Misleading implementations that compromise the privacy and information security DefCamp 2015

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=EM1vjCfEkGs



Category:
Guide
Duration: 22:35
1 views
0


DefCamp - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #DefCamp It started as a small meetup among friends that shared a common passion for cybersecurity. After 10 successful editions, DefCamp matured into what is today: a rich high-quality source of cybersecurity knowledge. Each year, it brings together the world’s leading cybersecurity doers who share their latest research and knowledge.

This year we’re full ONLINE and we will continue to nurture the DefCamp community in new ways. We’re still here for you, as we’ve been over the last decade, giving it our best to provide you with valuable knowledge and perspectives from infosec industry leaders.

To keep your finger on the pulse and keep the community going (and growing!), keep an eye on our social media channels to see what’s happening next! Now, we even have a proper environment to keep the hackers busy and building infosec muscles, so we hope to see you at the “gym” on CyberEDU.ro About DefCamp
DefCamp started back in 2011 as a small infosec gathering among friends. Soon, the meetup became an event and, later on, the largest and most important cybersecurity and hacking conference from Central and Eastern Europe.
In 2019 we celebrated the 10th edition with 3 stages packed with interesting briefings & panel discussions for the 2000+ security experts, developers, decision makers, entrepreneurs, members of the academia and private and public sectors from all around the world.

In 2020 we had a COVID-19 break and for 2021 we initially decided to go hybrid but according to the latest government decisions we had to move fully online. Even so, we will continue to create meaningful infosec experiences and host exciting cybersecurity competitions you’d usually find in the DefCamp Hacking Village and in our Community.

We are here so let’s Learn. Practice. Grow. reConnect with the infosec community.
Get involved
The digital landscape needs the cybersecurity community. We invite you to get involved in exchanging knowledge and developing connections.

How? Share your experience and knowledge in articles, white papers or other types of research and actively contribute valuable information while encouraging others to do the same.

Time has come to give back and be stronger together, as a team.
Learn from rockstars
Over the years, some of the most experienced and generous people in infosec took the stage at DefCamp conference.

You probably saw them too if you attended any (or all!) of the 10 editions of the conference. From basics to advanced tactics and knowledge, you get free access to a rich repository of presentations and videos to learn from. Be a doer and apply at Call for Papers with your research to add your name on the DefCamp rockstars.

Keep your skills sharp
The road to becoming an infosec expert is paved with two things: constant learning and practice.

Why? Well, technology evolves and so do attack techniques, which means that all defenders must practice – a lot. We host regular CTFs and tournaments for different experience levels on CyberEDU.ro to keep the community motivated and sharp. So, plan your infosec training and practice effectively.
Keep on hacking for good
We now have our own playground for all the hacking activities that used to take place in the DefCamp Hacking Village, on CyberEDU.

Set up your free account to participate in exciting competitions that test your skills while engaging your competitive spirit. And yes, the best hackers get prizes and their special place in the competition’s Hall of Fame.

CyberEDU.ro will host all future DefCamp competitions ensuring us all the means to bring together all of you for some hacking for good.







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering