Security conferences – Survival guide 2017 Q1

We have some few more days until the end of the year (2016) but it’s time to open the calendar and get ready for 2017(!).

We will try publish every quarter the main security conferences*

We have gathered the following information for you for each conference:

  • Dates
  • Place
  • Link to official conference website
  • Ticket price
  • Lectures
  • Workshops

So let’s get started:

Security conferences – Survival guide

ShmooCon

  • Dates: 13-15 January
  • Place: Washington Hilton Hotel 1919 Connecticut Ave., NW Washington, USA
  • Link to official conference website: http://shmoocon.org/
  • Ticket price: ~150$
  • Lectures:
    1. WaveConverter – An Open Source Software Tool for RF Reverse Engineering by Paul Clark
    2. Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles by Rebekah Houser
    3. Exploring The Infrared World by Dominic Spill and Michael Ossmann

REcon Brussels

  • Dates: 27-29 January
  • Place: Brussels, Belgium
  • Link to official conference website: https://recon.cx/2017/brussels/
  • Ticket price: ~800€
  • Lectures: unpublished
  • Workshops:
    1. Mobile and Telecom Applied Hacking and Reverse Engineering by Philippe Langlois (2 days)
    2. Reverse Engineering Malware by Nicolas Brulez (4 days)
    3. Windows Internals for Reverse Engineers by Alex Ionescu (4 days)
    4. Hardware Hacking (Advanced) by Dmitry Nedospasov (4 days)
    5. The ARM Exploit Laboratory by Saumil Shah (4 days)
    6. Windows kernel rootkits techniques and analysis by Bruce Dang (4 days)
    7. MacOS Sierra and iOS 10 Kernel Internals for Security Researchers by Stefan Esser (4 days)
    8. Botnet Takeover Attacks For Reverse Engineers by Brett Stone-Gross and Tillmann Werner (4 days)

Hackers Day

  • Dates: 13-14 January
  • Place: AMITY University Lucknow India
  • Link to official conference website: https://www.hackersday.org/
  • Ticket price: ~14$
  • Lectures: unpublished
  • Workshops:
    1. Web application penetration testing by Karan Bansal
    2. Digital Forensics 360° approach by Nilay R. Mistry and Prince Boonlia

HackCon

  • Dates: 15-16 February
  • Place: Oslo Norway
  • Link to official conference website: https://www.hackcon.org/
  • Ticket price: ~720$
  • Lectures:
    1. These unknown attacks will own you top secure systems – even if They are not connect to internet by Rogan Dawes
    2. Are today’s security thinking errors / expired? by More
    3. PowerShell – Your worst enemy or your best friend by Joe McCrey
    4. Silent RIFLE: How take control of all your systems by Kyoung-Ju Kwak
    5. How your virtual machines can be hacked in cloud environment by Dr. Ronny Bull
    6. Block Chain: Hype or Hope for nextgeneration cybersecurity? by Radia Perlman
    7. How to take control of your system thru wireless mouse or keyboard! by Marc Newlin
  • Workshops:
    1. Securing / hacking your systems with PowerShell by Joe McCray
    2. Advanced Securing / hacking your web systems by Aditya Modha and S. Sonya

RSAConference

NULLCON

  • Dates: 3-4 March
  • Place: Goa, India
  • Link to official conference website: http://nullcon.net/website/
  • Ticket price: ~207$
  • Lectures:
    1. Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov
    2. Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D””eTecT ‘Th’+’em’ by Daniel Bohannon
    3. Nearly generic fuzzing of XML-based formats by Nicolas Gregoire
    4. Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda and Timo Kreuzer
  • Workshops:
    1. Practical IoT Hacking by Aseem Jakhar
    2. Advanced Infrastructure Security Assessment Training by Abhisek Datta and Omair
    3. Assessing And Exploiting Industrial Control Systems by Justin Searle
    4. Cloud Security For Devs & Ops by Akash Mahajan and Riyaz Walikar
    5. The Web Application Hacker’s Handbook, Live Edition by Marcus Pinto
    6. Practical RFID/NFC Hacking Training by Adam Laurie
    7. Low level Hardware reversing (Basic) by Javier-Vazquez Vidal and Ferdinand
    8. Audit +++ by Joerg Simon
    9. Xtreme Android Exploitation Lab by Anant Shrivastava and Anto Joseph
    10. Understanding and Exploiting Cryptography & PKI Implementations by Ajit Hatti
    11. Windows Kernel Exploitation by Ashfaq Ansari

INSMNI’HACK

  • Dates: 23-24 March
  • Place: Geneva Switzerland
  • Link to official conference website: https://insomnihack.ch/
  • Ticket price: unpublished
  • Lectures: unpublished
  • Workshops: unpublished

CYPHERCON 2.0

  • Dates: 30-31 March
  • Place: Wisconsin USA
  • Link to official conference website: https://cyphercon.com/cyphercon-20/
  • Ticket price: ~175$
  • Lectures:
    1. Explore Wisconsin hacker history by Brad Swanson
    2. Modern evasion techniques by Jason Lang
    3. Cluster cracking passwords & MDXFIND by Robert Reif
    4. Predictive analytics and machine learning: “real” use cases for IT / Security professionals by John Platais
    5. Hackable electronic badge panelist by Zapp
    6. Protecting passwords with oblivious cryptography by Adam Everspaugh
    7. Does DOD level security work in the real world? by Jeff Man
    8. Brain based authentication by Melanie Segado and Sydney Swaine-Simon
    9. Naked and vulnerable: A Cybersecurity starter kit by Shannon Fritz
    10. Beyond the fringe: Anomalies of consciousness, experience, and scientific research by Richard Thieme

