iHub By Josiah Mugambi / February 19, 2014
The InfoSec community would like to invite you to AfricaHackOn, East Africa’s first premier technical computer security conference which will be held on 28 February 2014 at PWC Towers, Westlands, Nairobi from 9am to 9pm. This conference aims to bring together the individual talents of the best and brightest security professionals in the region, through live presentations, activities and demonstrations.
The AfricaHackOn conference is entirely independent of any corporate, vendor or organization and will be held over twelve hours in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the local information community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community.
Currently most information security conferences and conventions dwell on the theoretical aspect of cyber security and much less on the practical and tactical angle of the art. This conference will focus on various attack and defence vectors security professionals can apply in their respective organization. The conference will look at real life case studies where most of these attack methods have been propagated.
There will be a 4 hour mini “hackbattle” at the end of the conference to show the various skill set and awards will be given to the winning team.
Registration (1000/- via Ticketsasa) can be done through the following link:
Each ticket costs 1000/- with limited space available.
More information is available here:
The topics that will be covered in this conference include but are not limited to the following:
- Web application exploitation
- East Africa Cyber threat landscape – botnets, malware and vulnerable assets
- Insider Threats and Social Engineering
- System exploitation
- Post exploitation: pivoting
- Antivirus evasion
- Android and IOS exploitation
- Radio Frequency exploitation eg GSM interception, air traffic control, law
- Enforcement frequencies, Mobile Location Tracking
- ISO/IEC 2700:2005
- Wireless exploitation and countermeasures
- Botnets: Zeus, Flame, Duqu
- Reverse Engineering (plus exploit development) and Code Security.
For more information, contact the organising team: info (at) africanhackon.com
$i = 1; ?>
Edward at 20:53:08PM Thursday, February 20, 2014
Can I pay for this conference at the entrance?Reply
You can and will be hacked | tafakari at 10:35:13AM Thursday, March 6, 2014
[…] AfricaHackOn […]Reply
- iHub Cluster
- iHub Consulting
- iHub Research
- iHub Robotics
- iHub UXlab
- Pinned Blog
- Pinned Event
- [Meetup] How Do You Develop Your Software
- How to make the best out of GSM technology
- Mobile Monday – featuring Elma by Craft Silicon
- Review of Kenya’s move to EMV credit cards
- [Training] Managing Customers and Markets
Tag Cloudafrica Akirachix apps community dangerous speech design developers Entrepreneurship event fireside chat ict iHub iHubResearch (R@iHub) Innovation Intel kenya m:lab microsoft mobile nairobi open data outreach PIVOT25 Research Social Entrepreneurship startups Tech Technology training Umati
- No related posts found