Security conferences – Survival guide 2017 Q3

The security conferences “Survival guide” for 2017 Q3 is here!
We have gathered the following information for you for each conference:

  • Dates
  • Place
  • Link to official conference website
  • Ticket price
  • Lectures
  • Workshops

So let’s get started:


Security conferences – Survival guide part 3
Camp++


  • Dates: 6 – 9 July 2017
  • Place: Fort Monostor, Komárom, Hungary
  • Link to official conference website: https://camp.hsbp.org/2017/pp7e1/cfp.html
  • Ticket price: 80 USD
  • Lectures: unpublished
  • Workshops: unpublished

SteelCon


  • Dates: 7 – 9 July 2017
  • Place: Owen building at Sheffield Hallam University, UK
  • Link to official conference website: https://www.steelcon.info/
  • Ticket price: 35 USD
  • Lectures: unpublished
  • Workshops: unpublished

Black Hat USA


  • Dates:
  1. Conference: 26 – 27 July 2017
  2. Training: 22 – 25 July 2017
  • Place: Mandalay Bay, Las Vegas, USA
  • Link to official conference website: https://www.blackhat.com/us-17/
  • Ticket price: 2095 – 2800 USD
  • Lectures: unpublished
  • Workshops:
  1. A GUIDE TO THREAT HUNTING UTILIZING THE ELK STACK AND POWERSHELL by Thomas Pace, Michael Scott and Eric Cornelius
  2. ABILITIES INC – METASPLOIT BASICS by Rob Fuller and Egypt (James Lee)
  3. ABILITIES INC – METASPLOIT MASTERY by by Rob Fuller and Egypt (James Lee)
  4. ABSOLUTE SCADA: RED TEAM EDITION by Jonathan Pollet and Tom Parker
  5. ACTIVE DIRECTORY ATTACKS FOR RED AND BLUE TEAMS by Nikhil Mittal and Nishant Sharma
  6. ADAPTIVE PENETRATION TESTING by Dan McInerney, Michael Allen and Marcello Salvati
  7. ADVANCED CLOUD SECURITY AND APPLIED SECDEVOPS by Rich Mogull
  8. ADVANCED HARDWARE HACKING: HANDS-ON POWER ANALYSIS & GLITCHING WITH THE CHIPWHISPERER by Colin O’Flynn
  9. ADVANCED INFRASTRUCTURE HACKING – 2017 EDITION: 2 DAY by Owen Shearing
  10. ADVANCED INFRASTRUCTURE HACKING – 2017 EDITION: 4 DAY by Sumit “sid” Siddharth and Anant Shrivastava
  11. ADVANCED MALWARE TRAINING: WITH NEXT-GEN TOOLS by Dr. Joshua Stroschein
  12. ADVANCED OPEN SOURCE INTELLIGENCE TECHNIQUES by Michael Bazzell
  13. ADVANCED PRACTICAL SOCIAL ENGINEERING by Christopher Hadnagy and Michele Fincher
  14. ADVANCED SECURITY: FOR HACKERS AND DEVELOPERS by Dr. Jared DeMott
  15. ADVANCED WINDOWS EXPLOITATION by Matteo Memelli
  16. ADVANCED WIRELESS EXPLOITATION by Vivek Ramachandran and Thomas d’Otreppe
