• ShmooCon
    Wireless : 24
    Analysis : 20
    Community : 16
    Web : 13
    Development : 10
    ---------------------
  • DEF CON
    Web : 25
    Wireless : 18
    Malware : 16
    Privacy : 15
    Analysis : 14
    ---------------------
  • Blackhat USA
    Exploitation : 47
    Web : 46
    Analysis : 37
    Malware : 31
    Access : 25
    ---------------------
  • Blackhat Asia
    Privacy : 1
    Buffer Overflows : 1
    Forensics : 1
    Web : 1
    Wireless : 1
    ---------------------
  • Blackhat Europe
    Web : 18
    Exploitation : 14
    Analysis : 14
    Access : 12
    Testing : 11
    ---------------------
  • ZaCon
    Others : 12
    Deep Knowledge : 9
    Network Penetration : 7
    Infrastructure : 4
    Web : 3
    ---------------------
  • TROOPERS
    Hardware General : 3
    Application Security : 3
    Testing : 2
    Monitoring : 2
    Keynote : 2
    ---------------------
  • CanSecWest
    Attack : 5
    Full disk encryption : 1
    Android : 1
    Sandbox : 1
    Introductory : 1
    ---------------------
  • Hackito Ergo Sum
    Cryptography : 1
    VOIP : 1
    Hardware General : 1
    IPv6 : 1
    Formal Methods : 1
    ---------------------
  • Berlinsides
    Reverse Engineering : 3
    Community : 3
    Auditing : 2
    Mobile Security : 2
    Media : 2
    ---------------------
  • BruCON
    Others : 15
    Web : 8
    Hardware Reverse Engineering : 7
    Network Penetration : 7
    Application Security : 7
    ---------------------
  • Chaos Communication Congress
    Web : 26
    Analysis : 24
    Privacy : 16
    Access : 16
    Development : 15
    ---------------------
  • House Con
    Others : 5
    Deep Knowledge : 4
    Exploitation : 2
    Mobile Security : 2
    Web : 1
    ---------------------
  • ITWeb Security Summit
    Business : 8
    Web Security : 7
    Application Security : 4
    Mobile Security : 3
    Others : 3
    ---------------------
  • HITBSecConf Amsterdam
    Exploitation : 6
    Analysis : 5
    Others : 4
    Keynote : 2
    Mobile Security : 2
    ---------------------
  • THOTCON
    Web Security : 2
    Wireless : 2
    Reverse Engineering : 1
    Access : 1
    Firewall : 1
    ---------------------
  • Security B-Sides Denver
    Others : 3
    Compliance : 1
    Hardware General : 1
    Malware : 1
    Infrastructure : 1
    ---------------------
  • Security B-Sides Las Vegas
    Others : 7
    Deep Knowledge : 6
    Lightning Talk : 2
    Exploitation : 2
    Cyberwar : 2
    ---------------------
  • QuahogCon
    Others : 4
    Community : 4
    Hardware General : 3
    Exploitation : 2
    Wireless : 1
    ---------------------
  • Security B-Sides Boston
    Others : 5
    Deep Knowledge : 3
    Cloud : 1
    Access Control : 1
    Web : 1
    ---------------------
  • Security B-Sides DFW
    Deep Knowledge : 4
    Analysis : 4
    Others : 4
    Risk : 2
    Law Enforcement : 1
    ---------------------
  • OWASP Argentina
    Web : 6
    Exploitation : 2
    Others : 2
    Analysis : 1
    Risk : 1
    ---------------------
  • OWASP Day Mexico
    Keynote : 2
    Application Security : 1
    Web Security : 1
    Analysis : 1
    Panel : 1
    ---------------------
  • OWASP New Zealand
    Deep Knowledge : 2
    Web : 2
    Analysis : 2
    Application Security : 2
    Forensics : 1
    ---------------------
  • OWASP Dublin
    Application Security : 5
    Others : 5
    Keynote : 3
    Mobile Security : 2
    Web : 2
