From CloudSec to Web3 Security, Bug Bounties to DFIR, and More: 15 Power-Packed Talks at IWCON2022

Come, explore the entire spectrum of cybersecurity learnings you’ll get to witness at IWCON2022.

InfoSec Write-ups
InfoSec Write-ups

--

Hey fellow hacker,

You might’ve already heard about IWCON2022our 2nd Infosec conference cum networking event, but do you know what makes it ultra special?

Most Infosec conferences only talk about 3–4 wide umbrellas. But at IWCON2022, we have expert talks covering nine major aspects of security!

You’ll learn everything from CloudSec to Web3 Security, Bug Bounties to DFIR, Cybersecurity tooling to unique experiences, from the best in the world without leaving your home.

So if you want to pick up a new skill before 2022 ends, this is the place to be!

Join us at the conference, and let’s end this year with a bang 💥

Here’s a look at some of the topics our incredible speakers will cover:

1. Cloud security

  1. Threat hunting in cloud environments by Gabrielle Hempel aka gabsmashh (Leader, hunter, cloud SME, security engineer @ Netwitness.)
  2. Hacking cloud: for fun and Profit by Dhiyaneshwaran B (AppSec Researcher at ProjectDiscovery.io)

2. Bug Bounty

  1. My approach to accessing admin panels by Ahsan Khan aka hunter0x7 (Admin Pwner)
  2. Reading RFCs for hacking by Inti De Ceukelaire aka securinti (Intigriti’s head of hackers, Bug bounty hunter, known for his research on logic vulnerabilities.)
  3. My journey in bug bounty & unique findings by Majd Aldeen Atiyat aka Th3G3nt3lman (Bug bounty hunter and full-time security advisor.)
  4. Account Hijacking featuring OAuth and Javascript by Youssef Sammouda (Security researcher and bug bounty hunter)

3. API Security

  1. API security through external attack surface management by Phillip Wylie (Hacker in Residence at CyCognito)

4. Cybersecurity Tooling and Automation

  1. Method vs. Madness: Developing Flexible Automation Workflows by Mohammed Diaa (Trickest’s Head of Workflows)
  2. Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All by Jonathan Leitschuh (Security Researcher @ Dan Kaminsky Fellowship.)

5. DFIR (Digital Forensics and Incident Response)

  1. The good, the bad, and the ugly of IIS modules by Blake McDermott (DFIR within Microsoft DART.)

6. Web3 Security

  1. Starting into Smart Contract Security by Shashank aka cyberboyIndia (CEO and Co-founder of CredShields.)

7. Unique Experiences

  1. How I used recon techniques to identify a prolific scammer by Luke Stephens aka hakluke (Hacker, bounty hunter, tool creator, founder of Haksec.)

8. Pentesting

  1. Most common ways to hack companies under 4h by Florian Hansemann aka CyberWarship (Founder of HanseSecure.)

9. Open Source Security

  1. Impact security at scale by John Opdenakker (Infosec professional and blogger)

Got any questions? We’re here to address them.

We'll be happy to answer any questions, doubts, or blockers stopping you from being a part of IWCON 2022.

Leave a reply to this email (or drop a comment below), and we’ll get back to you as soon as possible.

Looking forward to seeing you at IWCON 2022.

Book your seat today.

Best,
Editorial team
Infosec Writeups.

--

--