iHub By Josiah Mugambi / February 19, 2014
The InfoSec community would like to invite you to AfricaHackOn, East Africa’s first premier technical computer security conference which will be held on 28 February 2014 at PWC Towers, Westlands, Nairobi from 9am to 9pm. This conference aims to bring together the individual talents of the best and brightest security professionals in the region, through live presentations, activities and demonstrations.
The AfricaHackOn conference is entirely independent of any corporate, vendor or organization and will be held over twelve hours in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the local information community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community.
Currently most information security conferences and conventions dwell on the theoretical aspect of cyber security and much less on the practical and tactical angle of the art. This conference will focus on various attack and defence vectors security professionals can apply in their respective organization. The conference will look at real life case studies where most of these attack methods have been propagated.
There will be a 4 hour mini “hackbattle” at the end of the conference to show the various skill set and awards will be given to the winning team.
Registration (1000/- via Ticketsasa) can be done through the following link:
Each ticket costs 1000/- with limited space available.
More information is available here:
The topics that will be covered in this conference include but are not limited to the following:
- Web application exploitation
- East Africa Cyber threat landscape – botnets, malware and vulnerable assets
- Insider Threats and Social Engineering
- System exploitation
- Post exploitation: pivoting
- Antivirus evasion
- Android and IOS exploitation
- Radio Frequency exploitation eg GSM interception, air traffic control, law
- Enforcement frequencies, Mobile Location Tracking
- ISO/IEC 2700:2005
- Wireless exploitation and countermeasures
- Botnets: Zeus, Flame, Duqu
- Reverse Engineering (plus exploit development) and Code Security.
For more information, contact the organising team: info (at) africanhackon.com
You can and will be hacked | tafakari at 10:35:13AM Thursday, March 6, 2014
[…] AfricaHackOn […]Reply
- iHub Cluster
- iHub Consulting
- iHub Research
- iHub Robotics
- iHub UXlab
- PIVOT East partners with Tech hubs for 2014 startups competition
- Screening of Girl Rising – empowering young women in ICT and entrepreneurship
- Why calling yourself a Startup could be Killing your Business
- INTEL IDEATION CAMP
- A Recap of #UmatiForum: The Many Faces of Online Hate Speech in Kenya
Tag Cloudafrica community design developers Entrepreneurship event ict iHub iHubResearch (R@iHub) Innovation Intel kenya m:lab Meetups microsoft mobile nairobi open data outreach PIVOT25 projects Research robotics Social Entrepreneurship startups talks Tech Technology training Umati
- No related posts found