Misplaced Pages

Computer security conference

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
(Redirected from Computer Security conference) Convention for individuals involved in computer security
Audience at the keynote of Glenn Greenwald at the 30th Chaos Communication Congress, 30C3

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts. Common activities at hacker conventions may include:

List of general computer security conferences

General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

Haroon Meer, a keynote speaker at Nullcon 2018
  • 0SecCon Zero Security Conference held in Kerala
  • 44Con, an Infosec conference and training event that occurs annually in London, UK.
  • ACM-CCS (Conferences on Computer and Communications Security), security conference held since 1993.
  • ACSAC, Annual Computer Security Applications Conference - oldest information security conference held annually.
  • ASIA or the Annual Symposium on Information Assurance that serves as the academic track for the New York State Cyber Security Conference, an annual information security conference held in Albany, NY usually for two days during June targeted at academic, government, and industry participants.
  • Black Hat, a series of conferences held annually in different cities around the world. Black Hat USA, held in Las Vegas immediately before DEF CON, is one of the largest computer security events in the world.
  • BlueHat Conference, a twice a year, invitation-only Microsoft security conference aimed at bringing Microsoft security professionals and external security researchers together.
  • Brucon, yearly conference, previously held in Brussels, since 2012 it is held in Ghent. Lasting 2 days, and preceded by a training.
  • CanSecWest, in Vancouver is held at the end of March and hosts the Pwn2Own hacking contest.
  • CSS - International Conference on Cryptography and Security System in Poland.
  • CIA Conference - A series of international conference on cyber security which aims to bridge the gap between the corporate need of cyber security to the fancy world of hacking.
  • DeepSec, in Vienna covers many security aspects of computing and electronic communications as well as security management and social aspects. DeepSec is visited by a broad international audience, academics, researchers, vendors, finance, public administration etc. (2 days trainings, 2 days conference). Presentations are published on Vimeo and YouTube.
  • DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada.
  • Department of Defense Cyber Crime Conference, an annual conference that focuses on the computer security needs of the United States federal government, military, and defense contractors.
  • FSec - Croatian annual security conference held at the Faculty of organization and informatics in Varaždin.
  • GreHack.fr, an annual conference held in Grenoble. Speakers from academia, industry. Both offensive and defensive security.
  • Hack.lu, an annual conference held in Luxembourg
  • Hacker Halted, Presented by EC-Council, the objective of the global series of Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security.
  • HackinParis, Is an annual event organized by SYSDREAM. The program includes IT security, industrial espionage, penetration testing, physical security, social engineering, forensics, malware analysis techniques and countermeasures.
  • HACK-IT-N is a cybersecurity conference that deals with current issues and offensive and defensive techniques of the moment: hacking, cyber-espionage, cyber-surveillance etc. It's held in Bordeaux at the end of each year and organized by TEHTRIS and the ENSEIRB-MATMECA engineering school.
  • Hackito Ergo Sum, Security conference pertaining to research topics, with attendees and speakers from both the industry, the offensive side and the academic circles, held in Paris every April.
  • HITBSecConf / Hack In The Box, deep-knowledge security conference held in Malaysia and the Netherlands.
  • HOU.SEC.CON, A Houston-area Cyber/information Security Conference established in 2010,
  • ICISSP International Conference on Information Systems Security and Privacy,
  • IEEE Symposium on Security and Privacy, top-tier privacy & security conference.
  • IEEE WIFS Workshop on Information Forensics and Security conference hosted by IEEE Signal Processing Society.
  • IIA/ISACA Chicago IT Hacking and Cybersecurity Conference, a regional, two-day event that brings together executives and professionals in audit, IT, and risk management functions to hear current trends and first-hand knowledge from subject matter experts.
  • INFOWARCON Beyond Information Warfare - Offensive Cyber Weapons and Technologies Training Congress.
  • IP EXPO Europe, held annually at London's ExCeL Centre
  • IP EXPO Nordic, held annually at Stockholm's Waterfront Congress Centre
  • IWSECC International Workshop on Security Engineering for Cloud Computing in conjunction with the 14th International Conference on Availability, Reliability and Security (ARES Conference » Vienna, Austria)
  • LeetCon, IT-Security-Convention in Hannover (Germany), frequently October or November every Year. Talks about IT-Security, IoT, Industry 4.0 and more.
  • Middle Tennessee Cyber Conference is an annual two-day event that covers cybersecurity trends, first-hand knowledge from subject matter experts, and operates a CtF for attendees.
  • NDSS (Network & Distributed System Security Symposium), annual security conference from Internet Society.
  • NSPW (New Security Paradigms Workshop), a workshop with new ideas in security.
  • Nullcon Security Conference is an annual security event held in Goa, India.
  • Open Web Application Security Project (OWASP), Focuses on web application security.
  • Positive Hack Days, Annual international IT Security event with workshops held in Moscow, Russia.
  • REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques.
  • RSA Security Conference, Cryptography and information security-related conference held annually in the San Francisco Bay Area.
  • RuhrSec, annual non-profit security conference at the Ruhr University Bochum.
  • S4:SCADA Security Scientific Symposium, Security conference pertaining to SCADA held annually by Digital Bond, usually in Miami.
  • SecurIT 2012, International Conference on Security of Internet of Things held in mid of August at Amrita Vishwa Vidyapeetham.
  • SecureWorld Expo, a series of IT Security conferences offering education, CPE training opportunities, and networking of security leaders, experts, senior executives, and policy makers who shape the face of security.
  • SIN ACM, or the International Conference on Security of Information and Networks.
  • SOURCE Conference, SOURCE is a computer security conference in Boston, Dublin and Seattle that offers education in both the business and technical aspects of the security industry.
  • SSTIC [fr], Annual French Security Symposium held in Rennes.
  • Swiss Cyber Storm, International IT Security Conference held in October at KKL Lucerne.
  • TROOPERS IT Security Conference, Annual international IT Security event with workshops held in Heidelberg, Germany.
  • USENIX Security, annual security conference associated with USENIX.
  • Virus Bulletin conference, annual security conference held late September or early October since 1989.

