Announcing... VB2020 localhost

Posted by    on   Jul 29, 2020

Over the last few months the VB team has been hard at work preparing for the virtual edition of VB2020 and we can now reveal... VB2020 localhost: the carbon neutral, budget neutral VB conference!

 

 VB2020-localhost-logo.png

 

VB localhost will bring the usual amount of great content your way - the latest and best research on malware, malicious actors and threat intelligence from top industry experts - direct to your device wherever you choose to access it, be it your desk, your garden or your sofa.

What's more, for the first time in the 30-year history of the VB conference, VB2020 localhost will be entirely free to attend, making it the first budget neutral VB conference!

The conference will take place over three days: 30 Sept to 2 Oct, but instead of the usual three parallel tracks of the in-person conference, we will have a single track, broadcasting live from 16:00 to 20:00 UTC each day, complete with a professional host. You will be able to join at any time, and re-watch, rewind or pause the live stream.

In addition to the live broadcast there will be a library packed full of top quality presentations for on-demand viewing – meaning you can watch the presentations whenever and wherever suits you – as well as the CTA’s Threat Intelligence Practitioners' Summit.

Check out the full programme here (note, there are still more presentations to be added!).

It wouldn't be a VB conference without networking, so VB2020 localhost will be running a dedicated Discord server, through which you can chat with other participants, contact event partners and speakers, and even set up 1:1 or small group meetings via text, audio or video.

What are you waiting for? Register now for FREE!

 

 

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.