accept no compromises

Amsterdam Technical Colloquium Call For Papers

Amsterdam Technical Colloquium Call For Papers
Posted Feb 6, 2017

The first annual Amsterdam Technical Colloquium (TC) has announced its call for speakers. It will take place in Amsterdam, Netherlands from April 25th through the 26th, 2017.

tags | paper, conference
MD5 | 2b3f96eb8a934bc9de9ee7fd4c4afd50

Amsterdam Technical Colloquium Call For Papers

Change Mirror Download

We would like to announce a "Save the Date" and "Call for Speakers" for
the annual FIRST Amsterdam Technical Colloquium (TC). The main event,
hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary
style conference held on the 25th and 26th of April 2017. We are also
offering an optional, free, training on Monday April 24th.

The event website:

Event registration is now open. This will be free event with no
registration charges (although registration is required). This event
will be open to all (not just FIRST members) and fills up quickly. Note,
the Monday training has limited seating, so please register early to
avoid being turned away.

Please register here:

A list of recommended hotels and travel information is available here:

Call for Speakers:

FIRST is looking for speakers that would like to present at the TC. We
are most interested in new presentations and presenters, however
important updates on prior work are also welcome. We strongly encourage
any individual who has not spoken at a conference before to submit a
proposal. The idea behind the TC is to encourage security teams and
researchers talent to share their technical work in a friendly
environment. While we give special consideration to local talent,
submissions are welcome from anyone, anywhere.

Any novel ideas, techniques, case studies, or research related to
incident and threat response are welcome. Some suggested topics are as

- Threat actor groups & techniques

- Creative incident response techniques

- Indicators of compromise and how detect/mitigate

- Data analytics for security

- Criminal underground

- Denial-of-service attacks and countermeasures

- Digital forensics

- Human-computer interaction, security, and privacy

- Intrusion and anomaly detection and prevention

- Malicious code analysis, anti-virus evasion, etc.

- Security architecture

- Open Source tools

- Attack and response to an organization

For your submission to be considered, you must provide ALL of the
following information:

- Title

- Presenter's Name(s), Affiliation, and short biography

- Brief Summary (Abstract) and completion status/plan

- Estimated Time (45 mins + 10 for questions is typical)


Important Note:

FIRST does not allow presentations with the aim of gaining the
audience's interest in any commercial application, solution or product.

In other words, NO MARKETING PRESENTATIONS. Please only submit a talk if
you are actually able to attend the TC in Amsterdam.

Our goal is to have the program on the event website by the end of
February 2017, to that end please have all submission completed by
February 17th. Feel free to reply with any questions.

Thank you,
Jeff Bollinger & Matthew Valites


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By