Author Archive

Science First! – University of Applied Sciences Upper Austria (FHOOe) supports DeepSec

October 12, 2017

The motto of DeepSec 2017 is „Science first!“. This is expressed by the co-located ROOTS workshop, many speakers from academics, topics fresh from the front lines of research, and a mindset that favours facts over fake content or showmanship. This is why we want to thank the University of Applied Sciences Upper Austria for their […]

Tags: , , ,
Posted in Conference, Security No Comments »

DeepSec 2017 Workshop: Hunting The Adversary – Developing And Using Threat Intelligence – John Bambenek

October 12, 2017

The arsenal of components you can use for securing your organisation’s digital assets is vast. The market offers a sheer endless supply of application level gateways (formerly know as „firewalls“), network intrusion detection/prevention systems, anti-virus filters for any kind of platform (almost down to the refrigerator in the office), security tokens, biometrics, strong cryptography (just […]

Tags: , , , ,
Posted in Conference, Security Intelligence, Training No Comments »

Google supports DeepSec 2017

October 12, 2017

You have probably heard of Google. Well, you will be hearing more from them if you come to DeepSec 2017. They have agreed to support our conference. They will be on site, and you will be able to talk to them. Every year we aim to give you opportunities for a short-cut, for exchanging ideas, […]

Tags: , , , ,
Posted in Conference, Internet No Comments »

DeepSec 2017 Schedule Update, Review Status, Disputes, and Trainings

September 26, 2017

The DeepSec 2017 schedule is still preliminary. We are almost done, and we have a small update. Some of you have noticed that the schedule featured a training about mobile security. The outline as shown as in the schedule was identical to a different course from a different trainer. We received a complaint, we got […]

Tags: ,
Posted in Administrivia, Conference, High Entropy No Comments »

DeepSec 2017 Early Bird Tariff ends on 25 September

September 22, 2017

The early bird tariff for DeepSec 2017 (and ROOTS) ends on 25 September 2017. We recommend buying your ticket now. Save some money! In addition we ask you to book the workshop you want to visit as early as possible! Every year we see sad faces, because the workshop of your choice had to be […]

Tags: ,
Posted in Administrivia, Conference No Comments »

Workshops, Trainings, Talks: DeepSec and ROOTS Schedule Update

September 20, 2017

As you might have noticed, the DeepSec schedule is not complete yet. Furthermore the ROOTS schedule is not published at all. The reason for this are the still pending reviews. The major part concerns ROOTS. ROOTS is an academic workshop where academic publications are presented. There has been some confusion about the term workshop. In […]

Tags: , , ,
Posted in Administrivia, Conference No Comments »

44CON revisited: Secure Design in Software is still a new Concept

September 20, 2017

We have been to 44CON, and we returned with lots of ideas and scary news about the state of security in devices and applications. Given the ever spreading Internet of Things (IoT) you can see why connecting random devices via a network with no second thoughts about design, updates, or quality control is a bad […]

Tags: , , ,
Posted in High Entropy, Interview, Security No Comments »

DeepSec 2017 Training: The ARM IoT Exploit Laboratory

August 29, 2017

If the Internet of Things (IoT) will ever leave puberty, it has to deal with the real world. This means dealing with lies, fraud, abuse, exploits, overload, bad tempered clients (and servers), and much more. Analysing applications is best done by looking at what’s behind the scenes. IoT devices, their infrastructure, billions of mobile devices, […]

Tags: , , , , , ,
Posted in Conference, Security, Training No Comments »

Administrivia: How to access ROOTS and DeepSec 2017

August 22, 2017

We have received some question on how to attend the presentations of the 1st Reversing and Offensive-oriented Trends Symposium (ROOTS) 2017. It’s very easy. ROOTS is co-hosted with DeepSec 2017. This means if you attend DeepSec, you also attend ROOTS. In turn attending ROOTS gives you also access to the DeepSec conference. So you only […]

Tags: , ,
Posted in Administrivia, Conference No Comments »

DeepSec 2017 Preliminary Schedule published

August 17, 2017

After two weeks of intense reviewing we have published the preliminary schedule for DeepSec 2017. There are some blanks to fill, but this will be done in the coming weeks. We still have to do some reviews and wait for the speaker’s confirmation. In case you noticed, the ROOTS track is not filled yet. The […]

Tags: , , ,
Posted in Administrivia, Conference, Training No Comments »

DeepSec 2017 Schedule, ROOTS, and Closing of Call for Papers

August 3, 2017

Thanks a lot for your submissions! We are currently in the final phase of the review. Expect the first draft of the schedule for the end of the week. Important: Don’t forget that the Call for Papers for the 1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS) is still open and was extended to 15 […]

Tags: , , ,
Posted in Administrivia, Conference No Comments »

Last Call – DeepSec 2017 “Science First!” – Call for Papers

July 31, 2017

Today our Call for Papers for DeepSec 2017 (motto Science first!) officially ends. We are still up to our necks in submissions, but if you have content and want to join, then make sure you submit now! All in-time submissions will be preferred over the ones that missed the d(r)eadline! The call for papers for […]

Posted in Administrivia, Call for Papers No Comments »

Unicorns in the Wild – Information Security Skills and how to achieve them

July 27, 2017

Everyone talks about information security, countering „cyber“ threats, endless feats of hackers gone wrong/wild, and more epic stories. Once you have realised that you are reading the news and not a script for a TV series, you are left with one question: What are information security skills? The next question will probably be: How do […]

Tags: , , ,
Posted in Discussion, High Entropy, Security No Comments »

DeepINTEL Schedule updated – Psychology and Power Grids

July 27, 2017

We have updated the schedule for DeepINTEL 2017. The human mind and power grids are both critical infrastructure. Both can be manipulated and switched off, arguably. And most of us use both every day. So this is why we added two more presentations to the schedule. Stefan Schumacher of the Magdeburg Institute for Security Research talks […]

Tags: , ,
Posted in Administrivia, Conference No Comments »

Malicious Software explores new Business Models – Politics

July 19, 2017

Malicious software has become a major component of criminal business and geopolitics. In addition it is a convenient explanation for anything one does not want to investigate. Since code always come from somewhere you have to ask yourself many more questions when it comes to infected networks and compromised hosts. What is the agenda of […]

Tags: , , , ,
Posted in Discussion, Internet, Security No Comments »