  17. AIKIDO ON THE COMMAND LINE: LINUX HARDENING AND CONTAINMENT by Jay Beale
  18. ANALYZING AN IOT EMPIRE by Michael Schloh
  19. ANDROID APPLICATION HACKING – PENETRATION AND REVERSING MOBILE APPS by Israel Chorzevski
  20. APPLICATION SECURITY: FOR HACKERS AND DEVELOPERS by Dr. Jared DeMott
  21. APPLIED DATA SCIENCE FOR SECURITY PROFESSIONALS by Charles Givre, Austin Taylor and Dr. Melissa Kilby
  22. APPLIED HARDWARE ATTACKS: EMBEDDED SYSTEMS by Joe FitzPatrick
  23. APPLIED HARDWARE ATTACKS: HARDWARE PENTESTING by Joe FitzPatrick
  24. ARM IOT EXPLOIT LABORATORY: ADVANCED by Saumil Shah
  25. ARM IOT EXPLOIT LABORATORY: INTRO by Saumil Shah
  26. ART AND SCIENCE OF SECURITY RESEARCH by Gregory Conti and David Raymond
  27. ASSESSING AND EXPLOITING CONTROL SYSTEMS & IOT by Justin Searle
  28. ATTACKS OVER GSM WITH PROJECT MAYHEM by Stephen Chicosky, William Peterson and Ken Welch
  29. AUTOMATING EXPLOITATION WITH NMAP SCRIPTING ENGINE by Josh Amishav-Zlatin
  30. BASIC INFRASTRUCTURE HACKING by Will Hunt and Neelu Tripathy
  31. BASIC WEB HACKING by Sunil Yadav and Rohit Salecha
  32. BEYOND THE BEAST: A BROAD SURVEY OF CRYPTO VULNERABILITIES by Alex Balducci
  33. BEYOND THE SCRIPT: PRACTICAL PROBLEM SOLVING TECHNIQUES FOR THE SECURITY PROFESSIONAL by Jeremy “CrYpT” Dodson, Ryan “1o57” Clarke and Mike “Anch” Guthrie
  34. BLACK OPS HACKING FOR PENTESTERS – MASTER LEVEL by SensePost
  35. CAR HACKING – HANDS ON by Robert Leale
  36. CLOUD SECURITY HANDS ON (CCSK-PLUS) by James Arlen
  37. CRYPTOGRAPHY USES AND MISUSES: HOW TO USE CRYPTO PROPERLY AND ATTACK THOSE THAT DON’T by Yehuda (Andrew) Lindell
  38. DARK SIDE OPS II: ADVERSARY SIMULATION by Brady Bloxham
  39. DARK SIDE OPS: CUSTOM PENETRATION TESTING by Brady Bloxham
  40. DEFENSE AND OFFENSE: UNDERSTANDING ATTACKERS THROUGH RED TEAM TACTICS by David Kennedy
  41. DIGITAL FORENSICS & INCIDENT RESPONSE by Andrew Case and Jamie Levy
  42. ERP SECURITY: ASSESS, EXPLOIT AND DEFEND SAP PLATFORMS by Julian Rapisardi
  43. ESCAPING OPPRESSION USING COVERT STEGANOGRAPHY by John Ortiz
  44. EXPANDING THE BLUE TEAM BY BUILDING A SECURITY CULTURE PROGRAM by Masha Sedova and Marisa Fagan
  45. FUZZING FOR VULNERABILITIES by Chris Bisnett and Kyle Hanslovan
  46. HACKING FIRMWARE & HARDWARE: SOFTWARE EXPLOITATION VIA HARDWARE EXPLOITATION by Senrio Research Team
  47. HACKING HARDENED SOFTWARE CRYPTO by Jasper (@jzvw)
  48. HANDS ON LINUX WEB SERVER HARDENING AND SYSTEM MONITORING FOR PCI by Lance
