Security conferences – Survival guide 2017 Q3
Credit to Author: Maor Schwartz| Date: Thu, 20 Apr 2017 07:10:46 +0000
The security conferences “Survival guide” for 2017 Q3 is here!
We have gathered the following information for you for each conference:
- Dates
- Place
- Link to official conference website
- Ticket price
- Lectures
- Workshops
So let’s get started:
Security conferences – Survival guide part 3
Camp++
- Dates: 6 – 9 July 2017
- Place: Fort Monostor, Komárom, Hungary
- Link to official conference website: https://camp.hsbp.org/2017/pp7e1/cfp.html
- Ticket price: 80 USD
- Lectures: unpublished
- Workshops: unpublished
SteelCon
- Dates: 7 – 9 July 2017
- Place: Owen building at Sheffield Hallam University, UK
- Link to official conference website: https://www.steelcon.info/
- Ticket price: 35 USD
- Lectures: unpublished
- Workshops: unpublished
Black Hat USA
- Dates:
- Conference: 26 – 27 July 2017
- Training: 22 – 25 July 2017
- Place: Mandalay Bay, Las Vegas, USA
- Link to official conference website: https://www.blackhat.com/us-17/
- Ticket price: 2095 – 2800 USD
- Lectures: unpublished
- Workshops:
- A GUIDE TO THREAT HUNTING UTILIZING THE ELK STACK AND POWERSHELL by Thomas Pace, Michael Scott and Eric Cornelius
- ABILITIES INC – METASPLOIT BASICS by Rob Fuller and Egypt (James Lee)
- ABILITIES INC – METASPLOIT MASTERY by by Rob Fuller and Egypt (James Lee)
- ABSOLUTE SCADA: RED TEAM EDITION by Jonathan Pollet and Tom Parker
- ACTIVE DIRECTORY ATTACKS FOR RED AND BLUE TEAMS by Nikhil Mittal and Nishant Sharma
- ADAPTIVE PENETRATION TESTING by Dan McInerney, Michael Allen and Marcello Salvati
- ADVANCED CLOUD SECURITY AND APPLIED SECDEVOPS by Rich Mogull
- ADVANCED HARDWARE HACKING: HANDS-ON POWER ANALYSIS & GLITCHING WITH THE CHIPWHISPERER by Colin O’Flynn
- ADVANCED INFRASTRUCTURE HACKING – 2017 EDITION: 2 DAY by Owen Shearing
- ADVANCED INFRASTRUCTURE HACKING – 2017 EDITION: 4 DAY by Sumit “sid” Siddharth and Anant Shrivastava
- ADVANCED MALWARE TRAINING: WITH NEXT-GEN TOOLS by Dr. Joshua Stroschein
- ADVANCED OPEN SOURCE INTELLIGENCE TECHNIQUES by Michael Bazzell
- ADVANCED PRACTICAL SOCIAL ENGINEERING by Christopher Hadnagy and Michele Fincher
- ADVANCED SECURITY: FOR HACKERS AND DEVELOPERS by Dr. Jared DeMott
- ADVANCED WINDOWS EXPLOITATION by Matteo Memelli
- ADVANCED WIRELESS EXPLOITATION by Vivek Ramachandran and Thomas d’Otreppe
- AIKIDO ON THE COMMAND LINE: LINUX HARDENING AND CONTAINMENT by Jay Beale
- ANALYZING AN IOT EMPIRE by Michael Schloh
- ANDROID APPLICATION HACKING – PENETRATION AND REVERSING MOBILE APPS by Israel Chorzevski
- APPLICATION SECURITY: FOR HACKERS AND DEVELOPERS by Dr. Jared DeMott
- APPLIED DATA SCIENCE FOR SECURITY PROFESSIONALS by Charles Givre, Austin Taylor and Dr. Melissa Kilby
- APPLIED HARDWARE ATTACKS: EMBEDDED SYSTEMS by Joe FitzPatrick
- APPLIED HARDWARE ATTACKS: HARDWARE PENTESTING by Joe FitzPatrick
- ARM IOT EXPLOIT LABORATORY: ADVANCED by Saumil Shah
