June 19, 2021

June 8th, 2011 World IPv6 Day

Today is World IPv6 Day, major web companies such as Google, Facebook, Yahoo!, Akamai, Limelight Networks and Microsoft will enable IPv6 for 24 hours to test IPv6 in the real world.

On World IPv6 Day more than 430 companies are offering their content over IPv6 for a 24 hours. The goal of this world wide test is to motivate organizations across the related industries (Internet service providers, hardware makers, operating system vendors and web companies) to prepare their services and products for IPv6 to ensure a successful transition from IPv4 to IPv6.

IPv6 is the next generation Internet Protocol (IP) address standard to replace, the IPv4 protocol most Internet services use today. This transition helps to ensure the continued growth of the Internet as a communication platform.

The Internet Society is working with its members and other organizations to promote IPv6 transition by sharing information and helping to build the required operational capability among the Internet community and major web companies.

Online Summit: Cybercrime & Computer Forensics

Last year, the world experienced significant breaches involving the use of botnets, viruses, and other forms of attacks targeting governments and businesses alike.

Engage live with experts at the Cybercrime & Computer Forensics Summit on Feb 3rd to learn what the latest threats to your business are, how to effectively manage breaches, and how to safeguard your organization from cybercriminals all over the world.

Click here to view the full program and sign up to attend your favorite presentations.

WHEN: February 3, 2011, or afterward on demand

Presentations include:

Cyber Security in 2011: What IT Security Managers Need to Know

Natalya Kaspersky, Chairperson of the Board of Directors, Co-Founder of Kaspersky Lab

Enterprise-Wide Risk Management

Ronald S. Ross, Fellow, NIST

Using Logs for Breach Investigations and Incident Response

Dr. Anton Chuvakin, Principal, Security Warrior Consulting

Preventing CyberCrime by Relying on SSL Protocol

Larry Seltzer, Security Analyst

Cybercrime Gets Social

Paul Dwyer, Chief Advisor at International Cyber Threat Task Force (ICTTF)

Cybercrime & Identity

Mike Small, Fellow Analyst at Kuppinger Cole

View the full program and register to view the free webcasts here.

Conference Series Targeting Technical Information Security Professionals Making Spring Debut in Dallas, Texas

EC-Council launches the TakeDownCon series – a highly technical information security conference series that promises to be an excellent knowledge acquisition and skills exchange platform.

TakeDownCon will bring together information security researchers and technical experts, both the brightest and darkest, from the corporate and government sectors to academic as well the underground, and make it into one of the world’s premier infosec event where the latest security threats are presented and debated, and vulnerabilities are disclosed and scrutinized.

TakeDownCon will also feature a pre-event training platform offering EC-Council certification training including the world-renowned Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI) programs. In addition, there will also be highly advanced and technical courses offered by EC-Council’s Center of Advanced Security Training (CAST). These programs are designed by industry practitioners and experts, and will allow participants to go through both hands on and real life scenario based training covering domains such as web application security, penetration testing and social engineering.

Jay Bavisi, President of EC-Council said, “There is a huge gap, and we recognize the need for more information security training and education. TakeDownCon will be the ideal platform for knowledge acquisition. Dallas was chosen for its strategic geographical location, and the vast demand for information security training. TakeDownCon, being highly technical, will feature a brand new format, it will be very focused, content driven, and attendees will see no frills, thus making it accessible for the masses.”

This conference will also see the launch of “Nite Locks et all”. It is where physical security vulnerabilities and lock picking skills will be showcased, and a chance for attendees to try their hands on lock picking, under the tutelage of experts in this realm.

The Call for Paper is now open. If you are interested to reveal a zero day exploit, expose a new vulnerability or flag an unknown threat, this may well be the platform for you to showcase and demonstrate your technical expertise and proficiency, as well as demonstrate your thought leadership. Do visit http://www.takedowncon.com/cfp to submit your paper to be considered.

TakeDownCon will make its debut in Dallas, TX from May 14 – 19, 2011. More details can be found at http://www.takedowncon.com.

First-ever Online Summit: Your 2011 Survival Guide

As staff, mobile devices and social media make the web increasingly fraught, SC magazine have launched their first-ever online summit on the subject. It features insights from the CSOs of the likes of Canon, Barclays and Euroclear to ensure you don’t fall foul of next year’s web threats, which have got even top governments worried.

SC’s first-ever online summit, streamed to your desk on 8th and 9th December 2010. The full agenda can be found at www.scsummitonline.com.

[ad code=6 align=left]

Some of the topics that will be explored are listed below:

1. Pre-empting 2011’s most devious cybercriminals
2. Hitting on the right social network usage policy to keep the floodgates closed
3. Educating staff as to the inherent dangers of their online activity
4. Controlling the ever-expanding perimeter of Internet-enabled mobile devices

Do take a look at the full program at www.sconlinesummit.com to see if it’s relevant for you and your team. If you have any problems with the link you can visit the sessions directly at www.scwebcasts.tv.

Source:[Information Security Community – Linkedin]

Free Access to Black Hat USA 2010 Media Archive

Black Hat USA 2010 was one of the best hacking events in 2010. There were many interesting hacking projects and vulnerability exploits such as ATM machine hacking.

Black Hat USA 2010 media archive is available for free to public. In this archive you can find whitepapers, presentations and source materials.

Visit Black Hat USA 2010 Media Archive for full access.