Hacker conferences

A team competing in the CTF competition at DEF CON 17

A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security professionals.

The actual events, time-spans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

A variety of electronic and non-electronic hacker conference badges

One facet of Hacker conferences that tends to differentiate many "HackerCons" from general computer security conferences, is the evolution of the conference badge. While many conferences use a fairly standard paper/plastic badge to identify attendees by name, many hacker con's have evolved to use more non-traditional badges, such as electronic PCB's with LED's, LCD screens, and can include wifi and advanced, often hidden functionality, to include games, that do not identify the individual, sometimes promoting a group identity or regional/local group affiliation. This has spurred the creation of so-called "badgelife" where different individuals and organizations (such as local hacker groups) may design, create, and sell or otherwise distribute a separate badge attendees wear in addition to their conference badge. These badges may be purchased, but some may have to be earned by completing a challenge at the conference. One of the rarest and most desirable badges is the DefCon Black Badge. While the use of the badges are traditionally associated with DefCon, their use has spread to other conferences.

Pixelflut is a common activity at hacker events. It is a protocol for software to draw a canvas. Usually this is done in a client-server architecture with multiple clients who send individual pixels and the server displays. The clients then overwrite each others images on the same server. There are various variants of the protocol and different implementations for both the server and the client.

List of hacker conferences

  • AthCon, the largest hacker conference in South Eastern Europe taking place annually in Athens, Greece.
  • BSides, community conference that initially started in the US is now global.
  • Blackhoodie, is a series of free, women-only reverse engineering conference offering workshops and talks. They are held in different cities around the world on a regular basis to encourage women interested in the cyber security field.
  • BornHack, an annual hacker camp on the Danish island of Funen.
  • CactusCon, the largest hacker and cybersecurity conference in Arizona, held annually since 2012.
  • CarolinaCon, an annual information security and rights conference held every spring in North Carolina's Research Triangle.
  • Chaos Communication Congress, the oldest and Europe's largest hacker conference, held by Chaos Computer Club.
  • CIA Conference - A series of international conference on cyber security which aims to bridge the gap between the corporate need of cyber security to the fancy world of hacking.
  • CircleCityCon is a security and technology conference held annually in June in Indianapolis.
  • Cop CON, is a unique Cyber Policing Conference held across India every year by Indian Cyber Army.
  • CypherCon, a Milwaukee based hacker conference held late winter each year.
  • DEF CON, in Las Vegas, Nevada, is the biggest hacker convention in the United States held during summer (June–August).
  • DerbyCon, an annual hacker conference based in Louisville, KY (2011–2019).
  • DEVSEC Conf, National Conference on Cyber Security and Operation Development (DevOps) in Farsi in Iran
  • Diana Initiative, an annual hacker conference to promote Women in cybersecurity technologies by The Diana Initiative non profit org located in Las Vegas, NV.
  • Digital Overdose Con, a Europe based hacker and tech conference focused on rookies held in the spring each year.
  • Ekoparty, a hacker convention in Argentina and one of the most important in South America, held annually around September in Buenos Aires.
  • GrrCon, an annual hacker conference hosted each September in Grand Rapids, Michigan.
  • GroundZero Summit, an annual hacker conference hosted each November in Hotel Ashoka, New Delhi.
  • Hack in the Box, an annual hacker conference.
  • Hackers Day is one of the hacking conferences in India held frequently in January–February every year. The organizers also used to organize DEFCON Lucknow, which was dissolved by the DEFCON after many controversies arose in 2016.
  • Hackers 2 Hackers Conference (H2HC) is the oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.
  • Hackers Idol, is a unique Hackers & Cyber Enthusiast Talent Hunt held across India every year by Indian Cyber Army.
  • Hackers Next Door, in New York City is held by Tech Learning Collective during the Winter (November/December).
  • Hackers on Planet Earth (HOPE), in New York City is held by 2600: The Hacker Quarterly in mid-summer (July/August) every other year.
  • Hackfest.ca, in Quebec, Canada, bilingual conferences and hacking games.
  • Hackers Teaching Hackers, a hacker conference in Columbus, Ohio, featuring talks, hands-on villages, a CTF, mentorship, and more.
  • HackMiami Conference, a hacker conference in Miami, Florida, organized by the HackMiami hackerspace.
  • Hardwear.io - Hardware Security Conference is an annual Hardware Security event held in The Hague, Netherlands. It is being organized every year to answer the emerging threats and attacks on hardware.
  • IDSECCONF, Indonesian annual IT Hacking and Cybersecurity conference.
  • INFILTRATE, hosted by Immunity, Inc, is a deep technical security conference that focuses on offensive technical issues. The conference has been held annually in Miami Beach, Florida since 2011.
  • Kernelcon, is an Omaha, Nebraska hacker convention held annually in April, beginning in 2019.
  • Kiwicon, is a Wellington, New Zealand hacker convention.
  • LayerOne, held every spring in Los Angeles, California.
  • LeHack, FRENCH HACKERS CONFERENCE hosted in Paris
  • Malcon, the world's first International Malware Conference, hosted in India.
  • No Hat is an international computer security conference held annually in Bergamo (IT), and considered the largest technical security event in Italy.
  • NorthSec, in Montreal, Quebec, is an applied security event held yearly mid-May, featuring two days of conference followed by a 48h on-site CTF.
  • Notacon, in Cleveland, Ohio, is an art and technology conference held frequently in mid-April.
  • Nuit Du Hack, in Paris, France, is the oldest and largest hacker conference held frequently in late-June.
  • PhreakNIC, in Nashville, Tennessee, is held by Nashville 2600. around October.
  • Pumpcon, A yearly HackerCon in a bar in Philadelphia, PA.
  • Quahogcon, In Providence, Rhode Island is held at the end of April.
  • Roadsec, One of the biggest hacking conferences in Latin America, held in Brazil, with smaller city editions throughout the whole year, and a big ending edition held in São Paulo in November (February - November).
  • ROOTCON, is the leading pioneer of hacking conferences in the Philippines and the most sought after conference by security researchers, professionals and enthusiasts for top caliber source of security skills and discoveries that is held annually around the months of September - October.
  • RootedCON, in Madrid, Spain, is one of the biggest hacker conference in Europe. This convention started in 2010. (March)
  • ShellCon, in Los Angeles CA is an information security conference that is held annually in the beautiful beach cities of Los Angeles.
  • ShmooCon, in Washington, DC is an annual east coast hacker conference that is held in Washington, DC.
  • SkyDogCon, A technology conference in Nashville, TN for the individual with the Renaissance Mind. SkyDogCon exists to facilitate learning, information sharing, and mingling with like-minded people in a relaxed atmosphere.
  • Sthack is an annual security conference in Bordeaux, followed by the traditional Capture The Flag.
  • Summercon, one of the oldest hacker conventions, held during Summer (frequently in June). It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON.
  • The Hackers Conference, is India's biggest Cyber Security Conference held in New Delhi, India every Year.
  • THOTCON, a Chicago based hacker conference held in the Spring each year.
  • ToorCon, San Diego hacker convention that emerged from the 2600 user group frequently in late September.
  • WildWestHackinFest, a conference focused on training and development held in Deadwood, South Dakota in October. Explore the Black Hills and learn how to hack all the things, including the IoT.
  • ZeroAccess, is a unique International Cyber Security Conference held in India, India in the Month of April by Indian Cyber Army

