top of page
Search
Feb 1, 20182 min read
The Importance of Being Ernest & Optimistic — by Dr. Jessica Barker
#IICSG2018 Conference Keynote Day 1 (24 May 2018) 10.30am—11.15am @ Stamford Ballroom [#IICSG2018 Conference Full Schedule] Abstract...
Feb 1, 20181 min read
Barbarians At the Gate(way) — by Dave Lewis
#IICSG2018 Conference Keynote Day 1 (24 May 2018) 11.15am—12.00pm @ Stamford Ballroom [#IICSG2018 Conference Full Schedule] Abstract...
Dec 20, 20171 min read
#IICSG2018 — ICS/SCADA Capture-the-Flag (CTF) Competition
Sponsored by NSHC REGISTRATION The ICS/SCADA CTF competition is open to all conference ticket holders to play, enjoy and compete....
Dec 15, 20171 min read
#IICSG2018 — Electronic Badge Village
Supported by Groud-Up Innovation Labs for Development (GUILD) "It's not a cybersecurity conference if attendees do not have a piece of...
Dec 10, 20171 min read
#IICSG2018 — Learning Lab Village
Powered by The Cyber Assembly Come discover cybersecurity skills through Immersive Labs — a gamified, practical learning environment...
Dec 5, 20171 min read
#IICSG2018 — Career Village
Co-Organised with the Singapore Computer Society (SCS) Career Consultation & CV Hacking We will be featuring cybersecurity career...
Dec 1, 20173 min read
#IICSG2018 Training — Pentesting the Modern Application Stack
by Bharadwaj Machiraju & Francis Alexander, OpSecX Continuous Build & Deployment tools, Message brokers, Configuration Management...
Dec 1, 20172 min read
#IICSG2018 Training — Applied Physical Attacks on Embedded Systems
by Joe FitzPatrick, SecuringHardware.com This course introduces and explores attacks on several different relatively accessible...
Dec 1, 20172 min read
#IICSG2018 Training — Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation
by Dawid Czagan, Silesia Security Lab HackerOne bug hunters have earned $20 million in bug bounties until 2017 and they are expected to...
Dec 1, 20172 min read
#IICSG2018 Training — ICS/SCADA Security
by Edward Lee & Ellie Kim, NSHC ICS/SCADA systems including power plants, factories, and transportation systems are some of the most...
Nov 1, 20174 min read
#IICSG18 Training — Exploit Development for Win32 Platform
by Peter Van Eeckhoutte, Corelan A fast-paced, mind-bending, hands-on course where you will learn advanced exploit development techniques...
bottom of page