EH-Net Global Calendar of Events

EH-Net Global Calendar of Events Audience IconSet Your Calendar for Career Advancement

A calendar of industry events is a natural item for a publisher to include as an additional value for their readers. Here at The Ethical Hacker Network Online Magazine, we strive to be the best single source for advancing your career in the various fields of ethical hacking. In addition to book reviews, course reviews, certification information, tutorials, interviews, community forums… another vital component of your career is attending and participating in security and hacking events. Get involved!

Stay up-to-date with all listed events by using the +Subscribe & Add to Google Buttons at the bottom. Happy Ethical Hacking!

Editor’s Note: Is your event NOT in the EH-Net Calendar? Please send in the details using the links below.

Apr
10
Fri
InfoSec Southwest 2015 @ Austin Convention Center
Apr 10 – Apr 12 all-day

InfoSec Southwest 2015 - LogoInfoSec Southwest 2015

InfoSec Southwest is an annual information security and hacking conference held in Austin, Texas, one of the most interesting and beautiful cities in the United States. By addressing a broad scope of subject-matter, InfoSec Southwest is intended to both provide a comprehensive and valuable forum to all participants as well as fill a gap for our local attendees left by the other few conferences held here in Texas which are all focused on a narrower scope of subject matter or a narrower slice of audience demographic.

InfoSec Southwest also provides a completely open lunch forum for lightning and turbo talks that is not constrained by a speaker selection process, mirroring our wildly successful local AHA! hacker meeting format. This forum is held during our long lunch breaks during both days of the conference and is open for anyone attending the conference to speak on any topic they wish in a first-come, first-speak order. As such, we invite everyone to attend and participate.

Keynote at InfoSec Southwest 2015

Richard Thieme

Too Much for Anyone to Know
(or)
How to survive during war, “cyber-mayhem,” and the game of spy versus spy.

Training at InfoSec Southwest 2015

In addition to the lecture tracks, we have specialized and in-depth training courses available before the conference proper. Classes include:

  • Art of Escape
  • Basics of Pentesting with Metasploit
  • Cloud Computing Security Knowledge – Foundation
  • Cloud Computing Security Knowledge – Foundation and Plus
  • Metasploit Mastery

Events at InfoSec Southwest 2015

In addition to the lecture tracks, we have a few other interesting things going on at InfoSec Southwest that you may enjoy:

  • Open-forum Turbo-talks at the Alamo Drafthouse Ritz
  • Project Mayhem
  • Demolition Derby Capture the Flag
  • Mini-Crack Me If You Can
  • Lockpick Village

 

Apr
11
Sat
SANS 2015 @ Walt Disney World Swan Resort
Apr 11 – Apr 18 all-day

SANS 2015 - LogoSANS 2015

Information security training in Orlando, Florida from SANS Institute, the global leader in information security training. This namesake event is SANS largest of the year with 42 Courses, 37 Instructors in 6 Disciplines and numerous other events and bonuses.

NEW!! $200 OFF Any 4-6 Day SANS High-Quality
Cyber Security Training Course! Any Format!
Use Coupon Code: SANS_EHN200

Bonus Sessions at SANS 2015

The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into four categories:

  • SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
  • Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
  • Vendor: Events hosted by external vendor exhibitors.
  • Lunch & Learn: Short presentations given during the lunch break.

Our courses are packed with the techniques and tools that you need at this point in your career. Below are the courses that will raise your level of security knowledge!

Available Courses at SANS 2015

Title Certification Instructor
NEW: SEC301: Intro to Information Security GISF Keith Palmgren
NEW: SEC511: Continuous Monitoring and Security Operations

Eric Conrad
NEW: HOSTED: Health Care Security Essentials
Greg Porter
SEC401: Security Essentials Bootcamp Style

GSEC Dr. Eric Cole
SEC440: Critical Security Controls: Planning, Implementing and Auditing
Randy Marchany
SEC501: Advanced Security Essentials – Enterprise Defender GCED Paul A. Henry
SEC503: Intrusion Detection In-Depth

GCIA Mike Poor
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling GCIH John Strand
SEC505: Securing Windows with the Critical Security Controls GCWN Jason Fossen
SEC524: Cloud Security Fundamentals
Dave Shackleford
SEC542: Web App Penetration Testing and Ethical Hacking GWAPT Seth Misenar
SEC560: Network Penetration Testing and Ethical Hacking GPEN Ed Skoudis
SEC561: Intense Hands-on Pen Testing Skill Development (with SANS NetWars)
Tim Medin
SEC566: Implementing and Auditing the Critical Security Controls – In-Depth GCCC James Tarala
SEC573: Python for Penetration Testers
Mark Baggett
SEC575: Mobile Device Security and Ethical Hacking GMOB Joshua Wright
SEC579: Virtualization and Private Cloud Security
Dave Shackleford
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Eric Conrad
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses GAWN Larry Pesce
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Justin Searle
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking GXPN James Lyne
SEC760: Advanced Exploit Development for Penetration Testers
Stephen Sims
DEV522: Defending Web Applications Security Essentials GWEB Johannes Ullrich, Ph.D.
DEV544: Secure Coding in .NET: Developing Defensible Applications GSSP-.NET Eric Johnson
FOR408: Windows Forensic Analysis

