lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3FDEFB9E-C040-4C84-9B89-85EAE1C20676@t2.fi>
Date: Mon, 19 May 2014 23:55:28 +0300
From: "Tomi Tuominen" <tomi.tuominen@...fi>
To: bugtraq@...urityfocus.com
Subject: t2'14: Call for Papers 2014 (Helsinki / Finland)

#
# t2'14 - Call For Papers (Helsinki, Finland) - October 23 - 24, 2014
#

Do you feel like Las Vegas is too hot, Berlin too bohème, Miami too humid, Singapore too clean and Pattaya just totally confusing ? No worries! Helsinki will be the perfect match for you – guaranteed low temperature, high tech and just enough regulation to make everything appear to be under control. This is the country where indestructible mobile phone and Linux kernel were invented.

Helsinki, the capital of Finland, known for the Finnish design and casual-yet-almost-sophisticated drinking culture offers you the chance to familiarize yourself with the birth place of many popular PC, console and mobile games. The murder rate of only 2.2 per 100 000 people makes Finland one of the safest countries for delivering a presentation. Do polar bears roam free in Helsinki? How do you go from being silent in three languages to having incoherent discussions in all of them? What does 176% mobile penetration look like? Come and see for yourself!

t2'14 is looking for technical infosec presentations with original content. Whether it’s your complicated relationship with the APT, embedded device exploitation, tactics and operational procedures in high stress / high risk operations, implementing or avoiding global surveillance, latest advances in offensive/defensive applications of computer science, the gospel of weird machine, breaking the Internet, reverse engineering milware or something totally different, we’d like to hear about it.

The advisory board will be reviewing submissions until 2014-07-04. First come, first served. No returns, no refunds.

Quick facts for speakers
========================
+ presentation length 60-120 minutes, in English
+ complimentary travel and accommodation
+ decent speaker hospitality benefits
+ no marketing or product propaganda

A blast from the past:
https://www.google.com/search?q=site:t2.fi%20intitle:%22schedule%20for%22

How to submit
=============
Please include the following with your submission (incomplete submissions will not be accepted):

1. Contact information (email and cell phone)
2. Country and city of origin for your travel to the conference
3. Brief biography (including employer and/or affiliations)
4. Title of the presentation
5. Presentation abstract
6. Explanation why your submission is significant
7. If your presentation references a paper or piece of software that you have
   published, please provide us with either a copy of the said paper or software,
   or an URL where we can obtain it
8. List any other publications or conferences where this material has been or
   will be published/submitted

Please send the above information to cfp-2014 (at) lists.t2.fi

-- 
Tomi 'T' Tuominen | Founder @ t2 infosec conference | https://t2.fi


Download attachment "signature.asc" of type "application/pgp-signature" (842 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