Before the year ends, Pandora Security Labs sponsors and joins the TCon (Tuguegarao Conference) by Hackthenorth.ph to continue to show its support in to the information security community in the Philippines, as well as to be able to impart in the improvement of information security capabilities of the country. Pandora Security Labs’ very own founder and CEO, Mr. Isaac Sabas will be giving the keynote speech for this event. See here for the list of speakers.
Isaac, with his keynote talk entitled, “Setting Security on Auto-Pilot? Rethink Your Security.” will be discussing about the current dilemma of the information security industry wherein the problem with too much automation of security is that it creates more vulnerabilities. The real problem no longer lies just in the aspect of technology or security products, but now in the heart of security operations. Isaac will be discussing about how our culture and mindset greatly affects how we perceive security and in return jeopardize our security posture. Isaac points out in the discussion the key into having a holistic security solution.
HackTheNorth.ph is a non-profit organization founded by IT Security Specialists and Software Engineers whose roots thrive from Northern Philippines. The main objective of forming the organization is to bring industry knowledge to the country’s northern rural areas through carefully crafted IT Seminars, IT Roadshows, Tech Share Sessions, Tech Talks and Hackathons.
TCon (Tuguegarao Consortium), the first ever Hacking Conference in Northern Philippines. It is patterned after DefCon, the top Hacking Conference worldwide which transpires annually in Las Vegas; and RootCon, the Premiere Hacking Conference in the Philippines which happens every September in Cebu. TCon is the first among many conferences that will be held in the northern part of the Philippine islands.
This year’s conference will be having the following tracks: Programming Best Practices and Current Cutting Edge Languages, Secure Coding, Securing Devices, Internet of Everything, Cryptography, Social Engineering, SQL Injection, The Current Malware Threat Landscape, Advanced Persistent Threats, Hardware Hacking, Countermeasures, Counterhacking, Ethical Hacking and the Cyber Crime Law. See here for the programme.