what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ShakaCon V Call For Papers

ShakaCon V Call For Papers
Posted Jan 1, 2013
Site shakacon.org

The Shakacon 2013 Call For Papers has been announced. It will take place June 25th through the 28st, 2013 in Honolulu, Hawaii.

tags | paper, conference
SHA-256 | fb0cf9b96e97b61a67f24e6a9b66744806c75f3c9ef203ecb1f5ede2865af3b5

ShakaCon V Call For Papers

Change Mirror Download
              
----++++++++++++++++++++++++++++++++++++----
Shakacon IV - Honolulu Hawaii

"Sun, Surf, and C Shells"

CALL FOR PAPERS

www.shakacon.org/2013CFP.html
----++++++++++++++++++++++++++++++++++++----

Who: Shakacon Crew
What: Shakacon IV
When: June 25-28 2013
Where: Paradise aka Honolulu Hawaii (nuff said)
Why: Why NOT?
How: By plane, boat, canoe, yacht, hydrofoil, stand-up paddle board,
jetski,
long board, dolphin, whale sled, nuclear submarine, etc.



[Overview]
Want to learn the Hula while increasing your security skills? Want to
attend a conference where
you can grab a drink with some of the top security minds in the
industry? Want to surf the
beautiful waters of the pacific in the morning and then drop some 0day
in the afternoon?
Sitting around somewhere freezing your a$$ off? Dreaming about warm
days, rainbows, decadent
tropical drinks sipped out of coconuts? Sure you could drop your 0day in
Vegas, bring down the
Internet in Germany, or satisfy your dark desires in Asia; however,
wouldn't you rather submit your
research or topics to our CFP and maybe win yourself a paid trip to
Hawaii? If the answer to any
of the above is yes then we are your conference.

The Shakacon security conference is a laid back conference where
industry, government, academia
and independent experts will get together to share knowledge and
experience in one of the most
beautiful places on Earth.

Shakacon will offer local, national, and international participants a
casual, social, learning
environment designed to present a "holistic" security view and the
opportunity to network with
peers and fellow enthusiasts in a relaxed setting. Leave your ego at
the airport (or shoreline
if you come in via another method) as we look forward to attendees
varying in skill level from N00b
to Ninja.

During the day, sessions will include: best practices, case studies,
research projects, etc.
covering all different aspects of the information security landscape.
There will be something
for everyone and if sitting through talks isn't your cup of kava, there
will be exciting events
and contests for you to sharpen your skills and knowledge on.

You will not want to miss the closing ceremonies where we pour enough
alcohol that we convince some
interverted security geniuses to get up on stage and dance the Hula.

[Trainer Opportunities]
Don't want to speak at the Con but have an uncanny ability to teach and
a proven track record for
delivering quality courseware and want to come to Hawaii? We're also
interested in bringing in trainers
to provide world class training leading up to Shakacon (June 25 and 26).
Submit a synopsis/class agenda,
prior teaching experience, and maybe get selected to teach in Hawaii.


[CFP Details]

We have a very limited number of spots so get your submissions in early
to ensure you get a spot.

(1) Abstract for papers must be submitted to the review committee by
_February 22, 2013_.

(2) Selection notification will occur by _March 15, 2013_ and abstracts
posted to the site
by _March 18, 2013_.

(3) Full Slides for your papers must be submitted by _May 15, 2032_.

CFP Review Committee:

Caleb Sima - BlueBox
Katie Mossouris - Microsoft
Colin Ames - Attack Research
Matthieu Suiche - MoonSols
Vincenzo Iozzo - TiQad
Kent Backman
Jonathan Brossard - Toucan Systems
Jeremiah Grossman - Whitehat Security
Daniel Hodson - Oxin Security & Ruxcon
Kris Harms - Cylance
Mark Ryan Talabis - Secure DNA
Chris Potter - Secure DNA
Jason Martin - Secure DNA


As mentioned, there are a limited number of speaking sessions for which
the conference organizers will provide
travel and accommodations so please submit your abstract early if you
are interested in speaking. Speaking
slots will be 55 minutes long (45 minutes for your talk and 10 minutes
for Q&A).

The audience will be a broad mix of professional, academic, and
enthusiast, so we welcome both technical
and non-technical submissions on all aspects of security. The key
criteria are practicality and timeliness.
We want to provide our attendees with up to date materials they can take
away and immediately gain
benefit from as well as new research or tools. Absolutely NO SALES
presentations will be accepted.


Proposals should include:


<Subject Line:>

"Shakacon CFP Submission: <paper title>, <your name>"

<Body>
1. Name, address, and contact info.
2. Employer and/or affiliations.
3. Brief biography.
4. Presentation experience.
5. Topic summary.
6. Reason this topic should be considered.
7. Other publications or conferences where this material has been or
will be published/submitted.

Please include plain text of all information provided in the body of
your email as well as any file attachments.
The plain text information will be reviewed first to find the most
suitable candidates.

Please forward the above information to cfp at shakacon.org
<mailto:cfp at shakacon.org> in order to be considered.

More conference information, registration details, and travel partner
deals will be
posted to:

http://www.shakacon.org <http://www.shakacon.org/>

Follow Status on:

www.twitter.com/shakacon


[Media Partners]
We are media friendly. Please email info at Shakacon.org for inquiries
about press passes.



ALOHA FROM THE SHAKACON CREW!


This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message, which arise as a result of e-mail transmission. If verification is required please request a hard-copy version.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close