One of our basic principles here in ROOTCON is to extend our assistance to you by helping you seek for budget approval from your boss or employer to attend ROOTCON 6 (www.rootcon.org) on September 7 - 8, 2012 (Cebu City). We can make that ...See More
ROOTCON™ - Premier Philippines' Hacker Conference
Added (09-June-2012, 9:43 AM)
As a recap of our history, this group started as DEFCONPH (DEFCON Philippines) and launched on December 20, 2008 as an IT Security organization gathering the best minds in IT Security. The event took place at Handuraw Restaurant, Lahug, Cebu City, Philippines. After the said launching, series of events were organized in Manila. Through the years it was later changed to www.pinoygreyhat.org and fi...See More
Added (16-June-2012, 11:30 AM)
Be guided with our tracks this year.....
AdverGaming The System
A Brief View In Prioritizing Website Security
Cyber Espionage - How to sell a country
Espionage in Cybertopia: A Government's Tale
Crypto and PKI - Weapons For Mass Liberation
Introduction to Web Dojo and Backdoor Shells
Mac Binary Analysis: A Sn3ak Peak
Added (26-June-2012, 9:38 AM)
Philippine’s Hacker Conference and Information Security Gathering
September 7 – 8, 2012
Parklane International Hotel
Cebu City, Philippines
HR Managers, Hiring Managers, CEO / CIO / President / Vice President, Supervisors, Business Owners, IT Managers, Tech Support, System Administrators, Web Developers, Security Analysts, Network / Server Administrators, Software Engineers, Web Developers, Programmers, IT Educators, Teachers / Faculty members, IT professionals and interested individuals
In the past year, we have witnessed cyber attacks of unprecedented sophistication and reach. These type of attacks have the ability to compromise and control millions of computers that belong to governments, private enterprises and ordinary citizens.
If we are going to prevent motivated adversaries from attacking your systems, stealing your data and harming your critical infrastructure, the broader community of security professionals - including the academia, the private sector and government must work together to understand emerging threats for 2012, and to develop proactive security solutions and safeguard the Internet and your infrastructure.
According to “Georgia Tech Information Security Center (GTISC)” and “Georgia Tech Research Institute (GTRI)”, these are the emerging cyber threats for 2012:
1)Mobile browsers present a unique challenge.
2)Mobile devices do not commonly receive patches and updates.
3)Threats targeting Adroid and iOS are on the rise.
4)While USB flash drives have long been recognized for their ability to spread malware, mobile phones are becoming a new vector that could introduce attacks on otherwise-protected systems.
5)Botnet controllers build massive information profiles which may become part of legitimate lead generation efforts.
6)Combination attacks affecting DNS service providers and certificate authorities are especially dangerous.
7)An advanced persistent threat (APT) is not characterized by the sophistication of an adversary’s malware. Rather, it pertains to the threat actor’s determination and the resources he is willing to expend to achieve his objectives. It’s not a what, but a who?
8)Another emerging threat to critical infrastructure and business in general include the move to cloud computing - which complicates today’s traditional defensive techniques.
9)National-state conflicts which I don’t want to explain further due to current and more pressing issues which I’m pretty sure you are aware of.
10)Lastly, the users continue to be a common and hard-to-remediate weak point in security. Normally this is a common problem among Systems Administrators, Network Security Administrators, Network Security Analysts and the likes. Human behavior is still the weakest link to security.
With the never-ending amount of security flaws potentially threatening your network, remaining vigilant is important. And that’s the reason why we are inviting the public once again to attend this annual security gathering right here at the heart of Metro Cebu, Philippines!
WHAT: ROOTCON: 6th Philippine Hacker Conference and Information Security Gathering
WHERE: Parklane International Hotel, Cebu City
WHEN: September 7-8, 2012 (Friday & Saturday)
COST: Early Bird Rates - 2,800PhP (for Professionals), 2,500PhP (for Students)
* Early registration is now open and will run until June 30, 2012.
Each registration is already inclusive of:
• A super-awesome human badge (all-access pass to the event, talks and activities).
• Delicious AM & PM Snacks / Lunch Buffet.
• Professional Networking / Socializing with other IT Professionals, geeks, hackers, nerds, and representatives from government agencies, private sectors and the academe.
ROOTCON committee is using Eventbrite as a facility for an online event registration. Click here to register now. For Offline Registration (Bank Deposit) please email us at [email protected] .
For Sponsorship and Exhibit inquiries, email us at [email protected] .
Alliance Consulting is the official Event Organizer for ROOTCON 6.
Forward to a friend
Know someone who might be interested to attend this annual hacker conference and information security gathering? Why not forward this email to them?
Added (05-July-2012, 10:05 AM)
6th Annual Hacker Conference and Information Security Gathering
(A National Security Event)
Victoria Hall, Parklane International Hotel, Cebu City
September 7 & 8, 2012 (Friday & Saturday)
9:00 AM - 6:00 PM
HR Managers, Hiring Managers, CEO / CIO / President / Vice President, Supervisors, Business Owners, IT Managers, Tech Support, System Administrators, Web Developers, Security Analysts, Network / Server Administrators, Software Engineers, Web Developers, Programmers, IT Educators, Teachers / Faculty members, IT professionals and interested individuals.
Here are some incidents that happened this year (and 2011) that made it to the headlines in this country.
Credit card users told: Be wary
"Dax Labrador, founder of the yearly hacking convention called ROOTCON, said that credit card hacking exists since 1990. Labrador said it is an easy undertaking given the right equipment and skills. In fact, Labrador said "any IT graduate" is capable of hacking."
Source: The Freeman, March 4, 2012
Government websites 'attacked by Chinese hackers'
Source: Sunstar, April 23, 2012
DOST express concern on "hacking" incidents
Source: The Philippine Star, April 26, 2012
Philippine news website hacked
Source: SunStar, May 5, 2012
PH asks agencies to check Internet security amid hack attacks
Source: Philippine Daily Inquirer, May 10, 2012
Hackers meet, share knowledge
"Dax Labrador, founding director of the Root Convention held in Cebu over the weekend, said not all hackers are "bad guys."
Source: SunStar, September 14, 2011
[Insert Another Title Here]
Source: ______, 2012
I leave that last part empty because we don't know who's next in our list. So if we look at this in an animated point of view, this is like a "Tom and Jerry" cartoon scenario. When you see a cat and a mouse, you expect the cat to own the mouse. But Jerry totally beats the crap out of Tom. Jerry is hungry, but Tom is guarding the kitchen. Be careful though, if your security within your network isn't strong enough, you will eventually fall.
ROOTCON 6 will set a record to draw more participants as the nation weighs new ways to protect themselves from cyber attacks by spies, criminals and activists.
Due to public request, the Early Bird Discount (P2,800) is extended until July 16, 2012. Regular Rate (P3, 800) applies thereafter.
SYNOPSIS OF THE TOPICS
BIOGRAPHY OF THE SPEAKERS
Plan to return to your office with recommendations and best practices that can surely help your organization. Then have a meeting with others in your department upon your return to share what you learned.
I would appreciate if you can ask for approval from the management as soon as possible in order to maximize both the conference and early bird discount.
Please disseminate or forward this invitation, in its entirety, to your colleagues, coworkers, friends and even to your boss, because you want to add value to their work and lives.
How to register? Please email [email protected] now. For sponsorship opportunities, email [email protected] .
"Let's Talk about Security"
Forward to a friend
Know someone who might be interested to attend these trainings? Why not forward this email to them?
If you received this email by mistake, send a blank email to [email protected] with subject line "Unsubscribe". Thank You.
Copyright © 2012 Alliance Consulting All rights reserved