CEIC is one of the largest international gatherings of legal, IT, law enforcement, and government attendees that focus on the latest developments in the digital investigations field. Industry experts, decision-makers and influencers attend CEIC year after year for a high-quality educational program and valuable networking opportunities. […]
The 2011 Conference is co-sponsored by the NYS Division of Homeland Security and Emergency Services Office of Cyber Security (OCS), the New York State Forum, Inc. and the University at Albany’s School of Business and College of Computing and Information. OCS’s experience with leading and coordinating New York State’s cyber security efforts and the University’s academic excellence in information assurance combine to make this a must-attend event. […]
The 7th annual Techno Forensics Conference will debut a track specifically devoted to Forensics industry professionals with highlighted focus on photo/video forensics and crime scene investigation and evidence collection. Joining together the Digital Forensic and Forensic communities reflects the crossover apparent today within a wide range of forensic and digital disciplines. This annual event brings together key stakeholders from industry, academia and government in an effort to strengthen this important technology, research, and communication bridge. […]
Focused – All presentations for each event focuses on the chosen subject domains. Nothing else.
Highly Technical – TakeDown Con insists that all presenters do live demonstrations or showcases.
Speaks Binary Only – Ability to understand English is NOT enough here. You need to speak the Zeros and Ones.
Knowledge Acquisition – By participating in the event, you will definitely learn something that is of value (unlike some others)
Conducive Environment – You will not be squashed like ducks. Though we cannot guarantee everyone a seat, you will get to stand comfortably, at least. […]
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Break It and Bring It On. […]
The Techno Forensics Conference is all about digital forensics, evidence collection, crime scene documentation, and e-Discovery. Sessions are for industry professionals with some previous experience in these disciplines. Advanced level content and depth are a must. […]
Facebook has decided to collaborate with the AMBER Alert system, The National Center for Missing and Exploited Children and The U.S. Department of Justice to create 53 individual pages, one for each state including the District of Columbia, Puerto Rico and the U.S. Virgin Islands. Users will start receiving updates via their news feeds. […]
Vulnerability Scanning –
Assess any target with an IPv4, IPv6, or URL with pre-defined policies for PCI, HIPAA, FISMA, and more. Identify CVE, OSVDB, IAVA, OVAL, and more.
Penetration Testing –
Exploit vulnerabilities to gain remote access. Run social engineering, phishing assessments, and more with the exploit tools suite. […]
The average citizen is very lax with the security of their credit card information therefore may be giving a non-verbal invitations to credit card scammers. Understanding how your card can be compromised is the first step to protecting your credit. There are many ways to extract your sensitive data to enable someone to go on a “free” shopping spree. […]