GovSec 2012 Conference & Expo takes place April 2-4 in Washington, D.C.

/
GovSec 2012 Conference & Expo, featuring U.S. Law Enforcement, takes place April 2-4, 2012 in Washington, D.C., offering 30+ sessions covering Cybersecurity, Homeland Security, Law Enforcement, Emergency Response and Critical Infrastructure and Protection. SecurityOrb is proud to be partnering with GovSec for the second year in a row!

The FOSE Conference & Expo Washington, DC, April 3-5

/
The FOSE Conference & Expo is returning to Washington, DC, April 3-5 – with all new in-depth conferences, workshops, camps, keynotes and education. The FOSE 2012 Education Experience features 5 all-new conferences, including the Cybersecurity Conference: http://bit.ly/FOSE12Cbr SecurityOrb is proud to partner with FOSE for the second year in a row!

EC-Council to Host Advanced Technical Security Summits in Alexandria and San Jose

/
The Center of Advanced Security Training (CAST) - the advanced training division of EC-Council - announces the next installment of its successful advanced training series ‘EC-Council Summit’ (formerly known as CAST Summit) March 19-22 in Alexandria, Virginia and March 26-29 in San Jose, California. This series of summits feature five highly technical workshops in ethical hacking, penetration testing, mobile hacking/forensics, application security and network defense.

EC-Council Summit San Antonio 2012, June 11 14

/
The all-new EC-Council Summit series is created to make advanced security training opportunities available for information security professionals across the globe. Attendees get to choose from a selection of highly technical and advanced training workshops offered by EC-Council Center of Advanced Security Training (CAST), covering current and important security topics such as penetration testing, cryptography, network defense, application security, mobile hacking and forensics, crimeware attribution, etc. The event concludes with a one-day security training seminar that specially designed to comprise a few mini-lectures, and allows for participants to actually learn, and not just listen or be rushed through a short presentation like how its like in some other events or conferences. For schedule of the EC-Council Summit, please visit: http://www.eccouncil.org/summit

EC-Council Summit Boston 2012, June 4 7

/
The all-new EC-Council Summit series is created to make advanced security training opportunities available for information security professionals across the globe. Attendees get to choose from a selection of highly technical and advanced training workshops offered by EC-Council Center of Advanced Security Training (CAST), covering current and important security topics such as penetration testing, cryptography, network defense, application security, mobile hacking and forensics, crimeware attribution, etc. The event concludes with a one-day security training seminar that specially designed to comprise a few mini-lectures, and allows for participants to actually learn, and not just listen or be rushed through a short presentation like how its like in some other events or conferences. For schedule of the EC-Council Summit, please visit: http://www.eccouncil.org/summit

TakeDownCon Dallas 2012, May 4 9

/
This highly technical IT security conference series was launched in 2011 in Dallas, Texas. TakeDownCon is a no-frills and topic focused conference series that is targeted towards the security engineers, researchers and analysts. The topical theme of this unique event series revolves around some of the most talked-about security issues such as Web Application Security, SCADA and Critical Infrastructures, Cloud Security, among others. Cities that are earmarked where TakeDownCon will be hosted in the near future are Las Vegas, Chicago, New York, Washington DC, Amsterdam, London, Johannesburg, Singapore, among others. For more information about TakeDownCon, please visit: http://www.takedowncon.com

EC-Council Summit Alexandria 2012, March 19 21

/
The EC-Council Summit (formerly known as CAST Summit) is designed with one purpose in mind, to enrich security professionals with the skills and knowledge surrounding the ever-evolving information security landscape. Attendees get to choose from a selection of highly technical and advanced training workshops led by subject matter experts and industry practitioners, covering essential security topics such as penetration testing, cryptography, network defense, application security, mobile hacking and forensics, crimeware attribution, etc. The Summit concludes with a one-day training seminar that is specially designed to comprise a few mini-lectures, and allows for participants to actually learn, and not just listen or be rushed through a short presentation.

Black Hat USA Welcomes Neal Stephenson to Keynote Stage

/
Black Hat, produced by UBM TechWeb, has announced that renowned speculative fiction writer Neal Stephenson will be interviewed in a keynote Q&A at this year's 15 year anniversary event. Black Hat USA 2012 is expected to host more than 6500 high-level security professionals for the most timely, actionable security presentations of the year.

Kevin Mitnick & Dave Kennedy – Adaptive Penetration Testing Derbycon 2011

/
Penetration Testing is something that has many different meaning depending on the context used by the person. The Penetration Testing Execution Standard (PTES) is aimed to change that. In this talk we’ll be covering adaptive penetration testing which essentially is the ability to conform and change based on the environment that your attacking. We’ll be covering several live examples used in real-world penetration tests, how we discovered some clever tricks to circumvent security controls, and eventually be creative and gain unauthorized access.

Attacking Proximity Card Access Systems by Brad Antoniewicz at ShmooCon 2012

/
From the card to the backend database, proximity card access systems contain a variety of components, all which are vulnerable to attack but have been rarely targeted. This demo-driven presentation explores and attacks each of the various components (RFID tags, controllers, and backend systems) of a popular deployment configuration.