{"id":7401,"date":"2017-04-20T14:19:08","date_gmt":"2017-04-20T22:19:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/20\/news-1192\/"},"modified":"2017-04-20T14:19:08","modified_gmt":"2017-04-20T22:19:08","slug":"news-1192","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/20\/news-1192\/","title":{"rendered":"Security conferences \u2013 Survival guide 2017 Q3"},"content":{"rendered":"<p><strong>Credit to Author: Maor Schwartz| Date: Thu, 20 Apr 2017 07:10:46 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>The security conferences \u201cSurvival guide\u201d for 2017 Q3 is here!<\/p>\n<p>We have gathered the following information for you for each conference:<\/p>\n<ul>\n<li>Dates<\/li>\n<li>Place<\/li>\n<li>Link to official conference website<\/li>\n<li>Ticket price<\/li>\n<li>Lectures<\/li>\n<li>Workshops<\/li>\n<\/ul>\n<p>So let\u2019s get started:<\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Cat-riding-unicorn.jpg\" data-slb-active=\"1\" data-slb-asset=\"1682756656\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Cat-riding-unicorn-300x176.jpg\" alt=\"\" width=\"300\" height=\"176\" class=\"alignnone size-medium wp-image-3140\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Cat-riding-unicorn-300x176.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Cat-riding-unicorn-768x450.jpg 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Cat-riding-unicorn-1024x599.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"more-3139\"><\/span><\/p>\n<p><strong>Security conferences \u2013 Survival guide part 3<\/strong><\/p>\n<p><strong><u>Camp++<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Camp.png\" data-slb-active=\"1\" data-slb-asset=\"649126001\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Camp-300x75.png\" alt=\"\" width=\"300\" height=\"75\" class=\"alignnone size-medium wp-image-3163\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Camp-300x75.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Camp-768x192.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Camp.png 780w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 6 &#8211; 9 July 2017<\/li>\n<li><strong>Place:<\/strong> Fort Monostor, Kom\u00e1rom, Hungary<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/camp.hsbp.org\/2017\/pp7e1\/cfp.html\" target=\"_blank\">https:\/\/camp.hsbp.org\/2017\/pp7e1\/cfp.html<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 80 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p><strong><u>SteelCon<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/steelcon-logo-wp.png\" data-slb-active=\"1\" data-slb-asset=\"1317050673\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/steelcon-logo-wp-300x59.png\" alt=\"\" width=\"300\" height=\"59\" class=\"alignnone size-medium wp-image-3164\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/steelcon-logo-wp-300x59.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/steelcon-logo-wp.png 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 7 &#8211; 9 July 2017<\/li>\n<li><strong>Place:<\/strong> Owen building at Sheffield Hallam University, UK<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.steelcon.info\/\" target=\"_blank\">https:\/\/www.steelcon.info\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 35 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p><u><strong>Black Hat USA<\/strong><\/u><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Black-Hat.png\" data-slb-active=\"1\" data-slb-asset=\"1260944128\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Black-Hat-300x150.png\" alt=\"\" width=\"300\" height=\"150\" class=\"alignnone size-medium wp-image-3141\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Black-Hat-300x150.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Black-Hat.png 533w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> <\/li>\n<\/ul>\n<ol>\n<li>Conference: 26 &#8211; 27 July 2017<\/li>\n<li>Training: 22 &#8211; 25 July 2017<\/li>\n<\/ol>\n<ul>\n<li><strong>Place:<\/strong> Mandalay Bay, Las Vegas, USA <\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.blackhat.com\/us-17\/\" target=\"_blank\">https:\/\/www.blackhat.com\/us-17\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 2095 &#8211; 2800 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>A GUIDE TO THREAT HUNTING UTILIZING THE ELK STACK AND POWERSHELL by Thomas Pace, Michael Scott and Eric Cornelius<\/li>\n<li>ABILITIES INC &#8211; METASPLOIT BASICS by Rob Fuller and Egypt (James Lee)<\/li>\n<li>ABILITIES INC &#8211; METASPLOIT MASTERY by by Rob Fuller and Egypt (James Lee)<\/li>\n<li>ABSOLUTE SCADA: RED TEAM EDITION by Jonathan Pollet and Tom Parker<\/li>\n<li>ACTIVE DIRECTORY ATTACKS FOR RED AND BLUE TEAMS by Nikhil Mittal and Nishant Sharma<\/li>\n<li>ADAPTIVE PENETRATION TESTING by Dan McInerney, Michael Allen and Marcello Salvati<\/li>\n<li>ADVANCED CLOUD SECURITY AND APPLIED SECDEVOPS by Rich Mogull <\/li>\n<li>ADVANCED HARDWARE HACKING: HANDS-ON POWER ANALYSIS &#038; GLITCHING WITH THE CHIPWHISPERER by Colin O&#8217;Flynn<\/li>\n<li>ADVANCED INFRASTRUCTURE HACKING &#8211; 2017 EDITION: 2 DAY by Owen Shearing<\/li>\n<li>ADVANCED INFRASTRUCTURE HACKING &#8211; 2017 EDITION: 4 DAY by Sumit &#8220;sid&#8221; Siddharth and Anant Shrivastava<\/li>\n<li>ADVANCED MALWARE TRAINING: WITH NEXT-GEN TOOLS by Dr. Joshua Stroschein<\/li>\n<li>ADVANCED OPEN SOURCE INTELLIGENCE TECHNIQUES by Michael Bazzell <\/li>\n<li>ADVANCED PRACTICAL SOCIAL ENGINEERING by Christopher Hadnagy and Michele Fincher<\/li>\n<li>ADVANCED SECURITY: FOR HACKERS AND DEVELOPERS by Dr. Jared DeMott<\/li>\n<li>ADVANCED WINDOWS EXPLOITATION by Matteo Memelli<\/li>\n<li>ADVANCED WIRELESS EXPLOITATION by Vivek Ramachandran and Thomas d&#8217;Otreppe<\/li>\n<li>AIKIDO ON THE COMMAND LINE: LINUX HARDENING AND CONTAINMENT by Jay Beale<\/li>\n<li>ANALYZING AN IOT EMPIRE by Michael Schloh<\/li>\n<li>ANDROID APPLICATION HACKING &#8211; PENETRATION AND REVERSING MOBILE APPS by Israel Chorzevski<\/li>\n<li>APPLICATION SECURITY: FOR HACKERS AND DEVELOPERS by Dr. Jared DeMott<\/li>\n<li>APPLIED DATA SCIENCE FOR SECURITY PROFESSIONALS by Charles Givre, Austin Taylor and Dr. Melissa Kilby<\/li>\n<li>APPLIED HARDWARE ATTACKS: EMBEDDED SYSTEMS by Joe FitzPatrick<\/li>\n<li>APPLIED HARDWARE ATTACKS: HARDWARE PENTESTING by Joe FitzPatrick<\/li>\n<li>ARM IOT EXPLOIT LABORATORY: ADVANCED by Saumil Shah<\/li>\n<li>ARM IOT EXPLOIT LABORATORY: INTRO by Saumil Shah<\/li>\n<li>ART AND SCIENCE OF SECURITY RESEARCH by Gregory Conti and David Raymond<\/li>\n<li>ASSESSING AND EXPLOITING CONTROL SYSTEMS &#038; IOT by Justin Searle<\/li>\n<li>ATTACKS OVER GSM WITH PROJECT MAYHEM by Stephen Chicosky, William Peterson and Ken Welch<\/li>\n<li>AUTOMATING EXPLOITATION WITH NMAP SCRIPTING ENGINE by Josh Amishav-Zlatin<\/li>\n<li>BASIC INFRASTRUCTURE HACKING by Will Hunt and Neelu Tripathy<\/li>\n<li>BASIC WEB HACKING by Sunil Yadav and Rohit Salecha<\/li>\n<li>BEYOND THE BEAST: A BROAD SURVEY OF CRYPTO VULNERABILITIES by Alex Balducci<\/li>\n<li>BEYOND THE SCRIPT: PRACTICAL PROBLEM SOLVING TECHNIQUES FOR