OS19 Dark Background 1609x579


Thank you to all of the attendees, speakers and sponsors that made InfoSec World 2018 Conference & Expo a success. From keynote sessions and breakouts that covered topics ranging from the IoT privacy apocalypse to learning to embrace the "grey" when it comes to privacy and data security laws, networking activities that included Capture the Flag and Escape Rooms, and receptions full of infosec pros, this year's event brought the infosec community together, and we couldn't have done it without you.

We look forward to hosting you again next year, but let's keep the conversation going in the meantime and continue to prepare for the changing cybersecurity landscape. 



For more than 20 years security professionals have made InfoSec World the “business of security” conference. To manage today’s threats, security practitioners must have the skills to be both a business partner and enabler, and have the technical expertise to prevent, detect and respond to security challenges. InfoSec World features a world-class program and expert speakers from the field to help you do just that. 



Dog photo AMELIE


Capture the Flag Tech Challenge
In teams of up to four people, InfoSec World attendees, sponsors and students are invited to participate in a prepared Capture the Flag challenge taking place among all the action in the Expo! Teams will have to combine their knowledge and skill sets to compete together and complete the challenge. Each team’s real-time progress will be projected on a big screen, so bring your A-game! Can't attend InfoSec World but want to participate? Register online here and details for your team to log in on March 20th will be sent to you beforehand.



Open Source Intelligence (OSINT) Gathering Hands-On
FULL-DAY WORKSHOP | March 17, 2018 | 8 CPEs

Open Source Intelligence Gathering (OSINT) is growing in popularity among attackers and defenders alike. When an attacker comes knocking on your network's front door, the warning lights go off in multiple systems (IDS, IPS, SIEM, WAF). More sophisticated attackers, however, spend considerable time gathering information using tools and techniques that never (or rarely) touch any of your systems. As a result, these attackers are able to execute their attacks and make off with proprietary data before you even realize they are there.

This workshop provides participants with both an introduction to numerous OSINT tools and techniques, as well as methods you can use to minimize your exposure. By the end of the workshop, participants will have a working knowledge of how to collect OSINT on their organizations, as well as on individuals associated with their organizations. More importantly, participants will understand how attackers might exploit that information in an effort to compromise a company’s internal network.


Back to top