Some of the choice cuts from the security conference circuit. Add your picks in the comments.
March: Focusing on applied digital security, CanSecWest is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and features a single track of thought provoking presentations, each prepared by an experienced professional and talented educator who is at the cutting edge of his or her field.
June: Summercon is one of the oldest hacker conventions, and the longest running such conference in America. It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON, although it has remained smaller and more personal.
The Symposium on Security for Asia Network (SyScan) is not a product or vendor conference that is sales and marketing oriented. SyScan is a deep knowledge technical security conference. It is the aspiration of SyScan to congregate in Asia the best security April experts in their various fields, to share their research, discovery and experience with all security enthusiasts in Asia.
May: WAHCKon (pronounced "whack on") is a brand new hacker conference based in Perth. The event will be comprised of presentations on topics spanning the many fields that comprise hackerdom. Topics could span from network attacks all the way through to genetics and guerilla knitting.
HOPE (abbreviation of Hackers on Planet Earth) conference series is sponsored by the hacker magazine 2600: The Hacker Quarterly and typically held at "Hotel Pennsylvania", in Manhattan, New York City.
May: Since 2010, the goal of Hackito Ergo Sum has been to promote security research, broaden public awareness, and create an open forum so that communication between researchers, the security industry, experts, and the public can happen. Like every year, we offer the possibility to hackers, security researchers, students, and academics to present their projects and research. During the three days of HES, research conferences, solutions presentations, panels, debates, and parties will aim to share, mix, and determine the future of IT security & hacking
MAY: INFILTRATE is a deep technical conference that focuses entirely on offensive security issues. INFILTRATE eschews policy and high-level presentations in favor of just hard-core thought-provoking technical meat.
May: you Sh0t the Sheriff is a very unique, one-day, event bringing attendees to the most up-to-date state of the information security world by mixing professionals and topics from different Infosec segments of the market. yStS is mostly invite-only.
October: The Australian Information Security Association (AISA) is an Australian representative industry body for the information security profession.
Formed in 1999, AISA is focussed on individual membership. AISA aims to foster and promote the development of the information security industry and encourage the professional development of our members.
We have continued to grow our membership base in excess of 1500 members and extend our geographical reach across Australia. AISA caters to all domains within the information security field with focus groups, presentations at meetings and networking opportunities.
May: AusCERT Conference attendees hear from a wealth of local and international speakers, learn new skills, network with industry peers, browse an extensive tradeshow of the latest information security products, create new opportunities for business, and experience great entertainment, good company, food and drink. These are just a few of the fantastic opportunities during the week's packed program.
The Black Hat Briefings are a series of technical information security conferences that bring together thought leaders from all facets of the infosec world - from the corporate and government sectors to academic and even underground researchers. The environment is vendor-neutral and focused on the sharing of practical insights and timely, actionable knowledge.
October: Over two days, 14 world-renowned speakers front Breakpoint to share their knowledge on a full range of security issues, from unpublished research to the latest trends in information security.
The conference is hosted at the Intercontinental Rialto Hotel located in the heart of Melbourne city. Breakpoint will bring together like-minded industry professionals to promote networking and collaboration. The event provides delegates with a unique opportunity for exposure to an interested, relevant, and influential audience within the Australian security industry.
September: BruCON is an annual security and hacker conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Brussels, BruCON offers a high quality line up of speakers, security challenges and interesting workshops.
Each BSides event around the world is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants.
December: The Chaos Communication Congress the annual four-day conference organized by the Chaos Computer Club (CCC) in Berlin, Germany. First held in 1984, it has since established itself as “The European Hacker Conference” attracting a diverse audience of thousands of hackers, scientists, artists, and utopists from all around the world.
November: Now in its 10th year, CSAW has grown to include a research conference, talks by industry experts, and a career fair featuring an impressive list of corporate partners.
Hosted by NYU-Poly’s Information Systems and Security Laboratory (ISIS Lab), the competition’s hands-on challenges are created and managed by NYU-Poly graduate and undergraduate students in consultation with NYU-Poly faculty and industry leaders. CSAW attracts the best and brightest high school, undergraduate and graduate students from around the globe, making it an event for students, by students, fostered by experts.
DEF CON is one of the oldest continuous running hacker conventions around, and also one of the largest.
September: DerbyCon is the place where security professionals from all over the world come to hang out. DerbyCon pulls in over 1000 people with a good speaker lineup and a family-like feel. https://www.derbycon.com/
September: The essence of ekoparty is simple and at the same time comprehensive. An international conference with speakers from Latin America and the world. With excellence in the choice of topics, discussions and direct participation of the public, ekoparty is a demonstration of cutting edge research and development in Information Security. Post-Conference activities give an added value to this event, inviting all to interact on a personal level in lockpicking challenges or to tour the city, wardriving by private transportation .
The Gartner Security & Risk Management Summit is a meeting place for IT and business executives responsible for creating, implementing and managing a proactive and comprehensive strategy for information security, risk management, governance, business continuity management and business resiliency. This event has been crafted specifically to meet the needs of security professionals, reflecting the topics and issues that are challenging enterprises.
The main aim of our conferences has always been to enable the dissemination, discussion and sharing of deep knowledge network security information. Our main focus is on new and groundbreaking attack and defense methods that have not been seen or discussed in public before. HITBSecConf events bring together a unique mix of security professionals, researchers, law enforcement and members of the hacker underground under one roof and our flagship event in Malaysia sees over 1000 attendees.
November: Kiwicon is New Zealand's best (only) hacker conference. Organised by a masochistic cabal of the security community, Kiwicon attempts to bring together the commercial infosec industry, academics, students, and hobbyist hackers to discover the new, the interesting, and technologically crackin'. First run in 2007, by now Kiwicon has gained reputation, size, and an extra cleaning run for the men's toilets. Attendance in 2011 was around 600 people (although we do not claim all of them are paying attention) plus 30 or so speakers, staff and crue.
