Bitcoin SV Spiked 17% Today: But Theres a Key Reason Its Not Sustainable – newsBTC

Bitcoin SV, a somewhat controversial hard fork of Bitcoin Cash, has suddenly spiked by as much as 17% intraday following legal developments in the Craig Wright legal battle with the late David Kleiman.

However, there is one important lingering factor that could cause this rally to run out of steam and eventually lead to a lot more downside in the future.

Avid Bitcoin SV supporter and the face of the cryptocurrency, Craig Wright has long been embroiled in a legal battle with the estate of his former business partner David Kleiman. The legal turmoil has been closely followed by the cryptocurrency community at large as well as Bitcoin SV supporters.

Wright is being sued by Kleimans brother Ira for his brothers portion of the 1.1 million BTC mined by Satoshi Nakamoto the mysterious founder of the original Bitcoin that Wright claims to be.

Wright claimed in a document called Tulip Trust that the keys to the Bitcoin were inaccessible, dragging out the legal battle. Wright has since produced another document, Tulip Trust II, and just yesterday according to new court filings, a third Tulip Trust has emerged with additional information.

Its not clear as to why the emergence of a new document would get Bitcoin SV investors bullish, however, the news circulating has led to a 17% spike in the Bitcoin Cash fork.

While theres no denying the timing is coincidental, crypto assets like Bitcoin SV have been in a bear market for the better portion of two years and are at extremely oversold conditions. The gains could very well be a clear break of resistance causing a cascade of stop losses, further driving up the price. Still, news like what has emerged related to the case can often be a catalyst for large price movements.

Despite Bitcoin SV growing by over 17%, the gains are unlikely sustainable. Any time an asset goes parabolic and rallies with such significant numbers, a deep retracement almost always follows as exuberance dies down and investors come back down to reality.

In addition, Bitcoin SV mining has failed to be a lucrative process for miners, and with the assets halving coming before Bitcoins which will cut BSVs new issuance from a combined $600,000 to just $300,000 miners are expected to operate at a further loss.

Miners must sell their crypto assets when the process becomes more costly than beneficial in order to make up for lost revenues. If miners begin to take extreme losses due to the halving, a deep selloff could occur and put the assets longevity in danger.

The best hope for Bitcoin SV is that this rally continues and the price of the asset grows enough to where mining becomes a more lucrative and sustainable venture.

Read more:
Bitcoin SV Spiked 17% Today: But Theres a Key Reason Its Not Sustainable - newsBTC

Bitcoin Is In Steep Downtrend, But This Variable Can Trigger A New Rally – newsBTC

Bitcoin price followed a bearish path after it failed to surpass the $8,500 resistance against the US Dollar. BTC is now approaching a crucial support near $7,750 and $7,600.

Recently, bitcoin bears took control and they were able to push the price below $8,000 against the US Dollar. Moreover, BTC settled below the $8,000 handle and the 100 hourly simple moving average.

The price is now trading below the 50% Fib retracement level of the last major rally from the $7,302 low to $8,460 high. During the decline, there was a break below a key bullish trend line with support near $8,000 on the hourly chart of the BTC/USD pair.

Bitcoin Price

The pair is now trading near a significant buy zone at $7,600-$7,750. An immediate support is near the $7,750 level. Additionally, the 61.8% Fib retracement level of the last major rally from the $7,302 low to $8,460 high is at $7,744.

The last key support is near the $7,600 area (the previous breakout zone). Both $7,750 and $7,600 are important buy zones. Therefore, there are chances of a fresh rally above the $8,000 resistance.

An initial resistance is near the $7,900 level. There is also a short term declining channel forming with resistance near $7,880 support near $7,930 on the same chart.

A successful break above the $7,900 and $8,000 resistance levels could set the pace for a decent rally. The next key resistances are near $8,180 and $8,300.

There are slight chances of a downside break below the $7,600 support. However, if the bears are successful, it could start a steady downtrend and the price might extend its decline towards $7,300 and $7,100.

Looking at the chart, bitcoin price is losing bearish momentum below $8,000, but the $7,750 and $7,600 supports are important. Overall, the price could either bounce sharply above $8,000 or tumble below $7,750 and $7,600.

Technical indicators:

Hourly MACD The MACD is likely to move into the bullish zone.

Hourly RSI (Relative Strength Index) The RSI for BTC/USD is currently declining below the 40 level.

Major Support Levels $7,750 followed by $7,600.

Major Resistance Levels $7,880, $8,000 and $8,180.

Excerpt from:
Bitcoin Is In Steep Downtrend, But This Variable Can Trigger A New Rally - newsBTC

Bitcoin Lost Momentum, But Markets Believe In Its 2020 Outlook – Yahoo Finance

A sharp rise in the USDT emission perceived as a positive signal for growth, so bots start buying after such news. What happened once again indicates a growing share of algorithmic trading in the crypto sector.