Non-annual hacker conventions

  • Stichting HAL2001, a not-for-profit organization, holds a quadrennial Dutch hacker convention. They have, so far, held HAL2001 (Hackers at Large) and What the Hack (2005, originally called HEX (referring to the 16th anniversary of the event, as well as an acronym for Hacking Extreme)). The Dutch conferences held prior Stichting HAL2001's existence were Galactic Hacker Party (1989), Hacking at the End of the Universe (1993) and Hacking In Progress (1997), notable for being held simultaneously and in conjunction with Beyond HOPE. The not-for-profit organization 'Stichting Hxx' was organizing the 2009 incarnation of this con; HAR (Hacking at Random). During the summer of 2013 the next installment of the series, called OHM (Observe Hack Make), was held., followed by SHA (Still Hacking Anyway) in 2017. The 2021 edition was delayed due to Covid and held as MCH (May Contain Hackers) in 2022.

References

  1. "Latest Hacking Tools". Darknet. 28 May 2023.
  2. "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05.
  3. "Boot Camps". Skillsoft. Retrieved 2021-01-29.
  4. "Haroon Meer". Archived from the original on 2018-07-04. Retrieved 2018-07-04.
  5. "International Security Conference". E7H1C5. 2016-09-03. Retrieved 2013-04-05.
  6. "44Con Website". 44Con. Retrieved 2019-01-14.
  7. "Acm Ccs". Sigsac.org. 2012-01-23. Retrieved 2013-04-05.
  8. "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05.
  9. "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05.
  10. "Annual Symposium on Information Assurance (ASIA)". Albany.edu. Retrieved 2013-04-05.
  11. "NYS Division of Homeland Security & Emergency Services - OCS". Cscic.state.ny.us. 2013-02-21. Archived from the original on 2011-02-21. Retrieved 2013-04-05.
  12. "Black Hat". Black Hat. Retrieved 2013-04-05.
  13. "Bluehat Security Briefings". Microsoft.com. Retrieved 2013-04-05.
  14. "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05.
  15. "Bluehat Security Briefings". Technet.microsoft.com. Retrieved 2013-04-05.
  16. "BruconTraining". Retrieved 27 April 2015.
  17. "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Cansecwest.com. Retrieved 2013-04-05.
  18. Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Archived from the original on January 29, 2012. Retrieved 2013-04-05.
  19. Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05.
  20. "css.umcs.lublin.pl". css.umcs.lublin.pl. Retrieved 2014-07-17.
  21. ^ "Asia's Most Popular Cybersecurity & Hacking Events". Outlook. Retrieved 2021-06-25.
  22. ^ "CIA Conference". ciaconference.com. Retrieved 2020-11-17.
  23. "DeepSec 2012". The Ethical Hacker Network. Archived from the original on 2012-10-30. Retrieved 2013-04-05.
  24. "DEFCON about".
  25. "FSec". FSec. Retrieved 2013-04-05.
  26. "grehack.fr". grehack.fr. 2013-11-15. Retrieved 2014-07-17.
  27. "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble". GreHack. Retrieved 2013-04-05.
  28. "Hacker Halted 2012". Hackerhalted.com. 2012-09-21. Retrieved 2013-04-05.
  29. "Hack in Paris 2019". hackinparis.com. 2019-01-10. Retrieved 2019-01-15.
  30. "HACK-IT-N 2021". hack-it-n.com. Retrieved November 9, 2021.
  31. "TEHTRIS - Automatic Remediation of Cyberattacks". tehtris.com/. Retrieved November 9, 2021.
