A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

Michael Lynn, a keynote speaker at Black Hat Briefings 2005

Common activities at hacker conventions may include:

List of general computer security conferences

General security conferences might be heldl;mMDLio saDop3 12[]by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies.

Haroon Meer,[4] a keynote speaker at Nullcon 2018


Hacker conferences

A team competing in the CTF competition at DEF CON 17

A hacker conference, also known as a hacker con, is a convention for hackers. These serve as meeting places for phreakers, hackers, and security professionals.

The actual events, time-spans, and details of various themes of these conventions not only depends on the specific convention attended but also its perceived reputation. Typically the actual details of any given convention are couched in mild secrecy due to the legality of certain panels, as well as the willingness of attendees to explain themselves to law enforcement and less computer-savvy individuals (see hacker definition controversy).

Common topics include wardriving, lockpicking, corporate and network security, personal rights and freedoms, new technologies, as well as general 'geek' motifs. Some may also have contests and general collaborative events such as hackathons.

A variety of electronic and non-electronic hacker conference badges

One facet of Hacker conferences that tends to differentiate many "HackerCons" from general computer security conferences, is the evolution of the conference badge. While many conferences use a fairly standard paper/plastic badge to identify attendees by name, many hacker con's have evolved to use more non-traditional badges, such as electronic PCB's with LED's, LCD screens, and can include wifi and advanced, often hidden functionality, to include games, that do not identify the individual, sometimes promoting a group identity or regional/local group affiliation. This has spurred the creation of so-called "badgelife" where different individuals and organizations (such as local hacker groups) may design, create, and sell or otherwise distribute a separate badge attendees wear in addition to their conference badge. These badges may be purchased, but some may have to be earned by completing a challenge at the conference. One of the rarest and most desirable badges is the DefCon Black Badge.[61] While the use of the badges are traditionally associated with DefCon, their use has spread to other conferences.

List of hacker conferences

Non-annual hacker conventions

References

  1. ^ "Latest Hacking Tools". Darknet. 28 May 2023.
  2. ^ "SX - Security Exchange '12". M.Tech Products. 2012. Retrieved 2013-04-05.
  3. ^ "Boot Camps". Skillsoft. Retrieved 2021-01-29.
  4. ^ "Haroon Meer". Archived from the original on 2018-07-04. Retrieved 2018-07-04.
  5. ^ "44Con Website". 44Con. Retrieved 2019-01-14.
  6. ^ "Acm Ccs". Sigsac.org. 2012-01-23. Retrieved 2013-04-05.
  7. ^ "Security Conference, Security Training & Security Networking - ACSAC 2013". ACSAC. Retrieved 2013-04-05.
  8. ^ "Past ACSACs - Annual Computer Security Applications Conference". ACSAC. Retrieved 2013-04-05.
  9. ^ "Annual Symposium on Information Assurance (ASIA)". Albany.edu. Retrieved 2013-04-05.
  10. ^ "NYS Division of Homeland Security & Emergency Services - OCS". Cscic.state.ny.us. 2013-02-21. Archived from the original on 2011-02-21. Retrieved 2013-04-05.
  11. ^ "Black Hat". Black Hat. Retrieved 2013-04-05.
  12. ^ "Bluehat Security Briefings". Microsoft.com. Retrieved 2013-04-05.
  13. ^ "Microsoft meets the hackers". CNET News. Retrieved 2013-04-05.
  14. ^ "Bluehat Security Briefings". Technet.microsoft.com. Retrieved 2013-04-05.
  15. ^ "BruconTraining". Retrieved 27 April 2015.
  16. ^ "CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada". Cansecwest.com. Retrieved 2013-04-05.
  17. ^ Naraine, Ryan (2012-01-23). "CanSecWest Pwn2Own hacker challenge gets a $105,000 makeover". ZDNet. Retrieved 2013-04-05.
  18. ^ Mills, Elinor (2010-03-24). "iPhone, Safari, IE 8, Firefox hacked in CanSecWest contest". CNET News. Retrieved 2013-04-05.
  19. ^ "css.umcs.lublin.pl". css.umcs.lublin.pl. Retrieved 2014-07-17.
  20. ^ a b "Asia's Most Popular Cybersecurity & Hacking Events". Outlook. Retrieved 2021-06-25.
  21. ^ a b "CIA Conference". ciaconference.com. Retrieved 2020-11-17.
  22. ^ "DeepSec 2012". The Ethical Hacker Network. Archived from the original on 2012-10-30. Retrieved 2013-04-05.
  23. ^ "DEFCON about".
  24. ^ "FSec". FSec. Retrieved 2013-04-05.
  25. ^ "grehack.fr". grehack.fr. 2013-11-15. Retrieved 2014-07-17.
  26. ^ "Security, Ethical Hacking conference and Capture The Flag (CTF) in Grenoble". GreHack. Retrieved 2013-04-05.
  27. ^ "Hacker Halted 2012". Hackerhalted.com. 2012-09-21. Retrieved 2013-04-05.
  28. ^ "Hack in Paris 2019". hackinparis.com. 2019-01-10. Retrieved 2019-01-15.
  29. ^ "HACK-IT-N 2021". hack-it-n.com. Retrieved November 9, 2021.
  30. ^ "TEHTRIS - Automatic Remediation of Cyberattacks". tehtris.com/. Retrieved November 9, 2021.
  31. ^ "Bienvenue à l'ENSEIRB-MATMECA | ENSEIRB-MATMECA". enseirb-matmeca.bordeaux-inp.fr. Retrieved November 9, 2021.
  32. ^ "HACK-IT-N 2021". www.hack-it-n.com/. Retrieved November 9, 2021.
  33. ^ "Hackito Ergo Sum 2013". Hackitoergosum.org. Retrieved 2013-04-05.
  34. ^ conference.hitb.org Archived 2014-06-25 at the Wayback Machine
  35. ^ "ICISSP 2022 - Conference". Retrieved November 9, 2021.
  36. ^ "IEEE Symposium on Security and Privacy". Ieee-security.org. Retrieved 2013-04-05.
  37. ^ "6th Annual IIA/ISACA Chicago IT Hacking and Cybersecurity Conference". 2019.
  38. ^ "infowarcon.com". infowarcon.com. Retrieved 2014-07-17.
  39. ^ "ARES Conference » Vienna, Austria". Retrieved November 9, 2021.
  40. ^ "Middle TN Cyber Conference". Retrieved 2022-04-01.
  41. ^ "NDSS Network & Distributed System Security Symposium". Internet Society. Retrieved 2013-04-05.
  42. ^ "Introduction | New Security Paradigms Workshop". Nspw.org. Retrieved 2013-04-05.
  43. ^ "International Security Conference". nullcon. 2013-03-02. Retrieved 2013-04-05.
  44. ^ "Cyber experts show vulnerability of GSM networks". Zeenews.india.com. 2012-02-19. Retrieved 2013-04-05.
  45. ^ "Appsec USA 2013". OWASP. 2013. Retrieved 2013-04-05.
  46. ^ "RuhrSec Conference". Hackmanit. 2017. Retrieved 2017-01-05.
  47. ^ "ICS Security Event Calendar". Digitalbond.com. Archived from the original on 2010-12-28. Retrieved 2013-04-05.
  48. ^ "SecurIT 2012 - Cyber Security conference on IoT". Securit.ws. Retrieved 2013-04-05.
  49. ^ "SecureWorld Conferences". SecureWorld Post. Seguro Group. Retrieved 2013-04-05.
  50. ^ "SINCONF 2021". www.sinconf.org. Retrieved November 9, 2021.
  51. ^ "Boston 2013". SOURCE Conference. 2012-04-17. Retrieved 2013-04-05.
  52. ^ "sstic.org". sstic.org. Retrieved 2014-07-17.
  53. ^ "SSTIC2013". Sstic.org. Retrieved 2013-04-05.
  54. ^ "Swiss Cyber Storm". SCS. Retrieved 2014-04-14.
  55. ^ "The IT-Security Conference". Troopers.de. Retrieved 2013-04-05.
  56. ^ "Events by Name: USENIX Security Symposium". USENIX. n.d. Retrieved 1 November 2015.
  57. ^ "Virus Bulletin conference". Virus Bulletin. Retrieved 2013-08-29.
