How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?

Pages

Wednesday, May 22, 2013

Ask Questions to the PHDays Speakers via Twitter

A great number of reports and hands-on labs from leading IS experts will be presented at Positive Hack Days III. If you are not able to attend the forum held on May 23 and 24 in the WTC Moscow, you still have the opportunity to participate in PHDays: specially for you the event will be broadcasting and you will be also able to communicate with the speakers and guests via Twitter.

If you wish to question a speaker, you'll need to post a message on the Twitter account of the hall where the report or hands-on lab is held.

Reports and hands-on labs will be held in five different halls, so you should post tweets to one of the five accounts:

@phd_valdai — Valday Hall
@phd_amph — Conference Hall
@phd_prhall — Press Hall
@phd_ural — Ural Hall
@phd_baikal — Baikal Hall

For example, you wish to ask a question to Maxim Goncharov (senior threat analyst at Trend Micro) who is speaking on hacking services underground market in the Conference Hall. Then you just need to go on Twitter, log in to your account and post the question on the right hall's account.


Of course, there will be many people willing to question speakers. However, you have good chances that your question will be asked if it is really interesting.

You can use the hashtag #PHDays on Twitter to communicate with other participants and guests of the forum.

2 comments:

  1. Positive Hack Days is a unique global event. It brings all best together. The masters of data security management and lots more come together. It is a good program to know about the developing digital world. We are all part of that. The speakers have a good idea on the developing society. All the experts and technicians will get a part in the event. The famous specialists hold the seminar. It also has hands-on labs. Hacking is all time process. Two types are there one is ethical, and the other is unethical. The ethical hacker helps to generate more secure systems. They use their ability in hacking to check the security of the system. Unethical hackers will act like a thief. They use their ability for personal use. It is an illegal process. In the positive hack days, they make innovation in the hacking world. Information system and the methods need good security in every field. The speakers use different techniques in this field. Information support needs important protection. All systems should have digital protection to secure from cheating and crime. Thank you such a great amount for this great post. This blog is a standout amongst other I have ever read. This article has every last moment points of interest it defines clearly which. Keep sharing more ideas. I found your site as a perfect platform to get good posts. I would love to say the contents which you are sharing in your site are very accurate and easy to understand. This factor makes the reader refer your site more and more. Visit custom essay writing service to get the best essay writers. As a writer, I got to know more about hacking. Only the people from that business have a clear picture of the digital world. You shared it for all the readers. I would like to read more good posts.

    ReplyDelete
  2. Hi there! Nice blog! Think some students might be interested in this content as well.

    ReplyDelete