Offensive hackers from around the world will meet for two days in Miami to share their expertise and technical know-how Credit: Thinkstock As I look out my window on this snowy Sunday, April 3, 2016 in Massachusetts, I can think of nothing more exciting than my pending trip to Miami to cover this year’s Infiltrate security conference April 7-8 at the Fontainbleau Hotel.The greatest challenge for me was narrowing down the speakers that I could cover, and this week I deliver you some fresh and important skills that you can use in offensive hacking. Following the opening remarks of Dave Aitel, this year’s keynote speaker, Nate Fick, CEO at Endgame, will address the crowd before Omer Coskun talks about “Why nation state malwares target Telco Networks.” Given the recent debates of encryption, this presentation is timely and critical for so many security professionals.Coskun will discuss recent research in malware. The “analysis of state-sponsored malwares like Flame, Duqu, Uruborus and the Regin revealed that these were designed to sustain long-term intelligence-gathering operations by remaining under the radar.” Recently added to the presenter lineup was Principal Cyber Adviser at Office of the Secretary of Defense Lisa Wiswell who will talk about “Hack the Pentagon,” and the announcement from the Secretary of Defense that they will launch a pilot program of the first bug bounty program in the federal government. For researchers in the offensive security field, the growing popularity of bug bounty programs provides opportunities for you to demonstrate your own expertise. Perhaps you might even be a presenter at next year’s Infiltrate conference.In addition to the two days packed with talks from experts in the field, students are also able to attend training courses ranging from two- to four-day courses that cover topics from Java to “Web Hacking Language Review.” The four-day course, “Wide Open to Interpretation,” will cover auditing and exploiting vulnerabilities in both PHP and Java with an intensive two days on each. To determine which classes are right for your level of expertise, prerequisite evaluation tests are available. If you are interested in any of the trainings offered yet are unsure of which ones would be best suited for you, you can email infiltrate@immunityinc.com for more information.The conference isn’t all about learning, though. Hackers who want to challenge their physical skills can compete in the Brazilian Jiu Jitsu challenge on April 6. For sure, I will not be participating in the physical game of chess described as “A near infinite exchange of moves and counter-moves interwoven with a deep endgame-focused strategy focused on submitting your opponent.”I will, however, report on any impressive demonstrations of strength and wit from those who are brave enough to partake in this challenge.If you will be attending the conference, seek me out and let me know what you find most valuable as a security newb so that I can cover the topics of greatest value to those new to offensive hacking. For those unable to attend, fear not my dear readers. I will not let you down. Check out the conference schedule, then send me a comment, message, or tweet to let me know what you would attend if you could. I will get there and report back to you through the week. Enjoy the extended winter for those who also are looking at snow right now. Tuesday I’m off to the sunny warmth of Miami! Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe