{"id":6509,"date":"2017-02-05T14:21:11","date_gmt":"2017-02-05T22:21:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/05\/news-337\/"},"modified":"2017-02-05T14:21:11","modified_gmt":"2017-02-05T22:21:11","slug":"news-337","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/05\/news-337\/","title":{"rendered":"Security conferences \u2013 Survival guide 2017 Q2"},"content":{"rendered":"<div class=\"entry-content\">\n<p>As we promised, the security conferences &#8220;Survival guide&#8221; for 2017 Q2 is here!<\/p>\n<p>We have gathered the following information for you for each conference:<\/p>\n<ul>\n<li>Dates<\/li>\n<li>Place<\/li>\n<li>Link to official conference website<\/li>\n<li>Ticket price<\/li>\n<li>Lectures<\/li>\n<li>Workshops<\/li>\n<\/ul>\n<p>So let\u2019s get started:<\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/hacker-grenade.jpg\" data-slb-active=\"1\" data-slb-asset=\"813846285\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/hacker-grenade-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" class=\"alignnone size-medium wp-image-2969\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/hacker-grenade-300x200.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/hacker-grenade.jpg 510w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><strong>Security conferences \u2013 Survival guide part 2<\/strong><\/p>\n<p><span id=\"more-2968\"><\/span><\/p>\n<p><u><strong><em>Infiltrate<\/em><\/strong><\/u><br \/> <a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/logo-infiltrate2011.jpg\" data-slb-active=\"1\" data-slb-asset=\"867846102\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/logo-infiltrate2011-300x142.jpg\" alt=\"\" width=\"300\" height=\"142\" class=\"alignnone size-medium wp-image-2971\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/logo-infiltrate2011-300x142.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/logo-infiltrate2011.jpg 313w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 6-7 April 2017 <\/li>\n<li>Place: Fontainebleau Miami,Florida US<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/infiltratecon.com\/\" target=\"_blank\">http:\/\/infiltratecon.com\/<\/a><\/li>\n<li>Ticket price: 2400$<\/li>\n<li>Lectures:<\/li>\n<ol>\n<li>Logic Bug Hunting in Chrome on Android by Georgi Geshev and Robert Miller<\/li>\n<li>802.11 Protocol Chaos by Andres Blanco<\/li>\n<li>Sierra Had a Little Lamb: A Userland Kit for MacOS by Stephanie Archibald<\/li>\n<li>Be a Binary Rockstar: Next-level Static Analysis For Vulnerability Research by Sophia d&#8217;Antoine, Peter LaFosse and Rusty Wagner<\/li>\n<li>Forget Enumerating a Network, Hack the SIEM and Win the War by John Grigg<\/li>\n<li>Did I hear a shell popping in your baseband? by Ralf-Phillip Weinmann<\/li>\n<li>COM in Sixty Seconds! (well minutes more likely) by James Forshaw<\/li>\n<li>BugID &#8211; Automated Bug Analysis by Berend-Jan Wever<\/li>\n<li>Remotely Compromising a Modern iOS Device by Marco Grassi and Liang Chen<\/li>\n<li>Cloud Post Exploitation Techniques by Andrew Johnson and Sacha Faust<\/li>\n<li>The Shadow Over Android: Heap Exploitation Assistance for Android&#8217;s libc allocator by Vasilis Tsaousoglou and Patroklos Argyroudis<\/li>\n<li>Hunting for Vulnerabilities in Signal by Jean-Philippe Aumasson and Markus Vervier<\/li>\n<\/ol>\n<li>Workshops: <\/li>\n<ol>\n<li>Web Hacking Language Review (Taught Remotely via WebEx)<\/li>\n<li>Web Hacking<\/li>\n<li>Wide Open To Interpretation<\/li>\n<li>Click Here For Ring0<\/li>\n<li>Master Track: Applied Cryptanalysis<\/li>\n<li>Master Track: Kernel Exploitation<\/li>\n<\/ol>\n<\/ul>\n<p><u><strong><em>HITBSecConf<\/em><\/strong><\/u><br \/> <a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/HITBSecConf-Banner.jpg\" data-slb-active=\"1\" data-slb-asset=\"1713434028\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/HITBSecConf-Banner.jpg\" alt=\"\" width=\"236\" height=\"59\" class=\"alignnone size-full wp-image-2972\" \/><\/a><\/p>\n<ul>\n<li>Dates: 10-14 April 2017<\/li>\n<li>Place: NH Grand Krasnapolsky, Amsterdam<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2017ams\/\" target=\"_blank\">http:\/\/conference.hitb.org\/hitbsecconf2017ams\/<\/a><\/li>\n<li>Ticket price: Starting at \u20ac1,199<\/li>\n<li>Lectures:<\/li>\n<ol>\n<li>Redefining Defense by Saumil Shah<\/li>\n<li>Breaking the Fourth Wall: Hacking Customer Information Control System by Ayoub Elaassal<\/li>\n<li>Femtocell Hacking: From Zero to Zero Day by JeongHoon Shin<\/li>\n<li>HITB Lab: Introduction to Windows Logical Privilege Escalation by James Forshaw<\/li>\n<li>We Broke all CSPs and You Won\u2019t Believe What Happened Next! by Michele Spagnuolo and Lukas Weichselbaum<\/li>\n<li>Can\u2019t Touch This: Cloning Any Android HCE Contactless Card by Slawomir Jasek<\/li>\n<li>A New RISC by Don Bailey<\/li>\n<li>The Secret of ChakraCore: 10 Ways to Go Beyond the Edge by Linan Hao and Long Liu<\/li>\n<li>HITB Lab: Unbridled HIDIOcy by Steve Lord<\/li>\n<li>Drammer: The Making-Of by Victor van der Veen<\/li>\n<li>Using MBAE to Disable MBAE and Subvert ASLR\/DEP by Abdulellah Alsaheel<\/li>\n<li>Harnessing Intel Processor Trace on Windows for Vulnerability Discovery by Richard Johnson<\/li>\n<li>ShadowBox: The Practical and Omnipotent Sandbox by Seunghun Han<\/li>\n<li>HITB Lab: Analyzing Malicious Office Documents by Didier Stevens<\/li>\n<li>I Got 99 Trends and a # is All of Them! How We Found Over 100 RCE Vulnerabilities in Trend Micro Software by Steven Seeley and Roberto Suggi Liverani<\/li>\n<li>Most Impressive: A Guide to Key Impressioning Attacks by Jos Weyers<\/li>\n<li>Everybody Wants SOME: Advance Same Origin Method Execution by Ben Hayak<\/li>\n<li>Chasing Cars: Keyless Entry System Attacks by Yingtao Zeng, Qing Yang and Jun Li<\/li>\n<li>HITB Lab: Practical Machine Learning in InfoSecurity by Clarence Chio and Anto Joseph<\/li>\n<li>Extracting All Your Secrets: Vulnerabilities in Android Password Managers by Stephan Huber, Steven Arzt and Siegfried Rasthofer<\/li>\n<li>The Best Laid Schemes: Attacking URL Schemes by Yu Hong<\/li>\n<li>Hunting For Vulnerabilities in Signal by Markus Vervier<\/li>\n<li>An Attack-in-Depth Analysis of Multicast DNS and DNS Service Discovery by Antonios Atlasis<\/li>\n<li>HITB Lab: Blue Picking: Hacking Bluetooth Smart Locks by Slawomir Jasek<\/li>\n<li>OverSight: Exposing Spies on macOS by Patrick Wardle<\/li>\n<li>Bypassing Memory Mitigations Using Data-Only Exploitation Techniques (Part II) by Bing Sun and Chong Xu<\/li>\n<li>Heads Up: Bootstrapping Systems with Open Source Firmware by Trammell Hudson<\/li>\n<li>Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure by Anirudh Duggal<\/li>\n<\/ol>\n<li>Workshops:<\/li>\n<ol>\n<li>ICS\/SCADA Security<\/li>\n<li>The ARM Exploit Laboratory<\/li>\n<li>Mastering Burp Suite Pro: 100% Hands-On<\/li>\n<li>Advanced Malware Analysis: Combating Exploit Kits<\/li>\n<li>Threat Intelligence Using Maltego<\/li>\n<li>Practical IoT Hacking<\/li>\n<li>Linux Kernel Exploitation Techniques<\/li>\n<\/ol>\n<\/ul>\n<p><u><em><strong>x33fcon<\/strong><\/em><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/x33fcon.png\" data-slb-active=\"1\" data-slb-asset=\"2059487867\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/x33fcon-300x54.png\" alt=\"\" width=\"300\" height=\"54\" class=\"alignnone size-medium wp-image-2973\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/x33fcon-300x54.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/x33fcon.png 420w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 27-28 April 2017<\/li>\n<li>Place: Pomeranian Science and Technology Park, Gdynia, Poland<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.x33fcon.com\/\" target=\"_blank\">https:\/\/www.x33fcon.com\/<\/a><\/li>\n<li>Ticket price: starting at 190 EUR +<\/li>\n<li>Lectures:<\/li>\n<ol>\n<li>Dirty Little Secrets They Didn\u2019t Teach You In Purple Team Class by Rob Fuller (aka mubix)<\/li>\n<li>Billions and Billions of Logs; Oh My by Jack Crook<\/li>\n<li>PowerShell for Practical Purple Teaming by Nikhil