  32. "Bienvenue à l'ENSEIRB-MATMECA | ENSEIRB-MATMECA". enseirb-matmeca.bordeaux-inp.fr. Retrieved November 9, 2021.
  33. "HACK-IT-N 2021". www.hack-it-n.com/. Retrieved November 9, 2021.
  34. "Hackito Ergo Sum 2013". Hackitoergosum.org. Retrieved 2013-04-05.
  35. conference.hitb.org Archived 2014-06-25 at the Wayback Machine
  36. "HOU.SEC.CON".
  37. "ICISSP 2022 - Conference". Retrieved November 9, 2021.
  38. "IEEE Symposium on Security and Privacy". Ieee-security.org. Retrieved 2013-04-05.
  39. "Signal Processing Society Conferences & Workshops". IEEE Signal Processing Society. 17 April 2016. Retrieved 31 July 2018.
  40. "6th Annual IIA/ISACA Chicago IT Hacking and Cybersecurity Conference". 2019.
  41. "infowarcon.com". infowarcon.com. Retrieved 2014-07-17.
  42. "ARES Conference » Vienna, Austria". Retrieved November 9, 2021.
  43. "Middle TN Cyber Conference". Retrieved 2022-04-01.
  44. "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05.
  45. "Introduction | New Security Paradigms Workshop". Nspw.org. Retrieved 2013-04-05.
  46. "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05.
  47. "Cyber experts show vulnerability of GSM networks". Zeenews.india.com. 2012-02-19. Retrieved 2013-04-05.
  48. "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05.
  49. "PHDays *". PHDays.com. Retrieved 2018-01-15.
  50. "RuhrSec Conference". Hackmanit. 2017. Retrieved 2017-01-05.
  51. "ICS Security Event Calendar". Digitalbond.com. Archived from the original on 2010-12-28. Retrieved 2013-04-05.
  52. "SecurIT 2012 - Cyber Security conference on IoT". Securit.ws. Retrieved 2013-04-05.
  53. "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013-04-05.
  54. "SINCONF 2021". www.sinconf.org. Retrieved November 9, 2021.
  55. "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05.
  56. "sstic.org". sstic.org. Retrieved 2014-07-17.
  57. "SSTIC2013". Sstic.org. Retrieved 2013-04-05.
  58. "Swiss Cyber Storm". SCS. Retrieved 2014-04-14.
  59. "The IT-Security Conference". Troopers.de. Retrieved 2013-04-05.
  60. "Events by Name: USENIX Security Symposium". USENIX. n.d. Retrieved 1 November 2015.
  61. "Virus Bulletin conference". Virus Bulletin. Retrieved 2013-08-29.
  62. "A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards". motherboard.vice.com. 18 September 2018. Retrieved 2019-01-14.
  63. By (2024-08-30). "Online Game Becomes Unexpected PixelFlut". Hackaday. Retrieved 2024-11-22.
  64. By (2020-08-01). "Playing The Pixelflut". Hackaday. Retrieved 2024-11-22.
  65. "Internet Archive waybackmachine". Archived from the original on April 3, 2010. Retrieved May 3, 2010.
  66. "Security B-Sides". Securitybsides.com. Retrieved 2013-04-05.
  67. "What We Do". CactusCon. Retrieved 2021-11-08.
  68. "CircleCityCon – The Game of Pwns". circlecitycon.com. Archived from the original on 2019-01-21. Retrieved 2016-03-24.
  69. "About us – An Introduction, Indian Cyber Army [ICA], Securing Digital India". Archived from the original on 2016-06-18. Retrieved 2016-04-27.
  70. "Milwaukee's Hacking Conference". CypherCon. Retrieved 2015-09-09.
  71. "Wow! So That Was DerbyCon". Infosecisland.com. 2011-10-03. Archived from the original on 2019-07-03. Retrieved 2013-04-05.
  72. "دِوسِکـ | DEVSEC - دوشنبه ۲۳ خرداد ۰۱". ایوند. Retrieved 2023-04-13.