- ARM IOT EXPLOIT LABORATORY: INTRO by Saumil Shah
- ART AND SCIENCE OF SECURITY RESEARCH by Gregory Conti and David Raymond
- ASSESSING AND EXPLOITING CONTROL SYSTEMS & IOT by Justin Searle
- ATTACKS OVER GSM WITH PROJECT MAYHEM by Stephen Chicosky, William Peterson and Ken Welch
- AUTOMATING EXPLOITATION WITH NMAP SCRIPTING ENGINE by Josh Amishav-Zlatin
- BASIC INFRASTRUCTURE HACKING by Will Hunt and Neelu Tripathy
- BASIC WEB HACKING by Sunil Yadav and Rohit Salecha
- BEYOND THE BEAST: A BROAD SURVEY OF CRYPTO VULNERABILITIES by Alex Balducci
- BEYOND THE SCRIPT: PRACTICAL PROBLEM SOLVING TECHNIQUES FOR THE SECURITY PROFESSIONAL by Jeremy “CrYpT” Dodson, Ryan “1o57” Clarke and Mike “Anch” Guthrie
- BLACK OPS HACKING FOR PENTESTERS – MASTER LEVEL by SensePost
- CAR HACKING – HANDS ON by Robert Leale
- CLOUD SECURITY HANDS ON (CCSK-PLUS) by James Arlen
- CRYPTOGRAPHY USES AND MISUSES: HOW TO USE CRYPTO PROPERLY AND ATTACK THOSE THAT DON’T by Yehuda (Andrew) Lindell
- DARK SIDE OPS II: ADVERSARY SIMULATION by Brady Bloxham
- DARK SIDE OPS: CUSTOM PENETRATION TESTING by Brady Bloxham
- DEFENSE AND OFFENSE: UNDERSTANDING ATTACKERS THROUGH RED TEAM TACTICS by David Kennedy
- DIGITAL FORENSICS & INCIDENT RESPONSE by Andrew Case and Jamie Levy
- ERP SECURITY: ASSESS, EXPLOIT AND DEFEND SAP PLATFORMS by Julian Rapisardi
- ESCAPING OPPRESSION USING COVERT STEGANOGRAPHY by John Ortiz
- EXPANDING THE BLUE TEAM BY BUILDING A SECURITY CULTURE PROGRAM by Masha Sedova and Marisa Fagan
- FUZZING FOR VULNERABILITIES by Chris Bisnett and Kyle Hanslovan
- HACKING FIRMWARE & HARDWARE: SOFTWARE EXPLOITATION VIA HARDWARE EXPLOITATION by Senrio Research Team
- HACKING HARDENED SOFTWARE CRYPTO by Jasper (@jzvw)
- HANDS ON LINUX WEB SERVER HARDENING AND SYSTEM MONITORING FOR PCI by Lance
- HANDS-ON HARDWARE HACKING AND REVERSE ENGINEERING by Joe Grand (@joegrand)
- HANDS-ON PENETRATION TESTING OF MOBILE DEVICES by Georgia Weidman
- IC REVERSE ENGINEERING 101 by Oliver Thomas
- INCIDENT RESPONSE: BLACK HAT EDITION
- INSIDER THREAT MITIGATION AND COUNTERMEASURES by Deputy Sheriff, Robin and Randy Marcoz
- KALI LINUX REVEALED – MASTERING THE PENETRATION TESTING DISTRIBUTION by Mati Aharoni and Johnny Long
- MACHINE LEARNING FOR PENTESTERS AND SECURITY RESEARCHERS by Sinan Ozdemir
- MALWARE ANALYSIS CRASH COURSE
- MILITARY STRATEGY AND TACTICS FOR CYBER SECURITY by Gregory Conti and David Raymond
- NETWORK FORENSICS: CONTINUOUS MONITORING AND INSTRUMENTATION by Sherri Davidoff and David Harrison
- OFFENSIVE MOBILE APPLICATION EXPLOITATION by Prateek Gianchandani
- OPEN SOURCE INTELLIGENCE WITH MALTEGO by Paul Richards
- OS X MALWARE ANALYSIS CRASH COURSE
- PENETRATION TESTING WITH KALI LINUX by Jim O’Gorman
- PENTESTING ENTERPRISE INFRASTRUCTURE – JOURNEYMAN LEVEL by SensePost
- PHYSICAL PENETRATION TESTING by Robert Pingor and Babak
- PRACTICAL ANDROID EXPLOITATION by Stephen A. Ridley
- PRACTICAL ARM EXPLOITATION (2-DAY BOOT CAMP) by Senrio Research Team
