what you don't know can hurt you

Breakpoint 2015 Call For Papers

Breakpoint 2015 Call For Papers
Posted May 19, 2015
Authored by bpx | Site ruxconbreakpoint.com

The Breakpoint 2015 Call For Papers has been announced. It will take place at the Intercontinental Rialto in Melbourne, Australia October 22nd through the 23rd, 2015. Breakpoint showcases the work of expert security researchers from around the world on a wide range of topics. This conference is organized by the Ruxcon team and offers a specialized security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint caters towards security researchers and industry professionals alike, with a focus on cutting edge security research.

tags | paper, conference
MD5 | ae02bc7fb9c8a28031ff1ab804054230

Breakpoint 2015 Call For Papers

Change Mirror Download
Breakpoint 2015 Call For Papers
Melbourne, Australia, October 22th-23th
Intercontinental Rialto
http://www.ruxconbreakpoint.com


.[x]. Introduction .[x].

We are pleased to announce Call For Presentations for Breakpoint 2015.

Breakpoint showcases the work of expert security researchers from around the
world on a wide range of topics. This conference is organised by the Ruxcon
team and offers a specialised security conference to complement and lead into
the larger and more casual Ruxcon weekend conference. Breakpoint caters
towards security researchers and industry professionals alike, with a focus on
cutting edge security research.

Breakpoint presents a great opportunity for our selected speakers to receive a
complimentary trip to Australia and experience both the Breakpoint and Ruxcon
conferences, not to mention the great weather, parties, and friendly people.


.[x]. Important Dates .[x].

May 15 - Call For Presentations Open
August 30 - Call For Presentations Close
October 19-21 - Breakpoint Training
October 22-23 - Breakpoint Conference
October 24-25 - Ruxcon Conference


.[x]. Topic Scope .[x].

Topics of interest include, but are not limited to:

o Mobile Device Security
o Exploitation Techniques
o Reverse Engineering
o Vulnerability Discovery
o Rootkit Development
o Malware Analysis
o Code Analysis
o Virtualisation, Hypervisor Security
o Cloud Security
o Embedded Device Security
o Hardware Security
o Telecommunications Security
o Wireless Network Security
o Web Application Security
o Law Enforcement Activities
o Forensics
o Threat Intelligence
o Incident Response


.[x]. Submission Guidelines .[x].

In order for us to process your submission we will require the following
information:

1. Presentation title
2. Detailed summary of your presentation material
3. Name/Nickname
4. Mobile phone number
5. Brief personal biography
6. Description of any demonstrations involved in presentation
7. Information on where the presentation material has or will be presented
before Breakpoint

* Preference will be given to presentations that contain original research
that will be first presented at Breakpoint.
* As a general guideline, Breakpoint presentations are between
45 and 60 minutes, including question time.

If you have any questions about submissions, or would like to make a
submission, please send an email to bpx@ruxconbreakpoint.com


.[x]. Speaker Benefits .[x].

Speakers at Breakpoint will be entitled to the following benefits:

- A return economy airfare to Melbourne (total cost limit applies)
- Three nights accommodation at the Intercontinental Rialto
- Complimentary registration for Breakpoint and Ruxcon conferences
- Invitation to all Breakpoint and Ruxcon parties
- Unlock 'Presented on world's smallest continent' achievement

* All speaker benefits apply to a single speaker per submission.


.[x]. Contact .[x].

If you have any questions or inqueries, contact us at:

* Email: bpx@ruxconbreakpoint.com
* Twitter: ruxconbpx

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    14 Files
  • 20
    Sep 20th
    20 Files
  • 21
    Sep 21st
    3 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close