World Library  
Flag as Inappropriate
Email this Article

Computer security conference

Article Id: WHEBN0023777555
Reproduction Date:

Title: Computer security conference  
Author: World Heritage Encyclopedia
Language: English
Subject: Ekoparty, Pwn2Own, HBGary, Browser security, Adobe Flash
Collection: Computer Security Conferences, Hacker Conventions
Publisher: World Heritage Encyclopedia

Computer security conference

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.


  • Events 1
    • List of general computer security conferences 1.1
  • Hacker conferences 2
    • List of hacker conferences 2.1
  • Non-annual hacker conventions 3
  • References 4
  • External links 5


Michael Lynn, a keynote speaker at Black Hat Briefings 2005

Common activities at hacker conventions may include:

List of general computer security conferences

General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

  • ACM-CCS (Conferences on Computer and Communications Security),[4] security conference held since 1993.
  • ACSAC, Annual Computer Security Applications Conference[5] - oldest information security conference held annually[6]
  • ASIA or the Annual Symposium on Information Assurance[7] that serves as the academic track for the New York State Cyber Security Conference,[8] an annual information security conference held in Albany, NY usually for two days during June targeted at academic, government, and industry participants.
  • Black Hat, a series of conferences held annually in different cities around the world. Black Hat USA, held in Las Vegas immediately before DEF CON, is one of the largest computer security event in the world.[9]
  • BlueHat Conference, a twice a year, invitation-only Microsoft security conference aimed at bringing Microsoft security professionals and external security researchers together.[10][11][12]
  • CanSecWest, in Vancouver, Canada is held at the end of March and hosts the Pwn2Own hacking contest.[13][14][15]
  • CarolinaCon, in North Carolina, is a regional technology and network security conference usually held during Spring.
  • CSS - International Conference on Cryptography and Security System[16] in Poland.
  • DeepSec, in Vienna, Austria covers many security aspects of computing and electronic communications as well as security management and social aspects. DeepSec is visited by a broad international audience, academics, researchers, vendors, finance, public administration etc. (2 days trainings, 2 days conference).[17] Presentations are published on Vimeo and YouTube.
  • Department of Defense Cyber Crime Conference, an annual conference that focuses on the computer security needs of the United States federal government, military, and defense contractors.
  • FSec - Croatian annual security conference held at the Faculty of organization and informatics in Varaždin, Croatia.[18]
  • [20], French Alps, France. Speakers from academia, industry. Both offensive and defensive security.Grenoble an annual conference held in [19]
  •, an annual conference held in Luxembourg
  • Hacker Halted, Presented by EC-Council, the objective of the global series of Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security.[21]
  • Hackito Ergo Sum, Security conference pertaining to research topics, with attendees and speakers from both the industry, the offensive side and the academic circles, held in Paris every April.[22]
  • HITBSecConf / Hack In The Box, deep-knowledge security conference held in Malaysia and The Netherlands[23]
  • ICMC, a conference focused on cryptographic modules, FIPS 140-2, ISO/IEC 19790 and cryptographic algorithms.[24]
  • IEEE Symposium on Security and Privacy,[25] top-tier privacy & security conference.
  • INFWARCON[26] Beyond Information Warfare - Offensive Cyber Weapons and Technologies Training Congress
  • NDSS (Network & Distributed System Security Symposium),[27] annual security conference from Internet Society.
  • NSPW (New Security Paradigms Workshop),[28] a workshop with new ideas in security.
  • nullcon Security Conference, a conference in Asia, held annually in Delhi and Goa.[29][30]
  • Open Web Application Security Project (OWASP) - Focuses on web application security,[31]
  • RSA Security Conference, Cryptography and information security-related conference held annually in the San Francisco Bay Area.
  • S4:SCADA Security Scientific Symposium, Security conference pertaining to SCADA held annually by Digital Bond, usually in Miami, FL.[32]
  • SecurIT 2012, International Conference on Security of Internet of Things held in mid of August at Amrita Vishwa Vidyapeetham.[33]
  • SecureWorld Expo, A series of IT Security conferences offering education, CPE training opportunities, and networking of security leaders, experts, senior executives, and policy makers who shape the face of security.[34]
  • SIN ACM or the International Conference on Security of Information and Networks,[35]
  • SOURCE Conference, SOURCE is a computer security conference in Boston, Seattle, and Barcelona that offers education in both the business and technical aspects of the security industry.[36]
  • SSTIC (fr),[37] Annual French Security Symposium held in Rennes, France.[38]
  • Swiss Cyber Storm, International IT Security Conference held in October at KKL Lucerne, Switzerland.[39]
  • TROOPERS IT Security Conference, Annual international IT Security event with workshops held in Heidelberg, Germany.[40]
  • USENIX Security,[41] annual security conference associated with USENIX.
  • Virus Bulletin conference, annual security conference held late September or early October since 1989.[42]

Hacker conferences

A team competing in the CTF competition at DEF CON 17

A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security experts.

The actual events, timespans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

List of hacker conferences

  • AthCon, the largest hacker conference in South Eastern Europe taking place annually in Athens, Greece.[43]
  • B Sides, community conference that initially started in the US is now global.[44]
  • Chaos Communication Congress, the oldest and Europe's largest hacker conference, held by Chaos Computer Club.
  • Cop CON, is a unique Cyber Policing Conference held across India every year by Indian Cyber Army.[45]
  • DEF CON, in Las Vegas, Nevada, is the biggest hacker convention in the United States held during summer (June–August).
  • DerbyCon, an annual hacker conference based in Louisville, KY.[46]
  • Ekoparty, a hacker convention in Argentina and one of the most important in South America, held annually around September in Buenos Aires.[47]
  • GrrCon, an annual hacker conference hosted each September in Grand Rapids, Michigan.[48]
  • Hack Expo, is a unique conference on Cyber Security and Cyber Policing held in Lucknow, India every year.[49]
  • Hack in the Box, an annual hacker conference.[50][51]
  • Hackers 2 Hackers Conference (H2HC) is the oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.[52]
  • Hackers Idol, is a unique Hackers & Cyber Enthusiast Talent Hunt held across India every year by Indian Cyber Army.[53]
  • Hackers on Planet Earth (HOPE), in New York is held by 2600: The Hacker Quarterly in mid-summer (July/August) every other year.
  •, in Quebec, Canada, bilingual conferences and hacking games.[54]
  • HackMiami Conference, a hacker conference in Miami, Florida organized by the HackMiami hackerspace.[55]
  • Hacktivity,[56] in Budapest, Hungary, run every September, the largest hacker conference in the Central and Eastern Europe.
  • INFILTRATE,[57] hosted by Immunity, Inc, is a deep technical security conference that focuses on offensive technical issues. The conference has been held annually in Miami Beach, Florida since 2011.
  • Kiwicon, is a Wellington, New Zealand hacker convention.
  • LayerOne, held every spring in Los Angeles, California.[58]
  • Malcon, the world's first International Malware Conference, hosted in India.[59]
  • NorthSec, in Montreal, Quebec, is an applied security event held yearly mid-May, featuring two day of conference followed by a 48h on-site CTF.[60]
  • Notacon, in Cleveland, Ohio, is an art and technology conference held frequently in mid-April.
  • Nuit Du Hack, in Paris, France, is the oldest and largest hacker conference held frequently in late-June.[61]
  • PhreakNIC, in Nashville, Tennessee, is held by Nashville 2600.[62] around October.
  • Quahogcon, In Providence, Rhode Island is held at the end of April.[63]
  • ROOTCON,[64] Premier Annual Hacker Conference in the Philippines held annually during summer (September - October).
  • RootedCON, in Madrid, Spain, is one of the biggest hacker conference in Europe. This convention started in 2010. (March)
  • ShmooCon, a Washington DC convention started in 2005 by The Shmoo Group, and held annually in late winter (usually February).
  • SkyDogCon, A technology conference in Nashville, TN for the individual with the Renaissance Mind. SkyDogCon exists to facilitate learning, information sharing, and mingling with like-minded people in a relaxed atmosphere.[65]
  • Summercon, one of the oldest hacker conventions, held during Summer (frequently in June). It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON.
  • T2 infosec conference, focuses on newly emerging information security research with a balance of topics on auditing and pen-testing, and security and defensive strategies. In general, presentations will address different aspects of information security—all presentations will include demos and be technically oriented and practical.[66]
  • The Hackers Conference, is India's biggest Cyber Security Conference held in New Delhi, India every Year.[67]
  • THOTCON, a Chicago based hacker conference held in the Spring each year.[68]
  • ToorCon, San Diego hacker convention that emerged from the 2600 user group frequently in late September.[69]
  • ZeroAccess, is a unique International Cyber Security Conference held in India, India in the Month of April by Indian Cyber Army[70]

Non-annual hacker conventions

  • Stichting Hacking at Random).[72] During the summer of 2013 the most recent installment of the series, called OHM (Observe Hack Make), was held.[73]