- PRACTICAL THREAT INTELLIGENCE by Andrew van der Stock
- PYTHON HACKER BOOTCAMP: ZERO TO HERO by JC Carruthers and Perry Jones
- RISK MANAGEMENT FRAMEWORK (CNSS-4016) by Jeff Moulton
- ROUTER BACKDOOR ANALYSIS
- SECDEVOPS: INJECTING SECURITY INTO DEVOPS by SensePost
- SOFTWARE DEFINED RADIO by Michael Ossmann
- TACTICAL DEFENSE WITH MODSECURITY by Josh Amishav-Zlatin
- TACTICAL EXPLOITATION: ATTACKING UNIX by Colin Ames and Val Smith
- TACTICAL EXPLOITATION: ATTACKING WINDOWS by Colin Ames and Val Smith
- TACTICS, TECHNIQUES AND PROCEDURES FOR HACKERS by SensePost
- THE IDA PRO ADVANCED COURSE: REVERSE ENGINEERING WITH IDA PRO by Chris Eagle
- THE IDA PRO BASIC COURSE by Chris Eagle
- THE MOBILE APPLICATION HACKER’S HANDBOOK: LIVE EDITION by Dominic Chell
- THE SHELLCODE LAB by Ty Miller
- THE WEB APPLICATION HACKER’S HANDBOOK, LIVE EDITION by Marcus Pinto
- VISUAL ANALYTICS – DELIVERING ACTIONABLE SECURITY INTELLIGENCE by Raffael Marty
- VISUALIZING AND EXPLORING YOUR OWN DATA WITH MALTEGO by Roelof Temmingh and Andrew Macpherson
- WHITEBOARD HACKING AKA HANDS-ON THREAT MODELING by Sebastien Deleersnyder
- WINDOWS KERNEL ROOTKIT TECHNIQUES by T. Roy
DEFCON
- Dates: 27 – 30 July 2017
- Place: Caesars Palace Las Vegas, US
- Link to official conference website: https://www.defcon.org/html/defcon-25/dc-25-index.html#
- Ticket price: 260 USD
- Lectures: unpublished
- Workshops: unpublished
USENIX Security
- Dates: 16 – 18 August 2017
- Place: Sheraton Vancouver Wall Centre Hotel, Vancouver Canada
- Link to official conference website: https://www.usenix.org/conference/usenixsecurity17
- Ticket price: 915 USD
- Lectures: unpublished
- Workshops: unpublished
c0c0n
- Dates:
- Conference: 18 – 19 August 2017
- Training: 17 August 2017
- Place: HOTEL LE MERIDIEN, KOCHI, INDIA
- Link to official conference website: http://is-ra.org/c0c0n/
- Ticket price: unpublished
- Lectures: unpublished
- Workshops: unpublished
AlligatorCon
- Dates: 25 – 26 August 2017
- Place: Kraków, Poland
- Link to official conference website: http://alligatorcon.pl/
- Ticket price: Free
- Lectures: Unknown
- Workshops: Unknown
HITB GSEC
- Dates:
- Conference: 24 – 25 August 2017
- Training: 21 – 24 August 2017
- Place: InterContinental Singapore
- Link to official conference website: http://gsec.hitb.org/sg2017/
- Ticket price: 1200 USD
- Lectures: unpublished
- Workshops:
- ICS/SCADA Security by Louis Hur, Edward Lee and Junyuan Chai
- Vulnerability Discovery and Triage Automation by Richard Johnson
- Hardware Hacking with Hardsploit & Drones by Julien Moinard
- Making & Breaking Machine Learning Systems by Clarence Chio and Anto Joseph
- Practical Car Hacking by Robert Leale and KC Johnson
ESORICS Oslo
- Dates:
- Conference: 11 – 13 September 2017
- Training: 14 – 15 September 2017
- Place: Gamle Museet / The Old Museum, Oslo Norway
- Link to official conference website: https://www.ntnu.edu/web/esorics2017/european-symposium-on-research-in-computer-security
