ignore security and it'll go away

Hacktivity 2017 Call For Papers

Hacktivity 2017 Call For Papers
Posted May 29, 2017
Site hacktivity.com

The Hacktivity 2017 Call For Papers has been announced. It will be held from October 20th through the 21st, 2017 in Budapest, Hungary.

tags | paper, conference
MD5 | d1de9c885c7ef80fc279c6d6aa34b21e

Hacktivity 2017 Call For Papers

Change Mirror Download
[ == Hacktivity 2017 Call For Papers  ==]

Conference: October 20-21, 2017
CFP closing date: June 30, 2017
CFP notification to authors: July 31, 2017
Venue: Budapest, Hungary

Web: https://hacktivity.com
Email: cfp _!{at}!_ hacktivity.com
Twitter: @hacktivityconf

[ == The Hacktivity Crew == ]

The Hacktivity hacking conference brings together the official and
alternative representatives of information security profession with all
those interested in the area, in an informal, yet educational, and most of
the times highly technical.

[ == Call For Contributions/Speakers

This year we are offering two alternatives: you can either give a
presentation as usual or you can give a hello workshop.

[ == Presentations == ]

This is the business as usual. We require similar thing as in any other IT
security conference CFP. We are accepting presentations from a wide
spectrum of IT security topics. It is up to you to apply for a presentation
which is in line with the spirit of Hacktivity. We favor presentations with
demo.

Please write your slide deck in English. Your speech can be in English
(favored) or Hungarian.

As a speaker you can have either 20A minutes or 40 Aminute s lot to
present your topic.

[ == Hello workshop == ]

We all know there is a huge difference between seeing and doing. Real
knowledge grows from issuing your first command. Therefore, to help
visitors start off learning we organize hello workshops. Hello workshops
are short courses introducing basic/intermediate IT security skills.
Previous years included topics like:

Burp Extensions
Malicious PDF analysis
Basic rootkit techniques
SQL injections
A hello workshop should meet the following requirements:

participants should acquire a definite and useful piece of knowledge;
participants bring their own equipment you should calculate with the
diversity;
a workshop will not have more than 16 attendees;
it should fit into 20 plus 20 minutes (seeing plus doing) from preparation
to takeAaways.
one workshop will be held approx. 3 times during the two days

[ == Topics == ]

Here are some topics that we are especially interested in:

- Vulnerabilities at unexpected territories
- Exploit mitigations and their mitigations
- Malware analysis inside or outside the sandbox
- Blue Team techniques / operation
- Big Data / Cloud / APT / any_fancy_buzzword A Whatas the big deal? Are
there any / What are the new threats?
- Extraordinary stories of #FAIL

Any research which brings something brand new to the security world
These are just examples though, please feel free to submit your talk as
long as it fits to the spirit of Hacktivity.

[ == How to apply as a speaker == ]

Please fill out our CFP application form: http://bit.ly/2pqGiy5

[ == Speaker benefits == ]

Speaker benefits are applicable to every person presenting at least one 40
minute or two 20 minute presentations. If you would like to hold a Hello
workshop and need coverage for travel or accommodation please contact us!

Hacktivity offers speakers accommodation for 2 nights next to the venue of
the conference and cover travel expenses up to 350 EUR .

Please note that we have flexibility regarding the travel expenses. The
travel contribution is agreed individually with every speaker . Please
contact us at cfp _!{at}!_ hacktivity.com for more details.

[ == Copyright == ]

As a speaker or workshop presenter you should accept the following use of
your intellectual properties:

Presentations will be recorded and made available on our website.

To the event a conference paper will be published with
presentation/workshop titles and abstracts, the presentersa bio and their
photos. The brochures will be distributed at the registration for all
participants of the conference.

Presentations and workshop materials will available on the conference web
page after the event in pdf form.

During the presentation we will take photos and use them in our
publications and will be published on our site.

We are not going to use your materials in any other form mentioned above
without your prior consent.

Cheers,
Attila Marosi
head of program committee


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    2 Files
  • 23
    Oct 23rd
    16 Files
  • 24
    Oct 24th
    4 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close