THE SECURITY PROFESSIONAL by Jeremy &#8220;CrYpT&#8221; Dodson, Ryan &#8220;1o57&#8221; Clarke and Mike &#8220;Anch&#8221; Guthrie <\/li>\n<li>BLACK OPS HACKING FOR PENTESTERS &#8211; MASTER LEVEL by SensePost<\/li>\n<li>CAR HACKING &#8211; HANDS ON by Robert Leale<\/li>\n<li>CLOUD SECURITY HANDS ON (CCSK-PLUS) by James Arlen<\/li>\n<li>CRYPTOGRAPHY USES AND MISUSES: HOW TO USE CRYPTO PROPERLY AND ATTACK THOSE THAT DON&#8217;T by Yehuda (Andrew) Lindell<\/li>\n<li>DARK SIDE OPS II: ADVERSARY SIMULATION by Brady Bloxham<\/li>\n<li>DARK SIDE OPS: CUSTOM PENETRATION TESTING by Brady Bloxham<\/li>\n<li>DEFENSE AND OFFENSE: UNDERSTANDING ATTACKERS THROUGH RED TEAM TACTICS by David Kennedy<\/li>\n<li>DIGITAL FORENSICS &#038; INCIDENT RESPONSE by Andrew Case and Jamie Levy<\/li>\n<li>ERP SECURITY: ASSESS, EXPLOIT AND DEFEND SAP PLATFORMS by Julian Rapisardi<\/li>\n<li>ESCAPING OPPRESSION USING COVERT STEGANOGRAPHY by John Ortiz<\/li>\n<li>EXPANDING THE BLUE TEAM BY BUILDING A SECURITY CULTURE PROGRAM by Masha Sedova and Marisa Fagan<\/li>\n<li>FUZZING FOR VULNERABILITIES by Chris Bisnett and Kyle Hanslovan<\/li>\n<li>HACKING FIRMWARE &#038; HARDWARE: SOFTWARE EXPLOITATION VIA HARDWARE EXPLOITATION by Senrio Research Team <\/li>\n<li>HACKING HARDENED SOFTWARE CRYPTO by Jasper (@jzvw)<\/li>\n<li>HANDS ON LINUX WEB SERVER HARDENING AND SYSTEM MONITORING FOR PCI by Lance<\/li>\n<li>HANDS-ON HARDWARE HACKING AND REVERSE ENGINEERING by Joe Grand (@joegrand)<\/li>\n<li>HANDS-ON PENETRATION TESTING OF MOBILE DEVICES by Georgia Weidman<\/li>\n<li>IC REVERSE ENGINEERING 101 by Oliver Thomas <\/li>\n<li>INCIDENT RESPONSE: BLACK HAT EDITION <\/li>\n<li>INSIDER THREAT MITIGATION AND COUNTERMEASURES by Deputy Sheriff, Robin and Randy Marcoz<\/li>\n<li>KALI LINUX REVEALED &#8211; MASTERING THE PENETRATION TESTING DISTRIBUTION by Mati Aharoni and Johnny Long <\/li>\n<li>MACHINE LEARNING FOR PENTESTERS AND SECURITY RESEARCHERS by Sinan Ozdemir<\/li>\n<li>MALWARE ANALYSIS CRASH COURSE<\/li>\n<li>MILITARY STRATEGY AND TACTICS FOR CYBER SECURITY by Gregory Conti and David Raymond<\/li>\n<li>NETWORK FORENSICS: CONTINUOUS MONITORING AND INSTRUMENTATION by Sherri Davidoff and David Harrison<\/li>\n<li>OFFENSIVE MOBILE APPLICATION EXPLOITATION by Prateek Gianchandani<\/li>\n<li>OPEN SOURCE INTELLIGENCE WITH MALTEGO by Paul Richards<\/li>\n<li>OS X MALWARE ANALYSIS CRASH COURSE<\/li>\n<li>PENETRATION TESTING WITH KALI LINUX by Jim O&#8217;Gorman<\/li>\n<li>PENTESTING ENTERPRISE INFRASTRUCTURE &#8211; JOURNEYMAN LEVEL by SensePost <\/li>\n<li>PHYSICAL PENETRATION TESTING by Robert Pingor and Babak<\/li>\n<li>PRACTICAL ANDROID EXPLOITATION by Stephen A. Ridley<\/li>\n<li>PRACTICAL ARM EXPLOITATION (2-DAY BOOT CAMP) by Senrio Research Team<\/li>\n<li>PRACTICAL THREAT INTELLIGENCE by Andrew van der Stock<\/li>\n<li>PYTHON HACKER BOOTCAMP: ZERO TO HERO by JC Carruthers and Perry Jones<\/li>\n<li>RISK MANAGEMENT FRAMEWORK (CNSS-4016) by Jeff Moulton<\/li>\n<li>ROUTER BACKDOOR ANALYSIS<\/li>\n<li>SECDEVOPS: INJECTING SECURITY INTO DEVOPS by SensePost<\/li>\n<li>SOFTWARE DEFINED RADIO by Michael Ossmann<\/li>\n<li>TACTICAL DEFENSE WITH MODSECURITY by Josh Amishav-Zlatin<\/li>\n<li>TACTICAL EXPLOITATION: ATTACKING UNIX by Colin Ames and Val Smith <\/li>\n<li>TACTICAL EXPLOITATION: ATTACKING WINDOWS by Colin Ames and Val Smith<\/li>\n<li>TACTICS, TECHNIQUES AND PROCEDURES FOR HACKERS by SensePost <\/li>\n<li>THE IDA PRO ADVANCED COURSE: REVERSE ENGINEERING WITH IDA PRO by Chris Eagle<\/li>\n<li>THE IDA PRO BASIC COURSE by Chris