The Atlantic Security Conference (AtlSecCon) is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada. Established in 2011, our goal is to provide quality information security education and training at an affordable cost.
The Atlantic Security Conference (AtlSecCon) will take place April 28 & 29, 2020, at the Halifax Convention Centre in Halifax, Nova Scotia, Canada.
Preferred Hotel is the the The Barrington Hotel, mention AtlSecCon for the preferred rate.
* Bring your own laptop to participate in Capture the Flag (CTF) and other challenges
* Badge and speakers dinner ticket required for Speakers Dinner
* Badge required for after party
What you will get
- Keynote Sessions from Industry Experts
- Capture the Flag Event
- Industry Leading Solution Expo
- RFID, IoT and Lock Pick Villages
We accept payment via the following Crypto Currencies. Please send us an email to arrange payment at tickets .at. atlseccon .dot. com.
IoT & RFID Village
RFID Village – Presented by Loudmouth Security
RFID Village was created to bring awareness to the security (or lack thereof) of different RFID technologies. Visit the RFID village to learn about RFID access control systems, payment cards and other uses of RFID technologies today. Learn through hands-on interaction how to clone an access control badge, or dump the memory contents of a simple payment card. Attendees should leave the village with a better understanding of what makes some RFID technologies better than others, and how to use RFID technologies securely.
IoT Village – Created by ISE & Presented by Loudmouth Security and Epyc Security
Created for DefCon 23 by security consulting and research firm Independent Security Evaluators (“ISE”), IoT Village delivers advocacy for and expertise on security advancements in Internet of Things devices. In 2018, the IoT Village launched an initiative to create Partner IoT Villages to expand the reach of IoT Village and bring awareness of IoT security issues to more security conferences around the world.
This Partner IoT Village will be hosting two contest tracks:
The Zero-Day track is focused on the discovery and demonstration of new exploits (0-day vulnerabilities). This track relies on the judging of newly discovered attacks against embedded electronic devices. Devices that are eligible for the contest can be found here and you can start submitting entries now! The winners who score the highest on their judged entries will be rewarded with cash prizes.
In the IoT CTF, players compete against one another by exploiting off-the-shelf IoT devices. These 12+ devices all have known vulnerabilities, but to successfully exploit these devices requires lateral thinking, knowledge of networking, and competency in exploit development. CTFs are a great experience to learn more about security and test your skills, so join up in a team (or even by yourself) and compete for fun and prizes! Exploit as many as you can and the top three teams will be rewarded.
LOCK PICK VILLAGE
Check out the best lock pick gear available and talk to the pros about all things lock picking at the Lock Pick Village, by Sparrows Lock Picks!
Capture the Flag
CMD + CTRL™ Application Security Cyber Range
Test your skills in a whole new way as you hack your way through hundreds of vulnerabilities that plague applications today. In this exciting game setting, participants are tasked with tapping into their inner evildoer to learn and apply creative attacks in authentic web and mobile applications.
INTERACTIVE AND ENGAGING
Utilizes proven Capture-the-Flag (CTF) techniques in real-world settings
Fully functional applications allowing users to exploit features they often build and use such as adding items to a cart, making a purchase, transferring money, applying for a loan, submitting time sheets, and tracking fitness routines.
Clever pop-up messages, humorous sounds, and “Easter Eggs” throughout the sites make hacking them even more fun
Real-time scoring creates friendly competition and motivation
LARGEST REPOSITORY OF VULNERABLE WEBSITES
Includes 300+ vulnerabilities that cover 20 vulnerability classes including the OWASP Top Ten and CWE Top 25
Each challenge has a point value based on complexity, with challenges ranging from common vulnerabilities such as SQL Injection (SQLi) to advanced cryptanalysis and cipher cracking tests
Vulnerabilities are represented in a variety of forms just as they appear in commercial applications