ROOTCON: 6th Annual Hacker Conference and Information Security Gathering


ROOTCON: 6th Annual Hacker Conference and Information Security Gathering (A National Security Event) will be at Victoria Hall, Parklane International Hotel, Cebu City on September 7 & 8, 2012 (Friday & Saturday) from 9:00 AM - 6:00 PM and visit www.rootcon.org for updates on the event!

ATTENTION:
HR Managers, Hiring Managers, CEO / CIO / President / Vice President, Supervisors, Business Owners, IT Managers, Tech Support, System Administrators, Web Developers, Security Analysts, Network / Server Administrators, Software Engineers, Web Developers, Programmers, IT Educators, Teachers / Faculty members, IT professionals and interested individuals.

In the past year, we have witnessed cyber attacks of unprecedented sophistication and reach. These types of attacks have the ability to compromise and control millions of computers that belong to governments, private enterprises and ordinary citizens. 

If we are going to prevent motivated adversaries from attacking your systems, stealing your data and harming your critical infrastructure, the broader community of security professionals - including the academia, the private sector and government must work together to understand emerging threats for 2012, and to develop proactive security solutions and safeguard the Internet and your infrastructure.

According to "Georgia Tech Information Security Center (GTISC)" and "Georgia Tech Research Institute (GTRI)", these are the emerging cyber threats for 2012:

  • Mobile browsers present a unique challenge.
  • Mobile devices do not commonly receive patches and updates.
  • Threats targeting Adroid and iOS are on the rise.
  • While USB flash drives have long been recognized for their ability to spread malware, mobile phones are becoming a new vector that could introduce attacks on otherwise-protected systems.
  • Botnet controllers build massive information profiles which may become part of legitimate lead generation efforts.

Combination attacks affecting DNS service providers and certificate authorities are especially dangerous.
An advanced persistent threat (APT) is not characterized by the sophistication of an adversary’s malware. Rather, it pertains to the threat actor’s determination and the resources he is willing to expend to achieve his objectives. It’s not a what, but a who?

Another emerging threat to critical infrastructure and business in general include the move to cloud computing - which complicates today’s traditional defensive techniques.

National-state conflicts which I don’t want to explain further due to current and more pressing issues which I’m pretty sure you are aware of.

Lastly, the users continue to be a common and hard-to-remediate weak point in security. Normally this is a common problem among Systems Administrators, Network Security Administrators, Network Security Analysts and the likes. Human behavior is still the weakest link to security.

With the never-ending amount of security flaws potentially threatening your network, remaining vigilant is important. And that’s the reason why we are inviting the public once again to attend this annual security gathering right here at the heart of Metro Cebu, Philippines!

COST: Early Bird Rates - 2,800PHP (for Professionals), 2,500PHP (for Students)
* Early registration is now open and will run until June 30, 2012.

Each registration is already inclusive of:

  • A super-awesome human badge (all-access pass to the event, talks and activities).
  • Delicious AM & PM Snacks / Lunch Buffet.
  • Professional Networking / Socializing with other IT Professionals, geeks, hackers, nerds, and representatives from government agencies, private sectors and the academe.

ROOTCON committee is using Eventbrite as a facility for an online event registration. Click here to register now. For Offline Registration (Bank Deposit) please email us at info@allianceconsulting.biz.

For Sponsorship and Exhibit inquiries, email us at sponsors@rootcon.org.

Alliance Consulting is the official Event Organizer for ROOTCON 6.
You can leave a response, or trackback from your own site.

0 Responses for this post

Post a Comment