ROOTCON 6 - Hacker Conference / InfoSec Gathering
Event Information
Description
ROOTCON
is an annual hacker conference and Information Security gathering, it aims to share best practices and technologies. Attend this event to see demos of exciting stuff (hacks, tools, tips, etc), network with your peers and meet the presenters who are the industry's leading experts and top security strategists.
Learn about solutions, products, techniques and critical tips to build and enhance your security practices and policies. The environment is vendor-neutral and focused on the sharing of practical insights and solutions.
Awesome event with awesome speakers, attendees and activities. If you are concerned about information security and want to know more, this event is not to be missed!
Checkout the ROOTCON 6 list of Tracks
Top 10 Reasons to Attend
Don't pay to attend a conference only to listen to vendors giving product sales pitches from the podium. We are rewriting the rules on conferences. Gone are the days when you spent a lot of money only to return with bits and pieces of information. Other industry conferences merely identify security issues you face. We tackle those issues with specific how-to-advice to conquer your toughest questions and challenges in your organizations.
1. Complimentary Admission
- For sponsors and partners
2. No sales pitches disguised as content!
3. Vendor-neutral expertise
- Solutions from top vendors are featured during the exhibit hours
4. Guarantees you attend with a senior-level audience of your peers for network opportunities
5. Learn about technologies and products to build and enhance your security policies
6. Different Topics, Trainings and Seminars focused to manage risk in all phases
7. Solutions, techniques and critical tips from industry's leading experts and top security strategists
8. Identify new markets, agents and distributors
9. Keep up with the latest technology
10. Promote your organization within the industry
Who Will Attend?
Security Administrators
CIOs and IS Management
Security Analysts
Network Administrators
Security Managers
Security Engineers
Security Monitoring Engineers / Analysts
Security Officers
System Programmers
Network Analysts
System Administrators and Analysts
Cyber Crime Investigators
IT Professionals
Students, Faculties and School Directors / Administrators
And many more...