  73. "The Diana Initiative : Hacker Family, Our diversity Unifies Us". dianainitiative.org. 2018-02-09. Retrieved 2018-02-09.
  74. "Digital Overdose Con: For Rookies @Digital Overdose". digitaloverdose.tech. Retrieved November 9, 2021.
  75. "ekoparty Security Conference". Ekoparty.com.ar. Archived from the original on 2012-03-25. Retrieved 2013-04-05.
  76. "Infosec Island". Infosec Island. Archived from the original on 2016-10-05. Retrieved 2013-04-05.
  77. "Ground Zero Summit". Indian InfoSec Consortium. Archived from the original on 2019-05-31. Retrieved 2019-11-14.
  78. "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05.
  79. Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". The Guardian. Retrieved 2013-04-05.
  80. "Hackers Day International Information Security Conference". hackersday.org. Retrieved 2015-04-08.
  81. "Hackers Day". Retrieved 2020-06-16 – via Facebook.
  82. "H2HC 10th Edition". H2hc.org.br. Retrieved 2021-02-11.
  83. "Academy". Archived from the original on April 11, 2014. Retrieved December 30, 2013.
  84. "Hackers Next Door". Tech Learning Collective. Retrieved 2019-11-03.
  85. "hackfest.ca". hackfest.ca. Retrieved 2014-07-17.
  86. "Hackers Teaching Hackers". Hackers Teaching Hackers. Retrieved January 19, 2022.
  87. "Hackmiami". Hackmiami. Retrieved 2013-04-05.
  88. "hardwear.io | Hardware Security Conference & Training | Netherlands, Germany & USA". hardwear.io. Retrieved November 9, 2021.
  89. "IDSECCONF 2022". IDSECCONF 2022. Retrieved 2023-01-29.
  90. "Infiltrate - Security Conference". Infiltratecon.com. Retrieved 2013-04-05.
  91. "LayerOne 2013 | Los Angeles' premiere security conference". Layerone.org. Retrieved 2013-04-05.
  92. "Call for papers". lehack.org. Retrieved 2019-04-05.
  93. "MalCon Malware Conference". MalCon. 2012-11-24. Archived from the original on 2013-05-26. Retrieved 2013-04-05.
  94. "No Hat Computer Security Conference". Retrieved 2021-12-13.
  95. "NorthSec". NorthSec. Retrieved 2014-11-21.
  96. "Call for papers". nuitduhack.com. Retrieved 2013-04-05.
  97. "Phreaknic 12 - October 24th - 25th, 2008". Phreaknic.info. Archived from the original on 2013-02-21. Retrieved 2013-04-05.
  98. "PumpCon". PumpConCon. Archived from the original on 2018-10-26. Retrieved 2019-01-14.
  99. "QuahogCon". QuahogCon. Retrieved 2013-04-05.
  100. "roadsec.com.br". roadsec.com.br. Retrieved 2017-12-14.
  101. "RootCon.org". RootCon.org. Retrieved 2012-02-29.
  102. "ShellCon". shellcon.io. Retrieved 2020-02-29.
  103. "ShmooCon". shmoocon.org. Retrieved 2021-12-29.
  104. "SkyDogCon". SkyDogCon. Archived from the original on 2016-09-03. Retrieved 2013-04-05.
  105. "The Hackers Conference 2013 - International IT Security Conference". Thehackersconference.com. Retrieved 2013-04-05.
  106. "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05.
  107. "Information Security Conference". ToorCon. Retrieved 2013-04-05.
  108. "Wild West Hackin Fest". Wild West Hackin' Fest. Retrieved 2017-10-27.
  109. "www.icalab.com/zeroaccess". Retrieved May 12, 2014.
  110. "stichtinghxx.nl". stichtinghxx.nl. Archived from the original on 2010-01-12. Retrieved 2014-07-17.
  111. "Hacking at Random". HAR2009. Retrieved 2013-04-05.
  112. "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Ohm2013.org. Retrieved 2013-04-05.

External links

Categories: