[ :: mainpage :: register :: conference :: training :: call for papers (CFP) :: the venue ]
[ :: capture the flag (CTF) :: press/media :: conference agenda :: contact us ]
[ :: forum :: sponsors :: past conferences :: conference kit (PDF) ]

Hack In The Box Security Conference 2006 - Malaysia

Filed under: Main Page — Administrator @ 10:16 am

February 22, 2006

Welcome to the official homepage of HITBSecConf2006- Malaysia. The main aim of the HITBSecConf conference series is to enable the dissemination, discussion and sharing of deep knowledge network security information. Featuring presentations by respected members of both the mainstream network security arena as well as the underground or black hat community, HITBSecConf2006 - Malaysia will see over 30 of the world’s leading network security specialists down to present their research and findings. Set to take place from September 18th - 21st 2006 at The Westin Kuala Lumpur, the event will feature 7 hands-on technical training sessions and 2-days of deep knowledge presentations.

Event Details

Venue: The Westin Kuala Lumpur
199 Jalan Bukit Bintang
55100 Kuala Lumpur

Date: 18th September
Time: 0900 - 1800
Item: 7-tracks Hands-On Technical Training (Day 1)

Date: 19th September
Time: 0900 - 1800
Item: 7-tracks Hands-On Technical Training (Day 2)

Date: 20th September
Time: 0900 - 1800
Item: Dual Track Security Conference & Capture The Flag ‘Live Hacking’ Competition (Day 1)

Date: 21st September
Time: 0900 - 1800
Item: Dual Track Security Conference & Capture The Flag ‘Live Hacking’ Competition (Day 2)

Hands-On Technical Training

TECH TRAINING 1 - Advanced Web Application & Services Hacking
Trainer: Umesh Nagori (Vice President, Net-Square) & Lyra Fernandes (Principal Analyst, Net-Square)

TECH TRAINING 2 - Attacking & Defending Networks (Advanced Linux Edition)
Trainer: Nish Bhalla (VP Consulting Solutions, Security Compass)

TECH TRAINING 3 - The Exploit Laboratory
Trainers: Saumil Shah (Director, Net-Square) & SK Chong (Scan Associates)

TECH TRAINING 4 - Tactical VoIP : Applied VoIPhreaking
Trainer: The Grugq (Independent Network Security Researcher)

TECH TRAINING 5 - War Driving .Gov
Trainers: Anthony Zboralski (Founder HERT & PT Bellua Asia Pacific) with Jim Geovedi (Member HERT & Security Consultant PT Bellua Asia Pacific).

TECH TRAINING 6 - Structured Network Threat Analysis and Forensics
Trainers: Meling Mudin (spoonfork) & Lee Chin Sheng (geek00l)

TECH TRAINING 7 - Yin and Yang of Java Security Programming
Trainer: Marc Schonefeld

HITBSecConf2006 - Keynote Speakers

1.) Bruce Schneier (Chief Technology Officer, Counterpane Internet Security)
2.) Mark Curphey (Vice President, Foundstone Professional Services - A division of McAfee Inc.)
3.) John Viega (Chief Security Architect, McAfee Inc.).

HITBSecConf2006 - Speakers (alphabetical order)

1.) Anthony Zboralski (Founder, HERT & PT. Bellua Asia Pacific)
2.) Arnaud Ebalard (Security Research Engineer, EADS Corporate Research Center)
3.) Carlos Sarraute (Senior Researcher, Core Security Technologies)
4.) Ching Tim Meng (Regional Security Consultant, Lucent Worldwide Services)
5.) Douglas MacIver (Penetration Engineer, Microsoft Penetration Team, Microsoft Corporation)
6.) Fabio Ghioni (Independent Advisor to various MNCs and Government organizations)
7.) Fabrice Marie (Manager, FMA-RMS Singapore/Malaysia)
8.) Fyodor Yarochkin (Co-Author, XProbe)
9.) Ian Hellen (Security Program Manager, Windows Security Engineering Team, Microsoft Corporation)
10.) Javier Burroni (Senior Developer of Core Impact, Core Security Technologies)
11.) Jim Geovedi (Member of HERT & Security Consultant, PT Bellua Asia Pacific)
12.) Joanna Rutkowska (Senior Security Researcher, COSEINC)
13.) Jonathan Limbo (Security Researcher, Cisco Systems)
14.) Lisa Thalheim (Independent Network Security Consultant)
15.) Marc Schonefeld (Independent Network Security Consultant)
16.) Meder Kydyraliev (Co-Author, XProbe)
17.) Michael Davis (Member, The Honeynet Project.)
18.) Nguyen Anh Quynh (PhD student of Keio university, Japan)
19.) Nish Bhalla (VP Consulting Solutions, Security Compass)
20.) Paul Boehm (Founding member of TESO Security, Security Consultant, SEC Consult)
21.) Philippe Biondi (Research Engineer at EADS Corporate Research Center)
22.) Raditya Iryandi (Information Security Consultant, Bellua Asia Pacific)
23.) Raoul Chiesa (Board of Directors Member@ Mediaservice.net ISECOM Group & TSTF)
24.) Roberto Preatoni (Founder, Zone-H Defacement Mirror)
25.) Rohyt Belani (Director, Mandiant)
26.) Saumil Shah (Director, Net-Square)
27.) Thorsten Holz (HoneyNet Project Germany, Independent Network Security Researcher)
28.) The Grugq (Independent Network Security Researcher)
29.) Van Hauser (Founder, THC.org and Security Consultant at n.runs GmbH)
30.) Vishal Kumar (Security Program Manager, Secure Windows Initiative Team, Microsoft Corporation)
31.) Wes Brown (Founder, Ephemeral Security)
32.) Window Snyder (Chief Security Something-or-Other, Mozilla Foundation)
33.) Yen Ming Chen (Senior Managing Consultant, Foundstone - A division of McAfee Inc.)

Event Organizer

Hack In The Box (M) Sdn. Bhd.

Supported & Endorsed By

Malaysian Communications and Multimedia Commission (MCMC)

Malaysian Administrative Modernisation & Management Planning Unit

Platinum Sponsors

Foundstone - A division of McAfee Inc.

Microsoft Corporation

Main Sponsors

Cisco Systems

Lucent Technologies - Bell Labs Innovations

Official Airline Partner

Internet Bandwidth Sponsor

AIMS - Malaysia's Telecommunications Hub

Official Hotel

Westin Kuala Lumpur

CTF Sponsor


CTF Prize Sponsor

Scan Associates Berhad.

Our Speakers Are Supported By:

Bellua Asia Pacific

Core Security Technologies

Media Partners:

InfoSec News

(ISN) InfoSec News

Virus Bulletin online magazine is dedicated exclusively to reporting and analysing malicious computer programs and spam. The annual Virus Bulletin conference is cited by many in the industry as the anti-malware event of the year.

Insecure Magazine

Phrack Magazine

Hakin9 Magazine

Supporting Organizations


ISECOM - Insititue for Security and Open Methodologies

IT Underground

Chaos Computer Club (Germany)

X-Focus China

Zone-H Defacement Mirror

Xatrix Security


Special Interest Group in Security & Information InteGrity Singapore