Computer security conference

Last updated
Audience at the keynote of Glenn Greenwald at the 30th Chaos Communication Congress, 30C3 2013-12-30 30C3 2821.JPG
Audience at the keynote of Glenn Greenwald at the 30th Chaos Communication Congress, 30C3

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts. Common activities at hacker conventions may include:

Contents

List of general computer security conferences

General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

Haroon Meer, a keynote speaker at Nullcon 2018 Haroon meer keynote speaker at nullcon 2018.jpg
Haroon Meer, a keynote speaker at Nullcon 2018

Hacker conferences

A team competing in the CTF competition at DEF CON 17 DEF CON 17 CTF competition.jpg
A team competing in the CTF competition at DEF CON 17

A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security professionals.

The actual events, time-spans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

A variety of electronic and non-electronic hacker conference badges HackerCon Badges.jpg
A variety of electronic and non-electronic hacker conference badges

One facet of Hacker conferences that tends to differentiate many "HackerCons" from general computer security conferences, is the evolution of the conference badge. While many conferences use a fairly standard paper/plastic badge to identify attendees by name, many hacker con's have evolved to use more non-traditional badges, such as electronic PCB's with LED's, LCD screens, and can include wifi and advanced, often hidden functionality, to include games, that do not identify the individual, sometimes promoting a group identity or regional/local group affiliation. This has spurred the creation of so-called "badgelife" where different individuals and organizations (such as local hacker groups) may design, create, and sell or otherwise distribute a separate badge attendees wear in addition to their conference badge. These badges may be purchased, but some may have to be earned by completing a challenge at the conference. One of the rarest and most desirable badges is the DefCon Black Badge. [62] While the use of the badges are traditionally associated with DefCon, their use has spread to other conferences.

Pixelflut is a common activity at hacker events. It is a protocol for software to draw a canvas. Usually this is done in a client-server architecture with multiple clients who send individual pixels and the server displays. The clients then overwrite each others images on the same server. [63] [64] There are various variants of the protocol and different implementations for both the server and the client.

List of hacker conferences

Non-annual hacker conventions

Related Research Articles

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">L0pht</span> American hacker collective

L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. The group famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’.

DEF CON is a hacker convention held annually in at least Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.

<span class="mw-page-title-main">Jeff Moss (hacker)</span> American computer security expert (born 1975)

Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

EC-Council is a cybersecurity certification, education, training, and services company based in Albuquerque, New Mexico.

Jeffrey Carr is a cybersecurity author, researcher, entrepreneur and consultant, who focuses on cyber warfare.

There is no commonly agreed single definition of “cybercrime”. It refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "international" or "transnational" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law, and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced.

<span class="mw-page-title-main">Access Now</span> Non-profit organization

Access Now is a non-profit organization headquartered in Brooklyn, New York City, in the United States. It was founded in California in July 2009 and focuses on digital civil rights. The organization issues reports on global Internet censorship, and hosts the annual RightsCon human rights conference. It is a registered 501(c)(3) nonprofit organization. Its headquarters moved to New York at the beginning of 2022.

ISC2 Non-profit IT cybersecurity organization

The International Information System Security Certification Consortium, or ISC2, is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization". The most widely known certification offered by ISC2 is the Certified Information Systems Security Professional (CISSP) certification.

<span class="mw-page-title-main">Wargame (hacking)</span> Cyber-security challenge and mind sport in hacking

In hacking, a wargame is a cyber-security challenge and mind sport in which the competitors must exploit or defend a vulnerability in a system or application, and/or gain or prevent access to a computer system.

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.

<span class="mw-page-title-main">Matt Suiche</span> French computer scientist (born 1988)

Matthieu Suiche, also known as Matt and under the username msuiche, is a French hacker and entrepreneur. He is widely known as the founder of MoonSols and co-founder of CloudVolumes, which was acquired by VMWare in 2014. In March 2014, Suiche was highlighted as one of the 100 key French developers in a report for French minister Fleur Pellerin.

<span class="mw-page-title-main">Iftach Ian Amit</span> Israeli Hacker

Iftach Ian Amit is an Israeli Hacker/computer security researcher and practitioner. He is one of the co-founders of the Tel Aviv DEF CON Group DC9723, the Penetration Testing Execution Standard, and presented at hacker conventions such as DEF CON, Black Hat, BlueHat, RSA Conference. He has been named SC Magazine's top experts and featured at Narratively's cover piece on Attack of the Superhackers and is frequently quoted and interviewed

Security BSides is a series of loosely affiliated information security conferences. It was co-founded by Mike Dahn, Jack Daniel, and Chris Nickerson in 2009. Due to an overwhelming number of presentation submissions to Black Hat USA in 2009, the rejected presentations were presented to a smaller group of individuals. The event was named after the "B-side" of a vinyl record.

Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.

<span class="mw-page-title-main">Rob Joyce</span> American cybersecurity official

Robert E. Joyce is an American cybersecurity official who served as special assistant to the President and Cybersecurity Coordinator on the U.S. National Security Council. He also began serving as White House Homeland Security Adviser to President Donald Trump on an acting basis after the resignation of Tom Bossert from April 10, 2018, to May 31, 2018. He completed his detail to the White House in May 2018 and returned to the National Security Agency, where he served as the Senior Advisor to the Director NSA for Cyber Security Strategy, until July 2019 when he went to London and served in the US Embassy as the NSA's senior cryptologic representative to the UK. Joyce previously performed as acting Deputy Homeland Security Advisor since October 13, 2017. On January 15, 2021, the NSA announced that Joyce would replace Anne Neuberger as its Director of Cybersecurity.

<span class="mw-page-title-main">Ang Cui</span> American computer scientist

Ang Cui is an American cybersecurity researcher and entrepreneur. He is the founder and CEO of Red Balloon Security in New York City, a cybersecurity firm that develops new technologies to defend embedded systems against exploitation.

<span class="mw-page-title-main">Chris Kubecka</span> American computer programmer and computer security researcher

Chris Kubecka is an American computer security researcher and cyberwarfare specialist. In 2012, Kubecka was responsible for getting the Saudi Aramco network running again after it was hit by one of the world's most devastating Shamoon cyberattacks. Kubecka also helped halt a second wave of July 2009 cyberattacks against South Korea. Kubecka has worked for the US Air Force as a Loadmaster, the United States Space Command and is now CEO of HypaSec, a security firm she founded in 2015. She lives and works in the Netherlands.

<span class="mw-page-title-main">Capture the flag (cybersecurity)</span> Computer security exercise

Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called "flags", which are secretly hidden in purposefully-vulnerable programs or websites. They can be used for both competitive or educational purposes. In two main variations of CTFs, participants either steal flags from other participants or from organizers. A mixed competition combines these two styles. Competitions can include hiding flags in hardware devices, they can be both online or in-person, and can be advanced or entry-level. The game is inspired by the traditional outdoor sport of the same name. CTFs are used as a tool for developing and refining cybersecurity skills, making them popular in both professional and academic settings.

Marc Rogers is a British information security expert and ethical hacker. He received media attention for uncovering vulnerabilities in modern technologies such as Google Glass and Tesla’s Model S. He was also involved in the protection of medical facilities against hackers seeking to exploit health organizations during the COVID-19 pandemic.

References

  1. "Latest Hacking Tools". Darknet. 28 May 2023.
  2. "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05.
  3. "Boot Camps". Skillsoft. Retrieved 2021-01-29.
  4. "Haroon Meer". Archived from the original on 2018-07-04. Retrieved 2018-07-04.
  5. "International Security Conference". E7H1C5. 2016-09-03. Retrieved 2013-04-05.
  6. "44Con Website". 44Con. Retrieved 2019-01-14.
  7. "Acm Ccs". Sigsac.org. 2012-01-23. Retrieved 2013-04-05.
  8. "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05.
  9. "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05.
  10. "Annual Symposium on Information Assurance (ASIA)". Albany.edu. Retrieved 2013-04-05.
  11. "NYS Division of Homeland Security & Emergency Services - OCS". Cscic.state.ny.us. 2013-02-21. Archived from the original on 2011-02-21. Retrieved 2013-04-05.
  12. "Black Hat". Black Hat. Retrieved 2013-04-05.
  13. "Bluehat Security Briefings". Microsoft.com. Retrieved 2013-04-05.
  14. "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05.
  15. "Bluehat Security Briefings". Technet.microsoft.com. Retrieved 2013-04-05.
  16. "BruconTraining" . Retrieved 27 April 2015.
  17. "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Cansecwest.com. Retrieved 2013-04-05.
  18. Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Archived from the original on January 29, 2012. Retrieved 2013-04-05.
  19. Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05.
  20. "css.umcs.lublin.pl". css.umcs.lublin.pl. Retrieved 2014-07-17.
  21. 1 2 "Asia's Most Popular Cybersecurity & Hacking Events". Outlook. Retrieved 2021-06-25.
  22. 1 2 "CIA Conference". ciaconference.com. Retrieved 2020-11-17.
  23. "DeepSec 2012". The Ethical Hacker Network. Archived from the original on 2012-10-30. Retrieved 2013-04-05.
  24. "DEFCON about".
  25. "FSec". FSec. Retrieved 2013-04-05.
  26. "grehack.fr". grehack.fr. 2013-11-15. Retrieved 2014-07-17.
  27. "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble". GreHack. Retrieved 2013-04-05.
  28. "Hacker Halted 2012". Hackerhalted.com. 2012-09-21. Retrieved 2013-04-05.
  29. "Hack in Paris 2019". hackinparis.com. 2019-01-10. Retrieved 2019-01-15.
  30. "HACK-IT-N 2021". hack-it-n.com. Retrieved November 9, 2021.
  31. "TEHTRIS - Automatic Remediation of Cyberattacks". tehtris.com/. Retrieved November 9, 2021.
  32. "Bienvenue à l'ENSEIRB-MATMECA | ENSEIRB-MATMECA". enseirb-matmeca.bordeaux-inp.fr. Retrieved November 9, 2021.
  33. "HACK-IT-N 2021". www.hack-it-n.com/. Retrieved November 9, 2021.
  34. "Hackito Ergo Sum 2013". Hackitoergosum.org. Retrieved 2013-04-05.
  35. conference.hitb.org Archived 2014-06-25 at the Wayback Machine
  36. "HOU.SEC.CON".
  37. "ICISSP 2022 - Conference" . Retrieved November 9, 2021.
  38. "IEEE Symposium on Security and Privacy". Ieee-security.org. Retrieved 2013-04-05.
  39. "Signal Processing Society Conferences & Workshops". IEEE Signal Processing Society. 17 April 2016. Retrieved 31 July 2018.
  40. "6th Annual IIA/ISACA Chicago IT Hacking and Cybersecurity Conference". 2019.
  41. "infowarcon.com". infowarcon.com. Retrieved 2014-07-17.
  42. "ARES Conference » Vienna, Austria" . Retrieved November 9, 2021.
  43. "Middle TN Cyber Conference" . Retrieved 2022-04-01.
  44. "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05.
  45. "Introduction | New Security Paradigms Workshop". Nspw.org. Retrieved 2013-04-05.
  46. "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05.
  47. "Cyber experts show vulnerability of GSM networks". Zeenews.india.com. 2012-02-19. Retrieved 2013-04-05.
  48. "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05.
  49. "PHDays *". PHDays.com. Retrieved 2018-01-15.
  50. "RuhrSec Conference". Hackmanit. 2017. Retrieved 2017-01-05.
  51. "ICS Security Event Calendar". Digitalbond.com. Archived from the original on 2010-12-28. Retrieved 2013-04-05.
  52. "SecurIT 2012 - Cyber Security conference on IoT". Securit.ws. Retrieved 2013-04-05.
  53. "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013-04-05.
  54. "SINCONF 2021". www.sinconf.org. Retrieved November 9, 2021.
  55. "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05.
  56. "sstic.org". sstic.org. Retrieved 2014-07-17.
  57. "SSTIC2013". Sstic.org. Retrieved 2013-04-05.
  58. "Swiss Cyber Storm". SCS. Retrieved 2014-04-14.
  59. "The IT-Security Conference". Troopers.de. Retrieved 2013-04-05.
  60. "Events by Name: USENIX Security Symposium". USENIX. n.d. Retrieved 1 November 2015.
  61. "Virus Bulletin conference". Virus Bulletin. Retrieved 2013-08-29.
  62. "A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards". motherboard.vice.com. 18 September 2018. Retrieved 2019-01-14.
  63. By (2024-08-30). "Online Game Becomes Unexpected PixelFlut". Hackaday. Retrieved 2024-11-22.
  64. By (2020-08-01). "Playing The Pixelflut". Hackaday . Retrieved 2024-11-22.
  65. "Internet Archive waybackmachine". Archived from the original on April 3, 2010. Retrieved May 3, 2010.
  66. "Security B-Sides". Securitybsides.com. Retrieved 2013-04-05.
  67. "What We Do". CactusCon. Retrieved 2021-11-08.
  68. "CircleCityCon – The Game of Pwns". circlecitycon.com. Archived from the original on 2019-01-21. Retrieved 2016-03-24.
  69. "About us – An Introduction, Indian Cyber Army [ICA], Securing Digital India". Archived from the original on 2016-06-18. Retrieved 2016-04-27.
  70. "Milwaukee's Hacking Conference". CypherCon. Retrieved 2015-09-09.
  71. "Wow! So That Was DerbyCon". Infosecisland.com. 2011-10-03. Archived from the original on 2019-07-03. Retrieved 2013-04-05.
  72. "دِوسِکـ | DEVSEC - دوشنبه ۲۳ خرداد ۰۱". ایوند. Retrieved 2023-04-13.
  73. "The Diana Initiative : Hacker Family, Our diversity Unifies Us". dianainitiative.org. 2018-02-09. Retrieved 2018-02-09.
  74. "Digital Overdose Con: For Rookies @Digital Overdose". digitaloverdose.tech. Retrieved November 9, 2021.
  75. "ekoparty Security Conference". Ekoparty.com.ar. Archived from the original on 2012-03-25. Retrieved 2013-04-05.
  76. "Infosec Island". Infosec Island. Archived from the original on 2016-10-05. Retrieved 2013-04-05.
  77. "Ground Zero Summit". Indian InfoSec Consortium. Archived from the original on 2019-05-31. Retrieved 2019-11-14.
  78. "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05.
  79. Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". The Guardian. Retrieved 2013-04-05.
  80. "Hackers Day International Information Security Conference". hackersday.org. Retrieved 2015-04-08.
  81. "Hackers Day" . Retrieved 2020-06-16 via Facebook.
  82. "H2HC 10th Edition". H2hc.org.br. Retrieved 2021-02-11.
  83. "Academy". Archived from the original on April 11, 2014. Retrieved December 30, 2013.
  84. "Hackers Next Door". Tech Learning Collective . Retrieved 2019-11-03.
  85. "hackfest.ca". hackfest.ca. Retrieved 2014-07-17.
  86. "Hackers Teaching Hackers". Hackers Teaching Hackers. Retrieved January 19, 2022.
  87. "Hackmiami". Hackmiami. Retrieved 2013-04-05.
  88. "hardwear.io | Hardware Security Conference & Training | Netherlands, Germany & USA". hardwear.io. Retrieved November 9, 2021.
  89. "IDSECCONF 2022". IDSECCONF 2022. Retrieved 2023-01-29.
  90. "Infiltrate - Security Conference". Infiltratecon.com. Retrieved 2013-04-05.
  91. "LayerOne 2013 | Los Angeles' premiere security conference". Layerone.org. Retrieved 2013-04-05.
  92. "Call for papers". lehack.org. Retrieved 2019-04-05.
  93. "MalCon Malware Conference". MalCon. 2012-11-24. Archived from the original on 2013-05-26. Retrieved 2013-04-05.
  94. "No Hat Computer Security Conference" . Retrieved 2021-12-13.
  95. "NorthSec". NorthSec. Retrieved 2014-11-21.
  96. "Call for papers". nuitduhack.com. Retrieved 2013-04-05.
  97. "Phreaknic 12 - October 24th - 25th, 2008". Phreaknic.info. Archived from the original on 2013-02-21. Retrieved 2013-04-05.
  98. "PumpCon". PumpConCon. Archived from the original on 2018-10-26. Retrieved 2019-01-14.
  99. "QuahogCon". QuahogCon. Retrieved 2013-04-05.
  100. "roadsec.com.br". roadsec.com.br. Retrieved 2017-12-14.
  101. "RootCon.org". RootCon.org. Retrieved 2012-02-29.
  102. "ShellCon". shellcon.io. Retrieved 2020-02-29.
  103. "ShmooCon". shmoocon.org. Retrieved 2021-12-29.
  104. "SkyDogCon". SkyDogCon. Archived from the original on 2016-09-03. Retrieved 2013-04-05.
  105. "The Hackers Conference 2013 - International IT Security Conference". Thehackersconference.com. Retrieved 2013-04-05.
  106. "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05.
  107. "Information Security Conference". ToorCon. Retrieved 2013-04-05.
  108. "Wild West Hackin Fest". Wild West Hackin' Fest. Retrieved 2017-10-27.
  109. "www.icalab.com/zeroaccess" . Retrieved May 12, 2014.[ dead link ]
  110. "stichtinghxx.nl". stichtinghxx.nl. Archived from the original on 2010-01-12. Retrieved 2014-07-17.
  111. "Hacking at Random". HAR2009. Retrieved 2013-04-05.
  112. "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Ohm2013.org. Retrieved 2013-04-05.