  49. HANDS-ON HARDWARE HACKING AND REVERSE ENGINEERING by Joe Grand (@joegrand)
  50. HANDS-ON PENETRATION TESTING OF MOBILE DEVICES by Georgia Weidman
  51. IC REVERSE ENGINEERING 101 by Oliver Thomas
  52. INCIDENT RESPONSE: BLACK HAT EDITION
  53. INSIDER THREAT MITIGATION AND COUNTERMEASURES by Deputy Sheriff, Robin and Randy Marcoz
  54. KALI LINUX REVEALED – MASTERING THE PENETRATION TESTING DISTRIBUTION by Mati Aharoni and Johnny Long
  55. MACHINE LEARNING FOR PENTESTERS AND SECURITY RESEARCHERS by Sinan Ozdemir
  56. MALWARE ANALYSIS CRASH COURSE
  57. MILITARY STRATEGY AND TACTICS FOR CYBER SECURITY by Gregory Conti and David Raymond
  58. NETWORK FORENSICS: CONTINUOUS MONITORING AND INSTRUMENTATION by Sherri Davidoff and David Harrison
  59. OFFENSIVE MOBILE APPLICATION EXPLOITATION by Prateek Gianchandani
  60. OPEN SOURCE INTELLIGENCE WITH MALTEGO by Paul Richards
  61. OS X MALWARE ANALYSIS CRASH COURSE
  62. PENETRATION TESTING WITH KALI LINUX by Jim O’Gorman
  63. PENTESTING ENTERPRISE INFRASTRUCTURE – JOURNEYMAN LEVEL by SensePost
  64. PHYSICAL PENETRATION TESTING by Robert Pingor and Babak
  65. PRACTICAL ANDROID EXPLOITATION by Stephen A. Ridley
  66. PRACTICAL ARM EXPLOITATION (2-DAY BOOT CAMP) by Senrio Research Team
  67. PRACTICAL THREAT INTELLIGENCE by Andrew van der Stock
  68. PYTHON HACKER BOOTCAMP: ZERO TO HERO by JC Carruthers and Perry Jones
  69. RISK MANAGEMENT FRAMEWORK (CNSS-4016) by Jeff Moulton
  70. ROUTER BACKDOOR ANALYSIS
  71. SECDEVOPS: INJECTING SECURITY INTO DEVOPS by SensePost
  72. SOFTWARE DEFINED RADIO by Michael Ossmann
  73. TACTICAL DEFENSE WITH MODSECURITY by Josh Amishav-Zlatin
  74. TACTICAL EXPLOITATION: ATTACKING UNIX by Colin Ames and Val Smith
  75. TACTICAL EXPLOITATION: ATTACKING WINDOWS by Colin Ames and Val Smith
  76. TACTICS, TECHNIQUES AND PROCEDURES FOR HACKERS by SensePost
  77. THE IDA PRO ADVANCED COURSE: REVERSE ENGINEERING WITH IDA PRO by Chris Eagle
  78. THE IDA PRO BASIC COURSE by Chris Eagle
  79. THE MOBILE APPLICATION HACKER’S HANDBOOK: LIVE EDITION by Dominic Chell
  80. THE SHELLCODE LAB by Ty Miller
  81. THE WEB APPLICATION HACKER’S HANDBOOK, LIVE EDITION by Marcus Pinto
  82. VISUAL ANALYTICS – DELIVERING ACTIONABLE SECURITY INTELLIGENCE by Raffael Marty
  83. VISUALIZING AND EXPLORING YOUR OWN DATA WITH MALTEGO by Roelof Temmingh and Andrew Macpherson
  84. WHITEBOARD HACKING AKA HANDS-ON THREAT MODELING by Sebastien Deleersnyder
  85. WINDOWS KERNEL ROOTKIT TECHNIQUES by T. Roy

