B-Sides Vienna is a hacker conference targeted at security researchers, system and network operators, application developers, hardware hackers, hackerspace members, and generally open-minded folks working or participating in the broad fields between information warfare and digital art.
It will combine the knowledge of experienced security speakers, hackers, and information warriors with the fun of a small but 1337 conference. Its main goal therefore is to help attendees understand the current state of art in information technology and security, and showcase projects evolved from the hackerspace movement. The official event language is English.
Talks, workshops and trainings will be held throughout Saturday, June 18th 2011, at The Hub Vienna - making it a full day and night of talks, trainings, hands-on workshops, epic haXX0r battles and partying afterwards - the perfect combination of technology, IT security, hardware hacking, art, music, socializing and good times.
B-Sides Vienna is looking forward to see a selection of trainings, hands-on workshops, 50-minute presentations and 15-minute lightning talks.
Topics of interest include (but are in no way limited to) the following:
It will combine the knowledge of experienced security speakers, hackers, and information warriors with the fun of a small but 1337 conference. Its main goal therefore is to help attendees understand the current state of art in information technology and security, and showcase projects evolved from the hackerspace movement. The official event language is English.
Talks, workshops and trainings will be held throughout Saturday, June 18th 2011, at The Hub Vienna - making it a full day and night of talks, trainings, hands-on workshops, epic haXX0r battles and partying afterwards - the perfect combination of technology, IT security, hardware hacking, art, music, socializing and good times.
B-Sides Vienna is looking forward to see a selection of trainings, hands-on workshops, 50-minute presentations and 15-minute lightning talks.
Topics of interest include (but are in no way limited to) the following:
- Information technology
- Network security
- Web application security
- Virtualization and cloud computing
- Innovative attack strategies
- Forensics
- Embedded devices
- Physical security and lock picking
- Biometrics
- Hardware hacking
- Phone phreaking
- Biohacking
- Open source software
- Evolutionary computing
- Robotics
- Massive abuse of technology.
No comments:
Post a Comment