Security Conferences

/Security Conferences

Week 29 In Review

Events Related Training At CanSecWest 2011: Analysis of Malicious Documents - esec-lab.sogeti.com Jean-Baptiste and Guillaume will give a course about malicious document analysis during the next CanSecWest Dojo session at Vancouver (March 7th/8th). The course deals with two major cases: PDF and Microsoft Office documents. Nowadays those two file formats have become a common vector [...]

Week 24 In Review

Events Related ENISA First 2011 The European Network & Information Security Agency (ENISA) formed in 2004. The agency supports the commission and the EU member states in the area of information security. Facilitate the exchange of information between EU institutions, the public sector and the private sector. Security Challenges for Future Systems - blog.c22.cc #First2011-Remediating [...]

Week 23 In Review

Events Related Defcon 19  Quals For the third year, I competed with team Shellphish in the Defcon quals. We pulled through with some amazing points at the end to finish in 8th place. My successful contributions, however, were really only with respect to Forensics 100 and 300 Defcon 19 Quals Forensics 100 and Forensics 300 [...]

Week 22 In Review

Events Related PH-Neutral, My First and Last One - blog.rootshell.be What differentiate  PH-Neutral from the other conferences? It’s different that’s all! Don’t try to find something equivalent on earth! It’s a mix of party, drinks, talks (yes, there was and good ones!) and social networking. Honestly I never saw so many top-notch hackers per square [...]

Week 21 In Review

Events Related Cyber Defence Challenge: Analogies - holisticinfosec.blogspot.com I recently had the opportunity to interview Alexei Czeskis, the captain of the University of Washington (UW) team who won this year's National Collegiate Cyber Defense Competition (CCDC). During my discussion with Alexei I was immediately drawn to the fact that his approach and tactics closely mirror [...]

Week 20 In Review

Events Related Hack In The Box 2011 Amsterdam Official debriefing from someone who was there. HITB2011 Ams Wrap-up Day#1 - blog.rootshell.be HITB2011 Ams Wrap-up Day#2 - blog.rootshell.be Resources WhiteHat Secuirty's Approach to Detecting Cross-Site Request Forgery (CSRF) - blog.whitehatsec.com Cross-Site Request Forgery (CSRF) generates many questions from prospects, customers, partners, and Web application security professionals [...]