IJISC
  • Indexed in

  • Latest News

    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
    June 29, 2017
    Volume 6, Issue 1 of IJISC – International Journal of Information Security and Cybercrime was published
    May 5, 2017
    IJISC was indexed in CEEOL (Central and Eastern European Online Library) database
  • --- More News ---
  • Popular Articles

  • DefCamp #7 – International Hacking & Information Security Conference


    Author(s): BARBU, Ionuț-Daniel; NICA, Cristina
    Issue: Volume 5, Issue 2, Year 2016

    Download PDF | Views: 656

    DefCamp, one of the most important conferences of Hacking & Information Security from Central and Eastern Europe has reached its Seventh edition this year. Held in Bucharest, on the 10th and 11th of November 2016, it brought together over 1100 attendees from 35 countries (according to organizer, CCSIR – Cyber Security Research Center from Romania).

    DefCamp
    DefCamp #7 Bucharest 2016 Audience

    Topics analyzed throughout the event included Threat Intelligence, Artificial Intelligence, Machine Learning, Threat Hunting, Network & Application Penetration Testing and Social Engineering. These were solidified with new concepts, use cases and extensive HOW-TO sessions. Apart from these main aspects, other engaging talks that captured a lot of interest were infecting IoT devices, insight of the traps that befall independent security researchers from a legal perspective, bot behavior in social environments, reverse engineering malware and windows shellcode exploits.

    It is worth mentioning a couple of talks, such as “Threat Intelligence! DIY!”. During this presentation, Daniel BARBU, Information Security Engineer at Adobe Romania, along with his colleague from Adobe US, Bryson LOUGHMILLER demoed how to implement a new way of handling threat analysis and providing great output of information with a minimum of costs. They took avail of Splunk, Suricata IDS and Bro IDS and presented a set of queries that would gather information on number of threat actors targeting designated honeypots.

    DefCamp
    Threat Intel: DIY Talk by Daniel BARBU & Bryson LOUGMILLER

    Additionally, “Split Personalities: The Psychology of Social Engineering” was an engaging talk by Dave CHRONISTER of Parameter Security about the psychology of social engineering and how he succeeds in social engineering by making people overthink a rational situation. He puts emphasis on the fact that emotional triggers will overwhelm the logical thinking process and talked a bit about different types of phishing. In addition to the speeches, DefCamp also hosted a Hacking Village where one could take a stab at different exercises like Capture the Flag, hacking an ATM, bug bounty and a few others.

    Needless to say, there was a large vendor area with interesting proof of concepts from Orange, BitDefender, Secureworks, Ixia, BitSentinel, KPMG, CyberGhost, PwC, PC Garage, Alter Ego, etc.

    Images Source: www.def.camp


    Additional Information

    Title: DefCamp #7 – International Hacking & Information Security Conference
    Author(s): BARBU, Ionuț-Daniel; NICA, Cristina
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225, e-ISSN: 2286-0096
    Issue: Volume 5, Issue 2, Year 2016
    Section: Books Reviews and Conferences Analysis
    Page Range: 103-104



    Copyright

    Copyright ©2012-2018 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.