The computer security conference Rooted CON born with the purpose of promoting the exchange of knowledge among members of the security community, particularly vindicating the enormous capacity of the Spanish – speaking professionals. One of the first premise was to maintain rigidly the principle of neutrality that has characterized each of its editions. In Rooted CON, members of the security community, students, professionals, businesses, amateurs, state forces, hackers and, why not, artists and academics could and can speak and present their ideas. Another premise is to avoid censorship . While adhering to the limits of legality, the contents will never be censored and presented with the necessary professionalism and rigor; We know that our speakers are serious professionals, whose contents deserve to be treated with all due respect. And, of course, two premises that are actually the same: promoting technical knowledge and ensure that, at all times, have fun and enjoyment in an atmosphere of animation and exchange.
The World Border Security Congress, organized by the Torch Marketing will take place from 20th to 22nd March 2018 in Madrid, Spain. This Conference will cover areas like border surveillance techniques and systems, Is it possible to enhance the protection and management of extended land borders? What are the solutions, How can border agencies enhance border security and improve results, whilst under increasing pressure of resources and many more.
After the ‘Sell-Out’ success of GibCyber last event we are back ‘Brighter’ In association with the Royal Gibraltar Police to offer more colour, creativity and insights into cyber security and the online world, from face recognition robots to tracking the hacker.
Featuring Artificial Intelligence – GDPR – More Interaction – ‘Break out Rooms’ – Hack Demonstrations – Machine Learning – Blockchain – Best in Class Speakers – High ranking Law Enforcement – Cyber Experts from across the Globe and of course you!
The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them.
Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems.
The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.
We are all coming together to watch the ‘celebs’ on the Ted Talk Style Stage, plus there will be rolling sessions and activity zones that you can be a part of when you wish. From Blockchain Explained & Examined, ‘Only Fools or ICO’s’ – A.I The Artificial Intelligence Trailers – Talking Techie – GDPR Clinic – Schools out Security Sessions – Cops v Robbers – Hacking is Child’s Play – The Future is Now – Got you Thinking?