DEFCON


USENIX Security


c0c0n


  • Dates:
  1. Conference: 18 – 19 August 2017
  2. Training: 17 August 2017
  • Place: HOTEL LE MERIDIEN, KOCHI, INDIA
  • Link to official conference website: http://is-ra.org/c0c0n/
  • Ticket price: unpublished
  • Lectures: unpublished
  • Workshops: unpublished

AlligatorCon


  • Dates: 25 – 26 August 2017
  • Place: Kraków, Poland
  • Link to official conference website: http://alligatorcon.pl/
  • Ticket price: Free
  • Lectures: Unknown
  • Workshops: Unknown

HITB GSEC


  • Dates:
  1. Conference: 24 – 25 August 2017
  2. Training: 21 – 24 August 2017
  • Place: InterContinental Singapore
  • Link to official conference website: http://gsec.hitb.org/sg2017/
  • Ticket price: 1200 USD
  • Lectures: unpublished
  • Workshops:
  1. ICS/SCADA Security by Louis Hur, Edward Lee and Junyuan Chai
  2. Vulnerability Discovery and Triage Automation by Richard Johnson
  3. Hardware Hacking with Hardsploit & Drones by Julien Moinard
  4. Making & Breaking Machine Learning Systems by Clarence Chio and Anto Joseph
  5. Practical Car Hacking by Robert Leale and KC Johnson

ESORICS Oslo


  • Dates:
  1. Conference: 11 – 13 September 2017
  2. Training: 14 – 15 September 2017
  1. 1st European Workshop on Security and Privacy in Fog and Edge Computing (SPIFEC)
  2. 3rd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS)
  3. ESORICS Doctoral Consortium – COINS Nordic PhD Workshop
  4. 1st International Workshop on Security and Privacy Requirements Engineering (SECPRE 2017)
  5. International Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE)
  6. 6th International Workshop on Quantitative Aspects of Security Assurance (QASA 2017)
  7. International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2017)
  8. 12th International Workshop on Data Privacy Management (DPM 2017)
  9. 13th International Workshop on Security and Trust Management (STM 2017)
  10. The International Workshop on Secure Internet of Things

44CON


  • Dates:
  1. Conference: 14 – 15 September 2017
  2. Training: 11 – 13 September 2017
  • Place: ILEC Conference Centre, London UK
  • Link to official conference website: https://44con.com/
  • Ticket price: 500 USD
  • Lectures: unpublished
  • Workshops:
  1. Windows Kernel Exploitation by Ashfaq Ansari
  2. Mobile Application Hacker’s Handbook: Live Edition by Dominic Chell
  3. Social Engineering Training by Dominique C. Brack
  4. Network Forensics Training by Erik Hjelmvik
  5. Applied Physical Attacks on Embedded Systems by Joe FitzPatrick
  6. Developing Burp Suite Extensions by Developing Burp Suite Extensions
  7. Web Application Hacker’s Handbook by Marcus Pinto
  8. Offensive PowerShell for Red and Blue Teams by Nikhil Mittal
  9. The ARM IoT Exploit Laboratory by Saumil Shah

DragonJAR


  • Dates: 16 – 17 September 2017
  • Place: Hotel NH Royal Metrotel, Bogotá Colombia
  • Link to official conference website: https://www.dragonjarcon.org/
  • Ticket price: 500 USD
  • Lectures: unpublished
  • Workshops: unpublished

ROOTCON


  • Dates: 21 – 22 September 2017
  • Place: Taal Vista Hote Tagaytay, Philippines
  • Link to official conference website: https://www.rootcon.org/xml/rc11
  • Ticket price: unpublished
  • Lectures:
  1. 7 sins of ATM protection against logical attacks by Timur Yunusov
  2. Breaking into the iCloud Keychain by Vladimir Katalov
  3. Demystifying The Ransomware and IoT Threat by Christopher Elisan
  4. Dissecting Exploit Kits by Daniel Frank
  5. Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov
  6. Finding Your Way to Domain Admin Access and Even So, the Game Isn’t Over Yet. by Keith Lee
  7. Hunting Hunters with OSint by Michael Rebultan
  8. The future of ApplePwn. How to save your money. by Timur Yunusov
  9. The rise of security assistants over security audit services. by Yury Chemerkin
  • Workshops: unpublished

Ekoparty


  • Dates: 25 – 29 September 2017
  • Place: Buenos Aires Argentina
  • Link to official conference website: https://www.ekoparty.org/
  • Ticket price: unpublished
  • Lectures: unpublished
  • Workshops: unpublished

That’s it guys – and “May the odds be ever in your favor”!
If you know any other security conferences – contact us via ssd[]beyondsecurity.com and we will update the list.