{"id":6271,"date":"2017-01-23T14:07:47","date_gmt":"2017-01-23T22:07:47","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-122\/"},"modified":"2017-01-23T14:07:47","modified_gmt":"2017-01-23T22:07:47","slug":"news-122","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-122\/","title":{"rendered":"Security conferences &#8211; Survival guide 2017 Q1"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/graffiti-259x300.jpg\"\/><\/p>\n<div class=\"entry-content\">\n<p>We have some few more days until the end of the year (2016) but it&#8217;s time to open the calendar and get ready for 2017(!).<\/p>\n<p>We will try publish every quarter the main security conferences*<\/p>\n<p><span id=\"more-2885\"><\/span><\/p>\n<p>We have gathered the following information for you for each conference:<\/p>\n<ul>\n<li>Dates<\/li>\n<li>Place<\/li>\n<li>Link to official conference website<\/li>\n<li>Ticket price<\/li>\n<li>Lectures<\/li>\n<li>Workshops<\/li>\n<\/ul>\n<p>So let&#8217;s get started:<\/p>\n<p><strong>Security conferences &#8211; Survival guide<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/graffiti.jpg\" data-slb-active=\"1\" data-slb-asset=\"1427568074\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2886\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/graffiti-259x300.jpg\" alt=\"\" width=\"259\" height=\"300\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/graffiti-259x300.jpg 259w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/graffiti.jpg 414w\" sizes=\"auto, (max-width: 259px) 100vw, 259px\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p><strong><em>ShmooCon<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/ShmooBanner2017.png\" data-slb-active=\"1\" data-slb-asset=\"320268132\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2887\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/ShmooBanner2017-300x86.png\" alt=\"\" width=\"300\" height=\"86\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/ShmooBanner2017-300x86.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/ShmooBanner2017-768x220.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/ShmooBanner2017-1024x294.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 13-15 January<\/li>\n<li>Place: Washington Hilton Hotel 1919 Connecticut Ave., NW Washington, USA<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/shmoocon.org\/\">http:\/\/shmoocon.org\/<\/a><\/li>\n<li>Ticket price: ~150$<\/li>\n<li>Lectures:<\/li>\n<ol>\n<li>WaveConverter \u2013 An Open Source Software Tool for RF Reverse Engineering by Paul Clark<\/li>\n<li>Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles by Rebekah Houser<\/li>\n<li>Exploring The Infrared World by Dominic Spill and Michael Ossmann<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>REcon Brussels<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/REcon-Brussels.jpg\" data-slb-active=\"1\" data-slb-asset=\"2003965407\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/REcon-Brussels-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-2888\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/REcon-Brussels-300x300.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/REcon-Brussels-150x150.jpg 150w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/REcon-Brussels-110x110.jpg 110w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/REcon-Brussels.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 27-29 January<\/li>\n<li>Place: Brussels, Belgium<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/recon.cx\/2017\/brussels\/\">https:\/\/recon.cx\/2017\/brussels\/<\/a><\/li>\n<li>Ticket price: ~800\u20ac<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops:<\/li>\n<ol>\n<li>Mobile and Telecom Applied Hacking and Reverse Engineering by Philippe Langlois (2 days)<\/li>\n<li>Reverse Engineering Malware by Nicolas Brulez (4 days)<\/li>\n<li>Windows Internals for Reverse Engineers by Alex Ionescu (4 days)<\/li>\n<li>Hardware Hacking (Advanced) by Dmitry Nedospasov (4 days)<\/li>\n<li>The ARM