Events

CODE BLUE in Tokyo

On February 17th (MON) – 18th (TUE), 2014 we were at an event in Tokyo called “CODE BLUE”, a new international information security conference originating from Japan.

2082160931

Even though this conference was being held for the first time, no less than 400 visitors attended, with people coming from about 10 different countries.

The overall atmosphere at the event was kind and friendly and everything seemed to go smooth and swiftly.

Topics on the first day were the keynote by Jeff Moss, followed by presentations about “The Current State of Automotive Security”, “A Security Barrier Device”, “Remote linux exploits” and hard-/software related hard disk matters.

For the Japanese speakers among you there’s a more detailed review of the event here.

OLYMPUS DIGITAL CAMERA

The second day also offered plenty of interesting topics.

I must say that it was a big surprise to me that so many people attended an event held for the first time. I wasn’t sure what to expect but I am glad that I decided to attend.
While the event itself is ‘new’, the organizers and staff are all veterans in the security field with much experience and know-how.

During the two days of presentations I spotted only ONE person briefly sleeping in their seat; and that’s not because so much coffee was consumed (there was actually one moment where ALL the coffee had run out), but because the overall content of the program was too interesting to miss.

CODE BLUE will be held annually. One of the important aspects of the conference is that it tries to give opportunities to researchers from countries where English is not the native language.

The simultaneous interpreters did an amazing job, offering translations in to English and Japanese.

At the close of CODE BLUE, it was announced that the event will be held again before the end of 2014. So make sure to keep an eye on further announcements so as not to miss it.

CODE BLUE in Tokyo

Your email address will not be published. Required fields are marked *

 

  1. Tyrena Michelle Taylor

    I would like to know more about how the blue code is helpful with communication with other country to provide a more safer world. Keep up the good work.

Reports

How to catch a wild triangle

How Kaspersky researchers obtained all stages of the Operation Triangulation campaign targeting iPhones and iPads, including zero-day exploits, validators, TriangleDB implant and additional modules.

Subscribe to our weekly e-mails

The hottest research right in your inbox