lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 16 Aug 2013 10:59:55 +0100
From: Ralf Braga <>
Subject: JoinSEC London - October

About the JoinSEC London

Designed by Information Security professionals

The Information Security has been one of the most increasing concerns
worldwide. Everyday new attacks and counter attacks emerge, making it
impossible for professionals to keep themselves up to date.

The JoinSEC London (first edition) intends to convene busy IT and
Information Security Professionals with very little time to learn new
technologies or just deepen their knowledge on IT security tools and
techniques. With this in mind we gathered a group of hand picked
internationally renowned professionals to share their expertise with all
participants through training sessions and workshops.

We would like to invite the information security community to submit papers
and projects proposals.

All presentations and techniques presented and demonstrated during the
event, should be used to prevent and defense mechanisms, by industry,
technology professionals, academics, researchers, system administrators,
and other stakeholders.

Speakers will be given a 30 to 40 minutes slot, *except* for workshops or
training sessions.

Note: *If the speaker are not from UK, the organization will try (is not
guaranteed) to support some of the traveling expenses, but it will be
evaluated case by case.*

*When submiting a proposal, please include:*

   - Speaker name
   - Contact information (country/city of origin, e-mail, telephone number)
   - Presentation theme
   - Abstract/Presentation description (very simple)
   - Short Bio
   - Estimated length of presentation (30, 40 or more for training or
   - Macrotheme Based (Choose one below)

 Analysis of malicious code
 Anti-detection / Obfuscation techniques
 Anti-Forensics
 Botnet creation and detection
 Computer forensics
 Cryptography
 Data Recovery and Incident Response
 Exploit and vulnerability disclosure
 Firewall Evasion techniques
 Hacking GSM Networks
 Hardware Hacking
 Intrusion detection / prevention
 Malware analysis
 Malware conception
 Mobile Security (cellular technologies)
 Network scanning and analysis
 Opensource Security Technologies
 Physical security
 Protocol / Application based vulnerability exploitation
 Reverse engineering
 RFID Hacking
 Secure coding & code analysis
 Smartcard hacking
 Social engineering
 SPAM fighting
 Traffic analysis
 Virtualization attacks
 VoIP Hacking
 Web application vulnerability research
 Data Leak
 Wireless Security
 Zero Day Technology and techniques

Special attention: Purely commercial presentations and/or advertisement of
products/services will _not_ be accepted, only technical presentations.
Some comercial content may be tolerated if relativeirectly of a new
technology or methodology.

*Deadline:* papers/project proposal submission should be sent till the 31
of August 2013, to info(at)shadowsec(dot)com


Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists