The InfoSec community would like to invite you to AfricaHackOn, East Africa’s first premier technical computer security conference which will be held on 28 February 2014at PWC Towers, Westlands, Nairobi from 9am to 9pm. This conference aims to bring together the individual talents of the best and brightest security professionals in the region, through live presentations, activities and demonstrations.
TheAfricaHackOnconference is entirely independent of any corporate, vendor or organization and will be held over twelve hours in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the local information community and expanding their knowledge of security. Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community.
Currently most information security conferences and conventions dwell on the theoretical aspect of cyber security and much less on the practical and tactical angle of the art. This conference will focus on various attack and defence vectors security professionals can apply in their respective organization. The conference will look at real life case studies where most of these attack methods have been propagated.
There will be a 4 hour mini “hackbattle” at the end of the conference to show the various skill set and awards will be given to the winning team.
Registration (1000/- via Ticketsasa) can be done through the following link:
Each ticket costs 1000/- with limited space available.
More information is available here:
The topics that will be covered in this conference include but are not limited to the following:
- Web application exploitation
- East Africa Cyber threat landscape – botnets, malware and vulnerable assets
- Insider Threats and Social Engineering
- System exploitation
- Post exploitation: pivoting
- Antivirus evasion
- Android and IOS exploitation
- Radio Frequency exploitation eg GSM interception, air traffic control, law
- Enforcement frequencies, Mobile Location Tracking
- ISO/IEC 2700:2005
- Wireless exploitation and countermeasures
- Botnets: Zeus, Flame, Duqu
- Reverse Engineering (plus exploit development) and Code Security.