VB2017 drinks reception to be hosted in Madrid's unique Geographic Club

Posted by   Martijn Grooten on   Aug 1, 2017

When, at the end of VB2016, we announced Madrid as the location for VB2017, the cheering from the audience suggested that it was a popular choice. This is understandable of course, as Madrid is a beautiful, vibrant and exciting city – but what would be the point of being in such a great location if during the conference you didn't actually leave the hotel?

This got us thinking about the drinks reception traditionally held on the evening of the first day of the conference – what if, instead of hosting it inside the hotel as we have done for the past several years, we gave delegates a chance to really experience Madrid, by holding it elsewhere?

After looking around at several local venues, we decided to host the VB2017 drinks reception at the unique and fascinating Geographic Club, a restaurant/bar a short walk from the conference hotel, whose global theme seems very fitting for the international aspect of the conference.

logo_geographic.png

Many people, especially those travelling from far away, like to combine attending the VB conference with a short visit to the city in which it is hosted. This time, even those who aren't able to stay in Madrid beyond the duration of the conference will get a chance to see a little bit of the city. And of course, as usual, the drinks reception provides an excellent opportunity to meet up with old acquaintances and make new ones – something that we know, for many, is one of the prime reasons for attending the event.

To make sure you don't miss out, book your VB2017 ticket now!

And don't forget that the call for last-minute papers, dealing with hot security research, is open until 3 September!

VB2017-325w.jpg

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Subtle change could see a reduction in installation of malicious Chrome extensions

Google has made a subtle change to its Chrome browser, banning the inline installation of new extensions, thus making it harder for malware authors to trick users into unwittingly installing malicious extensions.

Paper: EternalBlue: a prominent threat actor of 2017–2018

We publish a paper by researchers from Quick Heal Security Labs in India, who study the EternalBlue and DoublePulsar exploits in full detail.

'North Korea' a hot subject among VB2018 talks

Several VB2018 papers deal explicitly or implicitly with threats that have been attributed to North Korean actors.

Expired domain led to SpamCannibal's blacklist eating the whole world

The domain of the little-used SpamCannibal DNS blacklist had expired, resulting in it effectively listing every single IP address.

MnuBot banking trojan communicates via SQL server

Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.