Security conferences – Survival guide 2017 Q1
We have some few more days until the end of the year (2016) but it’s time to open the calendar and get ready for 2017(!).
We will try publish every quarter the main security conferences*
We have gathered the following information for you for each conference:
- Dates
- Place
- Link to official conference website
- Ticket price
- Lectures
- Workshops
So let’s get started:
Security conferences – Survival guide
ShmooCon
- Dates: 13-15 January
- Place: Washington Hilton Hotel 1919 Connecticut Ave., NW Washington, USA
- Link to official conference website: http://shmoocon.org/
- Ticket price: ~150$
- Lectures:
- WaveConverter – An Open Source Software Tool for RF Reverse Engineering by Paul Clark
- Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles by Rebekah Houser
- Exploring The Infrared World by Dominic Spill and Michael Ossmann
REcon Brussels
- Dates: 27-29 January
- Place: Brussels, Belgium
- Link to official conference website: https://recon.cx/2017/brussels/
- Ticket price: ~800€
- Lectures: unpublished
- Workshops:
- Mobile and Telecom Applied Hacking and Reverse Engineering by Philippe Langlois (2 days)
- Reverse Engineering Malware by Nicolas Brulez (4 days)
- Windows Internals for Reverse Engineers by Alex Ionescu (4 days)
- Hardware Hacking (Advanced) by Dmitry Nedospasov (4 days)
- The ARM Exploit Laboratory by Saumil Shah (4 days)
- Windows kernel rootkits techniques and analysis by Bruce Dang (4 days)
- MacOS Sierra and iOS 10 Kernel Internals for Security Researchers by Stefan Esser (4 days)
- Botnet Takeover Attacks For Reverse Engineers by Brett Stone-Gross and Tillmann Werner (4 days)
Hackers Day
- Dates: 13-14 January
- Place: AMITY University Lucknow India
- Link to official conference website: https://www.hackersday.org/
- Ticket price: ~14$
- Lectures: unpublished
- Workshops:
- Web application penetration testing by Karan Bansal
- Digital Forensics 360° approach by Nilay R. Mistry and Prince Boonlia
HackCon
- Dates: 15-16 February
- Place: Oslo Norway
- Link to official conference website: https://www.hackcon.org/
- Ticket price: ~720$
- Lectures:
- These unknown attacks will own you top secure systems – even if They are not connect to internet by Rogan Dawes
- Are today’s security thinking errors / expired? by More
- PowerShell – Your worst enemy or your best friend by Joe McCrey
- Silent RIFLE: How take control of all your systems by Kyoung-Ju Kwak
- How your virtual machines can be hacked in cloud environment by Dr. Ronny Bull
- Block Chain: Hype or Hope for nextgeneration cybersecurity? by Radia Perlman
- How to take control of your system thru wireless mouse or keyboard! by Marc Newlin
- Workshops:
- Securing / hacking your systems with PowerShell by Joe McCray
- Advanced Securing / hacking your web systems by Aditya Modha and S. Sonya
RSAConference
- Dates: 13-17 February
- Place: Moscone Center, San-Francisco, USA
- Link to official conference website: https://www.rsaconference.com/events/us17
- Ticket price: ~1700$
NULLCON
- Dates: 3-4 March
- Place: Goa, India
- Link to official conference website: http://nullcon.net/website/
- Ticket price: ~207$
- Lectures:
- Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov
- Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D””e
Tec
T ‘Th’+’em’ by Daniel Bohannon - Nearly generic fuzzing of XML-based formats by Nicolas Gregoire
- Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda and Timo Kreuzer
- Workshops:
- Practical IoT Hacking by Aseem Jakhar
- Advanced Infrastructure Security Assessment Training by Abhisek Datta and Omair
- Assessing And Exploiting Industrial Control Systems by Justin Searle
- Cloud Security For Devs & Ops by Akash Mahajan and Riyaz Walikar
- The Web Application Hacker’s Handbook, Live Edition by Marcus Pinto
- Practical RFID/NFC Hacking Training by Adam Laurie
- Low level Hardware reversing (Basic) by Javier-Vazquez Vidal and Ferdinand
- Audit +++ by Joerg Simon
- Xtreme Android Exploitation Lab by Anant Shrivastava and Anto Joseph
- Understanding and Exploiting Cryptography & PKI Implementations by Ajit Hatti
- Windows Kernel Exploitation by Ashfaq Ansari
INSMNI’HACK
- Dates: 23-24 March
- Place: Geneva Switzerland
- Link to official conference website: https://insomnihack.ch/
- Ticket price: unpublished
- Lectures: unpublished
- Workshops: unpublished
CYPHERCON 2.0
- Dates: 30-31 March
- Place: Wisconsin USA
- Link to official conference website: https://cyphercon.com/cyphercon-20/
- Ticket price: ~175$
- Lectures:
