ELIT organizes the
"DzHack Event"

- 09 May, 2015 -

Organizer

On the 1st of January 2009, the IT activity, related to the corporate headquarter of the Sonelgaz Group , was converted into a joint stock company, named "EL Djazair Information Technology", identified by the abbreviation "ELIT Spa".

ELIT was created to meet

A strategy of Sonelgaz Group to develop proper means of project management in the IT and Information Systems field, and to have a pole of technological skills in the service of his companies.

The will of the Sonelgaz Group to entrust the property of Information Systems at a specialized entity and focus the capabilities of its other companies on their respective core businesses.

Our services

The services provided by ELIT address

Development of business applications ;

Collaborative tools ;

Outsourcing ;

Networks and telecommunications ;

Training ;

Assistance and advice.

Speakers

Bruce Schneier

Fellow, Berkman Center for Internet and Society at Harvard Law School

Pavol LUPTAK

Security Consultant | CEO and owner of Nethemba | Slovakia OWASP

Jorge SEBASTIAO

Expert TIC, BSS MEA, Huawei | CISSP

Rafik BENCHERAIET

Senior Security Advisor | CISSP, CISM, CRISC, ISO27001-LA, ISO27001-LI

Michel GERARD

CEO and Owner of RAPIDAWARENESS, CONSCIO TECHNOLOGIES et HAPSIS

Battista CAGNONI

CISSP|Mandiant, a FireEye Company

Haythem EL MIR

Cybersecurity consultant | CISSP

Lamine Ouyahia

Vice President of AASSI | Owner of Otek

Thierry CHIOFALO

SI Security Management | Clusif Member

Boumediene Kaddour

Student at Pentester Academy

Hafedh BEN HAMIDA

Computer Hacking and Cyber Crime Forensic Investigations Specialist

Dmitry Kuznetsov

Director of Methodology and Standards at Positive Technologies

Program

The « DzHack Event », in his first version is designed to cover three types of activities.

CONFERENCE

- Highlighting themes, by a security experts and searchers on strategies, issues and trends of the information security.

- Open debates on specific issues, to which information security professionals are faced today.

WORKSHOP

A space where local and international experts could prepare and expose practical workshops that provide participants with opportunities to see demonstrations and exploits security flaws of a variant complexity and in real time.

CHALLENGE

This is a competition designed to test the ability of hacking teams. The challenge of the event is of type Jeopardy CTF (Capture the Flag).

Time
08:00 - 09:00 Welcome and Reception
09:00 - 09:20 CEO of ELIT welcome address
09:20 - 09:40 SONELGAZ Chairman welcome address
Time Rome Theme Speacker Language
09:40 - 10:20 Auditorium
La Sécurité des Illusions
Lamine Ouyahia French
10:20 - 11:00 Auditorium
Hacker's Impression of ICS Security

Until recently, ICS remained beyond hackers' vision, but public authorities and the owners of large companies have started expressing concern about the problems they might face because manufacturing facilities are vulnerable to hacker attacks. As a result, industrial enterprises and equipment manufacturers show more interest in SCADA and ICS security assessment.

Dmitry Kuznetsov will focus on the penetration testing of industrial control systems and security analysis of SCADA performed by Positive Technologies for a variety of vendors. During this talk, he will cover the main threats to manufacturing enterprises, attack types and vulnerabilities typical of such systems.

Dmitry Kuznetsov English
11:30 - 12:10 Auditorium
Exploiting RFID vulnerabilities using NFC phones

The goal of the presentation is to describe potential vulnerabilities in various RFID devices (Mifare, RFID biometric passport, Mastercard PayPass and VISA PayWave) and how to exploit them u to show how they can be significantly simplified and executed using current smartphones with NFC capabilities.

Pavol LUPTAK English
12:10 - 12:50 Auditorium
Traitement du volet humain dans le domaine de la sécurité numérique
Michel GERARD French
14:00 - 14:40 Auditorium
Protection des Infrastructures critiques industrielles
Rafik BENCHERAIET French
14:40 - 15:20 Auditorium
Are we ready for the new CyberWar?
Jorge SEBASTIAO English
15:20 - 16:00 Auditorium
Reactions and learnings from the Sony Hack

First we thought North Korea was behind the Sony cyberattacks. Then we thought it was a couple of hacker guys with an axe to grind. Now we think North Korea is behind it again, but the connection is still tenuous.

In a world where everything happens online, including what we think of as ephemeral conversation, everything is potentially subject to public scrutiny. Companies need to make sure their computer and network security is up to snuff, and their incident response and crisis management plans can handle this sort of thing. In this session Bruce will highlight how to secure your company against this sort of attack.

Bruce Schneier English
16:00 - 16:40 Auditorium
La protection du Cloud Computing et de l'infrastructure virtuelle
Hafedh BEN HAMIDA French
16:40 - 17:40 Auditorium
Round Table "How to convince your management for investing in IT security."
French
Time
11:00 - 11:20 Coffee Break
13:00 - 14:00 Lunch break
Time Rome Theme Speacker Language
10:00 - 17:00
Offensive Python For Networkers

Python is becoming day after day more popular and widespread over the world, most hackers and security researchers use High Level Programming languages such as Python for the purpose of creating Proof Of Concepts really fast.
In this topic, we are going to be looking at how Penetration Testers and Network Security Engineers make use of such a powerful programming language to perform some real world tasks.