Mittal<\/li>\n<li>Upping your Bug hunting skills using symbolic virtual machines! by Anto Joseph<\/li>\n<li>In Cyber trenches, stories from firing range by  Maciej Kotowicz (aka mak)<\/li>\n<li>Toppling the Stack: Outlier Detection for Threat Hunters by David J. Bianco<\/li>\n<li>Red teaming in Poland &#8211; test cases by Borys \u0141\u0105cki<\/li>\n<li>The Covert Cupid Under .11 Veil by Rushikesh D. Nandedkar<\/li>\n<li>Where Cypherpunk Meets Organized Crime by Benjamin Brown<\/li>\n<li>Enhancing your threat Simulation: How to look less like a pentester and more like a threat actor &#8211; A Defender&#8217;s perspective by Aaron Wade<\/li>\n<li>Invoke-CradleCrafter: Moar PowerShell obFUsk8tion &#038; Detection (@(\u2018Tech\u2019,\u2019niques\u2019) -Join \u2018\u2019) by Daniel Bohannon<\/li>\n<li>Weaponizing the USB Armory by Yashin Mehaboobe<\/li>\n<\/ol>\n<li>Workshops:<\/li>\n<ol>\n<li>Mobile Application Exploitation (iOS &#038; Android) by Prateek Gianchandani <\/li>\n<li>Offensive PowerShell for Red and Blue Teams by Nikhil Mittal <\/li>\n<li>Metasploit Basics \u2013 Extended Edition by mubix &#038; carnal0wnage <\/li>\n<li>Web Application Security \u2013 Attack and Defence by LogicalTrust <\/li>\n<li>Windows Kernel Exploitation by Ashfaq Ansari <\/li>\n<li>Ghost in Networks (network forensics) by Himanshu Anand <\/li>\n<li>POWER Class by Mikkel Guds\u00f8e &#038; Klaus Hoffbeck <\/li>\n<\/ol>\n<\/ul>\n<p><u><em><strong>CODEGATE<\/strong><\/em><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/coudegatelogo.jpg\" data-slb-active=\"1\" data-slb-asset=\"523040684\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/coudegatelogo-300x93.jpg\" alt=\"\" width=\"300\" height=\"93\" class=\"alignnone size-medium wp-image-2975\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/coudegatelogo-300x93.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/coudegatelogo-768x238.jpg 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/coudegatelogo-1024x317.jpg 1024w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/coudegatelogo.jpg 1030w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 11-13 April 2017<\/li>\n<li>Place: Dongdaemun Design Plaza(DDP), Seoul, South Korea <\/li>\n<li>Link to official conference website: <a href=\"http:\/\/www.codegate.org\/en\/\" target=\"_blank\">http:\/\/www.codegate.org\/en\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><em><strong>Atlantic Security Conference (ATLSECCON)<\/strong><\/em><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/atlseccon.png\" data-slb-active=\"1\" data-slb-asset=\"1059337641\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/atlseccon-300x92.png\" alt=\"\" width=\"300\" height=\"92\" class=\"alignnone size-medium wp-image-2976\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/atlseccon-300x92.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/atlseccon.png 649w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 27-28 April 2017<\/li>\n<li>Place: Halifax, Nova Scotia, Canada<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/atlseccon.com\/\" target=\"_blank\">https:\/\/atlseccon.com\/<\/a><\/li>\n<li>Ticket price: ~130$<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><em><strong>VXCON<\/strong><\/em><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/vxcon.jpg\" data-slb-active=\"1\" data-slb-asset=\"1191929890\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/vxcon-300x167.jpg\" alt=\"\" width=\"300\" height=\"167\" class=\"alignnone size-medium wp-image-2978\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/vxcon-300x167.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/vxcon-768x427.jpg 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/vxcon.jpg 960w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 28-30 April 2017<\/li>\n<li>Place: TheHUB, Hong Kong <\/li>\n<li>Link to official conference website: <a href=\"http:\/\/www.vxcon.hk\/\" target=\"_blank\">http:\/\/www.vxcon.hk\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>OPCDE_2017<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Opcde2017.jpg\" data-slb-active=\"1\" data-slb-asset=\"1837802105\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Opcde2017-300x151.jpg\" alt=\"\" width=\"300\" height=\"151\" class=\"alignnone size-medium wp-image-2979\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Opcde2017-300x151.