As a result, Bitcoin jumped up to $8,400, where it faced severe resistance. Apart from mistaken news on USDT emission, the geopolitical tension around Iran and the U.S. began to decrease. It became clear that both sides are not interested in further escalation and markets started to return to normal functioning. For Bitcoin, this means a decline.

Besides, as the crypto market began to grow, the technical picture pointed to a significant overbought of the Bitcoin. The Relative Strength Index (RSI) was even higher than when the bitcoin rebounded to $10K at the end of October 2019, when Chinas head Xi Jinping made his famous statement related to Chinas course on the blockchain development. It is not surprising that now we are witnessing a rollback in prices. However, the cautious nature of the reversal suggests that the level of optimism is still quite high.

Several well-known traders, including Peter Brandt, still hold bullish views on bitcoin. One of the leaders in the analysis has tweeted several bullish scenarios for bitcoin in 2020. In the first scenario, we will first face bear pressure which will push the Bitcoin down to $5K and then see the rebound while the lower boundary is held. In the second scenario, we are already out of the descending channel, which lasts from the summer, and the long accumulation of the asset will be the main reason for its growth. Also, optimists are waiting for Starbucks and Bakkt to collaborate, and for bitcoin usage to increase in the real world.

This article was written byFxPro

This article was originally posted on FX Empire

See the original post here:
Bitcoin Lost Momentum, But Markets Believe In Its 2020 Outlook - Yahoo Finance

Russia dominates the cloud-based bitcoin mining industry – Decrypt

The future of cloud-based bitcoin mining is in Russia, not China, according to a new report by TokenInsight, published Friday. This overturns the common conception that Chinas the only dominant player in the bitcoin mining industry.

With cloud-based bitcoin mining, users rent a computer system owned by someone else, elsewhere, and use the computers hash power to mine cryptocurrencies. This means the user doesnt have to bother with up-front mining costslike buying a bespoke mining rig and finding a place to put it.

Through user analysis on cloud-based bitcoin mining sites, TokenInsight discovered that, though mainland China's monthly unique visitors are fairly high, those of Russia are even higher.

This reflects a strong interest in cloud mining products outside of China, Johnson Xu, an analyst at TokenInsight, told Decrypt.

Be the first to get Decrypt Members. A new type of account built on blockchain.

In fact, according to data TokenInsight pulled from SimilarWeb, unique monthly visitors from Russia were almost double that of mainland China; Russians comprised around 130,000 unique visitors, while mainland China comprised around 80,000. Next up was Ukraine, with around 56,000 unique monthly users.

The report attributes this to the ease of Russia's policies on cryptocurrency and the weather advantages brought by the cold climate.

In addition, Xu said that the bitcoin network hash rate, the speed at which the complex computational processes can generate bitcoin, is concentrated in mainland China, which potentially reduces demand for cloud-based bitcoin mining within the country. After all, why would Chinese miners bother using the cloud, when the countrys already got the infrastructure for setting up their own mining rigs?

Xu estimates that the market outside of China will become even larger due to the increased awareness of crypto mining outside of China, and the fact that markets outside China are less saturated with mining products.

For those considering investing in cloud-based bitcoin miningRussian or otherwiseone piece of advice can be inferred from TokenInsights report: Go big or go home. Around 60% of all cloud-based bitcoin mining contracts last between six months to a year, but the market is moving at such a rapid pace, that the less powerful miners quickly become unprofitable.

Most of the bitcoin mining products are unprofitable under current network difficulty and bitcoin price, said the report. This will only get worse once the block halving event occurs around May of this year, which cuts the block reward in two.

Assume that as the block reward is halved, the hashrate of the entire network is also reduced by the same proportion; less than half of the cloud-based bitcoin mining products tracked by TokenInsight cannot make a positive ROI, it added

Its clear that Russians will have to bring their A-game to thrive in the cloud-based bitcoin mining industry. And their wallet.

The rest is here:
Russia dominates the cloud-based bitcoin mining industry - Decrypt

Forget the Bitcoin price! Id invest 5k like this to get rich and retire early – Yahoo Finance UK

With the Bitcoin price having risen by over 90% in 2019, its returns were significantly ahead of those of the FTSE 100. The index delivered a total return of 16%, which is almost twice its long-term annual average.

As such, many investors may feel that buying Bitcoin could be a better means of building a retirement portfolio. However, the virtual currency faces numerous risks that could mean that the FTSE 100 offers significantly stronger long-term potential when it comes to improving your chances of retiring early.

Even though the FTSE 100 delivered a strong performance in 2019, many of its members appear to offer good value for money. Sectors such as banking and retail have continued to be unpopular over recent years, with investors adopting a cautious attitude due in part to global economic risks. As such, there are opportunities to buy a wide range of stocks while their valuations are significantly below their long-term historic averages. This could mean that investors can generate relatively high returns in the coming years.