GCFE Rob Lee
FOR508: Advanced Digital Forensics and Incident Response GCFA Chad Tilbury
FOR572: Advanced Network Forensics and Analysis GNFA Philip Hagen
FOR585: Advanced Smartphone Forensics
Heather Mahalik
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques GREM Lenny Zeltser
MGT305: Technical Communication and Presentation Skills for Security Professionals
David Hoelzer
MGT414: SANS Training Program for CISSP Certification® GISP Jonathan Ham
MGT415: A Practical Introduction to Risk Assessment
G. Mark Hardy
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program

Lance Spitzner
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ GSLC David Hoelzer
MGT514: IT Security Strategic Planning, Policy and Leadership
G. Mark Hardy
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep GCPM Jeff Frisk
MGT535: Incident Response Team Management
Christopher Crowley
AUD507: Auditing & Monitoring Networks, Perimeters & Systems GSNA Tanya Baccam
LEG523: Law of Data Security and Investigations GLEG Benjamin Wright
NetWars – Tournament
Staff
DFIR NetWars Tournament
Staff
HOSTED: (ISC)2® Certified Secure Software Lifecycle Professional (CSSLP®) CBK® Education Program
Staff
HOSTED: Physical Penetration Testing
The CORE Group
HOSTED: Offensive Countermeasures: The Art of Active Defenses
Mick Douglas

 

Apr
16
Thu
ForenSecure’15 @ Illinois Institute of Technology's Rice Campus, School of Applied Technology
Apr 16 – Apr 18 all-day

ForenSecure’15

Cyber Security & Forensics Conference

A dynamic and growing number of organizations have contributed to the success of this conference, including: AccessData, Argonne National Laboratory, Authentify, Cisco, The Chicago Police Department, CompTIA, Computer Associates, the FBI, Fermilab, Fortinet, Guidance Software, IBM, IEEE, KPMG, Microsoft, Motorola, Sungard, UniForum, X-Ways Forensics and many others. Speakers and participants continue to represent local, regional, national, and international organizations and universities.
ForenSecure'15 - Logo
Attending ForenSecure’15 – Attendees generally consist of practitioners in the information security & forensics fields. This event is open to the public
  • General Attendee – $200, $150 Early Reg, $40 for Students
  • IEEE and UniForum discounted registration rate – $100
Sponsor/Exhibit – Promote your business to a targeted group of 200+ technical professionals:
  • Platinum Sponsor/exhibitor – $1,500
  • Gold Sponsor/exhibitor – $750
  • Silver Sponsor/exhibitor – $500
(all options include an exhibit table and 2 free registrations – Platinum includes 6)
Apr
20
Mon
RSA Conference 2015 @ Moscone Center
Apr 20 – Apr 24 all-day

RSA Conference 2015 - USA - LogoRSA Conference 2015 – USA

Same time, same place, same humongous crowds! RSA Conference 2015 is not specifically focused on hacking, pentesting and the like, but it is the largest general information security event and has been for years.

RSA Conference 2015 - USA - Logo

Keynotes at RSA Conference 2015

  • Scott Charney Corporate Vice President, Trustworthy Computing Microsoft
  • Amit Chatterjee Executive Vice President, Enterprise Solutions and Technology Group CA Technologies
  • Arthur W. Coviello Jr. Executive Vice President EMC Corporation
  • Whitfield Diffie Cryptographer & Security Expert Cryptomathic
  • Zak Ebrahim Author, The Terrorist’s Son: A Story of Choice Nonviolence advocate and lecturer
  • Art Gilliland Senior Vice President & General Manager of Software Enterprise Security Products Hewlett-Packard
  • Doris Kearns Goodwin World-renowned Presidential Historian and Pulitzer Prize-winning Author
  • et al

Innovation Sandbox Contest

RSAC’s Innovation Sandbox Contest has crowned innovative companies who create cutting-edge technologies to fight the InfoSec risk for the past 10 years!!

Check out our Gallery of Victors and see which ones were acquired by Cisco and Juniper, which had successful IPOs, and how all received funding within a year of winning. Is your company next? Ready to compete? Submissions open January 12, 2015.

The Sandbox

In this collaborative space, you will have the opportunity to engage in dynamic learning and networking opportunities. Kicking off the week with the popular RSAC Innovation Sandbox Contest, The RSAC Sandbox at Moscone Center North, Room 134 continues through Thursday, hosting a suite of hands-on activities. Bring your forward-thinking ideas to share with your peers and enrich your RSA Conference experience!

The Viewing Point at Gateway

The Viewing Point was introduced at RSA® Conference 2014 in direct response to the needs of our attendees. We heard loud and clear that attending professionals wanted to consume information and content at their own pace and in ways that better suited their busy schedules and learning styles. So we built The Viewing Point. By all accounts, this space had a real impact on the Conference experience, which is why it will continue to be part of RSA Conference 2015.

The Viewing Point has a lounge-style atmosphere that’s comfortable and easily accessible. And provides our attendees an alternative and casual way to watch and experience the keynotes and other programs. Food and coffee along with comfortable seating, Wi-Fi access, power for mobile devices, and live Twitter boards are all available in this space. During the opening keynotes on Tuesday, April 21, we may even have some special guests making an appearance—be sure to stop by and check it out.


 

About RSA Conference

RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia.  Throughout its history, RSA Conference has consistently attracted the world’s best and brightest in the field, creating opportunities for conference attendees to learn about IT security’s most important issues through first-hand interactions with peers, luminaries and emerging and established companies.  As the IT security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated.

RSA developed RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of Internet security.  Today, RSA Conference and related RSA Conference branded activities are still managed by RSA, with the support of the industry.  RSA Conference event programming is judged and developed by information security practitioners and other related professionals.

May
3
Sun
SANS Security West 2015 @ Manchester Grand Hyatt San Diego
May 3 – May 10 all-day

SANS Security West 2015 - LogoSANS Security West 2015

Take Cyber security training in San Diego from SANS Institute, the global leader in information security training. At SANS Security West 2015 + Emerging Trends, we offer more than 20 hands-on, immersion-style security training courses taught by real-world practitioners and interactive bonus sessions, led by a star-studded panel, on Emerging Trends in cyber security.

NEW!! $200 OFF Any 4-6 Day SANS Course!
Any Format! Use Coupon Code: SANS_EHN200

The line-up of cyber security courses, below, covers IT security, digital forensics, ethical hacking, penetration testing, software security and security courses for legal and management personnel, too. In addition to these security courses, the Emerging Trends discussions will provide the insight necessary to stay ahead of the latest cyber security threats and keep your organization secure.

Available Courses Security West 2015

Title Certification Instructor
NEW: SEC301: Intro to Information Security GISF Keith Palmgren
NEW: SEC511: Continuous Monitoring and Security Operations
Seth Misenar
NEW: FOR518: Mac Forensic Analysis
Sarah Edwards
SEC401: Security Essentials Bootcamp Style GSEC Bryce Galbraith
SEC440: Critical Security Controls: Planning, Implementing and Auditing
James Tarala
SEC501: Advanced Security Essentials – Enterprise Defender GCED Bryan Simon
SEC503: Intrusion Detection In-Depth GCIA Mike Poor
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling GCIH John Strand
SEC505: Securing Windows with PowerShell and the Critical Security Controls GCWN Jason Fossen
SEC524: Cloud Security Fundamentals
Paul A. Henry
SEC542: Web App Penetration Testing and Ethical Hacking GWAPT Eric Conrad
SEC560: Network Penetration Testing and Ethical Hacking GPEN Michael Murr
SEC561: Intense Hands-on Pen Testing Skill Development (with SANS NetWars)
Joshua Wright
SEC566: Implementing and Auditing the Critical Security Controls – In-Depth GCCC James Tarala
SEC575: Mobile Device Security and Ethical Hacking GMOB Christopher Crowley
SEC579: Virtualization and Private Cloud Security
Dave Shackleford
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Bryce Galbraith
DEV522: Defending Web Applications Security Essentials GWEB Johannes Ullrich, Ph.D.
FOR408: Windows Forensic Analysis GCFE Chad Tilbury
FOR508: Advanced Digital Forensics and Incident Response GCFA Rob Lee
BETA: FOR578: Cyber Threat Intelligence
Mike Cloppert
FOR585: Advanced Smartphone Forensics
Heather Mahalik
MGT414: SANS Training Program for CISSP Certification® GISP Paul A. Henry
MGT415: A Practical Introduction to Risk Assessment
James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Lance Spitzner
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ GSLC G. Mark Hardy
ICS410: ICS/SCADA Security Essentials GICSP Graham Speake
DFIR NetWars Tournament
Rob Lee
NetWars – Tournament
Jeff McJunkin

 

May
14
Thu
THOTCON 0x6 @ TOP_SECRET
May 14 – May 15 all-day

THOTCON 0X6THOTCON 0x6

THOTCON (pronounced \ˈthȯt\ and taken from THree – One – Two) is a small venue hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a very limited budget.

