Conferences

The computer security conference Rooted CON born with the purpose of promoting the exchange of knowledge among members of the security community, particularly vindicating the enormous capacity of the Spanish – speaking professionals. One of the first premise was to maintain rigidly the principle of neutrality that has characterized each of its editions. In Rooted CON, members of the security community, students, professionals, businesses, amateurs, state forces, hackers and, why not, artists and academics could and can speak and present their ideas. Another premise is to avoid censorship . While adhering to the limits of legality, the contents will never be censored and presented with the necessary professionalism and rigor; We know that our speakers are serious professionals, whose contents deserve to be treated with all due respect. And, of course, two premises that are actually the same: promoting technical knowledge and ensure that, at all times, have fun and enjoyment in an atmosphere of animation and exchange.

This workshop aims to showcase new and emerging strategies and technologies for forecasting, mitigating, countering, and attributing cyber-events that threaten security and privacy within the realm of IoT. Additionally, we invite arguments for innovative and off-the-wall solutions that have sound academic backing. The institutional benefits of IoT adoption are clear, however security and privacy concerns are constantly coming to light. As organizations—both public and private, large and small—adopt new IoT technologies, we hope that this forum can serve as an opening conversation between government, industry, and academia for the purpose of addressing those concerns.

The World Border Security Congress, organized by the Torch Marketing will take place from 20th to 22nd March 2018 in Madrid, Spain. This Conference will cover areas like border surveillance techniques and systems, Is it possible to enhance the protection and management of extended land borders? What are the solutions, How can border agencies enhance border security and improve results, whilst under increasing pressure of resources and many more.

Zer0Con is POC’s NEW ‘CLOSED’ international security conference. It focuses on finding, analyzing, and exploiting vulnerabilities. Zer0Con aims to have high-level technical presentations.
? It is a high-level and closed conference.
? It only focuses on finding, analyzing, exploiting vulnerabilities.
? Only speakers, attendees, and sponsors will share vulnerabilities information.
? Zer0Con attendees can share various information and establish unique community.
? Training courses also focus on finding, analyzing, exploiting vulnerabilities.
? If you have certain level of ability to find bugs and make exploit code, you will improve yourself through Zer0Con.

The 23rd International Conference on Reliable Software Technologies – Ada-Europe 2018 will take place in Lisbon, Portugal. As per its traditional style, the conference will span a full week, including, from Tuesday to Thursday, three days of parallel scientific, technical and industrial programs, along with tutorials and workshops on Monday and Friday.
The conference will provide an international forum for researchers, developers and users of reliable software technologies all over the world. Presentations and discussions cover applied and theoretical work currently conducted to support, the development and maintenance of reliable software systems.
The wide diffusion of embedded systems, including multi-core, many-core, and reconfigurable platforms, poses a number of challenges related to the security of the operation of such systems, as well as of the information stored in them.
Malicious adversaries can leverage unprotected communication to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviours, or can exploit side channel information leakage to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or countered. The prevalence of multi/many core systems opens additional issues such as NoC security. Finally, the complexity on modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools will be needed to design and verify the security features of new hardware/software systems.
The workshop is a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to security in computing systems.
Cybersecurity and cybersecurity policy means different things to different disciplines. It can involve the exploration of algorithms and technologies to secure systems, the study of how users interact with computers in order to provide stronger methods of privacy protection, the examination of digital approaches to development, how to control—through laws and technology—the growing surveillance society, analyzing the impact of the “borderless” world of the Internet has on sovereignty, studying how changing communications technologies impact law (and how law impacts changing communications technologies), analyzing the impact of artificial intelligence and machine learning on the economy – and more.

Zer0Con is POC’s NEW ‘CLOSED’ international security conference. It focuses on finding, analyzing, and exploiting vulnerabilities. Zer0Con aims to have high-level technical presentations.
? It is a high-level and closed conference.
? It only focuses on finding, analyzing, exploiting vulnerabilities.
? Only speakers, attendees, and sponsors will share vulnerabilities information.
? Zer0Con attendees can share various information and establish unique community.
? Training courses also focus on finding, analyzing, exploiting vulnerabilities.
? If you have certain level of ability to find bugs and make exploit code, you will improve yourself through Zer0Con.

The SEC conferences are a series of well-established international conferences on Security and Privacy. SEC is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 (TC-11).
The IFIP SEC conferences aim to bring together primarily researchers, but also practitioners from academia, industry and governmental institutions to elaborate and discuss IT Security and Privacy Challenges that we are facing today and will be facing in the future.