Boumediene Kaddour English
10:00 - 17:00
Analytics malware
Battista CAGNONI French
10:00 - 17:00
La Sécurité des systèmes SCADA
Haythem EL MIR French
10:00 - 17:00
Hacking RFID devices using NFC smartphones

The goal of the presentation is to describe potential vulnerabilities in various RFID devices (Mifare, RFID biometric passports, Mastercard PayPass, VISA PayWave) and how to exploit them using common NFC smartphones.

Pavol LUPTAK English
10:00 - 17:00
Raison d’être et de gouvernance de la SSI dans les organisations
Thierry CHIOFALO French
Time
19:00 - 07:00 CTF
Time
17:40 - 18:20 Conference closing
07:00 - 07:40 CTF award ceremoney

mobile

With so much to see and do at the event, make sure you get the most from your visit to DzHack having all the necessary information of the event in your pocket.

With the mobile application and the web portal of the event, you can:

Browse the event agenda

Have information about conferences

Have information about Workshops

Discover the Event Speakers

Discover the venue and the map of the event

Receive notifications about the event

Play the game and win a tablet

Download the Android Application :


Click here to download the Android application.

Do not have an Android ?

The DzHack 2015 Web App gives you access to the same information through: www.appdzhack.elit.dz

cfp

Computer security is nowadays a hot topic that everyone knows or at least have heard about it. Moreover, our daily life is closely linked to new technologies that are mostly diverted and pirated either to access to our private life and properties, or to get to organizations and their sensitive information.

To share professional experiences in the field and inform users about security risks, ELIT organizes, for the first time, a computer security event called "DzHack Event", to bring together some of the IT community and specifically those of information systems security (experts, researchers, ethical hackers whether they are amateurs or professionals) around this theme to discuss and share their experiences.

IMPORTANT DATES

Opening of the call for Paper : January 15, 2015

End of the call for Paper : February 28, 2015     Deadline for Call for Papers extended to March 9, 2015

Notification for the participants : March 08, 2015     Deadline for Notification : March 22, 2015

Delivery of the final versions (Camera-Ready) : April 01, 2015     April 12, 2015

THEMES

Themes of the conferences or of the workshop are :

Protection of cloud computing and virtual infrastructures

Prevention against the zero day attacks ( DDOS)

Computer crime, law enforcement and forensics analysis

Malware analysis and the newest trends of malicious codes

Cryptography

The security of industrial control systems (SCADA)

The security of business applications and ERP

The security of the networks communication

Exploitation and vulnerability assessment

Reverse engineering

Hardware hacking: RFID ,GSM ,CONSOLES

Standards and compliance

The audit of source code

Other topics may be proposed, provided they have a relationship with computer security.

HOW TO SUBMIT

To make a proposition for a conference or for a workshop, you have to fill the following details :

Surname and other names

E-mail address and other contacts twitter, linkedin,…

Personal informations: Phone number, Home address

Curriculum vitae

Type of participation: Conference / Workshop

Tittle of the subject

Summary of the participation: not more than 250 words, without abbreviations

Contribution of the subject to the security field

Language of the participation

The requirements that you will need (detailed list)

Your submission will be evaluated by a validation committee. Any detail you provide for your participation will be useful and allows the committee to evaluate your proposal at its fair value. Please send your application as soon as possible in order to have a better chance of being selected.

Speakers and workshops providers will be offered :

Free Transportation

Free Feeding

Free Accommodation

INSTRUCTIONS

Speakers and workshops providers are invited to submit their topics before February 28, 2015. After this date, no submissions will be accepted.

All participations (workshops and conferences) will be in Arabic, English or French (depending on the speaker).

All fees for conference travel, including airfare, hotel and meals will be covered by ELIT. However, all extra demands (extended stays, coverage of companion expenses …) will not be covered.

The length of the conference is 30 to 45 minutes with 15 more minutes for the debate.

The duration of Workshop is at least 6 hours.

If accepted, an email will be sent informing you that your contribution was accepted. From there, you have to meet the deadlines for submission of final versions. Otherwise, the validation committee will consider the possibility of canceling and replacing the speaker.

No advertising of any product, service or business will be tolerated.

The documents of the first submission must be in PDF format.

CONTACT

Your submissions must be sent to the following email address :

dz-hackevent@elit.dz

Inscription

Registration is Closed at DzHack Event

We inform you that registration is closed and a confirmation was sent to selected guests. We received a number important requests that we can not meet, we apologize to unsuccessful applicants hoping to see you in future editions.

We inform you that registration is closed and a confirmation was sent to the earliest applicants. We received a large number of applications that we can not meet, we apologize to unsuccessful applications, hoping to see you in our next editions.

guests

The guests of this edition are the representatives of the organizations

Contacts

Addressee : SN. N°38 Djisser Kasantina, Algiers, Alegria

Telephone : +213 21 83 62 64

Fax : +213 21 83 62 04

For further information, please feel free to contact us at :

dz-hackevent@elit.dz