Exploit Laboratory by Saumil Shah (4 days)<\/li>\n<li>Windows kernel rootkits techniques and analysis by Bruce Dang (4 days)<\/li>\n<li>MacOS Sierra and iOS 10 Kernel Internals for Security Researchers by Stefan Esser (4 days)<\/li>\n<li>Botnet Takeover Attacks For Reverse Engineers by Brett Stone-Gross and Tillmann Werner (4 days)<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>Hackers Day<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/HackersDay.png\" data-slb-active=\"1\" data-slb-asset=\"1282336555\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/HackersDay-300x212.png\" alt=\"\" width=\"300\" height=\"212\" class=\"alignnone size-medium wp-image-2889\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/HackersDay-300x212.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/HackersDay.png 311w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 13-14 January <\/li>\n<li>Place: AMITY University Lucknow India<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.hackersday.org\/\">https:\/\/www.hackersday.org\/<\/a><\/li>\n<li>Ticket price: ~14$<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: <\/li>\n<ol>\n<li>Web application penetration testing by Karan Bansal<\/li>\n<li>Digital Forensics 360\u00b0 approach by Nilay R. Mistry and Prince Boonlia<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>HackCon<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/hackcon.png\" data-slb-active=\"1\" data-slb-asset=\"870864387\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/hackcon-300x72.png\" alt=\"\" width=\"300\" height=\"72\" class=\"alignnone size-medium wp-image-2890\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/hackcon-300x72.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/hackcon.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 15-16 February<\/li>\n<li>Place: Oslo Norway<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.hackcon.org\/\">https:\/\/www.hackcon.org\/<\/a> <\/li>\n<li>Ticket price: ~720$<\/li>\n<li>Lectures: <\/li>\n<ol>\n<li>These unknown attacks will own you top secure systems &#8211; even if They are not connect to internet by Rogan Dawes<\/li>\n<li>Are today&#8217;s security thinking errors \/ expired? by More<\/li>\n<li>PowerShell &#8211; Your worst enemy or your best friend by Joe McCrey<\/li>\n<li>Silent RIFLE: How take control of all your systems by Kyoung-Ju Kwak <\/li>\n<li>How your virtual machines can be hacked in cloud environment by Dr. Ronny Bull<\/li>\n<li>Block Chain: Hype or Hope for nextgeneration cybersecurity? by Radia Perlman<\/li>\n<li>How to take control of your system thru wireless mouse or keyboard! by Marc Newlin<\/li>\n<\/ol>\n<li>Workshops: <\/li>\n<ol>\n<li>Securing \/ hacking your systems with PowerShell by Joe McCray<\/li>\n<li>Advanced Securing \/ hacking your web systems by Aditya Modha and S. Sonya<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>RSAConference<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/logo_rsac.png\" data-slb-active=\"1\" data-slb-asset=\"235277506\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/logo_rsac-300x26.png\" alt=\"\" width=\"300\" height=\"26\" class=\"alignnone size-medium wp-image-2891\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/logo_rsac-300x26.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/logo_rsac-768x67.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/logo_rsac.png 816w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 13-17 February<\/li>\n<li>Place: Moscone Center, San-Francisco, USA <\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.rsaconference.com\/events\/us17\">https:\/\/www.rsaconference.com\/events\/us17<\/a> <\/li>\n<li>Ticket price: ~1700$<\/li>\n<\/ul>\n<p><strong><em>NULLCON<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/nullcon.jpg\" data-slb-active=\"1\" data-slb-asset=\"617763893\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/nullcon-300x150.jpg\" alt=\"\" width=\"300\" height=\"150\" class=\"alignnone size-medium wp-image-2892\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/nullcon-300x150.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/nullcon-768x384.jpg 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/nullcon.jpg 945w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 3-4 March<\/li>\n<li>Place: Goa, India<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/nullcon.net\/website\/\">http:\/\/nullcon.net\/website\/<\/a> <\/li>\n<li>Ticket price: ~207$ <\/li>\n<li>Lectures:<\/li>\n<ol>\n<li>Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov<\/li>\n<li>Invoke-Obfuscation: PowerShell obFUsk8tion Techniques &#038; How To (Try To) D&#8221;&#8221;e<code>Tec<\/code>T &#8216;Th&#8217;+&#8217;em&#8217; by Daniel Bohannon<\/li>\n<li>Nearly generic fuzzing of XML-based formats by Nicolas Gregoire<\/li>\n<li>Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda and Timo Kreuzer<\/li>\n<\/ol>\n<li>Workshops:<\/li>\n<ol>\n<li>Practical IoT Hacking by Aseem Jakhar<\/li>\n<li>Advanced Infrastructure Security Assessment Training by Abhisek Datta and Omair<\/li>\n<li>Assessing And Exploiting Industrial Control Systems by Justin Searle<\/li>\n<li>Cloud Security For Devs &#038; Ops by Akash Mahajan and Riyaz Walikar<\/li>\n<li>The Web Application Hacker&#8217;s Handbook, Live Edition by Marcus Pinto<\/li>\n<li>Practical RFID\/NFC Hacking Training by Adam Laurie<\/li>\n<li>Low level Hardware reversing (Basic) by Javier-Vazquez Vidal and Ferdinand<\/li>\n<li>Audit +++ by Joerg Simon<\/li>\n<li>Xtreme Android Exploitation Lab by Anant Shrivastava and Anto Joseph<\/li>\n<li>Understanding and Exploiting Cryptography &#038; PKI Implementations by Ajit Hatti<\/li>\n<li>Windows Kernel Exploitation by Ashfaq Ansari<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>INSMNI&#8217;HACK<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/affiche_insomnihack.jpg\" data-slb-active=\"1\" data-slb-asset=\"654566223\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/affiche_insomnihack-260x300.jpg\" alt=\"\" width=\"260\" height=\"300\" class=\"alignnone size-medium wp-image-2893\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/affiche_insomnihack-260x300.jpg 260w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/affiche_insomnihack.jpg 693w\" sizes=\"auto, (max-width: 260px) 100vw, 260px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 23-24 March<\/li>\n<li>Place: Geneva Switzerland <\/li>\n<li>Link to official conference website: <a href=\"https:\/\/insomnihack.ch\/\">https:\/\/insomnihack.ch\/<\/a> <\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><strong><em>CYPHERCON 2.0<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/cyphercon.jpg\" data-slb-active=\"1\" data-slb-asset=\"1008325120\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/cyphercon-300x170.jpg\" alt=\"\" width=\"300\" height=\"170\" class=\"alignnone size-medium wp-image-2894\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/cyphercon-300x170.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/cyphercon.jpg 382w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 30-31 March<\/li>\n<li>Place: Wisconsin USA<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/cyphercon.com\/cyphercon-20\/\">https:\/\/cyphercon.com\/cyphercon-20\/<\/a><\/li>\n<li>Ticket price: ~175$ <\/li>\n<li>Lectures: <\/li>\n<ol>\n<li>Explore Wisconsin hacker history by Brad Swanson <\/li>\n<li>Modern evasion techniques by Jason Lang<\/li>\n<li>Cluster cracking passwords &#038; MDXFIND by Robert Reif<\/li>\n<li>Predictive analytics and machine learning: &#8220;real&#8221; use cases for IT \/ Security professionals by John Platais<\/li>\n<li>Hackable electronic badge panelist by Zapp<\/li>\n<li>Protecting passwords with oblivious cryptography by Adam Everspaugh<\/li>\n<li>Does DOD level security work in the real world? by Jeff Man<\/li>\n<li>Brain based authentication by Melanie Segado and Sydney Swaine-Simon<\/li>\n<li>Naked and vulnerable: A Cybersecurity starter kit by Shannon Fritz<\/li>\n<li>Beyond the fringe: Anomalies of consciousness, experience, and scientific research by Richard Thieme<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>TROOPERS<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/troopers.png\" data-slb-active=\"1\" data-slb-asset=\"942694373\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/troopers-255x300.png\" alt=\"\" width=\"255\" height=\"300\" class=\"alignnone size-medium wp-image-2895\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/troopers-255x300.png 255w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/troopers.png 290w\" sizes=\"auto, (max-width: 255px) 100vw, 255px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 20-24 March<\/li>\n<li>Place: Heidelberg, Germany<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.troopers.de\">https:\/\/www.troopers.de<\/a> <\/li>\n<li>Ticket price: ~1800\u20ac<\/li>\n<li>Lectures:<\/li>\n<ol>\n<li>Unsafe JAX-RS: Breaking REST API by Mikhail Egorov<\/li>\n<li>Vox Ex Machina by Graeme Neilson<\/li>\n<li>Hunting For Vulnerabilities in Signal by JP Aumasson and Markus Vervier<\/li>\n<li>Architecting a Modern Defense using Device Guard by Matt Graeber and Casey Smith<\/li>\n<li>Windows 10 &#8211; Endpoint Security Improvements and the Implant since Windows 2000 by Christopher Truncer and Evan Pe\u00f1a <\/li>\n<\/ol>\n<li>Workshops:<\/li>\n<ol>\n<li>Fuzzing with american fuzzy lop, address sanitizer and libfuzzer by Hanno B\u00f6ck<\/li>\n<li>Making &#038; breaking machine learning systems by Clarence Chio and Anto Joseph<\/li>\n<li>Network Forensics by Erik Hjelmvik<\/li>\n<li>Docker security &#038;(sec)devops by Florian Barth and Matthias Luft<\/li>\n<li>Hacking 101 by Malte Heinzelmann, Sven Nobis and Niklaus Schiess<\/li>\n<li>AD security by Friedwart Kuhn and Heinrich Wiederkehr<\/li>\n<li>Applied physical attacks on embedded systems by Joe FitzPatrick<\/li>\n<li>RFID \/ NFC: &#8220;Two days of security and privacy nightmares&#8221; by Nahuel Grisol\u00eda, Philippe Teuwen<\/li>\n<li>Whireshark scripting with LUA by Peter Kieseberg and Sebastian Schrittwieser<\/li>\n<li>Incident analysis by Frank Block, Dominik Phillips and Michael Thumann<\/li>\n<li>Automation with ansible: radically simplify IT operations by R\u00fcdiger Kramolisch and Kai Sparwald<\/li>\n<li>Suricata: world-class and open source by Andreas Herz and Peter Manev<\/li>\n<li>Software defined radio by Michael Ossmann<\/li>\n<li>Forensics computing by Andreas Dewald and Christoph Klaassen<\/li>\n<li>Windows and Linux exploitation by Birk Kauer and Oliver Matula<\/li>\n<li>Crypto attacks and defenses by Philipp Jovanovic and Jean-Philippe Aumasson<\/li>\n<li>Networking and VOIP security by Fatih Ozavci<\/li>\n<li>Cellular hacking workshop by Hendrik Schmidt<\/li>\n<li>Developing BURP suite extensions &#8211; from manual testing to security automation by Luca Carettoni<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>Black Hat<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/BlackHat.jpg\" data-slb-active=\"1\" data-slb-asset=\"1180164010\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/BlackHat-300x170.jpg\" alt=\"\" width=\"300\" height=\"170\" class=\"alignnone size-medium wp-image-2897\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/BlackHat-300x170.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/BlackHat.jpg 612w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 28-31 March<\/li>\n<li>Place: Singapore<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.blackhat.com\/asia-17\/\">https:\/\/www.blackhat.com\/asia-17\/<\/a><\/li>\n<li>Ticket price: ~1300$ <\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: <\/li>\n<ol>\n<li>A PRACTICAL APPROACH TO MALWARE ANALYSIS AND MEMORY FORENSICS by Monnappa and Sajan Shetty<\/li>\n<li>ADAPTIVE PENETRATION TESTING by Veris Group&#8217;s Adaptive Threat Division<\/li>\n<li>ADAPTIVE RED TEAM TACTICS by Veris Group&#8217;s Adaptive Threat Division<\/li>\n<li>ADVANCED EXPLOITATION: FOR HACKERS AND DEVELOPERS by VDA Labs, LLC<\/li>\n<li>ADVANCED HARDWARE HACKING: HANDS-ON POWER ANALYSIS &#038; GLITCHING WITH THE CHIPWHISPERER by NewAE Technology Inc.<\/li>\n<li>ADVANCED INFRASTRUCTURE HACKING by NotSoSecure<\/li>\n<li>ATTACKING 2G\/3G MOBILE NETWORKS, SMARTPHONES AND APPS by Pedro Cabrera and Simon Roses Femerling<\/li>\n<li>BEYOND THE SCRIPT: PRACTICAL PROBLEM SOLVING TECHNIQUES FOR THE SECURITY PROFESSIONAL by Curious Codes<\/li>\n<li>DARK SIDE OPS: CUSTOM PENETRATION TESTING by Silent Break Security<\/li>\n<li>MOBILE APPLICATION BOOTCAMP &#8211; JOURNEYMAN LEVEL by SensePost<\/li>\n<li>NETWORK FORENSICS: CONTINUOUS MONITORING AND INSTRUMENTATION by LMG Security<\/li>\n<li>OFFENSIVE IOS EXPLOITATION by Marco Lancini, MWR InfoSecurity<\/li>\n<li>OFFENSIVE POWERSHELL FOR RED AND BLUE TEAMS by Nikhil &#8220;SamratAshok&#8221; Mittal<\/li>\n<li>OS X MALWARE ANALYSIS CRASH COURSE by Fireeye Labs and Reverse Engineering Team<\/li>\n<li>SECURE CODING IN C AND C++ by Robert C. Seacord<\/li>\n<li>SOFTWARE DEFINED RADIO by Michael Ossmann, Great Scott Gadgets<\/li>\n<li>TECHNIQUES, TACTICS AND PROCEDURES FOR HACKERS by SensePost<\/li>\n<\/ol>\n<\/ul>\n<p><strong><em>\/RootedCON<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/rooted.jpg\" data-slb-active=\"1\" data-slb-asset=\"1646350531\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/rooted-300x221.jpg\" alt=\"\" width=\"300\" height=\"221\" class=\"alignnone size-medium wp-image-2898\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/rooted-300x221.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/rooted.jpg 320w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates:2-4 March<\/li>\n<li>Place: Madrid Spain<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.rootedcon.com\/\">https:\/\/www.rootedcon.com\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><strong><em>CanSecWest<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/CANSECwest.jpg\" data-slb-active=\"1\" data-slb-asset=\"1599507761\" data-slb-internal=\"0\" data-slb-group=\"2885\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/CANSECwest-300x151.jpg\" alt=\"\" width=\"300\" height=\"151\" class=\"alignnone size-medium wp-image-2899\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/CANSECwest-300x151.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/CANSECwest.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 15-17 March<\/li>\n<li>Place: Vancouver, Canada<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/cansecwest.com\/\">https:\/\/cansecwest.com\/<\/a> <\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p>That&#8217;s it guys &#8211; and &#8220;May the odds be ever in your favor&#8221;!<\/p>\n<p>If you know any other security conferences &#8211; contact us via ssd[]beyondsecurity.com and we will update the list.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/2885\" target=\"bwo\" >https:\/\/blogs.securiteam.com\/index.php\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2016\/12\/graffiti-259x300.jpg\"\/><br \/>We have some few more days until the end of the year (2016) but it&#8217;s time to open the calendar and get ready for 2017(!). We will try publish every quarter the main security conferences* We have gathered the following information for you for each conference: Dates Place Link to official conference website Ticket price &#8230; <a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/2885\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Security conferences &#8211; Survival guide 2017 Q1<\/span> <span class=\"meta-nav\">&#8594;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10754],"tags":[10756,10757],"class_list":["post-6271","post","type-post","status-publish","format-standard","hentry","category-independent","category-securiteam","tag-conferences","tag-securiteam-secure-disclosure"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6271"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6271\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6271"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}