Once you attend a THOTCON event, you will have experienced one of the best information security conference experiences combined with a uniquely casual and social experience.

THOTCON 0x6 is the sixth incarnation of this event and will be held on Thursday and Friday May 14-15, 2015.

It will be held at a location only to be disclosed to attendees and speakers during the week before the event.

*** VENUE *****************************************************************

TOP_SECRET, but we’ll tell you this:

– It will be held in the city of Chicago.
– It will be held at a bar-like venue (drink from 8:30am to close if you please).
– It will be within walking distance from a CTA Brown Line stop.
– There will be food & drink for purchase all day.
– Purchases will be CASH ONLY, so plan ahead.
> There are plenty of ATMs in the area.

Keynotes at THOTCON 0x6

  • Christopher Valasek – “The Ghost of Security Past”
  • Tod Beardsley && egypt – “Wanna Cyber?”
  • Jack Daniel – “InfoSec: What we know, and what we need to know.”
  • Jon Callas – “Everything You Need to Know About Crypto in 50 minutes”

FULL Length Talks (50 Minute) at THOTCON 0x6

  • Kevin Bong – “Building a Poor Man’s RFID Cloner”
  • Matias Brutti – “Cartero – Another Social Engineering Framework”
  • Nick Espinoza – “Week to Weak: Weaponization of Vulnerabilities”
  • FuzzyNop – “Pwning People Personally”
  • Rob Havelt – “The Bad, The Worse, and The Ugly – No Hope for POS Security”
  • Ryan Linn – “Vomiting Shells: Tracking the Splatter Patterns”
  • Brandon Myers && Jonathan Claudius – “Trojaned Gems – You can’t tell you’re using one!”
  • Steve “nosteve” Ocepek – “Synspotting for Teenagers and Real Swinging Adults”
  • Jeremy Richards – “Firmware Vulnerability Analysis”
  • Jayson E. Street – “BREAKING in BAD! (I’m the one who doesn’t knock)”

TURBO Talks (25 Minute) will also be given at THOTCON 0x6. See their site for a full list. Be sure to also check out the contests and party details.

 

May
16
Sat
BSides Chicago 2015 @ Concord Music Hall
May 16 all-day

BSides Chicago 2015BSides Chicago 2015

Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is an intense event with discussions, demos, and interaction from participants. It is where conversations for the next-big-thing are happening.

 

Who is Speaking at BSides Chicago 2015?

You. Your Friends. Your Coworkers. And that random guy who no one remembers his name but remembers he can code like a machine. CFP will open soon.

 

May
18
Mon
CEIC 2015 @ Caesars Palace
May 18 – May 22 all-day

CEIC 2015 - LogoCEIC 2015

It’s no exaggeration to say that CEIC (Computer and Enterprise Investigations Conference) is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for practical skills development. From sessions on acquiring evidence from mobile devices to international e-discovery to cyber security intelligence, there’s simply no other training or seminar series available that packs so much relevant and practical information from so many expert speakers into a four-day period.

Cybercrime Expert Brian Krebs to Deliver Keynote at Guidance Software’s CEIC 2015

It’s a cybersecurity conference where incident responders and information security specialists meet up with their fellow experts from around the world to network and learn the very latest security tactics.

It’s a legal technology conference where inside counsel and litigation support staff learn how to collaborate with information security professionals prior to litigation.

It’s a digital forensics conference where everyone from beginning forensic investigators to the best of the best learn different and better methods that take their professional capabilities to a whole new level.

CEIC is the only digital investigations conference offering training sessions for Spanish speakers, by Spanish speakers, centered around concerns voiced by Spanish speakers.

Who Should Attend CEIC 2015:

  • Digital Forensic Examiners
  • E-Discovery Lawyers
  • Litigation Support Professionals
  • Cyber Security Professionals
  • Incident Responders
  • Compliance and Risk Managers
  • E-Discovery Practitioners
  • Information Security Personnel
  • Law Enforcement

App Central World at CEIC 2015

No CEIC experience is complete until you check out EnCase App Central World. Staffed by Guidance Software experts as well as community experts who develop the apps that are available online, EnCase App Central World is the place for getting a good look at the latest products, apps, EnScripts, and templates that improve your investigative workflow so you can close more cases faster.

Stop by EnCase App Central World at CEIC to:

  • Learn about the diverse ecosystem of dozens of products that either extend, integrate, or work seamlessly with EnCase, such as Internet Evidence Finder (IEF), a Volatility Reporting Plug-in, and useful extensions such as a VSS Examiner
  • Connect with EnCase App Central developers to connect and share tips and techniques
  • Meet Guidance Software experts and others from your favorite technology providers and the forensic community for invaluable face-to-face Q&A
  • Talk with EnCase Technology Partners as they showcase their solutions.

Training at CEIC 2015

The EnCE and EnCEP exam will be offered on Monday, May 18 through Wednesday, May 20 from 8am – 3pm each day. An application is required to take the exam, but you are not required to register for a specific exam time. Once your application is accepted, you will receive testing instructions and login information.

SANS Pen Test Austin 2015 @ Omni Austin Hotel Downtown
May 18 – May 23 all-day

SANS Pen Test Austin 2015SANS Pen Test Austin 2015

Every organization needs skilled people who know how to find vulnerabilities, understand risk, and help prioritize resources based on mitigating potential real-world attacks. That’s what SANS Pen Test Austin is all about! If you like to break things, put them back together, find out how they work, and mimic the actions of real-world bad guys, all the while providing real business value to your organization, then this event is exactly what you need.

NEW!! $200 OFF Any 4-6 Day SANS Training Course! Any Format!
Use Coupon Code: SANS_EHN200

Every security professional needs to understand how to get the most out of penetration tests and vulnerability assessments. The SANS Pen Test Austin 2015 event is a focused on helping you build world-class security assessment and penetration testing skills to do just that. This event is an IDEAL way to take your penetration testing and vulnerability assessment skills to an entirely new level. We’re bringing our most popular pen test courses, instructors, and bonus sessions together in one place to offer one of SANS most comprehensive Pen Test training experiences ever.

At the SANS Pen Test Austin 2015 event you will not only learn vital and in-demand skills and abilities, but also network with like-minded security professionals that also see the benefit in taking their Pen Test artistry to the next level.

What’s special about SANS Pen Test Austin 2015?

  • SANS Top Courses focused on Pen Testing: Learn hands-on skills that you can directly apply the day you get back to your job.
  • NetWars, NetWars, NetWars: Enjoy three exciting nights of NetWars challenges, where you can have some fun while building serious infosec skills.
  • Coin-a-palooza: Earn up to four additional SANS pen test challenge coins (each with an integrated cipher challenge) based on your performance in SANS NetWars!
  • CyberCity Missions: Work through an evening of cyber missions that have a direct kinetic impact on the miniature CyberCity environment that SANS built with a real power grid, water reservoir, military base, and more!

Available Courses at SANS Pen Test Austin 2015

Title Certification Instructor
SEC401: Security Essentials Bootcamp Style

GSEC Bryce Galbraith
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling

GCIH Michael Murr
SEC542: Web App Penetration Testing and Ethical Hacking

GWAPT Seth Misenar
SEC560: Network Penetration Testing and Ethical Hacking

GPEN Ed Skoudis
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses GAWN Larry Pesce
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking GXPN Stephen Sims
NetWars – Tournament
Tim Medin
NetWars – CyberCity
Tim Medin
May
19
Tue
OWASP AppSecEU 2015 @ Amsterdam RAI Exhibition and Convention Centre
May 19 – May 22 all-day

OWASP AppSecEU 2015OWASP AppSecEU 2015

The BeNeLux chapters will host the OWASP AppSec Europe Research 2015 global conference in Amsterdam, The Netherlands from May 19-22. Amsterdam is the capital of the Netherlands and the largest city of the country.

The AppSec Europe 2015 conference will be a premier gathering of Information Security leaders, also it is going to have a research part.

Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers will be traveling to hear the cutting-edge ideas presented by Information Security’s top talent. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 400-500 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology and many other verticals.

The conference program will consist of five tracks (Developers, Ops, Hack, CISO and Research). The full conference schedule will be available mid-February, with a range of interesting and provoking keynote speakers to open and close each day of the conference presentations, but also a lot of satellite events.

Events at OWASP AppSecEU 2015

Different satellite events will take place during the AppSec Europe conference.

Find the details of these events on the dedicated pages:

The OWASP AppSecEU 2015 Experience

  • Cutting-edge research presented by security professionals across Europe
  • Trainings and speeches on a variety of security topics including: cloud security, mobile security, vulnerability analysis, and much more
  • Premier gathering place for executives from Fortune 500 companies and technology thought leaders
  • Small group sessions, workshops, and learning opportunities for developers, business owners, and security experts
  • Learn and network for four days, while discovering Amsterdam!
May
25
Mon
SOURCE Boston 2015 @ Marriott Courtyard
May 25 – May 28 all-day

SOURCE Conference Boston 2015 - LogoSOURCE Boston 2015

Our Mission

The purpose of SOURCE Conference is to bridge the gap between technical excellence and business acumen within the security industry. SOURCE fosters a community of learning where business and security professionals come together to gain knowledge and skills, network with peers, and advance their careers and professional development. SOURCE enables individuals, teams, and organizations to leverage information to improve decision-making, optimize performance, and achieve business objectives.

Our Vision

In our vision, we see SOURCE as a leader in the security industry where attendees, speakers, and sponsors identify solutions for the toughest and most important problems:

  • An environment that fosters professional growth and development.
  • Top technical and business experts from around the world coming together to share technologies, research, and security practices.
  • A security community that is rewarding and enjoyable to participate in.

At a Glance

  • Launched in 2008 in Boston, Massachusetts, USA.
  • Averages 300-350 attendees in Boston, 100 in Seattle, and 60-80 in Barcelona.
  • Focuses on bridging the gap between technological expertise and business excellence.
  • Organized by many of the top minds in the security industry. Each member of our advisory board has deep roots in the security industry and a reputation for technical excellence.
  • Attracts thought leaders involved in all aspects of security. Messages conveyed at SOURCE resonate deeply through the security community.
  • Focuses on bridging the gap between technological expertise and business excellence.
  • SOURCE Conference has served as the inspiration point for The Security Twits Twitter Group, InfoSec Mentors, and HacKid.
May
26
Tue
HITBSecConf2015 Amsterdam @ De Beurs van Berlage
May 26 – May 29 all-day

HITBSecConf2015 Amsterdam - LogoHITBSecConf2015 Amsterdam

The 6th Annual HITB Security Conference in The Netherlands

Held once again at De Beurs van Berlage, HITB2015AMS takes place from the 26th till the 29th of May 2015 and runs alongside HITB Haxpo – our 3-day technology expo for hackers, makers, builders and breakers. The Call for Papers for the conference is now open and the first round of accepted speakers will be announced at the end of January. As always, do follow @HITBSecConf on Twitter for the latest event updates.

A deep-knowledge security event…

HITBSecConf or the Hack In The Box Security Conference is an annual must attend event in the calendars of security researchers and professionals around the world. Held annually in Kuala Lumpur, Malaysia and Amsterdam in The Netherlands, HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events routinely feature two days of trainings and a two-day multi-track conference featuring cutting-edge hardcore technical talks delivered by some of the most respected names in the computer security industry. HITBSecConf is a place where ideas are exchanged, talent discovered and genius celebrated.

Keynotes at HITBSecConf2015 Amsterdam

  • Marcia Hofmann – EFF Special Counsel
  • John Matherly – Founder, Shodan
  • Runa A. Sandvik – Privacy and Security Researcher

Hands on Training at HITBSecConf2015 Amsterdam

  • Exploitation Technique
  • Hacking PDFs for Ninjas
  • Application Security for Hackers & Developers
  • Understanding x86-64 Assembly for Reverse Engineering & Exploits
  • Windows Internals
  • Android Security – Reverse Engineering & App Pentesting
  • Hacking Web Applications: Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More
  • Professional Pentesting IPv6 Networks

HITB Haxpo 2015 Amsterdam
Hackers // Makers // Breakers // Builders

The second Haxpo in Amsterdam

Our second edition of the Haxpo in Amsterdam will take place once again in the historic building “Beurs van Berlage” in the city centre of Amsterdam. Featuring 35+ companies in our exhibition and countless other events taking place during the 3-day Haxpo madness! Get more information about what the Haxpo is at www.haxpo.nl

Jun
8
Mon
ShowMeCon 2015 @ Ameristar Casino & Resort
Jun 8 – Jun 9 all-day

ShowMeCon 2015 - LogoShowMeCon 2015

St. Louis’ Hacking & Cyber Security Con

ShowMeCon. The name says it all. Known as the Show Me State, Missouri is home to St. Louis-based ethical hacking firm, Parameter Security, and security training company, Hacker University. Together, they are bringing you a one-of-a-kind event that will Show You the State of security from a unique perspective – the hacker’s viewpoint.

Pre-Con Training: June 3 – 7
Hacker Con: June 8 – 9

This highly technical forum showcases eye-opening presentations from world-renown ethical hackers and epic security ninjas which will leave you amazed and frightened at the same time. By giving you access into the mind of a hacker, you will better understand how to protect your networks and critical data. As we always say “In order to beat a hacker, you have to think like one” and “if you don’t understand the enemy, how can you protect against him?” ShowMeCon pulls back the curtain and exposes how hackers are winning the war on physical and cyber security.

Pre-Con Training at ShowMeCon 2015

ShowMeCon 2015 will be jammed with content specifically and immediately applicable to your career. For starters, the winner will get their choice of the following courses (click the course title for more info):

Whether you’re a large corporation or a small business, you should attend this mind-blowing event as you witness the cream of the crop unveil the latest attacks, techniques, tactics and practices of today’s hackers. Plus, gain insight and understanding into ways to effectively protect yourself so you can implement this information immediately when you return to your business.

Be sure to follow them @ShowMeConSTL

Jun
10
Wed
SC Congress Toronto 2015 @ Metro Convention Center NORTH BUILDING
Jun 10 – Jun 11 all-day

SC Congress Toronto 2015 - LogoSC Congress Toronto 2015

SC Congress Toronto is our largest show in the SC Congress portfolio. Spanning two days, our Canadian conference and expo attracts over 1,000 cybersecurity pros on average in North America and beyond.

2015 is slated to be one of our best years ever; SC Congress Toronto 2015 will be moving to more spacious accommodations in the Metro Toronto Convention Centre and boast an even more robust Exhibit Hall than any other year. Our 2014 show floor was sold out and 2015 should be no exception, featuring even more of the top names and brands in info security. Mark your calendars for June 10-11 for a not-to-be missed SC Congress Toronto.

Aside from our enhanced Exhibit Hall, SC Congress Toronto 2015 will – as always – feature our hallmark programming, delivering the latest insights on all the issues cyber security professionals need to stay ahead of their game – and the growing number of cyber threats and criminals. Our 2014 event addressed such pressing issues including PCI Revisited, The Art of Cyberwar, A Day in the Life of a CISO, Effective Methods for Engaging the Board of Directors About IT Security, 21st Century Incidence Reponse, IoT Java Exploited and the Growing Rise of Ransomware, to name just a handful of topics. Our 2015 SC Congress will pick up with all new topics and address all of the issues moving today’s – and more importantly – tomorrow’s – headlines.

Jun
12
Fri
CircleCityCon 2015 @ Westin Indianapolis
Jun 12 – Jun 14 all-day

CircleCityCon 2015 - LogoCircleCityCon 2015

CircleCityCon is a security conference held in downtown Indianapolis. Our inaugural con last year was a big success and we are only looking to grow and make it better.

CircleCityCon is about the community. Our signature offering is the community led training classes offered to all participants. Events and contests are organized by members of the security community, including both CircleCityCon staffers and community partners. Two tracks, incredible entertainment, and technical villages help round out the CircleCityCom experience. Of course, don’t forget the chance to meet and talk with your peers about all topics including security, hacking, and the latest superhero movie.

Talks at CircleCityCon 2015

Events at CircleCityCon 2015

  • Lockpick Village – Information on the 2015 Lockpick Village will be announced soon. Please check back for details.
  • Hardware Village – Information on the 2015 Hardware Village will be announced soon. Please check back for details.
  • Ham Radio Exams – New this year to CircleCityCon, we are planning on conducting Ham radio licensing exams. More info to come, please check back for details.
  • Hak4Kidz – Information on Hak4Kids will be announced soon. Please check back for details.

Training at CircleCityCon 2015

 

Jun
27
Sat
Hak4Kidz 2015 @ TechNexus
Jun 27 all-day

Hak4Kidz 2015Hak4Kidz 2015

Hak4Kidz is the first official youth based ethical hacking conference in Chicago that is *not* a hackathon.

Hak4Kidz is an event by ethical hackers and Information Security professionals dedicated to bring the educational and communal benefits of whitehat hacking conferences to children and young adults. We plan to accomplish this mission by putting our collective expertise and passion on display for the attendees to interact with us at their will. A combination of youth base speaking tracks complementing an open area of stations will enable the attendees to expand and enlighten their technical interests. For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential.

Activities at Hak4Kidz 2015

Additional activities for Hak4Kidz are still being finalized, so please check back regularly. In the meantime, these are the activities from last year:

Time to get your hak on with these educational activities from 2014:

  • jrCTF – junior Capture The Flag contest for prizes
  • Snap Circuits – Award winning engineering toy by Elenco
  • Networking Playground – Hooking up network gear and securing them
  • Homemade Hacks – Old tech meets new tech for alternative tech! And a programmable robot!!
  • How I.T. Works – disassemble old electronics without getting “grounded”
  • InfoSec Career Mentoring – hacking is fun but hacking for a living is uber fun
  • Locksport – introduction to ethical lock-picking for sport only
  • NEW -> Hands-on OSI Model – learn how a web page gets into your browser
Jul
3
Fri
SteelCon 2015 @ Cantor Building - Sheffield Hallam University – City Campus
Jul 3 – Jul 5 all-day

SteelCon 2015 - LogoSteelCon 2015

With a growing international interest in security events and hacker conferences, and the increasing focus on security in the media, SteelCon offers a unique opportunity for you to get involved and develop your hacking* skills.

After last years very successful event we will be back in 2015, bigger and better. Capacity will be doubled, there will be more activities and hopefully a lot more fun.

The North’s Premier Hacker* Con!

It doesn’t matter what your background is, whether you’re a security professional or penetration tester by trade or a hobbyist who’s just picked up your first Raspberry Pi. This is a conference with something for everyone in a family friendly environment, with activities for big kids and little kids so come along and join in.

The Events Team

*hacker: n. someone with an interest in how things work, how things can be broken and how they can be fixed.


More info to come when available.

Jul
8
Wed
Shakacon VII @ Hawaii Prince Hotel – Mauna Kea Ballroom
Jul 8 @ 9:30 pm – Jul 9 @ 10:30 pm

Shakacon VII - LogoShakacon VII

Shakacon, an Information Technology (IT) Security Conference, is back and ready to invite business executives, government and military officials, security professionals, and IT enthusiasts to participant in Hawaii’s only Call for Paper based IT security conference.

We decided it was time to bring some top notch technical talent back to one of the most remote locations on earth.

Sitting around somewhere freezing your a$$ off? Dreaming about warm days, rainbows, decadent tropical drinks sipped out of coconuts? Sure you could drop your 0day in Vegas, bring down the Internet in Germany, or satisfy your dark desires in Asia; however, wouldn’t you rather submit your research or topics to our CFP and maybe win yourself a paid trip to Hawaii?

Keynotes at Shakacon VII

  • Slipping out the front door of the party: The challenges of detecting silent exits of your data -Stephen Adegbite
  • Project Zero: make 0day hard -Chris Evans

Training Sessions at Shakacon VII (July 6 – 7)

  • Powershell for Penetration Testers by Nikhil Mittal
  • Offensive Techniques by Colin Ames, Attack Research
  • Web Application Exploitation by Chris Potter, Attack Research
  • Rapid Reverse Engineering by Russ Gideon, Attack Research
  • Low-Power Hacking by Dr. Phil Polstra
  • Windows Internals for Security Professionals by T. Roy
  • Automotive Exploitation Techniques by Craig Smith
  • Physical Penetration Testing by Deviant Ollam
  • Diving Into Development of Microsoft Windows Kernel Exploits by Nikita Tarakanov
  • Threat Modeling by Matt Jones
  • Penetration Testing with the Pi by Bob Monroe
  • Mobile App Hacking – Internet Banking Edition by Aditya Modha
  • Hacking Web Applications – Case studies of award-winning bugs in Google, Yahoo, Mozilla and more

    by Dawid Czagan

 

Jul
22
Wed
RSA Conference Asia Pacific & Japan 2015 @ Marina Bay Sands
Jul 22 – Jul 24 all-day

RSA Conference Asia Pacific & Japan 2015RSA Conference Asia Pacific & Japan 2015

RSA Conference Asia Pacific & Japan is the leading information security event in the region. Join us for three days of engaging sessions and intense networking. Get exposure to innovative technologies and leadership that will help secure your organization and your future.

RSA Conference Asia Pacific & Japan 2015 will take place at the Marina Bay Sands in Singapore 22 to 24 July.

Mark your calendar and register your interest today to save S$100* on your Early Bird full conference pass. Registration opens in early February!

*A discount code will be emailed to you when Early Bird Registration opens. Only one discount code can be used per registration. Discount offers cannot be combined.


About RSA Conference

RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia.  Throughout its history, RSA Conference has consistently attracted the world’s best and brightest in the field, creating opportunities for conference attendees to learn about IT security’s most important issues through first-hand interactions with peers, luminaries and emerging and established companies.  As the IT security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated.

RSA developed RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of Internet security.  Today, RSA Conference and related RSA Conference branded activities are still managed by RSA, with the support of the industry.  RSA Conference event programming is judged and developed by information security practitioners and other related professionals.

Aug
2
Sun
Black Hat USA 2015 @ Mandalay Bay Convention Center
Aug 2 – Aug 7 all-day

Black Hat USA 2015 - ImageBlack Hat USA 2015

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six day event begins with four days of intense Trainings for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).

More specific info will be posted when available.

About Us

Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.

What We Do

Briefings
The Black Hat Briefings were created more than 16 years ago to provide security professionals a place to learn the very latest in information security risks, research and trends. Each year, internationally leading security researchers take the stage to share their latest work and exploits in a friendly, vendor-neutral environment. Vulnerabilities are often exposed that impact everything from popular consumer devices to critical international infrastructure and everything in between. Black Hat seeks groundbreaking research to fill both 25 and 50-minute speaking slots for each annual show.

Trainings
The Black Hat Trainings offer attendees individual technical courses on topics ranging from the latest in penetration testing to exploiting web applications and even defending and building SCADA systems. Often designed exclusively for Black Hat, these hands-on attack and defense courses are taught by industry and subject matter experts from all over the world with the goal of defining and defending tomorrow’s information security landscape.