- Explore Wisconsin hacker history by Brad Swanson
- Modern evasion techniques by Jason Lang
- Cluster cracking passwords & MDXFIND by Robert Reif
- Predictive analytics and machine learning: “real” use cases for IT / Security professionals by John Platais
- Hackable electronic badge panelist by Zapp
- Protecting passwords with oblivious cryptography by Adam Everspaugh
- Does DOD level security work in the real world? by Jeff Man
- Brain based authentication by Melanie Segado and Sydney Swaine-Simon
- Naked and vulnerable: A Cybersecurity starter kit by Shannon Fritz
- Beyond the fringe: Anomalies of consciousness, experience, and scientific research by Richard Thieme
TROOPERS
- Dates: 20-24 March
- Place: Heidelberg, Germany
- Link to official conference website: https://www.troopers.de
- Ticket price: ~1800€
- Lectures:
- Unsafe JAX-RS: Breaking REST API by Mikhail Egorov
- Vox Ex Machina by Graeme Neilson
- Hunting For Vulnerabilities in Signal by JP Aumasson and Markus Vervier
- Architecting a Modern Defense using Device Guard by Matt Graeber and Casey Smith
- Windows 10 – Endpoint Security Improvements and the Implant since Windows 2000 by Christopher Truncer and Evan Peña
- Workshops:
- Fuzzing with american fuzzy lop, address sanitizer and libfuzzer by Hanno Böck
- Making & breaking machine learning systems by Clarence Chio and Anto Joseph
- Network Forensics by Erik Hjelmvik
- Docker security &(sec)devops by Florian Barth and Matthias Luft
- Hacking 101 by Malte Heinzelmann, Sven Nobis and Niklaus Schiess
- AD security by Friedwart Kuhn and Heinrich Wiederkehr
- Applied physical attacks on embedded systems by Joe FitzPatrick
- RFID / NFC: “Two days of security and privacy nightmares” by Nahuel Grisolía, Philippe Teuwen
- Whireshark scripting with LUA by Peter Kieseberg and Sebastian Schrittwieser
- Incident analysis by Frank Block, Dominik Phillips and Michael Thumann
- Automation with ansible: radically simplify IT operations by Rüdiger Kramolisch and Kai Sparwald
- Suricata: world-class and open source by Andreas Herz and Peter Manev
- Software defined radio by Michael Ossmann
- Forensics computing by Andreas Dewald and Christoph Klaassen
- Windows and Linux exploitation by Birk Kauer and Oliver Matula
- Crypto attacks and defenses by Philipp Jovanovic and Jean-Philippe Aumasson
- Networking and VOIP security by Fatih Ozavci
- Cellular hacking workshop by Hendrik Schmidt
- Developing BURP suite extensions – from manual testing to security automation by Luca Carettoni
Black Hat
- Dates: 28-31 March
- Place: Singapore
- Link to official conference website: https://www.blackhat.com/asia-17/
- Ticket price: ~1300$
- Lectures: unpublished
- Workshops:
- A PRACTICAL APPROACH TO MALWARE ANALYSIS AND MEMORY FORENSICS by Monnappa and Sajan Shetty
- ADAPTIVE PENETRATION TESTING by Veris Group’s Adaptive Threat Division
- ADAPTIVE RED TEAM TACTICS by Veris Group’s Adaptive Threat Division
- ADVANCED EXPLOITATION: FOR HACKERS AND DEVELOPERS by VDA Labs, LLC
- ADVANCED HARDWARE HACKING: HANDS-ON POWER ANALYSIS & GLITCHING WITH THE CHIPWHISPERER by NewAE Technology Inc.
- ADVANCED INFRASTRUCTURE HACKING by NotSoSecure
- ATTACKING 2G/3G MOBILE NETWORKS, SMARTPHONES AND APPS by Pedro Cabrera and Simon Roses Femerling
- BEYOND THE SCRIPT: PRACTICAL PROBLEM SOLVING TECHNIQUES FOR THE SECURITY PROFESSIONAL by Curious Codes
- DARK SIDE OPS: CUSTOM PENETRATION TESTING by Silent Break Security
- MOBILE APPLICATION BOOTCAMP – JOURNEYMAN LEVEL by SensePost
- NETWORK FORENSICS: CONTINUOUS MONITORING AND INSTRUMENTATION by LMG Security
- OFFENSIVE IOS EXPLOITATION by Marco Lancini, MWR InfoSecurity
- OFFENSIVE POWERSHELL FOR RED AND BLUE TEAMS by Nikhil “SamratAshok” Mittal
- OS X MALWARE ANALYSIS CRASH COURSE by Fireeye Labs and Reverse Engineering Team
- SECURE CODING IN C AND C++ by Robert C. Seacord
- SOFTWARE DEFINED RADIO by Michael Ossmann, Great Scott Gadgets
- TECHNIQUES, TACTICS AND PROCEDURES FOR HACKERS by SensePost
/RootedCON
- Dates:2-4 March
- Place: Madrid Spain
- Link to official conference website: https://www.rootedcon.com/
- Ticket price: unpublished
- Lectures: unpublished
- Workshops: unpublished
CanSecWest
- Dates: 15-17 March
- Place: Vancouver, Canada
- Link to official conference website: https://cansecwest.com/
- Ticket price: unpublished
- Lectures: unpublished
- Workshops: unpublished
That’s it guys – and “May the odds be ever in your favor”!
If you know any other security conferences – contact us via ssd[]beyondsecurity.com and we will update the list.