All offensive security conference in Seoul
Provider for automated security testing solutions including vulnerability management, Beyond Security, has announced that they will host the first ever all offensive security conference in Seoul, South Korea starting from June 10th to 14th, 2019 at the Courtyard by Marriott Seoul Namdaemun.
“Beyond Security is extremely proud to host this unique security event in Seoul this year” said Aviram Jenik, CEO and Co-Founder of Beyond Security. “As the first of its kind, this conference will focus on highly technical offensive security topics such as vulnerability discovery, advanced exploitation techniques and reverse engineering and offers to be a great event for cyber security professionals.”
This conference will host speakers from all over the world who are world renowned cyber security experts along with training sessions and workshops. Formally known as Hack2Win Extreme, Beyond Security’s extremely popular hacking competition will also be taking place with a new name, TyphoonPwn.
Noam Rathaus, CTO and Co-Founder of Beyond Security, added: “We designed the competition to help improving the security posture of the software and devices, responsibly disclosing vulnerabilities to the vendors as well as awarding monetary prizes and fame to the security researchers who are good enough to win the contest. This event is a rare opportunity to help the security ecosystem while getting cash for doing so, getting credit for vulnerabilities found and disclosing them responsibly" he added.
Aviram Jenik additionally, said: "We chose South Korea for the event because of the talent pool that is available in the country and its central influence on the entire region. We noticed that while South Korea has amazing hacking talents, who are usually not used for offensive security research. We want to use the conference to demonstrate how offensive security can be used for good.”
Some of the topics for this year’s conference include Vulnerability discovery, Advanced exploitation techniques, Browsers Exploitation, Revolutionary Web Hacking Technique, Mitigation bypass techniques, Hardware reverse engineering and Attacks on cryptography in hardware and/or software to name a few.