The Atlantic Security Conference (AtlSecCon) is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada. Established in 2011, our goal is to provide quality information security education and training at an affordable cost.
The Atlantic Security Conference (AtlSecCon) will take place April 24 & 25, 2019, at the Halifax Convention Centre in Halifax, Nova Scotia, Canada.
Preferred Hotel is the TBD.
* Register on Sched to build your own agenda and to register for the free workshops (limited seating).
* Bring your own laptop to participate in Capture the Flag (CTF) and workshops
* Badge and speakers dinner ticket required for Speakers Dinner
* Badge required for after party
What you will get
- Keynote Sessions from Industry Experts
- Capture the Flag Event
- Industry Leading Solution Expo
- Lock Pick Village by Sparrows
LOCK PICK VILLAGE
Check out the best lock pick gear available and talk to the pros about all things lock picking at the Lock Pick Village, by Sparrows Lock Picks!
Capture the Flag
CMD + CTRL™ Application Security Cyber Range
Test your skills in a whole new way as you hack your way through hundreds of vulnerabilities that plague applications today. In this exciting game setting, participants are tasked with tapping into their inner evildoer to learn and apply creative attacks in authentic web and mobile applications.
INTERACTIVE AND ENGAGING
Utilizes proven Capture-the-Flag (CTF) techniques in real-world settings
Fully functional applications allowing users to exploit features they often build and use such as adding items to a cart, making a purchase, transferring money, applying for a loan, submitting time sheets, and tracking fitness routines.
Clever pop-up messages, humorous sounds, and “Easter Eggs” throughout the sites make hacking them even more fun
Real-time scoring creates friendly competition and motivation
LARGEST REPOSITORY OF VULNERABLE WEBSITES
Includes 300+ vulnerabilities that cover 20 vulnerability classes including the OWASP Top Ten and CWE Top 25
Each challenge has a point value based on complexity, with challenges ranging from common vulnerabilities such as SQL Injection (SQLi) to advanced cryptanalysis and cipher cracking tests
Vulnerabilities are represented in a variety of forms just as they appear in commercial applications