- Ticket price: 550 USD
- Lectures: unpublished
- Workshops:
- 1st European Workshop on Security and Privacy in Fog and Edge Computing (SPIFEC)
- 3rd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS)
- ESORICS Doctoral Consortium – COINS Nordic PhD Workshop
- 1st International Workshop on Security and Privacy Requirements Engineering (SECPRE 2017)
- International Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE)
- 6th International Workshop on Quantitative Aspects of Security Assurance (QASA 2017)
- International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2017)
- 12th International Workshop on Data Privacy Management (DPM 2017)
- 13th International Workshop on Security and Trust Management (STM 2017)
- The International Workshop on Secure Internet of Things
44CON
- Dates:
- Conference: 14 – 15 September 2017
- Training: 11 – 13 September 2017
- Place: ILEC Conference Centre, London UK
- Link to official conference website: https://44con.com/
- Ticket price: 500 USD
- Lectures: unpublished
- Workshops:
- Windows Kernel Exploitation by Ashfaq Ansari
- Mobile Application Hacker’s Handbook: Live Edition by Dominic Chell
- Social Engineering Training by Dominique C. Brack
- Network Forensics Training by Erik Hjelmvik
- Applied Physical Attacks on Embedded Systems by Joe FitzPatrick
- Developing Burp Suite Extensions by Developing Burp Suite Extensions
- Web Application Hacker’s Handbook by Marcus Pinto
- Offensive PowerShell for Red and Blue Teams by Nikhil Mittal
- The ARM IoT Exploit Laboratory by Saumil Shah
DragonJAR
- Dates: 16 – 17 September 2017
- Place: Hotel NH Royal Metrotel, Bogotá Colombia
- Link to official conference website: https://www.dragonjarcon.org/
- Ticket price: 500 USD
- Lectures: unpublished
- Workshops: unpublished
- Dates: 21 – 22 September 2017
- Place: Taal Vista Hote Tagaytay, Philippines
- Link to official conference website: https://www.rootcon.org/xml/rc11
- Ticket price: unpublished
- Lectures:
- 7 sins of ATM protection against logical attacks by Timur Yunusov
- Breaking into the iCloud Keychain by Vladimir Katalov
- Demystifying The Ransomware and IoT Threat by Christopher Elisan
- Dissecting Exploit Kits by Daniel Frank
- Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov
- Finding Your Way to Domain Admin Access and Even So, the Game Isn’t Over Yet. by Keith Lee
- Hunting Hunters with OSint by Michael Rebultan
- The future of ApplePwn. How to save your money. by Timur Yunusov
- The rise of security assistants over security audit services. by Yury Chemerkin
- Workshops: unpublished
Ekoparty
- Dates: 25 – 29 September 2017
- Place: Buenos Aires Argentina
- Link to official conference website: https://www.ekoparty.org/
- Ticket price: unpublished
- Lectures: unpublished
- Workshops: unpublished
That’s it guys – and “May the odds be ever in your favor”!
If you know any other security conferences – contact us via ssd[]beyondsecurity.com and we will update the list.