  1. ^ [1]
  2. ^ [2]
  3. ^ "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05. 
  4. ^ "Acm Ccs". 2012-01-23. Retrieved 2013-04-05. 
  5. ^ "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05. 
  6. ^ "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05. 
  7. ^ "Annual Symposium on Information Assurance (ASIA)". Retrieved 2013-04-05. 
  8. ^ "NYS Division of Homeland Security & Emergency Services - OCS". 2013-02-21. Retrieved 2013-04-05. 
  9. ^ "Black Hat". Black Hat. Retrieved 2013-04-05. 
  10. ^ "Bluehat Security Briefings". Retrieved 2013-04-05. 
  11. ^ "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05. 
  12. ^ "Bluehat Security Briefings". Retrieved 2013-04-05. 
  13. ^ "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Retrieved 2013-04-05. 
  14. ^ Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Retrieved 2013-04-05. 
  15. ^ Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05. 
  16. ^ "". Retrieved 2014-07-17. 
  17. ^ "DeepSec 2012". The Ethical Hacker Network. Retrieved 2013-04-05. 
  18. ^ "FSec". FSec. Retrieved 2013-04-05. 
  19. ^ "". 2013-11-15. Retrieved 2014-07-17. 
  20. ^ "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble, France". GreHack. Retrieved 2013-04-05. 
  21. ^ "Hacker Halted 2012". 2012-09-21. Retrieved 2013-04-05. 
  22. ^ "Hackito Ergo Sum 2013". Retrieved 2013-04-05. 
  23. ^
  24. ^ "ICMC". International Cryptographic Module Conference. Retrieved 2013-04-05. 
  25. ^ "IEEE Symposium on Security and Privacy". Retrieved 2013-04-05. 
  26. ^ "". Retrieved 2014-07-17. 
  27. ^ "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05. 
  28. ^ "Introduction | New Security Paradigms Workshop". Retrieved 2013-04-05. 
  29. ^ "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05. 
  30. ^ "Cyber experts show vulnerability of GSM networks". 2012-02-19. Retrieved 2013-04-05. 
  31. ^ "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05. 
  32. ^ "ICS Security Event Calendar". Retrieved 2013-04-05. 
  33. ^ "SecurIT 2012 - Cyber Security conference on IoT". Retrieved 2013-04-05. 
  34. ^ "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013-04-05. 
  35. ^ "the International Conference on Security of Information and Networks (SINCONF)". 
  36. ^ "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05. 
  37. ^ "". Retrieved 2014-07-17. 
  38. ^ "SSTIC2013". Retrieved 2013-04-05. 
  39. ^ "Swiss Cyber Storm". SCS. Retrieved 2014-04-14. 
  40. ^ "The IT-Security Conference". Retrieved 2013-04-05. 
  41. ^ "Events by Name: USENIX Security Symposium". USENIX. 2012-05-19. Retrieved 2013-04-05. 
  42. ^ "Virus Bulletin conference". Virus Bulletin. Retrieved 2013-08-29. 
  43. ^ [3]
  44. ^ "Security B-Sides". Retrieved 2013-04-05. 
  45. ^ [4]
  46. ^ "Wow! So That Was DerbyCon". 2011-10-03. Retrieved 2013-04-05. 
  47. ^ "ekoparty Security Conference". Retrieved 2013-04-05. 
  48. ^ "Infosec Island". Infosec Island. Retrieved 2013-04-05. 
  49. ^ daringdad (2013-12-16). "Hack with Innovation | Just another WordPress site". Hack Expo. Retrieved 2014-07-17. 
  50. ^ "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05. 
  51. ^ Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". Guardian. Retrieved 2013-04-05. 
  52. ^ "H2HC 10th Edition". Retrieved 2013-04-05. 
  53. ^ [5]
  54. ^ "". Retrieved 2014-07-17. 
  55. ^ "Hackmiami". Hackmiami. Retrieved 2013-04-05. 
  56. ^ "Hacktivity - The IT Security Festival in Central and Eastern Europe". Hacktivity. Retrieved 2013-04-05. 
  57. ^ "Infiltrate - Security Conference". Retrieved 2013-04-05. 
  58. ^ "LayerOne 2013 | Los Angeles' premiere security conference". Retrieved 2013-04-05. 
  59. ^ "MalCon - Malware Conference". MalCon. 2012-11-24. Retrieved 2013-04-05. 
  60. ^ "NorthSec". NorthSec. Retrieved 2014-11-21. 
  61. ^ "Call for papers". Retrieved 2013-04-05. 
  62. ^ "Phreaknic 12 - October 24th - 25th, 2008". Retrieved 2013-04-05. 
  63. ^ "QuahogCon". QuahogCon. Retrieved 2013-04-05. 
  64. ^ "". Retrieved 2014-07-17. 
  65. ^ "SkyDogCon". SkyDogCon. Retrieved 2013-04-05. 
  66. ^ "t2 infosec conference". Retrieved 2013-04-05. 
  67. ^ "The Hackers Conference 2013 - International IT Security Conference". Retrieved 2013-04-05. 
  68. ^ "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05. 
  69. ^ "Information Security Conference". ToorCon. Retrieved 2013-04-05. 
  70. ^ [6]
  71. ^ "". Retrieved 2014-07-17. 
  72. ^ "Hacking at Random". HAR2009. Retrieved 2013-04-05. 
  73. ^ "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Retrieved 2013-04-05. 

External links

  • Hacker Convention Comparison based on internet connectivity and attendees
  • List of academic security conferences and their submission deadlines; includes iCal calendars
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.