Certainly, there are risks facing the world economy. Since the FTSE 100 generates around two-thirds of its revenue from outside of the UK, they could weigh on its performance. Threats such as geopolitical uncertainty in the Middle East and a continuing trade war between the US and China may cause investors to adopt a cautious stance towards riskier assets. This may produce challenging performances in the short run, but could present opportunities to buy stocks at even lower prices for the long run.

Therefore, building a portfolio of shares in a tax-efficient account such as an ISA could be a shrewd move. It may lead to high returns which, when compounded, improve your financial prospects and enable you to retire early.

While the price of Bitcoin could feasibly move higher in the coming months, it is a relatively risky asset that could easily experience a tough period. The threat of other virtual currencies may mean that investor interest in Bitcoin recedes to some degree. It also faces regulatory risks, with many lawmakers and central banks around the world currently having a negative view of cryptocurrencies.

Additionally, there is no way of knowing if Bitcoin offers good value for money following its price rise. It has no fundamentals, and its price level is decided by investor sentiment. Should it decline, the track record of Bitcoins performance shows that it can fall at a fast pace. This could lead to investors nursing heavy losses, and not knowing whether they should hold or sell an asset for which they are unable to ascertain an accurate valuation.

While investing in shares may take time to impact favourably on your financial situation, over the long run, the FTSE 100s track record shows that it can help you to retire early. Bitcoin could generate further growth in the short run, but it continues to be a riskier and less attractive means of improving your financial prospects.

More reading

Views expressed on the companies mentioned in this article are those of the writer and therefore may differ from the official recommendations we make in our subscription services such as Share Advisor, Hidden Winners and Pro. Here at The Motley Fool we believe that considering a diverse range of insights makesus better investors.

Motley Fool UK 2020

View post:
Forget the Bitcoin price! Id invest 5k like this to get rich and retire early - Yahoo Finance UK

Is Bradley Manning a Traitor or a Whistleblower? I want …

Not really either, but if you put those two at the opposite ends of the spectrum that they belong at he is closer to the traitor end. He could not have known the content and the second, third, etc level impact of the content being released. He had the opinion that he didn't like what he saw from his vantage point of the world, but what he took and released far exceeded the world he understood.

If he had only released content that spoke of a specific known (by him) illegality then he would be maybe a little closer to the whistleblower side, but not at the extreme. But he didn't do anything close to that.

BTW is he being charged with any "traitor-like" charge? Or is that just what the politicians on both sides are saying? I thought it was just release of classified material - a different UCMJ violation.

Original post:
Is Bradley Manning a Traitor or a Whistleblower? I want ...

Over two dozen encryption experts call on India to rethink changes to its intermediary liability rules – TechCrunch

Security and encryption experts from around the world are joining a number of organizations to call on India to reconsider its proposed amendments to local intermediary liability rules.

In an open letter to Indias IT Minister Ravi Shankar Prasad on Thursday, 27 security and cryptography experts warned the Indian government that if it goes ahead with its originally proposed changes to the law, it could weaken security and limit the use of strong encryption on the internet.

The Indian government proposed(PDF) a series of changes to its intermediary liability rules in late December 2018 that, if enforced, would require millions of services operated by anyone from small and medium businesses to large corporate giants such as Facebook and Google to make significant changes.

The originally proposed rules say that intermediaries which the government defines as those services that facilitate communication between two or more users and have five million or more users in India will have to proactively monitor and filter their users content and be able to trace the originator of questionable content to avoid assuming full liability for their users actions.

By tying intermediaries protection from liability to their ability to monitor communications being sent across their platforms or systems, the amendments would limit the use of end-to-end encryption and encourage others to weaken existing security measures, the experts wrote in the letter, coordinated by the Internet Society .

With end-to-end encryption, there is no way for the service provider to access its users decrypted content, they said. Some of these experts include individuals who work at Google, Twitter, Access Now, Tor Project and World Wide Web Consortium.

This means that services using end-to-end encryption cannot provide the level of monitoring required in the proposed amendments. Whether its through putting a backdoor in an encryption protocol, storing cryptographic keys in escrow, adding silent users to group messages, or some other method, there is no way to create exceptional access for some without weakening the security of the system for all, they added.

Technology giants have so far enjoyed what is known as safe harbor laws. The laws, currently applicable in the U.S. under the Communications Decency Act and India under its 2000 Information Technology Act, say that tech platforms wont be held liable for the things their users share on the platform.

Many organizations have expressed in recent days their reservations about the proposed changes to the law. Earlier this week, Mozilla, GitHub and Cloudflare requested the Indian government to be transparent about the proposalsthat they have made to the intermediary liability rules. Nobody outside the Indian government has seen the current draft of the proposal, which it plans to submit to Indias Supreme Court for approval by January 15.

Among the concerns raised by some is the vague definition of intermediary itself. Critics say the last publicly known version of the draft had an extremely broad definition of the term intermediary, that would be applicable to a wide-range of service providers, including popular instant messaging clients, internet service providers, cyber cafes and even Wikipedia.

Amanda Keton, general counsel of Wikimedia Foundation, requested the Indian government late last month to rethink the requirement to bring traceability on online communication, as doing so, she warned, would interfere with the ability of Wikipedia contributors to freely participate in the project.

A senior executive with an American technology company, who requested anonymity, told TechCrunch on Wednesday that even as the proposed changes to the intermediary guidelines need major changes, it is high time that the Indian government decided to look into this at all.

Action on social media platforms, and instant communications services is causing damage in the real world. Spread of hoax has cost us more than at least 30 lives. If tomorrow, someones sensitive photos and messages leak on the internet, there is currently little they can expect from their service providers. We need a law to deal with the modern internets challenges, he said.

More here:
Over two dozen encryption experts call on India to rethink changes to its intermediary liability rules - TechCrunch

Ethereum 2.0 Will Come in 2020, According to ConsenSys Co-Founder – Cointelegraph

Ethereums Serenity will launch by the end of this year, according to ConsenSys Co-founder Andrew Keys. Given the current state of development though, few share his excitement.

In a Jan. 7 post published on the ConsenSys site, Andrew Keys shared his predictions for 2020. Keys was one of the co-founders of ConsenSys, having since become a managing partner at DARMA Capital.

While Keys predictions touched diverse themes ranging from the world economy to human rights, two are especially notable for their optimism.

According to the executive, 2020 will see Ethereum move stridently beyond Phase 0 of Ethereum 2.0, onto Phase 1 and the launch of shard chains.

In addition, while Serenity continues development, Keys believes that layer two solutions will turbocharge Ethereum and bring it towards 2.0 levels of scalability at layer one.

The recent Istanbul hard fork was the last stage in Ethereum 1.0, introducing several improvements and adjustments. Some of the core Ethereum Improvement Proposals (EIPs) that went into the upgrade were closely related to Zcash (ZEC). EIP-152 improved interoperability with the actual Zcash blockchain, while EIP-1108 made optimizations for cryptography routines leveraged by projects such as Aztec and ZEther.

Aztec Protocol aims to introduce confidential transactions within the Ethereum (ETH) blockchain by using SNARK zero-knowledge technology the same powering Zcash shielded transactions.

On the other hand, Matter Labs is attempting to leverage SNARKs for scalability. On a basic level, its Zk Sync technology would allow offloading of the majority of transactional computations off-chain using a zero-knowledge proof to guarantee their correct execution.

Finally, Plasma focuses on creating sidechains for specific use cases. In a 2019 interview with Cointelegraph, CEO of ConsenSys Joseph Lubin explained:

Plasma is this class of technologies that enable you to have less decentralized platforms sitting at layer two in the Ethereum ecosystem. They can benefit from the full trust in some cases sometimes they benefit from partial trust but if they're linked in really rigorously, they can benefit from the full trust of the base trust layer, and you can get the best of both worlds.

However, these technologies are not yet live. Only Aztec looks poised to launch its cryptography engine this month, after conducting its trusted setup ceremony on Jan. 9.

Matter Labs revealed in a blog post that it would launch a smart contract framework this month but not the full scaling technology. Representatives from Matter Labs failed to reply to Cointelegraphs inquiries on detailed time tables.

Plasma Group, a non-profit research group, recently declared that their theoretical work on the technology is complete, but failed to indicate specific implementations underway.

Cointelegraph approached Afri Schoeden, a former Parity Technologies developer, for additional insight. When asked whether 2020 will feature working sidechain solutions, Schoeden replied:

No. We will see COSMOS maturing, Polkadot launching maybe, and Ethereum 2.0 finally taking shape. But we are still far away from viable solutions that would work in production.

Though Istanbul was the last step before the introduction of Ethereum 2.0 technology, it is unclear when the next stages will be implemented.

According to a mid-2019 roadmap by ConsenSys, phase zero of Serenity was supposed to be implemented by years end. This will introduce the Beacon Chain, the first to be powered by Proof-of-Stake validators.

Though Keys noted that a block explorer for the beacon chain was released, it merely tracks a testnet version. He then continued:

Ethereum developers have already proven their ability to work wonders, and that this decentralized team is now in the stride of hitting ambitious roadmap targets is the best indicator in all of blockchain for future success.

Schoeden, however, was far less optimistic:

From what I observe, maybe we can expect Q4/2020 launch window for phase 0.

Cointelegraph sought out comments on the roadmap from the Ethereum Foundations press team, but did not receive a response at publication.

Follow this link:
Ethereum 2.0 Will Come in 2020, According to ConsenSys Co-Founder - Cointelegraph

Facebook Targets Rest Of BlackBerry IP Suit After Alice Win – Law360

Law360 (January 8, 2020, 11:09 PM EST) -- After leveraging the U.S. Supreme Court's Alice decision to trim BlackBerry's IP claims, Facebook argued in California federal court Wednesday that BlackBerry's remaining messaging and targeted advertising patent claims should be thrown out, including one that purportedly relied on "jargon" to make it appear more advanced than it is.

In a motion seeking summary judgment and to strike, Facebook Inc. sought to punch holes in the various remaining patent claims, saying that one offered no technological improvements and another offered only a basic concept.

Of one of the claims, Facebook said that BlackBerry "will likely lean on the claim's cryptography jargon...

In the legal profession, information is the key to success. You have to know whats happening with clients, competitors, practice areas, and industries. Law360 provides the intelligence you need to remain an expert and beat the competition.

TRY LAW360 FREE FOR SEVEN DAYS

Read the original post:
Facebook Targets Rest Of BlackBerry IP Suit After Alice Win - Law360

The best security conferences of 2020 – TechBeacon

Security takes a team, and it's a journey. Fortunately, you can keep up with the state of security through networking and knowledge sharing at industry conferences.

You can find security conferences tailored to every IT security pro's needs, including application security, information security, and data security. Some events are very large, while others are more intimate. Some are loud and boisterous; others are more formal and toned down. Some focus on vendors and their latest products, while others emphasize training and education. A few have a narrow scope, while others aim to be comprehensive.

TechBeacon's list of the top security conferences goes through all of these details so you can find the right ones for you. Stay up to speed on securityand move toward continuous securitywith continuous learning.

Twitter: @SecurityBSidesWeb: securitybsides.comDates: January-DecemberLocations: Multiplelocations worldwideCost: Most are free

Almost every week, there's a BSides conference taking place somewhere in the world. BSides describes itself as a community-driven framework for building events led by members of the security community, not byvendors. BSides events create opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration.

Who should attend: Security pros and enthusiasts

Twitter: @DataConnectorsWeb: dataconnectors.comDates: January-DecemberLocations: 50 major citiesCost: Free

These conferences are focused on best practices, products, and services in an educational environment. Topics covered by the forums include cloud computing, the evolving IT landscape, andhow to combat cyber criminals. Each event is built around regionallybased vendors and speakers and qualify for CPE credits.

The events are free, with registration. Data Connectors may share registration information with the sponsors of a conference, who may use it to send marketing and promotional material to attendees.

Who should attend:Information, cyber,and network security professionals

Twitter:@AppSecCaliWeb: 2020.appseccalifornia.orgDate: January 21-24Location: Santa Monica, California, USACost: $99 to $1,200

Open Web Application Security Project chapters in Los Angeles, Orange County, the San Francisco Bay Area, and the Inland Empire in Southern Californiaare sponsoring this event. It gives infosec pros an opportunity to learn and share knowledge and experiences about secure systems and secure development. Although a regional OWASP event, it attracts practitioners from around the world.

Who should attend: Information security professionals, developers, and QA and testing professionals

Twitter: #enigma2020Web: usenix.org/conference/enigma2020Date: January 27-29Location: San Francisco, California, USACost: $1,500 (academic, student, government, and nonprofit discounts available)

Enigma, a Usenix event, centers on a single track of talks covering a wide range of topics in security and privacy. Topics at the 2020 forum include "Securing the Software Supply Chain,""Third-Party Integrations: Friend or Foe?""Catch Me If You Can!Detecting Sandbox Evasion Techniques," and "Bringing Usable Crypto to Seven Million Developers."

Who should attend: Security practitioners, chief privacy officers, chief financial officers, researchers, developers, andcryptographers

Twitter: @shmooconWeb: shmoocon.orgDate: January 31-February 2Location: Washington, DC, USACost:Sold out

ShmooCon is a three-day conference organized by the Shmoo Group, a security think tank started by Bruce Potter in the 1990s. The conference has been compared to the Black Hat and Def Con conferencesprobably because of its appeal to folks who like to compromise devices, networks, and appliancesbut on a smaller scale.

Who should attend: Hackers, CSOs, and government security professionals

Twitter: @BlueHatILWeb: bluehatil.comDate: February 5-6Location: Tel Aviv, IsraelCost: Invitation only

This invitation-only event is sponsored by Microsoft. The conferencewas cooked up by Fastly CSO Window Snyder, who designed itto get "blue hats"an industry term for bug bounty hunterscommunicating with Microsoft engineers and tobring them up to speed on current and emerging security threats.

Who should attend: Security professionals and bug bounty hunters

Twitter: @SuitsandSpooksWeb: tellaro.ioDate: February 6-7Location: Washington, DC, USACost: $298 to $798 (military and government employee discounts available)

Suits & Spooks bills itself as the "anti-conference" and offers boutique forums on top-line security issues. Among the issues discussed at the DC event are achieving early detection of terrorism in smart cities, the future of war and leadership in a connected and chaotic world, and the future of Big Tech in the era of GDPR and antitrust. In addition to the DC event, forums will also be held in Seattle, Washington (October 28; invitation only),and Los Angeles, California (November 18).

