[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAMQnBk7rzO=Kyx3rt03peNTsjij9xXM29k4P+r+jzY=qF_EpaQ@mail.gmail.com>
Date: Fri, 16 Aug 2013 10:59:55 +0100
From: Ralf Braga <ralfbraga@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: JoinSEC London - October
About the JoinSEC London
Designed by Information Security professionals
The Information Security has been one of the most increasing concerns
worldwide. Everyday new attacks and counter attacks emerge, making it
impossible for professionals to keep themselves up to date.
The JoinSEC London (first edition) intends to convene busy IT and
Information Security Professionals with very little time to learn new
technologies or just deepen their knowledge on IT security tools and
techniques. With this in mind we gathered a group of hand picked
internationally renowned professionals to share their expertise with all
participants through training sessions and workshops.
We would like to invite the information security community to submit papers
and projects proposals.
All presentations and techniques presented and demonstrated during the
event, should be used to prevent and defense mechanisms, by industry,
technology professionals, academics, researchers, system administrators,
and other stakeholders.
Speakers will be given a 30 to 40 minutes slot, *except* for workshops or
training sessions.
Note: *If the speaker are not from UK, the organization will try (is not
guaranteed) to support some of the traveling expenses, but it will be
evaluated case by case.*
*When submiting a proposal, please include:*
- Speaker name
- Contact information (country/city of origin, e-mail, telephone number)
- Presentation theme
- Abstract/Presentation description (very simple)
- Short Bio
- Estimated length of presentation (30, 40 or more for training or
workshop)
- Macrotheme Based (Choose one below)
Analysis of malicious code
Anti-detection / Obfuscation techniques
Anti-Forensics
Botnet creation and detection
Computer forensics
Cryptography
Data Recovery and Incident Response
Exploit and vulnerability disclosure
Firewall Evasion techniques
Hacking GSM Networks
Hardware Hacking
Intrusion detection / prevention
Malware analysis
Malware conception
Mobile Security (cellular technologies)
Network scanning and analysis
Opensource Security Technologies
Physical security
Protocol / Application based vulnerability exploitation
Reverse engineering
RFID Hacking
Secure coding & code analysis
Smartcard hacking
Social engineering
SPAM fighting
Traffic analysis
Virtualization attacks
VoIP Hacking
Web application vulnerability research
Data Leak
Wireless Security
Zero Day Technology and techniques
Special attention: Purely commercial presentations and/or advertisement of
products/services will _not_ be accepted, only technical presentations.
Some comercial content may be tolerated if relativeirectly of a new
technology or methodology.
*Deadline:* papers/project proposal submission should be sent till the 31
of August 2013, to info(at)shadowsec(dot)com
Read more: http://www.joinsec.com/call-for-papers/<http://www.joinsec.com/call-for-papers/?utm_source=copy&utm_medium=paste&utm_campaign=copypaste&utm_content=http%3A%2F%2Fwww.joinsec.com%2Fcall-for-papers%2F>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists