EH-Net Global Calendar of Events

EH-Net Global Calendar of Events Audience IconSet Your Calendar for Career Advancement

A calendar of industry events is a natural item for a publisher to include as an additional value for their readers. Here at The Ethical Hacker Network Online Magazine, we strive to be the best single source for advancing your career in the various fields of ethical hacking. In addition to book reviews, course reviews, certification information, tutorials, interviews, community forums… another vital component of your career is attending and participating in security and hacking events. Get involved!

Stay up-to-date with all listed events by using the +Subscribe & Add to Google Buttons at the bottom. Happy Ethical Hacking!

Editor’s Note: Is your event NOT in the EH-Net Calendar? Please send in the details using the links below.

Jul
8
Wed
Shakacon VII @ Hawaii Prince Hotel – Mauna Kea Ballroom
Jul 8 @ 9:30 pm – Jul 9 @ 10:30 pm

Shakacon VII - LogoShakacon VII

Shakacon, an Information Technology (IT) Security Conference, is back and ready to invite business executives, government and military officials, security professionals, and IT enthusiasts to participant in Hawaii’s only Call for Paper based IT security conference.

We decided it was time to bring some top notch technical talent back to one of the most remote locations on earth.

Sitting around somewhere freezing your a$$ off? Dreaming about warm days, rainbows, decadent tropical drinks sipped out of coconuts? Sure you could drop your 0day in Vegas, bring down the Internet in Germany, or satisfy your dark desires in Asia; however, wouldn’t you rather submit your research or topics to our CFP and maybe win yourself a paid trip to Hawaii?

Keynotes at Shakacon VII

  • Slipping out the front door of the party: The challenges of detecting silent exits of your data -Stephen Adegbite
  • Project Zero: make 0day hard -Chris Evans

Training Sessions at Shakacon VII (July 6 – 7)

  • Powershell for Penetration Testers by Nikhil Mittal
  • Offensive Techniques by Colin Ames, Attack Research
  • Web Application Exploitation by Chris Potter, Attack Research
  • Rapid Reverse Engineering by Russ Gideon, Attack Research
  • Low-Power Hacking by Dr. Phil Polstra
  • Windows Internals for Security Professionals by T. Roy
  • Automotive Exploitation Techniques by Craig Smith
  • Physical Penetration Testing by Deviant Ollam
  • Diving Into Development of Microsoft Windows Kernel Exploits by Nikita Tarakanov
  • Threat Modeling by Matt Jones
  • Penetration Testing with the Pi by Bob Monroe
  • Mobile App Hacking – Internet Banking Edition by Aditya Modha
  • Hacking Web Applications – Case studies of award-winning bugs in Google, Yahoo, Mozilla and more

    by Dawid Czagan

 

Jul
22
Wed
RSA Conference Asia Pacific & Japan 2015 @ Marina Bay Sands
Jul 22 – Jul 24 all-day

RSA Conference Asia Pacific & Japan 2015RSA Conference Asia Pacific & Japan 2015

RSA Conference Asia Pacific & Japan is the leading information security event in the region. Join us for three days of engaging sessions and intense networking. Get exposure to innovative technologies and leadership that will help secure your organization and your future.

RSA Conference Asia Pacific & Japan 2015 will take place at the Marina Bay Sands in Singapore 22 to 24 July.

Mark your calendar and register your interest today to save S$100* on your Early Bird full conference pass. Registration opens in early February!

*A discount code will be emailed to you when Early Bird Registration opens. Only one discount code can be used per registration. Discount offers cannot be combined.


About RSA Conference

RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia.  Throughout its history, RSA Conference has consistently attracted the world’s best and brightest in the field, creating opportunities for conference attendees to learn about IT security’s most important issues through first-hand interactions with peers, luminaries and emerging and established companies.  As the IT security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated.

RSA developed RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of Internet security.  Today, RSA Conference and related RSA Conference branded activities are still managed by RSA, with the support of the industry.  RSA Conference event programming is judged and developed by information security practitioners and other related professionals.

Aug
2
Sun
Black Hat USA 2015 @ Mandalay Bay Convention Center
Aug 2 – Aug 7 all-day

Black Hat USA 2015 - ImageBlack Hat USA 2015

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six day event begins with four days of intense Trainings for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).

More specific info will be posted when available.

About Us

Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.

What We Do

Briefings
The Black Hat Briefings were created more than 16 years ago to provide security professionals a place to learn the very latest in information security risks, research and trends. Each year, internationally leading security researchers take the stage to share their latest work and exploits in a friendly, vendor-neutral environment. Vulnerabilities are often exposed that impact everything from popular consumer devices to critical international infrastructure and everything in between. Black Hat seeks groundbreaking research to fill both 25 and 50-minute speaking slots for each annual show.

Trainings
The Black Hat Trainings offer attendees individual technical courses on topics ranging from the latest in penetration testing to exploiting web applications and even defending and building SCADA systems. Often designed exclusively for Black Hat, these hands-on attack and defense courses are taught by industry and subject matter experts from all over the world with the goal of defining and defending tomorrow’s information security landscape.

Aug
6
Thu
DEF CON 23 @ Paris/Bally's, Las Vegas
Aug 6 – Aug 9 all-day

DEF CON 23 - LogoDEF CON 23

As we’ve mentioned here on EH-Net for years, this is one of those events that you must attend at least once in your life… preferably multiple times. It is often said that DEF CON is what you make it. This is 100% accurate as there are so many talks, events, parties and people that 20 people can go to the same event and not see each other or have the same experience. For a little more on this, it might help to watch DEF CON 101 from DEF CON 17. It’s a few years old, but the concept is the same:

The DEF CON Story

Originally started in 1993, it was a meant to be a party for member of “Platinum Net”, a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I’ll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can’t remember. Why not invite everyone on #hack? Good idea!

Where did the name come from?

The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn’t want any association with a time of year. If you are a Phreak, or just use your phone a lot you’ll notes “DEF” is #3 on the phone. If you are into military lingo DEF CON is short for “Defense Condition.” Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.