About the JoinSEC London
Designed by Information Security professionals The Information Security has been one of the most increasing concerns worldwide. Everyday new attacks and counter attacks emerge, making it impossible for professionals to keep themselves up to date. The JoinSEC London (first edition) intends to convene busy IT and Information Security Professionals with very little time to learn new technologies or just deepen their knowledge on IT security tools and techniques. With this in mind we gathered a group of hand picked internationally renowned professionals to share their expertise with all participants through training sessions and workshops. We would like to invite the information security community to submit papers and projects proposals. All presentations and techniques presented and demonstrated during the event, should be used to prevent and defense mechanisms, by industry, technology professionals, academics, researchers, system administrators, and other stakeholders. Speakers will be given a 30 to 40 minutes slot, *except* for workshops or training sessions. Note: *If the speaker are not from UK, the organization will try (is not guaranteed) to support some of the traveling expenses, but it will be evaluated case by case.* *When submiting a proposal, please include:* - Speaker name - Contact information (country/city of origin, e-mail, telephone number) - Presentation theme - Abstract/Presentation description (very simple) - Short Bio - Estimated length of presentation (30, 40 or more for training or workshop) - Macrotheme Based (Choose one below) Analysis of malicious code Anti-detection / Obfuscation techniques Anti-Forensics Botnet creation and detection Computer forensics Cryptography Data Recovery and Incident Response Exploit and vulnerability disclosure Firewall Evasion techniques Hacking GSM Networks Hardware Hacking Intrusion detection / prevention Malware analysis Malware conception Mobile Security (cellular technologies) Network scanning and analysis Opensource Security Technologies Physical security Protocol / Application based vulnerability exploitation Reverse engineering RFID Hacking Secure coding & code analysis Smartcard hacking Social engineering SPAM fighting Traffic analysis Virtualization attacks VoIP Hacking Web application vulnerability research Data Leak Wireless Security Zero Day Technology and techniques Special attention: Purely commercial presentations and/or advertisement of products/services will _not_ be accepted, only technical presentations. Some comercial content may be tolerated if relativeirectly of a new technology or methodology. *Deadline:* papers/project proposal submission should be sent till the 31 of August 2013, to info(at)shadowsec(dot)com Read more: http://www.joinsec.com/call-for-papers/<http://www.joinsec.com/call-for-papers/?utm_source=copy&utm_medium=paste&utm_campaign=copypaste&utm_content=http%3A%2F%2Fwww.joinsec.com%2Fcall-for-papers%2F>
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/