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Opcde2017-768x385.jpg 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Opcde2017-1024x514.jpg 1024w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Opcde2017.jpg 1321w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 26-27 April 2017<\/li>\n<li>Place: The Emirates Towers, Dubai<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/www.opcde.com\/\" target=\"_blank\">http:\/\/www.opcde.com\/<\/a><\/li>\n<li>Ticket price: ~400$<\/li>\n<li>Lectures: <\/li>\n<ol>\n<li>BugId &#8211; automated bug analysis by Berend-Jan &#8220;SkyLined&#8221; Wever <\/li>\n<li>The Blackbox of DPAPI: the gift that keeps on giving by Bartosz Inglot<\/li>\n<li>Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader&#8217;s XSLT Engine by Brian Gorence, Jasiel Spelman and  Abdul-Aziz Hariri<\/li>\n<li>From mimikatz to kekeo, passing by new Microsoft security technologies by Benjamin &#8220;gentilkiwi&#8221; Delpy<\/li>\n<li>Agentless Post Exploitation on Device Guarded Systems by Christopher Truncer<\/li>\n<li>Security Research and Development with LLVM by Andrew Reiter <\/li>\n<li>Supply Chainsaw: Practical software supply chain attacks by Matt Weeks<\/li>\n<li>Hacking wireless SCADA systems by Elena Feldman<\/li>\n<li>Exploring Your System Deeper by Oleksandr Bazhaniuk<\/li>\n<\/ol>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>Wahckon<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Wahckon.gif\" data-slb-active=\"1\" data-slb-asset=\"1737327465\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Wahckon-300x271.gif\" alt=\"\" width=\"300\" height=\"271\" class=\"alignnone size-medium wp-image-2990\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Wahckon-300x271.gif 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Wahckon-768x694.gif 768w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 6-7 May 2017<\/li>\n<li>Place: State Library of Western Australia, Northbridge, Perth, Australia <\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.wahckon.org.au\/\" target=\"_blank\">https:\/\/www.wahckon.org.au\/<\/a><\/li>\n<li>Ticket price: ~60$<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>Positive Hack Days<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/PHD_logo_rgb_200px_square_400x400.png\" data-slb-active=\"1\" data-slb-asset=\"2140617743\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/PHD_logo_rgb_200px_square_400x400-300x300.png\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-2980\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/PHD_logo_rgb_200px_square_400x400-300x300.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/PHD_logo_rgb_200px_square_400x400-150x150.png 150w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/PHD_logo_rgb_200px_square_400x400-110x110.png 110w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/PHD_logo_rgb_200px_square_400x400.png 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 23-24 May 2017<\/li>\n<li>Place: Krasnopresnenskaya nab., 12, Centr Mezhdunarodnoy Torgovli, Moscow, Russia<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/www.phdays.com\/\" target=\"_blank\">http:\/\/www.phdays.com\/<\/a><\/li>\n<li>Ticket price: ~130$<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>THOTCON<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/THOTCON.jpg\" data-slb-active=\"1\" data-slb-asset=\"83044968\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/THOTCON-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-2981\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/THOTCON-300x300.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/THOTCON-150x150.jpg 150w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/THOTCON-110x110.jpg 110w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/THOTCON.jpg 512w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 4-5 May 2017<\/li>\n<li>Place: Chicago, Illinois, USA <\/li>\n<li>Link to official conference website: <a href=\"http:\/\/thotcon.org\/\" target=\"_blank\">http:\/\/thotcon.org\/<\/a><\/li>\n<li>Ticket price: Sold Out<\/li>\n<li>Lectures: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>North Sec<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/2397_nsec_Logo_500-250.png\" data-slb-active=\"1\" data-slb-asset=\"593426555\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/2397_nsec_Logo_500-250-300x150.png\" alt=\"\" width=\"300\" height=\"150\" class=\"alignnone size-medium wp-image-2982\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/2397_nsec_Logo_500-250-300x150.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/2397_nsec_Logo_500-250.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 18-19 May 2017<\/li>\n<li>Place: Montreal, QC, Canada<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.nsec.io\/\" target=\"_blank\">https:\/\/www.nsec.io\/<\/a><\/li>\n<li>Ticket price: starting at ~270$<\/li>\n<li>Lectures: <\/li>\n<ol>\n<li>KEYNOTE: Playing Through the Pain: The Impact of Dark Knowledge and Secrets on Security and Intelligence Professionals by Richard Thieme<\/li>\n<li>Hack Microsoft Using Microsoft Signed Binaries by Pierre-Alexandre Braeken<\/li>\n<li>Attacking Linux\/Moose Unraveled an Ego Market by Masarah Paquet-Clouston and Olivier Bilodeau<\/li>\n<li>BearSSL: SSL For all Things by Thomas Pornin<\/li>\n<li>Hacking POS PoS Systems by Jackson Thuraisamy and Jason Tran<\/li>\n<li>Backslash Powered Scanning: Implementing Human Intuition by James Kettle<\/li>\n<li>Don\u2019t Kill My Cat by Charles F. Hamilton<\/li>\n<li>Stupid RedTeamer Tricks by Laurent Desaulniers<\/li>\n<li>Murder Mystery \u2013 How Vulnerability Intelligence is Poisoning your Information Security Program by Gordon MacKay<\/li>\n<\/ol>\n<li>Workshops: <\/li>\n<ol>\n<li>Introduction to Assembly Language and Shellcoding by Charles F. Hamilton<\/li>\n<li>Automating Detection, Investigation and Mitigation with LimaCharlie by Maxime Lamothe-Brassard<\/li>\n<li>Script Engine Hacking For Fun And Profit by Jean-Marc Le Blanc and Isra\u00ebl Hall\u00e9<\/li>\n<li>Cracking Custom Encryption \u2013 An Intuitive Approach to Uncovering Malware\u2019s Protected Data by Pavel Asinovsky and Magal Baz<\/li>\n<li>Building and Breaking Windows Device Guard by Matt Graeber and Casey Smith<\/li>\n<\/ol>\n<\/ul>\n<p><u><strong><em>RuhrSec<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/ruhrsec.jpg\" data-slb-active=\"1\" data-slb-asset=\"231969047\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/ruhrsec-300x118.jpg\" alt=\"\" width=\"300\" height=\"118\" class=\"alignnone size-medium wp-image-2983\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/ruhrsec-300x118.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/ruhrsec.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 4-5 May 2017<\/li>\n<li>Place: Bochum University, Bochum, Germany<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.ruhrsec.de\/2017\/\" target=\"_blank\">https:\/\/www.ruhrsec.de\/2017\/<\/a><\/li>\n<li>Ticket price: Starting at ~330$<\/li>\n<li>Lectures: <\/li>\n<ol>\n<li>Keynote: How to Build Hardware Trojansby Prof. Dr. Christof Paar<\/li>\n<li>Rowhammer Attacks: A Walkthrough Guide by Dr. Cl\u00e9mentine Maurice and Daniel Gruss<\/li>\n<li>Using microarchitectural design to break KASLR and more by Anders Fogh<\/li>\n<li>Teach a man to phish and you feed him for a lifetime by Armin Buescher<\/li>\n<li>Five years of Android security research: The good, the bad, the ugly by Dr. Sven Bugiel<\/li>\n<li>A new categorization system for Side-channel attacks on mobile devices &#038; more by Dr. Veelasha Moonsamy<\/li>\n<li>The (In)Security of Autmotive Remote Keyless Entry Systems (revisited) by Dr. David Oswald<\/li>\n<li>Keynote 2: Applied Crypto by Prof Dr. Kenny Paterson<\/li>\n<li>Breaking PPTP VPNs via RADIUS Encryption by Prof. Dr. Tibor Jager<\/li>\n<li>Breaking and Fixing a Cryptocurrency by Martin Grothe<\/li>\n<li>Black-box security analysis of state machine implementations by Dr. Joeri de Ruiter<\/li>\n<li>Advanced SSL\/TLS Deployment Strategies by Frederik Braun<\/li>\n<li>Secrets of the Google Vulnerability Reward Program by Krzysztof Kotowicz<\/li>\n<li>How to Hack Your Printer by Jens M\u00fcller<\/li>\n<\/ol>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>CARO 2017<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Caro2017-etouches-750x300.jpg\" data-slb-active=\"1\" data-slb-asset=\"1330427407\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Caro2017-etouches-750x300-300x120.jpg\" alt=\"\" width=\"300\" height=\"120\" class=\"alignnone size-medium wp-image-2984\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Caro2017-etouches-750x300-300x120.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Caro2017-etouches-750x300.jpg 750w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 11-12 May 2017<\/li>\n<li>Place: Qubus Hotel Krak\u00f3w, Krakow, Poland<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/2017.caro.org\/\" target=\"_blank\">https:\/\/2017.caro.org\/<\/a><\/li>\n<li>Ticket price: Starting at ~650$<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>You Sh0t The Sheriff<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/yoush0tthe-shiriff.jpg\" data-slb-active=\"1\" data-slb-asset=\"380504705\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/yoush0tthe-shiriff-287x300.jpg\" alt=\"\" width=\"287\" height=\"300\" class=\"alignnone size-medium wp-image-2985\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/yoush0tthe-shiriff-287x300.jpg 287w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/yoush0tthe-shiriff.jpg 406w\" sizes=\"auto, (max-width: 287px) 100vw, 287px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 22 May 2017<\/li>\n<li>Place: Sao Paulo, Brazil<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.ysts.org\/\" target=\"_blank\">https:\/\/www.ysts.org\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>Syscan360<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/syscan360.png\" data-slb-active=\"1\" data-slb-asset=\"1485993569\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/syscan360.png\" alt=\"\" width=\"274\" height=\"184\" class=\"alignnone size-full wp-image-2986\" \/><\/a><\/p>\n<ul>\n<li>Dates: 30-31 May 2017<\/li>\n<li>Place: Four Seasons Hotel Seattle, USA<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.syscan360.org\/\" target=\"_blank\">https:\/\/www.syscan360.org\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>NOPcon<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/NOPcon.png\" data-slb-active=\"1\" data-slb-asset=\"1096260882\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/NOPcon.png\" alt=\"\" width=\"274\" height=\"184\" class=\"alignnone size-full wp-image-2987\" \/><\/a><\/p>\n<ul>\n<li>Dates: 11 May 2017<\/li>\n<li>Place: \u0130stanbul Sanayi Odas\u0131 Vakf\u0131 \u2013 Sak\u0131p Sabanc\u0131 Konferans Salonu, Istanbul, Turkey<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/www.nopcon.org\/\" target=\"_blank\">http:\/\/www.nopcon.org\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>Confidence<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/confidence.jpg\" data-slb-active=\"1\" data-slb-asset=\"452020533\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/confidence-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-2988\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/confidence-300x300.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/confidence-150x150.jpg 150w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/confidence-110x110.jpg 110w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/confidence.