Hacktivity – The IT Security Festival in Central & Eastern Europe


Hacktivity Conference will be held for the fourteenth time in 2017. The conference traditionally brings together the official and alternative representatives of the information security profession with those who are interested in this field in an informal and informative and sometimes deeply technological way. More than 1000 participants attended in the festival last year. We had 1 Diamond, 2 Gold, 10 Silver and another 15 sponsors. The communication was facilitated by HVG, Millás reggeli, HWSW, IT Business, Computerworld and PC World, along with several online newspapers and strategic partners. In the US and some European countries conferences on information security are regularly held with participants including not only corporate executives but also committed IT experts working hands-on in this field as well as students studying IT in higher education. They visit these conferences to get information. In fact these events provide a forum for presenting IT security-related, legal and sociological problems faced by users and often not addressed by other conferences. As a consequence these events are considered unique among conferences focusing on similar topics in all countries. “At the conference experts with IT security certifications (CISA, CISM, CISSP) can collect CPE points for their licence, therefore top IT experts are expected to attend the event.”

Activity website: http://hacktivity.com

Add Event to Calendar: vCal | iCal

Time & Place

20 Oct 2017 09:00 to 21 Oct 2017 17:00
MOM Kulturális Központ – 1124 Budapest, Csörsz u. 18. Hungary

Target Audience

Official and alternative representatives of the IT security profession, IT security professionals and people who are interested in this field (induviduals, students)



1. vulnerabilities of mobile devices,
2. hardware hacking,
3. attack vectors of telecommunication networks,
4. network security,
5. security of operating systems,
6. browser based attacks,
7. misuse of popular applications,
8. database security,
9. possibilities arisen from server errors,
10. info. gathering from business applications,
11. malicious and mobile codes,
12. hacking tools,
13. information warfare,
14. hacker subculture,
15. social engineering,
16. digital forensics,
17. privacy,
18. questions of intellectual properties.

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information