenews.india.com. 2012-02-19. Retrieved 2013-04-05. 
  17. ^ "DeepSec 2012". The Ethical Hacker Network. Retrieved 2013-04-05. 
  18. ^ "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble, France". GreHack. Retrieved 2013-04-05. 
  19. ^ "Hitbsecconf - Netherlands / Malaysia". Conference.hitb.org. Retrieved 2013-04-05. 
  20. ^ "FSec". FSec. Retrieved 2013-04-05. 
  21. ^ "Hacker Halted 2012". Hackerhalted.com. 2012-09-21. Retrieved 2013-04-05. 
  22. ^ "Hackito Ergo Sum 2013". Hackitoergosum.org. Retrieved 2013-04-05. 
  23. ^ "ICMC". International Cryptographic Module Conference. Retrieved 2013-04-05. 
  24. ^ "IEEE Symposium on Security and Privacy". Ieee-security.org. Retrieved 2013-04-05. 
  25. ^ "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05. 
  26. ^ "Introduction | New Security Paradigms Workshop". Nspw.org. Retrieved 2013-04-05. 
  27. ^ "ICS Security Event Calendar". Digitalbond.com. Retrieved 2013-04-05. 
  28. ^ "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013=04-05. 
  29. ^ "SSTIC2013". Sstic.org. Retrieved 2013-04-05. 
  30. ^ "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05. 
  31. ^ "The IT-Security Conference". Troopers. Retrieved 2013-04-05. 
  32. ^ "Events by Name: USENIX Security Symposium". USENIX. 2012-05-19. Retrieved 2013-04-05. 
  33. ^ "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Cansecwest.com. Retrieved 2013-04-05. 
  34. ^ Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Retrieved 2013-04-05. 
  35. ^ Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05. 
  36. ^ "SecurIT 2012 - Cyber Security conference on IoT". Securit.ws. Retrieved 2013-04-05. 
  37. ^ [3][dead link]
  38. ^ "Security B-Sides". Securitybsides.com. Retrieved 2013-04-05. 
  39. ^ "The Hackers Conference 2013 - International IT Security Conference". Thehackersconference.com. Retrieved 2013-04-05. 
  40. ^ http://www.hackexpo.org
  41. ^ "Wow! So That Was DerbyCon". Infosecisland.com. 2011-10-03. Retrieved 2013-04-05. 
  42. ^ "ekoparty Security Conference". Ekoparty.com.ar. Retrieved 2013-04-05. 
  43. ^ "Infosec Island". Infosec Island. Retrieved 2013-04-05. 
  44. ^ "H2HC 10th Edition". H2hc.org.br. Retrieved 2013-04-05. 
  45. ^ "Hackmiami". Hackmiami. Retrieved 2013-04-05. 
  46. ^ HackFest.ca
  47. ^ "Hacktivity - The IT Security Festival in Central and Eastern Europe". Hacktivity. Retrieved 2013-04-05. 
  48. ^ "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05. 
  49. ^ Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". Guardian. Retrieved 2013-04-05. 
  50. ^ "Infiltrate - Security Conference". Infiltratecon.com. Retrieved 2013-04-05. 
  51. ^ "LayerOne 2013 | Los Angeles' premiere security conference". Layerone.org. Retrieved 2013-04-05. 
  52. ^ "MalCon - Malware Conference". MalCon. 2012-11-24. Retrieved 2013-04-05. 
  53. ^ "Call for papers". www.nuitduhack.com. Retrieved 2013-04-05. 
  54. ^ "Phreaknic 12 - October 24th - 25th, 2008". Phreaknic.info. Retrieved 2013-04-05. 
  55. ^ "QuahogCon". QuahogCon. Retrieved 2013-04-05. 
  56. ^ RootCon.org
  57. ^ "SkyDogCon". SkyDogCon. Retrieved 2013-04-05. 
  58. ^ "t2 infosec conference". T2.fi. Retrieved 2013-04-05. 
  59. ^ "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05. 
  60. ^ "Information Security Conference". ToorCon. Retrieved 2013-04-05. 
  61. ^ "Hacking at Random". HAR2009. Retrieved 2013-04-05. 
  62. ^ "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Ohm2013.org. Retrieved 2013-04-05. 

External links[edit]