EH-Net Global Calendar of Events
Set Your Calendar for Career Advancement
A calendar of industry events is a natural item for a publisher to include as an additional value for their readers. Here at The Ethical Hacker Network Online Magazine, we strive to be the best single source for advancing your career in the various fields of ethical hacking. In addition to book reviews, course reviews, certification information, tutorials, interviews, community forums… another vital component of your career is attending and participating in security and hacking events. Get involved!
Editor’s Note: Is your event NOT in the EH-Net Calendar? Please send in the details using the links below.
Take Cyber security training in San Diego from SANS Institute, the global leader in information security training. At SANS Security West 2015 + Emerging Trends, we offer more than 20 hands-on, immersion-style security training courses taught by real-world practitioners and interactive bonus sessions, led by a star-studded panel, on Emerging Trends in cyber security.
NEW!! $200 OFF Any 4-6 Day SANS Course!
Any Format! Use Coupon Code: SANS_EHN200
The line-up of cyber security courses, below, covers IT security, digital forensics, ethical hacking, penetration testing, software security and security courses for legal and management personnel, too. In addition to these security courses, the Emerging Trends discussions will provide the insight necessary to stay ahead of the latest cyber security threats and keep your organization secure.
Available Courses Security West 2015
THOTCON (pronounced \ˈthȯt\ and taken from THree – One – Two) is a small venue hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a very limited budget.
Once you attend a THOTCON event, you will have experienced one of the best information security conference experiences combined with a uniquely casual and social experience.
THOTCON 0x6 is the sixth incarnation of this event and will be held on Thursday and Friday May 14-15, 2015.
It will be held at a location only to be disclosed to attendees and speakers during the week before the event.
*** VENUE *****************************************************************
TOP_SECRET, but we’ll tell you this:
– It will be held in the city of Chicago.
– It will be held at a bar-like venue (drink from 8:30am to close if you please).
– It will be within walking distance from a CTA Brown Line stop.
– There will be food & drink for purchase all day.
– Purchases will be CASH ONLY, so plan ahead.
> There are plenty of ATMs in the area.
Keynotes at THOTCON 0x6
- Christopher Valasek – “The Ghost of Security Past”
- Tod Beardsley && egypt – “Wanna Cyber?”
- Jack Daniel – “InfoSec: What we know, and what we need to know.”
- Jon Callas – “Everything You Need to Know About Crypto in 50 minutes”
FULL Length Talks (50 Minute) at THOTCON 0x6
- Kevin Bong – “Building a Poor Man’s RFID Cloner”
- Matias Brutti – “Cartero – Another Social Engineering Framework”
- Nick Espinoza – “Week to Weak: Weaponization of Vulnerabilities”
- FuzzyNop – “Pwning People Personally”
- Rob Havelt – “The Bad, The Worse, and The Ugly – No Hope for POS Security”
- Ryan Linn – “Vomiting Shells: Tracking the Splatter Patterns”
- Brandon Myers && Jonathan Claudius – “Trojaned Gems – You can’t tell you’re using one!”
- Steve “nosteve” Ocepek – “Synspotting for Teenagers and Real Swinging Adults”
- Jeremy Richards – “Firmware Vulnerability Analysis”
- Jayson E. Street – “BREAKING in BAD! (I’m the one who doesn’t knock)”
TURBO Talks (25 Minute) will also be given at THOTCON 0x6. See their site for a full list. Be sure to also check out the contests and party details.
Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.
Who is Speaking at BSides Chicago 2015?
You. Your Friends. Your Coworkers. And that random guy who no one remembers his name but remembers he can code like a machine. CFP will open soon.
It’s no exaggeration to say that CEIC (Computer and Enterprise Investigations Conference) is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for practical skills development. From sessions on acquiring evidence from mobile devices to international e-discovery to cyber security intelligence, there’s simply no other training or seminar series available that packs so much relevant and practical information from so many expert speakers into a four-day period.
Cybercrime Expert Brian Krebs to Deliver Keynote at Guidance Software’s CEIC 2015
It’s a cybersecurity conference where incident responders and information security specialists meet up with their fellow experts from around the world to network and learn the very latest security tactics.
It’s a legal technology conference where inside counsel and litigation support staff learn how to collaborate with information security professionals prior to litigation.
It’s a digital forensics conference where everyone from beginning forensic investigators to the best of the best learn different and better methods that take their professional capabilities to a whole new level.
CEIC is the only digital investigations conference offering training sessions for Spanish speakers, by Spanish speakers, centered around concerns voiced by Spanish speakers.
Who Should Attend CEIC 2015:
App Central World at CEIC 2015
No CEIC experience is complete until you check out EnCase App Central World. Staffed by Guidance Software experts as well as community experts who develop the apps that are available online, EnCase App Central World is the place for getting a good look at the latest products, apps, EnScripts, and templates that improve your investigative workflow so you can close more cases faster.
Stop by EnCase App Central World at CEIC to:
- Learn about the diverse ecosystem of dozens of products that either extend, integrate, or work seamlessly with EnCase, such as Internet Evidence Finder (IEF), a Volatility Reporting Plug-in, and useful extensions such as a VSS Examiner
- Connect with EnCase App Central developers to connect and share tips and techniques
- Meet Guidance Software experts and others from your favorite technology providers and the forensic community for invaluable face-to-face Q&A
- Talk with EnCase Technology Partners as they showcase their solutions.
Training at CEIC 2015
The EnCE and EnCEP exam will be offered on Monday, May 18 through Wednesday, May 20 from 8am – 3pm each day. An application is required to take the exam, but you are not required to register for a specific exam time. Once your application is accepted, you will receive testing instructions and login information.
Every organization needs skilled people who know how to find vulnerabilities, understand risk, and help prioritize resources based on mitigating potential real-world attacks. That’s what SANS Pen Test Austin is all about! If you like to break things, put them back together, find out how they work, and mimic the actions of real-world bad guys, all the while providing real business value to your organization, then this event is exactly what you need.
NEW!! $200 OFF Any 4-6 Day SANS Training Course! Any Format!
Use Coupon Code: SANS_EHN200
Every security professional needs to understand how to get the most out of penetration tests and vulnerability assessments. The SANS Pen Test Austin 2015 event is a focused on helping you build world-class security assessment and penetration testing skills to do just that. This event is an IDEAL way to take your penetration testing and vulnerability assessment skills to an entirely new level. We’re bringing our most popular pen test courses, instructors, and bonus sessions together in one place to offer one of SANS most comprehensive Pen Test training experiences ever.
At the SANS Pen Test Austin 2015 event you will not only learn vital and in-demand skills and abilities, but also network with like-minded security professionals that also see the benefit in taking their Pen Test artistry to the next level.
What’s special about SANS Pen Test Austin 2015?
- SANS Top Courses focused on Pen Testing: Learn hands-on skills that you can directly apply the day you get back to your job.
- NetWars, NetWars, NetWars: Enjoy three exciting nights of NetWars challenges, where you can have some fun while building serious infosec skills.
- Coin-a-palooza: Earn up to four additional SANS pen test challenge coins (each with an integrated cipher challenge) based on your performance in SANS NetWars!
- CyberCity Missions: Work through an evening of cyber missions that have a direct kinetic impact on the miniature CyberCity environment that SANS built with a real power grid, water reservoir, military base, and more!
Available Courses at SANS Pen Test Austin 2015
The BeNeLux chapters will host the OWASP AppSec Europe Research 2015 global conference in Amsterdam, The Netherlands from May 19-22. Amsterdam is the capital of the Netherlands and the largest city of the country.
The AppSec Europe 2015 conference will be a premier gathering of Information Security leaders, also it is going to have a research part.
Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers will be traveling to hear the cutting-edge ideas presented by Information Security’s top talent. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 400-500 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology and many other verticals.
The conference program will consist of five tracks (Developers, Ops, Hack, CISO and Research). The full conference schedule will be available mid-February, with a range of interesting and provoking keynote speakers to open and close each day of the conference presentations, but also a lot of satellite events.
Different satellite events will take place during the AppSec Europe conference.
Find the details of these events on the dedicated pages:
- Cutting-edge research presented by security professionals across Europe
- Trainings and speeches on a variety of security topics including: cloud security, mobile security, vulnerability analysis, and much more
- Premier gathering place for executives from Fortune 500 companies and technology thought leaders
- Small group sessions, workshops, and learning opportunities for developers, business owners, and security experts
- Learn and network for four days, while discovering Amsterdam!
The purpose of SOURCE Conference is to bridge the gap between technical excellence and business acumen within the security industry. SOURCE fosters a community of learning where business and security professionals come together to gain knowledge and skills, network with peers, and advance their careers and professional development. SOURCE enables individuals, teams, and organizations to leverage information to improve decision-making, optimize performance, and achieve business objectives.
In our vision, we see SOURCE as a leader in the security industry where attendees, speakers, and sponsors identify solutions for the toughest and most important problems:
- An environment that fosters professional growth and development.
- Top technical and business experts from around the world coming together to share technologies, research, and security practices.
- A security community that is rewarding and enjoyable to participate in.
At a Glance
- Launched in 2008 in Boston, Massachusetts, USA.
- Averages 300-350 attendees in Boston, 100 in Seattle, and 60-80 in Barcelona.
- Focuses on bridging the gap between technological expertise and business excellence.
- Organized by many of the top minds in the security industry. Each member of our advisory board has deep roots in the security industry and a reputation for technical excellence.
- Attracts thought leaders involved in all aspects of security. Messages conveyed at SOURCE resonate deeply through the security community.
- Focuses on bridging the gap between technological expertise and business excellence.
- SOURCE Conference has served as the inspiration point for The Security Twits Twitter Group, InfoSec Mentors, and HacKid.
The 6th Annual HITB Security Conference in The Netherlands
Held once again at De Beurs van Berlage, HITB2015AMS takes place from the 26th till the 29th of May 2015 and runs alongside HITB Haxpo – our 3-day technology expo for hackers, makers, builders and breakers. The Call for Papers for the conference is now open and the first round of accepted speakers will be announced at the end of January. As always, do follow @HITBSecConf on Twitter for the latest event updates.
A deep-knowledge security event…
HITBSecConf or the Hack In The Box Security Conference is an annual must attend event in the calendars of security researchers and professionals around the world. Held annually in Kuala Lumpur, Malaysia and Amsterdam in The Netherlands, HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events routinely feature two days of trainings and a two-day multi-track conference featuring cutting-edge hardcore technical talks delivered by some of the most respected names in the computer security industry. HITBSecConf is a place where ideas are exchanged, talent discovered and genius celebrated.
Keynotes at HITBSecConf2015 Amsterdam
- Marcia Hofmann – EFF Special Counsel
- John Matherly – Founder, Shodan
- Runa A. Sandvik – Privacy and Security Researcher
Hands on Training at HITBSecConf2015 Amsterdam
- Exploitation Technique
- Hacking PDFs for Ninjas
- Application Security for Hackers & Developers
- Understanding x86-64 Assembly for Reverse Engineering & Exploits
- Windows Internals
- Android Security – Reverse Engineering & App Pentesting
- Hacking Web Applications: Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More
- Professional Pentesting IPv6 Networks
HITB Haxpo 2015 Amsterdam
Hackers // Makers // Breakers // Builders
The second Haxpo in Amsterdam
Our second edition of the Haxpo in Amsterdam will take place once again in the historic building “Beurs van Berlage” in the city centre of Amsterdam. Featuring 35+ companies in our exhibition and countless other events taking place during the 3-day Haxpo madness! Get more information about what the Haxpo is at www.haxpo.nl
St. Louis’ Hacking & Cyber Security Con
ShowMeCon. The name says it all. Known as the Show Me State, Missouri is home to St. Louis-based ethical hacking firm, Parameter Security, and security training company, Hacker University. Together, they are bringing you a one-of-a-kind event that will Show You the State of security from a unique perspective – the hacker’s viewpoint.
Pre-Con Training: June 3 – 7
Hacker Con: June 8 – 9
This highly technical forum showcases eye-opening presentations from world-renown ethical hackers and epic security ninjas which will leave you amazed and frightened at the same time. By giving you access into the mind of a hacker, you will better understand how to protect your networks and critical data. As we always say “In order to beat a hacker, you have to think like one” and “if you don’t understand the enemy, how can you protect against him?” ShowMeCon pulls back the curtain and exposes how hackers are winning the war on physical and cyber security.
Pre-Con Training at ShowMeCon 2015
ShowMeCon 2015 will be jammed with content specifically and immediately applicable to your career. For starters, the winner will get their choice of the following courses (click the course title for more info):
- CISSP (Covers updated version of the exam available on April 15)- $2400 – Certification exam not included in prize
- Hands-On Hacking $2300
- Network Defense – $1999
- Router Hacking – $1999
- Secure Coding – TBD
Whether you’re a large corporation or a small business, you should attend this mind-blowing event as you witness the cream of the crop unveil the latest attacks, techniques, tactics and practices of today’s hackers. Plus, gain insight and understanding into ways to effectively protect yourself so you can implement this information immediately when you return to your business.
Be sure to follow them @ShowMeConSTL
SC Congress Toronto is our largest show in the SC Congress portfolio. Spanning two days, our Canadian conference and expo attracts over 1,000 cybersecurity pros on average in North America and beyond.
2015 is slated to be one of our best years ever; SC Congress Toronto 2015 will be moving to more spacious accommodations in the Metro Toronto Convention Centre and boast an even more robust Exhibit Hall than any other year. Our 2014 show floor was sold out and 2015 should be no exception, featuring even more of the top names and brands in info security. Mark your calendars for June 10-11 for a not-to-be missed SC Congress Toronto.
Aside from our enhanced Exhibit Hall, SC Congress Toronto 2015 will – as always – feature our hallmark programming, delivering the latest insights on all the issues cyber security professionals need to stay ahead of their game – and the growing number of cyber threats and criminals. Our 2014 event addressed such pressing issues including PCI Revisited, The Art of Cyberwar, A Day in the Life of a CISO, Effective Methods for Engaging the Board of Directors About IT Security, 21st Century Incidence Reponse, IoT Java Exploited and the Growing Rise of Ransomware, to name just a handful of topics. Our 2015 SC Congress will pick up with all new topics and address all of the issues moving today’s – and more importantly – tomorrow’s – headlines.
CircleCityCon is a security conference held in downtown Indianapolis. Our inaugural con last year was a big success and we are only looking to grow and make it better.
CircleCityCon is about the community. Our signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Two tracks, incredible entertainment, and technical villages help round out the CircleCityCom experience. Of course, don’t forget the chance to meet and talk with your peers about all topics including security, hacking, and the latest superhero movie.
Talks at CircleCityCon 2015
Events at CircleCityCon 2015
- Lockpick Village – Information on the 2015 Lockpick Village will be announced soon. Please check back for details.
- Hardware Village – Information on the 2015 Hardware Village will be announced soon. Please check back for details.
- Ham Radio Exams – New this year to CircleCityCon, we are planning on conducting Ham radio licensing exams. More info to come, please check back for details.
- Hak4Kidz – Information on Hak4Kids will be announced soon. Please check back for details.
Training at CircleCityCon 2015
- Introduction to E-textiles
- Building an Incident Response Program
- Small and Medium Business Security: The First Steps
- Break it before you buy it – Hacking and fixing web applications
- Intro to Lock Picking
- Introduction to Threat Intelligence
- Social Engineering 101
- Introduction to CTF Challenges
Hak4Kidz is the first official youth based ethical hacking conference in Chicago that is *not* a hackathon.
Hak4Kidz is an event by ethical hackers and Information Security professionals dedicated to bring the educational and communal benefits of whitehat hacking conferences to children and young adults. We plan to accomplish this mission by putting our collective expertise and passion on display for the attendees to interact with us at their will. A combination of youth base speaking tracks complementing an open area of stations will enable the attendees to expand and enlighten their technical interests. For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential.
Activities at Hak4Kidz 2015
Additional activities for Hak4Kidz are still being finalized, so please check back regularly. In the meantime, these are the activities from last year:
Time to get your hak on with these educational activities from 2014:
- jrCTF – junior Capture The Flag contest for prizes
- Snap Circuits – Award winning engineering toy by Elenco
- Networking Playground – Hooking up network gear and securing them
- Homemade Hacks – Old tech meets new tech for alternative tech! And a programmable robot!!
- How I.T. Works – disassemble old electronics without getting “grounded”
- InfoSec Career Mentoring – hacking is fun but hacking for a living is uber fun
- Locksport – introduction to ethical lock-picking for sport only
- NEW -> Hands-on OSI Model – learn how a web page gets into your browser
With a growing international interest in security events and hacker conferences, and the increasing focus on security in the media, SteelCon offers a unique opportunity for you to get involved and develop your hacking* skills.
After last years very successful event we will be back in 2015, bigger and better. Capacity will be doubled, there will be more activities and hopefully a lot more fun.
The North’s Premier Hacker* Con!
It doesn’t matter what your background is, whether you’re a security professional or penetration tester by trade or a hobbyist who’s just picked up your first Raspberry Pi. This is a conference with something for everyone in a family friendly environment, with activities for big kids and little kids so come along and join in.
The Events Team
*hacker: n. someone with an interest in how things work, how things can be broken and how they can be fixed.
More info to come when available.
Shakacon, an Information Technology (IT) Security Conference, is back and ready to invite business executives, government and military officials, security professionals, and IT enthusiasts to participant in Hawaii’s only Call for Paper based IT security conference.
We decided it was time to bring some top notch technical talent back to one of the most remote locations on earth.
Sitting around somewhere freezing your a$$ off? Dreaming about warm days, rainbows, decadent tropical drinks sipped out of coconuts? Sure you could drop your 0day in Vegas, bring down the Internet in Germany, or satisfy your dark desires in Asia; however, wouldn’t you rather submit your research or topics to our CFP and maybe win yourself a paid trip to Hawaii?
Keynotes at Shakacon VII
- Slipping out the front door of the party: The challenges of detecting silent exits of your data -Stephen Adegbite
- Project Zero: make 0day hard -Chris Evans
Training Sessions at Shakacon VII (July 6 – 7)
- Powershell for Penetration Testers by Nikhil Mittal
- Offensive Techniques by Colin Ames, Attack Research
- Web Application Exploitation by Chris Potter, Attack Research
- Rapid Reverse Engineering by Russ Gideon, Attack Research
- Low-Power Hacking by Dr. Phil Polstra
- Windows Internals for Security Professionals by T. Roy
- Automotive Exploitation Techniques by Craig Smith
- Physical Penetration Testing by Deviant Ollam
- Diving Into Development of Microsoft Windows Kernel Exploits by Nikita Tarakanov
- Threat Modeling by Matt Jones
- Penetration Testing with the Pi by Bob Monroe
- Mobile App Hacking – Internet Banking Edition by Aditya Modha
- Hacking Web Applications – Case studies of award-winning bugs in Google, Yahoo, Mozilla and more
by Dawid Czagan
RSA Conference Asia Pacific & Japan 2015
RSA Conference Asia Pacific & Japan is the leading information security event in the region. Join us for three days of engaging sessions and intense networking. Get exposure to innovative technologies and leadership that will help secure your organization and your future.
RSA Conference Asia Pacific & Japan 2015 will take place at the Marina Bay Sands in Singapore 22 to 24 July.
Mark your calendar and register your interest today to save S$100* on your Early Bird full conference pass. Registration opens in early February!
*A discount code will be emailed to you when Early Bird Registration opens. Only one discount code can be used per registration. Discount offers cannot be combined.
About RSA Conference
RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world’s best and brightest in the field, creating opportunities for conference attendees to learn about IT security’s most important issues through first-hand interactions with peers, luminaries and emerging and established companies. As the IT security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated.
RSA developed RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of Internet security. Today, RSA Conference and related RSA Conference branded activities are still managed by RSA, with the support of the industry. RSA Conference event programming is judged and developed by information security practitioners and other related professionals.
Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six day event begins with four days of intense Trainings for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).
More specific info will be posted when available.
Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.
What We Do
The Black Hat Briefings were created more than 16 years ago to provide security professionals a place to learn the very latest in information security risks, research and trends. Each year, internationally leading security researchers take the stage to share their latest work and exploits in a friendly, vendor-neutral environment. Vulnerabilities are often exposed that impact everything from popular consumer devices to critical international infrastructure and everything in between. Black Hat seeks groundbreaking research to fill both 25 and 50-minute speaking slots for each annual show.
The Black Hat Trainings offer attendees individual technical courses on topics ranging from the latest in penetration testing to exploiting web applications and even defending and building SCADA systems. Often designed exclusively for Black Hat, these hands-on attack and defense courses are taught by industry and subject matter experts from all over the world with the goal of defining and defending tomorrow’s information security landscape.
As we’ve mentioned here on EH-Net for years, this is one of those events that you must attend at least once in your life… preferably multiple times. It is often said that DEF CON is what you make it. This is 100% accurate as there are so many talks, events, parties and people that 20 people can go to the same event and not see each other or have the same experience. For a little more on this, it might help to watch DEF CON 101 from DEF CON 17. It’s a few years old, but the concept is the same:
The DEF CON Story
Originally started in 1993, it was a meant to be a party for member of “Platinum Net”, a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I’ll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can’t remember. Why not invite everyone on #hack? Good idea!
Where did the name come from?
The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn’t want any association with a time of year. If you are a Phreak, or just use your phone a lot you’ll notes “DEF” is #3 on the phone. If you are into military lingo DEF CON is short for “Defense Condition.” Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.