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 18-19 May 2017<\/li>\n<li>Place: Forum Hotel, Krakow, Poland<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/2017.confidence.org.pl\/\" target=\"_blank\">http:\/\/2017.confidence.org.pl\/<\/a><\/li>\n<li>Ticket price: ~180$<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>WARCON<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/warcon.jpg\" data-slb-active=\"1\" data-slb-asset=\"911072342\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/warcon-218x300.jpg\" alt=\"\" width=\"218\" height=\"300\" class=\"alignnone size-medium wp-image-2993\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/warcon-218x300.jpg 218w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/warcon.jpg 445w\" sizes=\"auto, (max-width: 218px) 100vw, 218px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 2-3 June 2017<\/li>\n<li>Place: Warsaw, Poland<\/li>\n<li>Link to official conference website: <a href=\"http:\/\/warcon.pl\/\" target=\"_blank\">http:\/\/warcon.pl\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p><u><strong><em>HACK IN PARIS<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Hack-In-Paris.jpg\" data-slb-active=\"1\" data-slb-asset=\"2143007215\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Hack-In-Paris-300x179.jpg\" alt=\"\" width=\"300\" height=\"179\" class=\"alignnone size-medium wp-image-2991\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Hack-In-Paris-300x179.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Hack-In-Paris-768x458.jpg 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/Hack-In-Paris.jpg 847w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Dates: 19-23 June 2017<\/li>\n<li>Place: Disney\u2019s Newport Bay Club Convention Center, Paris, France<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/www.hackinparis.com\/\" target=\"_blank\">https:\/\/www.hackinparis.com\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished <\/li>\n<\/ul>\n<p><u><strong><em>REcon<\/em><\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/recon.png\" data-slb-active=\"1\" data-slb-asset=\"1098471243\" data-slb-internal=\"0\" data-slb-group=\"2968\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/recon.png\" alt=\"\" width=\"208\" height=\"250\" class=\"alignnone size-full wp-image-2992\" \/><\/a><\/p>\n<ul>\n<li>Dates: 16-18 June 2017<\/li>\n<li>Place: Hyatt Regency Montreal, Canada<\/li>\n<li>Link to official conference website: <a href=\"https:\/\/recon.cx\/2017\/montreal\/\" target=\"_blank\">https:\/\/recon.cx\/2017\/montreal\/<\/a><\/li>\n<li>Ticket price: unpublished<\/li>\n<li>Lectures: unpublished<\/li>\n<li>Workshops: unpublished<\/li>\n<\/ul>\n<p>That\u2019s it guys \u2013 and \u201cMay the odds be ever in your favor\u201d!<\/p>\n<p>If you know any other security conferences \u2013 contact us via ssd[]beyondsecurity.com and we will update the list.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/2968\" target=\"bwo\" >https:\/\/blogs.securiteam.com\/index.php\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/02\/hacker-grenade-300x200.jpg\"\/><br \/>As we promised, the security conferences &#8220;Survival guide&#8221; for 2017 Q2 is here! We have gathered the following information for you for each conference: Dates Place Link to official conference website Ticket price Lectures Workshops So let\u2019s get started: Security conferences \u2013 Survival guide part 2 Infiltrate Dates: 6-7 April 2017 Place: Fontainebleau Miami,Florida US &#8230; <a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/2968\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Security conferences \u2013 Survival guide 2017 Q2<\/span> <span class=\"meta-nav\">&#8594;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10754],"tags":[10756,10757],"class_list":["post-6509","post","type-post","status-publish","format-standard","hentry","category-independent","category-securiteam","tag-conferences","tag-securiteam-secure-disclosure"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6509"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6509\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6509"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}