Who should attend: Civilian and government cybersecurity professionals, anddefense industry executives

Twitter: @internetsociety / #ndss20Web: ndss-symposium.org/ndss2020Date: February 23-26Location: San Diego, California, USACost: Workshops, $235 to $395; symposium, $490 to $1,110 (time-sensitive and student discounts available)

The Network and Distributed System Security Symposium is organized by the Internet Society. The event caters to researchers and practitioners of network and distributed system security, with an emphasis on system design and implementation. A major goal of the conference is to encourage and helpthe Internet community to apply, deploy, and advance the state of available security technologies.

Who should attend: University researchers and educators, chief technology and privacy officers, security analysts, system administrators, and operations and security managers

Twitter: @rsaconference / #RSAC2020Web: rsaconference.com/usaDate: February 24-28Location: San Francisco, California, USACost: Full conference pass $750 to $1,995 (time-sensitive, student, government, and loyalty discounts available)

This is one of the world's largest security conferences. Its size is a sign of the robust growth in the IT security industry and just how dangerous the threat landscape has become. Attendees should do their pre-conference homework and sketch out a game plan, since this is a very large conference.

The forum attracts more than 42,000 attendees and some 700 speakers across more than 550 sessions. In 2020, conference organizers are adding a new "Engagement Zone," a dedicated networking space meant to encourage interactive, collaborative, and cooperative learning for the thousands of cybersecurity experts in attendance.

Who should attend: Security professionals

[ Understand what's driving thenext-generation SOCwith TechBeacon'sguide. Plus: Download ESG's report on the state of cloud-based security analytics and operations ]

Twitter: @SecureWorldWeb: secureworldexpo.com/eventsDates: March-NovemberLocations: Multiple sites across the United States and CanadaCost: $45 to $795

SecureWorld is a series of regional conferences held annually in the United States and Canada. Conference agendas vary from region to region and include subjects of localas well as broader interest. Cities lined upfor 2020 areCharlotte, North Carolina;Philadelphia, Pennsylvania;Boston, Massachusetts;Houston, Texas;Cincinnati, Ohio;Toronto, Ontario;Kansas City, Kansas;Atlanta, Georgia;Chicago, Illinois; Santa Clara, California; St. Louis, Missouri; New York, New York; Detroit, Michigan; Dallas, Texas; Minneapolis, Minnesota; Denver, Colorado; and Seattle, Washington.

Who should attend: CSOs, CISOs, compliance officers, security consultants, directors, governance officers, cloud security practitioners, security researchers, and othersecurity professionals

Twitter: @nullcon / #nullconWeb: nullcon.net/website/Date: Training, March 3-5; conference, March 6-7Location: Goa, IndiaCost: Training, $624 to $993; conference, $169 to $300 (student, group, and time-sensitive discounts available)

Nullcon was founded in 2010 with the idea of providing an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities, and otherthreats. Its motto"The neXt security thing!"drives the narrative of the conference.

Organizers promise a venuewhere security researchers and experts discuss and showcase the future of information security and the nextgeneration of offensive and defensive security technology. The forum is known for responsibly disclosing new vulnerabilities, risks, and attacks on computers.

In that vein, the forum has a section called Desi Jugaad (Hindi for "Local Hack"), which invites researchers to cook up innovative approaches to real-life security problems.

Who should attend: Security practitioners (analysts, testers, developers, cryptographers, and hackers),security executives (CISOs and CXOs), business developers and venture capitalists (presidents, directors, vice presidents, and consultants), recruiters, and academics

Twitter: @WEareTROOPERS / #TR20Web: troopers.deDate: March 16-20Location: Heidelberg, GermanyCost: Conference, 2,190; training, 2,290; conference, training, and roundtables, 3,990

Troopers is an old-school, multitrack security conference that attracts speakers from more than 25 countries. Beforethe start of the two-day, three-track conference there are two-days of training. On the last day of the forum, a number of roundtable sessions are offered to allow attendees and speakers to discusscurrent security topics. There are also a number of special eventsTelco Security Day, IoT Security Day, and IPv6State of Play Day.

Who should attend: Security researchers and managers; security team members and leaders; network administrators; security testers; operations managers; Windows, Linux, and SAP administrators; CISOs; and CSOs

Twitter: @ISMGCorpWeb: events.ismg.io/summitsDates: March-DecemberLocations: Multiple sites worldwideCost: $160 to $995

This series of conferences on cybersecurity and fraud are staged around the world by the Information Security Media Group, a publisher of online information security publications. Content at the conferences is driven by the group's editorial team, and the events offer attendees an opportunity to learn from industry influencers, earn CPE credits, and meet with technology providers.