TROOPERS

  • Dates: 20-24 March
  • Place: Heidelberg, Germany
  • Link to official conference website: https://www.troopers.de
  • Ticket price: ~1800€
  • Lectures:
    1. Unsafe JAX-RS: Breaking REST API by Mikhail Egorov
    2. Vox Ex Machina by Graeme Neilson
    3. Hunting For Vulnerabilities in Signal by JP Aumasson and Markus Vervier
    4. Architecting a Modern Defense using Device Guard by Matt Graeber and Casey Smith
    5. Windows 10 – Endpoint Security Improvements and the Implant since Windows 2000 by Christopher Truncer and Evan Peña
  • Workshops:
    1. Fuzzing with american fuzzy lop, address sanitizer and libfuzzer by Hanno Böck
    2. Making & breaking machine learning systems by Clarence Chio and Anto Joseph
    3. Network Forensics by Erik Hjelmvik
    4. Docker security &(sec)devops by Florian Barth and Matthias Luft
    5. Hacking 101 by Malte Heinzelmann, Sven Nobis and Niklaus Schiess
    6. AD security by Friedwart Kuhn and Heinrich Wiederkehr
    7. Applied physical attacks on embedded systems by Joe FitzPatrick
    8. RFID / NFC: “Two days of security and privacy nightmares” by Nahuel Grisolía, Philippe Teuwen
    9. Whireshark scripting with LUA by Peter Kieseberg and Sebastian Schrittwieser
    10. Incident analysis by Frank Block, Dominik Phillips and Michael Thumann
    11. Automation with ansible: radically simplify IT operations by Rüdiger Kramolisch and Kai Sparwald
    12. Suricata: world-class and open source by Andreas Herz and Peter Manev
    13. Software defined radio by Michael Ossmann
    14. Forensics computing by Andreas Dewald and Christoph Klaassen
    15. Windows and Linux exploitation by Birk Kauer and Oliver Matula
    16. Crypto attacks and defenses by Philipp Jovanovic and Jean-Philippe Aumasson
    17. Networking and VOIP security by Fatih Ozavci
    18. Cellular hacking workshop by Hendrik Schmidt
    19. Developing BURP suite extensions – from manual testing to security automation by Luca Carettoni

Black Hat

  • Dates: 28-31 March
  • Place: Singapore
  • Link to official conference website: https://www.blackhat.com/asia-17/
  • Ticket price: ~1300$
  • Lectures: unpublished
  • Workshops:
    1. A PRACTICAL APPROACH TO MALWARE ANALYSIS AND MEMORY FORENSICS by Monnappa and Sajan Shetty
    2. ADAPTIVE PENETRATION TESTING by Veris Group’s Adaptive Threat Division
    3. ADAPTIVE RED TEAM TACTICS by Veris Group’s Adaptive Threat Division
    4. ADVANCED EXPLOITATION: FOR HACKERS AND DEVELOPERS by VDA Labs, LLC
    5. ADVANCED HARDWARE HACKING: HANDS-ON POWER ANALYSIS & GLITCHING WITH THE CHIPWHISPERER by NewAE Technology Inc.
    6. ADVANCED INFRASTRUCTURE HACKING by NotSoSecure
    7. ATTACKING 2G/3G MOBILE NETWORKS, SMARTPHONES AND APPS by Pedro Cabrera and Simon Roses Femerling
    8. BEYOND THE SCRIPT: PRACTICAL PROBLEM SOLVING TECHNIQUES FOR THE SECURITY PROFESSIONAL by Curious Codes
    9. DARK SIDE OPS: CUSTOM PENETRATION TESTING by Silent Break Security
    10. MOBILE APPLICATION BOOTCAMP – JOURNEYMAN LEVEL by SensePost
    11. NETWORK FORENSICS: CONTINUOUS MONITORING AND INSTRUMENTATION by LMG Security
    12. OFFENSIVE IOS EXPLOITATION by Marco Lancini, MWR InfoSecurity
    13. OFFENSIVE POWERSHELL FOR RED AND BLUE TEAMS by Nikhil “SamratAshok” Mittal
    14. OS X MALWARE ANALYSIS CRASH COURSE by Fireeye Labs and Reverse Engineering Team
    15. SECURE CODING IN C AND C++ by Robert C. Seacord
    16. SOFTWARE DEFINED RADIO by Michael Ossmann, Great Scott Gadgets
    17. TECHNIQUES, TACTICS AND PROCEDURES FOR HACKERS by SensePost

/RootedCON

  • Dates:2-4 March
  • Place: Madrid Spain
  • Link to official conference website: https://www.rootedcon.com/
  • Ticket price: unpublished
  • Lectures: unpublished
  • Workshops: unpublished

CanSecWest

  • Dates: 15-17 March
  • Place: Vancouver, Canada
  • Link to official conference website: https://cansecwest.com/
  • Ticket price: unpublished
  • Lectures: unpublished
  • Workshops: unpublished

That’s it guys – and “May the odds be ever in your favor”!

If you know any other security conferences – contact us via ssd[]beyondsecurity.com and we will update the list.

https://blogs.securiteam.com/index.php/feed