  58. ^ "International Security Conference". E7H1C5. 2016-09-03. Retrieved 2013-04-05.
  59. ^ "PHDays *". PHDays.com. Retrieved 2018-01-15.
  60. ^ "Signal Processing Society Conferences & Workshops". IEEE Signal Processing Society. 17 April 2016. Retrieved 31 July 2018.
  61. ^ "A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards". motherboard.vice.com. 18 September 2018. Retrieved 2019-01-14.
  62. ^ "Internet Archive waybackmachine". Archived from the original on April 3, 2010. Retrieved May 3, 2010.
  63. ^ "Security B-Sides". Securitybsides.com. Retrieved 2013-04-05.
  64. ^ "What We Do". CactusCon. Retrieved 2021-11-08.
  65. ^ "CircleCityCon – The Game of Pwns". circlecitycon.com. Archived from the original on 2019-01-21. Retrieved 2016-03-24.
  66. ^ "About us – An Introduction, Indian Cyber Army [ICA], Securing Digital India". Archived from the original on 2016-06-18. Retrieved 2016-04-27.
  67. ^ "Milwaukee's Hacking Conference". CypherCon. Retrieved 2015-09-09.
  68. ^ "Wow! So That Was DerbyCon". Infosecisland.com. 2011-10-03. Archived from the original on 2019-07-03. Retrieved 2013-04-05.
  69. ^ "The Diana Initiative : Hacker Family, Our diversity Unifies Us". dianainitiative.org. 2018-02-09. Retrieved 2018-02-09.
  70. ^ "Digital Overdose Con: For Rookies @Digital Overdose". digitaloverdose.tech. Retrieved November 9, 2021.
  71. ^ "ekoparty Security Conference". Ekoparty.com.ar. Archived from the original on 2012-03-25. Retrieved 2013-04-05.
  72. ^ "Infosec Island". Infosec Island. Archived from the original on 2016-10-05. Retrieved 2013-04-05.
  73. ^ "Ground Zero Summit". Indian InfoSec Consortium. Archived from the original on 2019-05-31. Retrieved 2019-11-14.
  74. ^ "Hack In The Box 2012 Europe Call For Papers". Packet Storm Security. 2011-12-08. Retrieved 2013-04-05.
  75. ^ Kent, Jonathan (2011-05-23). "Hacking conference sees 'enemies' break boundaries". The Guardian. Retrieved 2013-04-05.
  76. ^ "Hackers Day International Information Security Conference". hackersday.org. Retrieved 2015-04-08.
  77. ^ "Hackers Day". Retrieved 2020-06-16 – via Facebook.
  78. ^ "H2HC 10th Edition". H2hc.org.br. Retrieved 2021-02-11.
  79. ^ "Academy". Archived from the original on April 11, 2014. Retrieved December 30, 2013.
  80. ^ "Hackers Next Door". Tech Learning Collective. Retrieved 2019-11-03.
  81. ^ "hackfest.ca". hackfest.ca. Retrieved 2014-07-17.
  82. ^ "Hackers Teaching Hackers". Hackers Teaching Hackers. Retrieved January 19, 2022.
  83. ^ "Hackmiami". Hackmiami. Retrieved 2013-04-05.
  84. ^ "Hacktivity The IT Security Festival in Central and Eastern Europe". Hacktivity. Retrieved 2013-04-05.
  85. ^ "hardwear.io | Hardware Security Conference & Training | Netherlands, Germany & USA". hardwear.io. Retrieved November 9, 2021.
  86. ^ "IDSECCONF 2022". IDSECCONF 2022. Retrieved 2023-01-29.
  87. ^ "Infiltrate - Security Conference". Infiltratecon.com. Retrieved 2013-04-05.
  88. ^ "LayerOne 2013 | Los Angeles' premiere security conference". Layerone.org. Retrieved 2013-04-05.
  89. ^ "Call for papers". lehack.org. Retrieved 2019-04-05.
  90. ^ "MalCon Malware Conference". MalCon. 2012-11-24. Archived from the original on 2013-05-26. Retrieved 2013-04-05.
  91. ^ "No Hat Computer Security Conference". Retrieved 2021-12-13.
  92. ^ "NorthSec". NorthSec. Retrieved 2014-11-21.
  93. ^ "Call for papers". nuitduhack.com. Retrieved 2013-04-05.
  94. ^ "Phreaknic 12 - October 24th - 25th, 2008". Phreaknic.info. Archived from the original on 2013-02-21. Retrieved 2013-04-05.
  95. ^ "PumpCon". PumpConCon. Archived from the original on 2018-10-26. Retrieved 2019-01-14.
  96. ^ "QuahogCon". QuahogCon. Retrieved 2013-04-05.
  97. ^ "roadsec.com.br". roadsec.com.br. Retrieved 2017-12-14.
  98. ^ "RootCon.org". RootCon.org. Retrieved 2012-02-29.
  99. ^ "ShellCon". shellcon.io. Retrieved 2020-02-29.
  100. ^ "ShmooCon". shmoocon.org. Retrieved 2021-12-29.
  101. ^ "SkyDogCon". SkyDogCon. Archived from the original on 2016-09-03. Retrieved 2013-04-05.
  102. ^ "The Hackers Conference 2013 - International IT Security Conference". Thehackersconference.com. Retrieved 2013-04-05.
  103. ^ "Chicago's Hacking Conference". Thotcon. Retrieved 2013-04-05.
  104. ^ "Information Security Conference". ToorCon. Retrieved 2013-04-05.
  105. ^ "Wild West Hackin Fest". Wild West Hackin' Fest. Retrieved 2017-10-27.
  106. ^ "www.icalab.com/zeroaccess". Retrieved May 12, 2014.[dead link]
  107. ^ "دِوسِکـ | DEVSEC - دوشنبه ۲۳ خرداد ۰۱". ایوند. Retrieved 2023-04-13.
  108. ^ "stichtinghxx.nl". stichtinghxx.nl. Archived from the original on 2010-01-12. Retrieved 2014-07-17.
  109. ^ "Hacking at Random". HAR2009. Retrieved 2013-04-05.
  110. ^ "OHM2013: Observe. Hack. Make. July 31 – August 4, 2013". Ohm2013.org. Retrieved 2013-04-05.