May: NoSuchCon is a place for both well-known, top-guns of the cybercommunity, as well as young researchers at the dawn of their career or others presenting their results anonymously. NoSuchCon has multiple goals but it more importantly wants to foster exchange, federating different communities: students, key actors of the industry, private and public sectors. It wants to make room for practical demonstrations as well as innovative theoretical findings.
August: The Nordic Security Conference (NSC) is the most technically-focused computer security conference in Scandinavia. The purpose of NSC is to foster a sense of community in and enhance the knowledge of the computer security communities in Scandinavian countries by hosting the best ideas and training from around the world.
Feb: The nullcon conference is a unique platform for security companies/evangelists to showcase their research and technology. It is an integrated and structured platform which caters to the needs of IT Security industry at large in a comprehensive way.
November: To address the increasing importance of information security in Japan, the best known figures in the international security industry will get together with leading Japanese researchers to share best practices and technology. The most significant new discoveries about computer network hack attacks will be presented for discussion at the 11th annual PacSec conference.
The PacSec meeting provides an opportunity for foreign specialists to be exposed to Japanese innovation and markets and collaborate on practical solutions to computer security issues. In a relaxed setting with a mixture of material bilingually translated in both English and Japanese, the eminent technologists can socialize and attend training sessions.
November: Power of Community started in 2006 and has been organized by Korean hackers & security experts. It is an international security & hacking conference in Korea. POC doesn't pursue money. POC concentrates on technical and creative discussion and shows real hacking and security. POC wears both black hat and white hat. POC will share knowledge for the sake of the power of community. POC believes that the power of community will make the world safer.
June:REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada.
The conference offers a single track of presentations over the span of three days along with technical training sessions held before the presentation dates. Technical training varies in length between two and four days.
RSA Conferences are where practitioners connect to protect. Here you’ll meet with top industry leaders and fellow security specialists to explore the most important security challenges facing your organization; discover how the latest advances in technology can help you meet those challenges, and Build meaningful professional relationships that keep you at the top of your profession.
October: Ruxcon is a computer security conference that aims to bring together the best and the brightest security talent within the Aus-Pacific region. The conference is a mixture of live presentations, activities and demonstrations presented by security experts from the Aus-Pacific region and invited guests from around the world. Ruxcon is widely regarded as a leading computer security conference within Australia attracting all facets of the security landscape from industry, academics, to enthusiasts.
October: Illuminating the Black Art of Security. Now entering its 7th year, SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques. The primary goal of the SecTor team is to ensure the highest possible value to the security community. The conference provides an unmatched opportunity for IT Professionals and Managers to connect with their peers and learn from their mentors.
June: Shakacon is Hawaii’s only Call for Paper based IT security conference. Shakacon is a unique and intimate security conference where industry, government, academia, and independent experts gather together to share knowledge and experiences in one of the most beautiful places on Earth. http://www.shakacon.org/
The purpose of SOURCE Conference is to bridge the gap between technical excellence and business acumen within the security industry. SOURCE fosters a community of learning where business and security professionals come together to gain knowledge and skills, network with peers, and advance their careers and professional development. SOURCE enables individuals, teams, and organizations to leverage information to improve decision-making, optimize performance, and achieve business objectives.
October: The conference focuses on newly emerging information security research with a balance of topics on auditing and pen-testing, and security and defensive strategies. In general, presentations will address different aspects of information security—all presentations will include demos and be technically oriented and practical. The presenters are not only experienced security professionals at the vanguard of leading information security technology, but also experienced instructors who have prepared tutorials intended to help you stay abreast of the latest developments in this rapidly moving technological field. The best and the brightest have been assembled and they have arranged unique and original material to help you maintain technological leadership. All presentations and official communications will be in English to allow our non-Finnish speaking presenters and attendees to participate without any language restrictions.
August: The Hackers Conference is an unique event, where the best of minds in the hacking world, leaders in the information security industry and the cyber community along with policymakers and government representatives on cyber security meet face-to -face to join their efforts to co-operate in addressing the most topical issues of the Internet Security space.
ToorCon was created as a small get together for ToorCon staff, supporters and past speakers to meet up and have fun. ToorCon in San Diego has always been open to the general public is extremely affordable and does not have a cap on attendance.
October: Since the inaugural VB conference in 1991 the event has become a major highlight of the anti-malware calendar, with many of its regular attendees citing it as the anti-malware event of the year. Its objectives are to present factual information, demonstrate defensive procedures and discuss future developments and countermeasures, while providing an opportunity for experts in the anti-threat arena to share their research interests, discuss methods and technologies and set new standards.
November: ZeroNights is an international conference dedicated to the technical side of information security. The mission of the conference is to disseminate information about new attack methods, threats and defense tools. Another purpose is to create a communication venue for skilled professionals in the field of information security.
September: ROOTCON is the premiere hacker conference and infosec gathering in the Philippines. It aims to share best practices and technologies through talks by qualified speakers and demos of exciting stuff (hacks, tools, tips, etc). Learn about solutions, products, techniques and critical tips to build and enhance your security practices & policies from awesome speakers and action-packed activities.
December: Botconf covers the functioning of botnets and of methods used to distribute malware related to botnets; The functioning of malware and command & control mechanisms related to botnets; The understanding of the organisation of groups involved in the development or the management of botnets; Methods to monitor localize and identify botnets and distribution of malware related to botnets; Methods to detect mitigate and disrupt botnet activities inside ISP networks or organisations’ networks, Technical legal and other methods used to mitigate investigate dismantle or disrupt botnets
Some of the choice cuts from the security conference circuit. Add your picks in the comments.