Who should attend: CISOs and cybersecurity professionals

Twitter: @WWHackinFestWeb: wildwesthackinfest.com/sandiegoDate: March 10-13Location: San Diego, California, USACost: $325

Conference organizers say this is the most hands-on conference in the industry. Numerous labs are available to conference-goers, as well as "Capture the Flag" and escape room events. In addition, theover 50 presentations and speakers are encouraged to include actionable takeaways in their presentations. A sister conference is scheduled for September in Deadwood, South Dakota, USA.

Who should attend: Security pros, penetration testers, application security specialists, threat intelligence analysts, system architects, researchers, system administrators, and students

Twitter: @ISCEventsWeb: iscwest.com/HomeDate: March 17-20Location: Las Vegas, Nevada, USACost: $75

This conference encompasses both physical and connected security. It attracts some 30,000 security and public safety professionals each year. More than 1,000 security brands and exhibitors are represented at the event.

A wide array of technologies are covered at the forumeverything from video surveillance and access control to smart home technologies, IoT, and unmanned security. A sister conference will be held November 18-19 in New York City.

Who should attend: Security and public safety professionals

Twitter: @CanSecWestWeb: cansecwest.comDate: March 18-20Location: Vancouver, British Columbia, CanadaCost:Conference, C$2,300 to C$2700; training, C$6,600 to C$7,500 (time-sensitive discounts available for conference and training)

CanSecWest is a three-day, single-track conference featuring one-hour presentations in a lecture theater setting and hands-on dojo training courses from security instructors. Organizers say thatpreference is given to new and innovative material, highlighting important andemergent technologies ortechniques, or best industry practices.

Who should attend: CISOs, CSOs, enterprise IT security pros, and executives

Twitter: @Infosecurity / @InfosecurityBEWeb: infosecurity.beDate: March 18-19Location: Brussels, BelgiumCost: Free, with registration

This is the first in a series of conferences organized by education and networking companyInfosecurity Group. In addition to coveringIT security, the conferences also discussdata management and cloud computing. Besides the Belgium forum, events are also planned for Copenhagen, Denmark;Mexico City, Mexico;So Paulo, Brazil;Utrecht, Netherlands; and New York, New York.

Who should attend: Security pros, executives, and managers

Twitter: @devseccon #DevSecConWeb: devseccon.com/singapore-2020Date: March 18-19Location: SingaporeCost: 245 to 495

This is the first in a series of conferences held throughout the year by MyDevSecOps, a global community connecting developers and security. According to the organizers, these events are run by practitioners for practitioners. The forums include talks by key industry figures about making DevOps and security work together, as well as interactive workshops. Additional forums will be held in Sydney, Australia;Boston, Massachusetts; London, UK; Tel Aviv, Israel; on the West Coast of the United States; and online.

Who should attend: DevSecOps and IT security professionals

Twitter: @BlackHatEvents / #bhasiaWeb: blackhat.com/asia-20Date: March 31-April 3Location: SingaporeCost: Briefings, S$1,700 to S$2,200; training, S$4,000 to S$6,620; (time-sensitive discounts available for briefings and training)

This is the Asian sister of the famous North American conference for hackers held in Las Vegas. It combines hands-on training sessions taught by industry experts with briefings containing cutting-edge research, including the latest zero-dayvulnerabilities. There's also a businesshall for solutions and service providers, and an "arsenal" feature where the latest open-source security tools are demonstrated.

Who should attend: Security analysts, risk managers, security architects/engineers, penetration testers, security software developers, and cryptographers

[ Explore TechBeacon's guideto SecOpschallenges and opportunities. Plus: Downloadthe 2019 State of Security Operations report. ]

Twitter: @sansinstitute / #SANS2020Web: sans.org/event/sans-2020Date: April 3-10Location: Orlando, Florida, USACost: Courses, $2,800 to $7,610

The SANS Institute, founded in 1989, focuses on security research and providing intensive, immersive security training via a variety of conferences, smaller events, and courses that reach about 165,000 security professionals around the world. Its big annual event, SANS 2020, doubles as a conference, with keynote speakers and networking opportunities, and a training event.

SANS pledges that what people learn in its courses and events can be applied immediately once they get back to their workplaces. For IT pros who can't make it to the conference, SANS offers many of the forum's courses in virtual classrooms, where they can participate in live sessions remotely.

Who should attend: IT security pros, CxOs, network and system administrators, security managers, and security testers

Twitter: @HITBSecConf / #HITB2020AMSWeb: conference.hitb.org/hitbsecconf2020amsDate: April 20-24Location: Amsterdam, NetherlandsCost: Training, 1,899 to 4,299; conference, 799 to 1,499 (student and time-sensitive discounts available)

HITB emerged during the early dotcom days as a news and resource portal for hacking and network security. In 2003, its operators decided to try their hand at staging a conference. The result was the Hack In The Box Security Conference, which is held annually in Amsterdam.