Eagle<\/li>\n<li>THE MOBILE APPLICATION HACKER&#8217;S HANDBOOK: LIVE EDITION by Dominic Chell<\/li>\n<li>THE SHELLCODE LAB by Ty Miller<\/li>\n<li>THE WEB APPLICATION HACKER&#8217;S HANDBOOK, LIVE EDITION by Marcus Pinto<\/li>\n<li>VISUAL ANALYTICS &#8211; DELIVERING ACTIONABLE SECURITY INTELLIGENCE by Raffael Marty <\/li>\n<li>VISUALIZING AND EXPLORING YOUR OWN DATA WITH MALTEGO by Roelof Temmingh and Andrew Macpherson<\/li>\n<li>WHITEBOARD HACKING AKA HANDS-ON THREAT MODELING by Sebastien Deleersnyder<\/li>\n<li>WINDOWS KERNEL ROOTKIT TECHNIQUES by T. Roy<\/li>\n<\/ol>\n<p><strong><u>DEFCON<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/dc-25-logo.jpg\" data-slb-active=\"1\" data-slb-asset=\"452699670\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/dc-25-logo-300x134.jpg\" alt=\"\" width=\"300\" height=\"134\" class=\"alignnone size-medium wp-image-3169\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/dc-25-logo-300x134.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/dc-25-logo.jpg 650w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 27 &#8211; 30 July 2017<\/li>\n<li><strong>Place:<\/strong> Caesars Palace Las Vegas, US<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.defcon.org\/html\/defcon-25\/dc-25-index.html#\" target=\"_blank\">https:\/\/www.defcon.org\/html\/defcon-25\/dc-25-index.html#<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 260 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p><strong><u>USENIX Security<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/USENIX-.jpg\" data-slb-active=\"1\" data-slb-asset=\"1001956163\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/USENIX--300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-3168\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/USENIX--300x300.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/USENIX--150x150.jpg 150w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/USENIX-.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 16 &#8211; 18 August 2017<\/li>\n<li><strong>Place:<\/strong> Sheraton Vancouver Wall Centre Hotel, Vancouver Canada<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity17\" target=\"_blank\">https:\/\/www.usenix.org\/conference\/usenixsecurity17<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 915 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p><strong><u>c0c0n<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/c0c0ncy0ps-c0n.png\" data-slb-active=\"1\" data-slb-asset=\"1044366727\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/c0c0ncy0ps-c0n-300x121.png\" alt=\"\" width=\"300\" height=\"121\" class=\"alignnone size-medium wp-image-3166\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/c0c0ncy0ps-c0n-300x121.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/c0c0ncy0ps-c0n.png 670w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>Conference: 18 &#8211; 19 August 2017<\/li>\n<li>Training: 17 August 2017<\/li>\n<\/ol>\n<ul>\n<li><strong>Place:<\/strong> HOTEL LE MERIDIEN, KOCHI, INDIA<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"http:\/\/is-ra.org\/c0c0n\/\" target=\"_blank\">http:\/\/is-ra.org\/c0c0n\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> unpublished<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p><strong><u>AlligatorCon<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/hackerstrip_artwork_alligatorcon_2017_large.jpg\" data-slb-active=\"1\" data-slb-asset=\"813649898\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/hackerstrip_artwork_alligatorcon_2017_large-212x300.jpg\" alt=\"\" width=\"212\" height=\"300\" class=\"alignnone