    ---------------------
  • OWASP AppSec Brasil
    Web Security : 4
    Application Security : 3
    Browser : 2
    Testing : 1
    Risk : 1
    ---------------------
  • OWASP BASC
    Others : 5
    Web : 4
    Application Security : 4
    Mobile Security : 3
    Deep Knowledge : 2
    ---------------------
  • OWASP China
    Web : 3
    Others : 2
    Exploitation : 1
    Computer Forensics : 1
    Monitoring : 1
    ---------------------
  • OWASP BeNelux
    Exploitation : 3
    Infrastructure : 2
    Privacy : 1
    Firewall : 1
    Analysis : 1
    ---------------------
  • OWASP IBWAS
    Web : 6
    Others : 5
    Application Security : 4
    Development : 3
    Community : 3
    ---------------------
  • hashdays
    Others : 3
    Mobile Security : 2
    Hardware Reverse Engineering : 2
    Cryptography : 2
    Social Engineering : 1
    ---------------------
  • SANS Pen Test Summit
    Others : 3
    Network Penetration : 2
    Keynote : 2
    Panel : 2
    Application Security : 2
    ---------------------
  • LASCON
    Web : 5
    Application Security : 5
    Others : 4
    Risk : 3
    Privacy : 2
    ---------------------
  • OWASP Appsec
    Web : 69
    Application Security : 52
    Others : 30
    Development : 29
    Compliance : 14
    ---------------------
  • CyberSec
    Cyberwar : 12
    Others : 10
    Incident Response : 4
    Development : 3
    Community : 3
    ---------------------
  • CollSec
    Others : 4
    Community : 3
    Infrastructure : 3
    Computer Forensics : 2
    Web : 2
    ---------------------
  • HealthSec
    Privacy : 7
    Others : 4
    Wireless : 3
    Hardware General : 3
    Business : 3
    ---------------------
  • BugCon
    Others : 12
    Unix : 6
    Web : 6
    Hardware General : 6
    Exploitation : 5
    ---------------------
  • NinjaCon
    Others : 21
    Hardware General : 13
    Hardware Reverse Engineering : 9
    Cyberwar : 5
    Wireless : 3
    ---------------------
  • SyScan
    Web : 18
    Exploitation : 17
    Analysis : 15
    Malware : 14
    Fuzzing : 14
    ---------------------
  • SOURCE Barcelona
    Others : 20
    Community : 3
    Analysis : 3
    Privacy : 2
    Hardware General : 2
    ---------------------
  • AthCon
    Others : 9
    Network Penetration : 3
    Exploitation : 2
    Fuzzing : 2
    Risk : 2
    ---------------------
  • Security B-Sides Austin
    Others : 6
    Hardware Reverse Engineering : 2
    Exploitation : 2
    Network Penetration : 2
    Access Control : 1
    ---------------------
  • CarolinaCon
    Malware : 6
    Web : 4
    Testing : 4
    Analysis : 4
    Community : 3
    ---------------------
  • CarolinaCon6
    Hardware General : 6
    Hardware Reverse Engineering : 5
    Mobile Security : 2
    Others : 2
    Application Security : 2
    ---------------------
  • CCDCOE
    Cyberwar : 23
    Others : 14
    Legal : 6
    Infrastructure : 5
    Keynote : 4
    ---------------------
  • 4th UNIX Security Symposium
    Unix : 3
    Access : 1
    Cryptography : 1
    Firewall : 1
    ---------------------
  • 5th USENIX UNIX Security Symposium
    Firewall : 2
    Unix : 1
    DNS : 1
    Auditing : 1
    Access : 1
    ---------------------
  • 6th USENIX Security Symposium
    DNS : 1
    Cryptography : 1
    Compliance : 1
    ---------------------
  • 7th USENIX Security Symposium
    Analysis : 1
    Keynote : 1
    SSL : 1
    Web : 1
    Browser : 1
    ---------------------
  • 8th USENIX Security Symposium
    Access : 4
    Unix : 2
    Cryptography : 2
    Analysis : 1
    Monitoring : 1
    ---------------------
  • 9th USENIX Security Symposium
    Wireless : 1
    Web : 1
    Cryptography : 1
    Analysis : 1
    Intrusion Detection : 1
    ---------------------
  • 10th USENIX Security Symposium
    Firewall : 3
    Analysis : 3
    Hardware General : 2
    Cryptography : 2
    Web : 2
    ---------------------
  • 11th USENIX Security Symposium
    Access : 3
    Keynote : 1
    Legal : 1
    Analysis : 1
    Privacy : 1
    ---------------------
  • 12th USENIX Security Symposium
    Cryptography : 1
    Analysis : 1
    Media : 1
    Keynote : 1
    Malware : 1
    ---------------------
  • 13th USENIX Security Symposium
    Keynote : 2
    Privacy : 2
    Analysis : 1
    Panel : 1
    Cryptography : 1
    ---------------------
  • 14th USENIX Security Symposium
    Analysis : 5
    Monitoring : 3
    Development : 2
    Panel : 2
    Legal : 1
    ---------------------
  • 15th USENIX Security Symposium
    Analysis : 4
    Development : 2
    Others : 2
    Panel : 2
    Keynote : 1
    ---------------------
  • 16th USENIX Security Symposium
    Privacy : 5
    Web : 3
    Analysis : 2
    Malware : 2
    Development : 1
    ---------------------
  • 17th USENIX Security Symposium
    Analysis : 3
    Keynote : 2
    Web : 2
    Cloud : 1
    Exploitation : 1
    ---------------------
  • 18th USENIX Security Symposium
    Web : 6
    Privacy : 4
    Malware : 2
    Keynote : 2
    Browser : 2
    ---------------------
  • 19th USENIX Security Symposium
    Web : 5
    Analysis : 3
    Privacy : 2
    Access : 2
    Unix : 2
    ---------------------
  • H2K
    Panel : 8
    Web : 5
    Community : 4
    Media : 4
    Access : 3
    ---------------------
  • H2K2
    Panel : 8
    Access : 4
    Privacy : 3
    Community : 3
    Legal : 3
    ---------------------
  • The Fifth HOPE
    Panel : 13
    Media : 7
    Legal : 5
    Web : 3
    Community : 3
    ---------------------
  • HOPE Number 6
    Community : 7
    Access : 6
    Panel : 6
    Media : 5
    Privacy : 4
    ---------------------
  • The Last HOPE
    Privacy : 7
    Legal : 7
    Panel : 7
    Community : 5
    Others : 5
    ---------------------
  • 1st Workshop on Cyber Security Experimentation and Test
    Keynote : 1
    Access : 1
    Wireless : 1
    ---------------------
  • 2nd Workshop on Cyber Security Experimentation and Test
    Keynote : 1
    Wireless : 1
    Access : 1
    ---------------------
  • 3rd Workshop on Cyber Security Experimentation and Test
    Keynote : 1
    Web : 1
    ---------------------
  • 1st USENIX Workshop on Offensive Technologies
    DNS : 1
    Botnets : 1
    ---------------------
  • 2nd USENIX Workshop on Offensive Technologies
    Fuzzing : 1
    Analysis : 1
    Phishing : 1
    ---------------------
  • 3rd USENIX Workshop on Offensive Technologies
    Routing : 1
    Keynote : 1
    IPv6 : 1
    Rootkits : 1
    Analysis : 1
    ---------------------
  • 4th USENIX Workshop on Offensive Technologies
    Analysis : 2
    Exploitation : 1
    ---------------------
  • HITBSecConf Malaysia
    Analysis : 23
    Web : 23
    Access : 15
    Exploitation : 14
    Malware : 13
    ---------------------
  • 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats
    DNS : 2
    Analysis : 1
    Privacy : 1
    Keynote : 1
    Web : 1
    ---------------------
  • 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats
    Malware : 6
    Analysis : 2
    Phishing : 1
    ---------------------
  • 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats
    Botnets : 1
    Legal : 1
    ---------------------
  • SOURCE Boston
    Business : 12
    Web : 10
    Compliance : 10
    Testing : 9
    Access : 8
    ---------------------
  • SecTor
    IPv6 : 1
    Malware : 1
    Cloud : 1
    Introductory : 1
    Network Monitoring : 1
    ---------------------
  • OWASP FROC
    Others : 7
    Development : 2
    Exploitation : 2
    Cloud : 2
    Application Security : 2
    ---------------------
  • PacSec
    Application Security : 2
    Community : 2
    Others : 2
    IPv6 : 2
    Exploitation : 1
    ---------------------
  • Ruxcon
    Others : 6
    Hardware General : 6
    Hardware Reverse Engineering : 4
    Tools : 4
    Malware : 3
    ---------------------
  • KiwiCon
    Others : 9
    Hardware General : 4
    Workshops : 2
    Hardware Reverse Engineering : 2
    Rootkits : 1
    ---------------------
  • BlueHat
    Others : 3
    Browser : 3
    Application Security : 2
    Deep Knowledge : 2
    Mobile Security : 1
    ---------------------
  • EC2ND
    Keynote : 4
    Intrusion Detection : 4
    Incident Response : 4
    Network Penetration : 3
    Exploitation : 2
    ---------------------
  • CONFidence
    Recommended : 2
    HTML5 : 2
    IPv6 : 1
    Privacy : 1
    Botnets : 1
    ---------------------
  • t2
    Others : 6
    Development : 2
    Hardware Reverse Engineering : 2
    Hardware General : 2
    Exploitation : 1
    ---------------------
  • ekoparty
    Rootkits : 1
    Hardware General : 1
    Video Card : 1
    ---------------------
  • REcon
    Reverse Engineering : 9
    Defence : 2
    Windows : 1
    VisualC++ : 1
    Machine Learning : 1
    ---------------------
  • DeepSec
    Attack : 3
    Tool : 3
    Cyberwar : 2
    Fuzzing : 2
    Computer Forensics : 2
    ---------------------
  • Hack.Lu
    Reverse Engineering : 1
    Dropbox : 1
    ---------------------
  • Infiltrate
    Military : 1
    Keynote : 1
    Rootkits : 1
    Attack : 1
    Dtrace : 1
    ---------------------
  • FloCon
    Network Monitoring : 1
    Risk : 1
    Quantitative Methods : 1
    ---------------------
  • Computer Crime Update
    Phishing : 1
    ---------------------
  • SummerCon
    Exploitation : 2
    Google : 1
    Code Analysis : 1
    Information Leaks : 1
    Bouncer : 1
    ---------------------
  • SEC-T
    Mobile Security : 2
    RFID : 2
    Application Security : 1
    Physical Pentesting : 1
    Hardware Reverse Engineering : 1
    ---------------------
  • Virus Bulletin
    None : 18
    ---------------------
  • S4
    Harvard : 1
    Embedded : 1
    DNP3 : 1
    ---------------------
  • Security B-Sides London
    Code Analysis : 1
    Windows Phone 7 : 1
    Attack Planning : 1
    HTML5 : 1
    Windows : 1
    ---------------------
  • InfoSec SouthWest
    ADDP : 1
    Attack : 1
    Serial Device : 1
    Survey : 1
    Port Scanning : 1
    ---------------------
  • 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats
    Botnets : 2
    Socialbots : 2
    Parsing : 1
    Attack : 1
    Android : 1
    ---------------------
  • Security B-Sides ROC
    Windows Phone 7 : 1
    ---------------------
  • 10th International Conference on Applied Cryptography and Network Security
    CAPTCHA : 1
    ---------------------
  • Security B-Sides Detroit
    Vehicle : 1
    Defence : 1
    OWASP : 1
    HTTP Strict Transport Security : 1
    ---------------------
  • Hack In Paris
    XML : 1
    StuxNet : 1
    Flame : 1
    SCADA : 1
    ---------------------
  • RVAsec
    Defence : 2
    SIEM : 1
    Risk : 1
    ---------------------
  • ShakaCon
    Tor : 2
    HTML5 : 1
    Cloud : 1
    Splunk : 1
    Android : 1
    ---------------------
  • Positive Hack Days
    Botnets : 2
    Anonymous : 2
    LINQ : 1
    Nginx : 1
    XML : 1
    ---------------------
  • OWASP AppSec Research
    Defence : 5
    Cross-Site Scripting : 2
    SQL : 1
    Payment Card : 1
    SQL Injection : 1
    ---------------------
  • Privacy Enhancing Technologies Symposium
    Privacy : 1
    Browser : 1
    ---------------------
  • ToorCamp
    Keynote : 1
    Hardware General : 1
    Software Defined Radio : 1
    ---------------------
  • International Workshop on Digital Forensics
    Computer Forensics : 1
    Volatility Framework : 1
    ---------------------
  • 44Con
    Attack : 1
    Post Exploitation : 1
    Python : 1
    Defence : 1
    ---------------------
  • GrrCON
    Advanced Persistent Threat : 1
    Sales : 1
    ---------------------
  • AppSecUSA
    Industry News : 1
    Panel : 1
    Bug Bounty : 1
    Introductory : 1
    ---------------------
  • Breakpoint
    Exploitation : 3
    Android : 2
    Introductory : 2
    Tools : 2
    Metrics : 1
    ---------------------
  • Hacktivity
    TEMPEST : 1
    Mobile Security : 1
    Malware : 1
    Survey : 1
    ---------------------
  • ZeroNights
    Reference Counting : 1
    Attack : 1
    Reverse Engineering : 1
    Kernel : 1
    Web Security : 1
    ---------------------
  • Blackhat Abu Dhabi
    Attack : 5
    Cyberwar : 3
    Android : 3
    Tools : 2
    Malware : 2
    ---------------------
  • BSidesSanFrancisco
    Industry News : 1
    Defence : 1
    Active Defence : 1
    Introductory : 1
    ---------------------
  • Third ACM Conference on Data and Application Security and Privacy
    Geolocation : 1
    Verification : 1
    ---------------------
  • ESSoS
    Defence : 1
    Active Defence : 1
    ---------------------
  • RSA USA
    Introductory : 4
    Visualisation : 1
    Insider Threat : 1
    Defence : 1
    Internet of Things : 1
    ---------------------
  • BlackHat EU
    Attack : 2
    Appliance : 1
    Sandbox : 1
    Network Penetration : 1
    Intrusion Detection : 1
    ---------------------
  • Financial Cryptography and Data Security
    BitCoin : 1
    Phishing : 1
    Defence : 1
    UI : 1
    ---------------------
  • NSDI
    Defence : 1
    ---------------------
  • WiSec
    Privacy : 1
    Defence : 1
    ---------------------
  • BSidesBoston
    Tool : 1
    Unmanned vehicles : 1
    Attack : 1
    Embedded : 1
    ---------------------
  • MOST
    Defence : 1
    Mobile Security : 1
    Honeypot : 1
    ---------------------
  • Wahckon
    Tor : 1
    .onion : 1
    ---------------------
  • BSideSRhodeIsland
    Network Monitoring : 1
    ---------------------
  • hackinparis
    Android : 1
    TrustZone : 1
    Attack : 1
    Rootkits : 1
    Mobile Security : 1
    ---------------------
  • Nuit
    Web Security : 1
    Survey : 1
    ---------------------
  • SourceBoston
    Jailbreak : 1
    Android : 1
    Analysis : 1
    iOS : 1
    ---------------------
  • AppSec USA
    SSL : 1
    ---------------------