It focuses on "next-generation" computer security issues. It includes a competition, technology exhibit, and "hackerspaces" for hackers, makers, and breakers. In addition to Amsterdam, conferences will be held in Singapore in July and Abu Dhabi in October.

Who should attend: Security pros, researchers, and hackers

Twitter: @SecurityWeekWeb: icscybersecurityconference.com/singapore/Date: April 21-23Location: SingaporeCost: $895 to $1,295 (time-sensitive, military, and government discounts available)

Organized by SecurityWeek, this is the longest-running cybersecurity-focused conference for the industrial control systems sector. Its target audience consists of energy, utility, chemical, transportation, manufacturing, and other industrial and critical-infrastructure organizations.

Most attendees are control systems users, working as control engineers, in operations management, or in IT. Topics addressed in the forum include protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers, and other field control system devices.

Who should attend: Operations, control systems, and IT security professionals

Twitter: @ruhrsecWeb: ruhrsec.de/2020Date: May 5-8Location: Bochum, GermanyCost (2018): 199 to 1,599

True to its location at Ruhr University, the conference has a collegiate feel to it, with both academic and industry talks planned for the event. In the past, the conference has made headlines with research about exploiting vulnerabilities in popular printer models. All profits from the conference will be donated to a local nongovernmental youth organization.

Who should attend: Hardware/IoT security practitioners, application developers, security researchers, software testers and QA professionals, network administrators, academics, and computer science students

Twitter: @THOTCON / #THOTCONWeb: thotcon.orgDate: May 8-9Location: Chicago, Illinois, USACost:Sold out

Organizers describe this event as a low-cost "hacking conference" with a nonprofit and noncommercial goal and a limited budget. It's been held annually in Chicago since 2010, born from its organizers' desire to host an affordable security conference for hackers who live in and around the Windy City. Proceeds are used for the following year's conference.

There's a bit of a cloak-and-dagger aura about the forum. Not only does its homepage have messages in Russian, but its exact location in Chicago is never revealed to attendees and speakers until a week before the conference.

Who should attend: Hackers, especially those from the Chicago area

Twitter: @NorthSec_io / #nsec20Web: nsec.ioDate: May 10-17Location: Montreal, Quebec, CanadaCost: Conference, C$150 to C$5,300 (student and time-sensitive discounts available)

Attracting more than 600 attendees annually, NorthSec is the biggest applied security event in Canada. It's aimed at raising the knowledge and technical expertise of both professionals and students.

The event offers a single-track conference, training workshops, and a capture-the-flag competition. Speakers address topics ranging from application and infrastructure security to cryptography and ethics. Workshops and training cover subjects such as penetration testing, network security, software and hardware exploitation, web hacking, reverse engineering, malware, and encryption.

Who should attend: CSOs, CISOs, CTOs, software developers, software engineers, programmers, industry analysts and consultants, security researchers, security engineers, cryptographers, privacy advocates, computer scientists, penetration testers, and reverse engineers

Twitter: @IEEESSPWeb: ieee-security.org/TC/SP2020Date: May 18-20Location: San Francisco, California, USACost (2019): Symposium, $745 to $1,565; workshop, $380 to $530 (time-sensitive, member, and student discounts available for both symposium and workshops)

Since 1980, thisIEEE symposium has been a venue for airing developments in computer security and electronic privacy. The conference attracts both researchers and practitioners ready to share their knowledge on a broad range of security topics. In addition to the symposium, the IEEE offers a number of workshops that allow forum-goers to take a deeper dive into specific aspects of security and privacy.

Who should attend: Researchers, security practitioners, and students

Twitter: @reconmtl, @reconbrxWeb: recon.cxDate: JuneLocation: Montreal, Quebec, CanadaCost (2019): C$800 to C$1,400 (student and time-sensitive discounts available)

REcon is an annual conference held in Brussels and Montreal that focuses on reverse engineering and advanced exploitation techniques. The single-track conference covers subjects such as software and hardware reverse engineering, finding vulnerabilities and writing exploits, and bypassing security protections.

In addition to the conference, training sessions lasting two to four days are offered. They cover subjects such as hacking operating systems, firmware, and IoT devices.

Who should attend: Security researchers, programmers, developers, and information security team members, plus leaders of those disciplines

Twitter: #GartnerSECWeb: gartner.com/en/conferences/na/security-risk-management-usDate: June 1-4Location: National Harbor, Maryland, USACost: $3,250 to$3,825 (time-sensitive and public sector discounts available)

As with all Gartner conferences, Gartner analysts will feature prominently in keynotes, panels, roundtables, how-to workshops, and one-on-one meetings, but there will also be companies presenting case studies, and many opportunities to network.

Who should attend: CISOs, CSOs, enterprise IT security pros and executives, CxOs, business continuity and disaster recovery managers, and network security managers

See the article here:
The best security conferences of 2020 - TechBeacon