size-medium wp-image-3162\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/hackerstrip_artwork_alligatorcon_2017_large-212x300.jpg 212w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/hackerstrip_artwork_alligatorcon_2017_large.jpg 724w\" sizes=\"auto, (max-width: 212px) 100vw, 212px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 25 &#8211; 26 August 2017<\/li>\n<li><strong>Place:<\/strong> Krak\u00f3w, Poland<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"http:\/\/alligatorcon.pl\/\" target=\"_blank\">http:\/\/alligatorcon.pl\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> Free<\/li>\n<li><strong>Lectures:<\/strong> Unknown<\/li>\n<li><strong>Workshops:<\/strong> Unknown<\/li>\n<\/ul>\n<p><strong><u>HITB GSEC<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/HITB-GSEC.png\" data-slb-active=\"1\" data-slb-asset=\"671685124\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/HITB-GSEC.png\" alt=\"\" width=\"250\" height=\"244\" class=\"alignnone size-full wp-image-3158\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>Conference: 24 &#8211; 25 August 2017<\/li>\n<li>Training: 21 &#8211; 24 August 2017<\/li>\n<\/ol>\n<ul>\n<li><strong>Place:<\/strong> InterContinental Singapore<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"http:\/\/gsec.hitb.org\/sg2017\/\" target=\"_blank\">http:\/\/gsec.hitb.org\/sg2017\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 1200 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>ICS\/SCADA Security by Louis Hur, Edward Lee and Junyuan Chai<\/li>\n<li>Vulnerability Discovery and Triage Automation by Richard Johnson<\/li>\n<li>Hardware Hacking with Hardsploit &#038; Drones by Julien Moinard<\/li>\n<li>Making &#038; Breaking Machine Learning Systems by Clarence Chio and Anto Joseph<\/li>\n<li>Practical Car Hacking by Robert Leale and KC Johnson<\/li>\n<\/ol>\n<p><strong><u>ESORICS Oslo<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/ESORICS-Oslo.png\" data-slb-active=\"1\" data-slb-asset=\"1659396441\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/ESORICS-Oslo-300x68.png\" alt=\"\" width=\"300\" height=\"68\" class=\"alignnone size-medium wp-image-3167\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/ESORICS-Oslo-300x68.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/ESORICS-Oslo-768x173.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/ESORICS-Oslo-1024x231.png 1024w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/ESORICS-Oslo.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>Conference: 11 &#8211; 13 September 2017<\/li>\n<li>Training: 14 &#8211; 15 September 2017<\/li>\n<\/ol>\n<ul>\n<li><strong>Place:<\/strong> Gamle Museet \/ The Old Museum, Oslo Norway<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.ntnu.edu\/web\/esorics2017\/european-symposium-on-research-in-computer-security\" target=\"_blank\">https:\/\/www.ntnu.edu\/web\/esorics2017\/european-symposium-on-research-in-computer-security<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 550 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>1st European Workshop on Security and Privacy in Fog and Edge Computing (SPIFEC)<\/li>\n<li>3rd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS)<\/li>\n<li>ESORICS Doctoral Consortium \u2013 COINS Nordic PhD Workshop<\/li>\n<li>1st International Workshop on Security and Privacy Requirements Engineering (SECPRE 2017)<\/li>\n<li>International Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE)<\/li>\n<li>6th International Workshop on Quantitative Aspects of Security Assurance (QASA 2017)<\/li>\n<li>International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2017)<\/li>\n<li>12th International Workshop on Data Privacy Management (DPM 2017)<\/li>\n<li>13th International Workshop on Security and Trust Management (STM 2017)<\/li>\n<li>The International Workshop on Secure Internet of Things<\/li>\n<\/ol>\n<p><strong><u>44CON<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/logo44con1.png\" data-slb-active=\"1\" data-slb-asset=\"1326589781\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/logo44con1-300x119.png\" alt=\"\" width=\"300\" height=\"119\" class=\"alignnone size-medium wp-image-3159\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/logo44con1-300x119.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/logo44con1.png 450w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>Conference: 14 &#8211; 15 September 2017<\/li>\n<li>Training: 11 &#8211; 13 September 2017<\/li>\n<\/ol>\n<ul>\n<li><strong>Place:<\/strong> ILEC Conference Centre, London UK<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/44con.com\/\" target=\"_blank\">https:\/\/44con.com\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 500 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>Windows Kernel Exploitation by Ashfaq Ansari<\/li>\n<li>Mobile Application Hacker&#8217;s Handbook: Live Edition by Dominic Chell<\/li>\n<li>Social Engineering Training by Dominique C. Brack<\/li>\n<li>Network Forensics Training by Erik Hjelmvik<\/li>\n<li>Applied Physical Attacks on Embedded Systems by Joe FitzPatrick<\/li>\n<li>Developing Burp Suite Extensions by Developing Burp Suite Extensions<\/li>\n<li>Web Application Hacker&#8217;s Handbook by Marcus Pinto<\/li>\n<li>Offensive PowerShell for Red and Blue Teams by Nikhil Mittal<\/li>\n<li>The ARM IoT Exploit Laboratory by Saumil Shah<\/li>\n<\/ol>\n<p><strong><u>DragonJAR<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/DragonJar-logo.png\" data-slb-active=\"1\" data-slb-asset=\"549111501\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/DragonJar-logo-300x97.png\" alt=\"\" width=\"300\" height=\"97\" class=\"alignnone size-medium wp-image-3160\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/DragonJar-logo-300x97.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/DragonJar-logo-768x249.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/DragonJar-logo.png 780w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 16 &#8211; 17 September 2017<\/li>\n<li><strong>Place:<\/strong> Hotel NH Royal Metrotel, Bogot\u00e1 Colombia<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.dragonjarcon.org\/\" target=\"_blank\">https:\/\/www.dragonjarcon.org\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> 500 USD<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p><strong><u>ROOTCON<\/u><\/strong><br \/> <a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/RootCon.jpg\" data-slb-active=\"1\" data-slb-asset=\"1324565167\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/RootCon-300x197.jpg\" alt=\"\" width=\"300\" height=\"197\" class=\"alignnone size-medium wp-image-3161\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/RootCon-300x197.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/RootCon-768x505.jpg 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/RootCon.jpg 999w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 21 &#8211; 22 September 2017<\/li>\n<li><strong>Place:<\/strong> Taal Vista Hote Tagaytay, Philippines<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.rootcon.org\/xml\/rc11\" target=\"_blank\">https:\/\/www.rootcon.org\/xml\/rc11<\/a><\/li>\n<li><strong>Ticket price:<\/strong> unpublished<\/li>\n<li><strong>Lectures:<\/strong><\/li>\n<\/ul>\n<ol>\n<li>7 sins of ATM protection against logical attacks by Timur Yunusov <\/li>\n<li>Breaking into the iCloud Keychain by Vladimir Katalov <\/li>\n<li>Demystifying The Ransomware and IoT Threat by Christopher Elisan <\/li>\n<li>Dissecting Exploit Kits by Daniel Frank <\/li>\n<li>Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov <\/li>\n<li>Finding Your Way to Domain Admin Access and Even So, the Game Isn\u2019t Over Yet. by Keith Lee<\/li>\n<li>Hunting Hunters with OSint by Michael Rebultan<\/li>\n<li>The future of ApplePwn. How to save your money. by Timur Yunusov<\/li>\n<li>The rise of security assistants over security audit services. by Yury Chemerkin<\/li>\n<\/ol>\n<ul>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p><strong><u>Ekoparty<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Ekoparty.jpg\" data-slb-active=\"1\" data-slb-asset=\"1844633680\" data-slb-internal=\"0\" data-slb-group=\"3139\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Ekoparty-300x158.jpg\" alt=\"\" width=\"300\" height=\"158\" class=\"alignnone size-medium wp-image-3165\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Ekoparty-300x158.jpg 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Ekoparty.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<ul>\n<li><strong>Dates:<\/strong> 25 &#8211; 29 September 2017<\/li>\n<li><strong>Place:<\/strong> Buenos Aires Argentina<\/li>\n<li><strong>Link to official conference website:<\/strong> <a href=\"https:\/\/www.ekoparty.org\/\" target=\"_blank\">https:\/\/www.ekoparty.org\/<\/a><\/li>\n<li><strong>Ticket price:<\/strong> unpublished<\/li>\n<li><strong>Lectures:<\/strong> unpublished<\/li>\n<li><strong>Workshops:<\/strong> unpublished<\/li>\n<\/ul>\n<p>That\u2019s it guys \u2013 and \u201cMay the odds be ever in your favor\u201d!<\/p>\n<p>If you know any other security conferences \u2013 contact us via ssd[]beyondsecurity.com and we will update the list.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/3139\" target=\"bwo\" >https:\/\/blogs.securiteam.com\/index.php\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/04\/Cat-riding-unicorn-300x176.jpg\"\/><\/p>\n<p><strong>Credit to Author: Maor Schwartz| Date: Thu, 20 Apr 2017 07:10:46 +0000<\/strong><\/p>\n<p>The security conferences \u201cSurvival guide\u201d for 2017 Q3 is here! We have gathered the following information for you for each conference: Dates Place Link to official conference website Ticket price Lectures Workshops So let\u2019s get started: Security conferences \u2013 Survival guide part 3 Camp++ Dates: 6 &#8211; 9 July 2017 Place: Fort Monostor, Kom\u00e1rom, Hungary &#8230; <a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/3139\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Security conferences \u2013 Survival guide 2017 Q3<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10754],"tags":[11180,10757],"class_list":["post-7401","post","type-post","status-publish","format-standard","hentry","category-independent","category-securiteam","tag-know-your-community","tag-securiteam-secure-disclosure"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7401"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7401\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}