DeepSec 2010 - Call for Papers and Experts

DeepSec 2010 - Call for Papers and Experts


DeepSec 2010 - Call for Papers and Experts

Posted:

InfoSec News: DeepSec 2010 - Call for Papers and Experts: Forwarded from: DeepSec Conference <deepsec (at) deepsec.net>
== Call for Papers and Experts === DeepSec In-Depth Security Conference 2010 - Quad Core, the fourth DeepSec
Another year has passed and another Call for Papers is out. The next DeepSec conference will be in Vienna from November 23rd to 26th 2010 and we invite you to send your submission for conference talks and workshops. Additionally we call for submisison from young security researchers of 21 years and younger for exhibits of their own research during the conference. The deadline for submissions is July 31 2010.
== Topics ==
The DeepSec 2010 focuses heavily on mobile security. Any gadget that you carry with you or that is used by roadwarriors comes under scrutiny. This includes networked resources intended for the mobile audience and modern nomads as well. On top of that we like to hear about the security of next generation infrastructure - IPv6, cloud computing and services, virtualization technologies, in short everything that should keep us online and connected for the next decades. We want to get a glimpse into the future based on the problems of today.
Please do not submit specific single exploits (which might be fixed by the time of the conference) and "yet-another-XYZ-hack", script kiddy content or similar "breakthroughs". Save your effort for the Nobel prize. Exploit frameworks, general approaches, "defective by design" or "defective by implementation" and high impact exploits have a much higher chance to get accepted. ;-)
- AJAX/Web2.0/JavaScript Security - Cloud Computing - Code Analysis - Cryptographical Weaknesses - Digital Espionage - Digital Forensics - e-Voting - Failure and Fixes of all kinds - Gadgets (networked and mobile) - Incident Response - Malware Research - Messaging Technologies - Network Protocols - Operating Systems - Patch & Upgrade Management - Secure Software Development - Security Management - Social Engineering - Virtualisation - VoIP Technology - Web Security - Wireless Technology
Please note, that we are a non-product, non-vendor biased security conference and do not welcome vendor pitches in the conference talks or trainings. We will provide an opportunity for vendor self presentation through sponsorship and vendor booths in the conference lounge, where coffee and snacks will be served during the breaks.
== U21 ==
DeepSec will sponsor young security researchers by providing an opportunity to attend the conference for free. In order to take advantage of this offer your have to submit a description of your own security research project. Your work will be an exhibit during the breaks. You have to present your project in the loung area. Optionally you can do a lightning talk about your work (roughly 5 minutes).
The offer is intended for everyone with a maximum age of 21.
== Submission ==
Proposals for talks and trainings at the second annual DeepSec In-Depth Security Conference will be accepted until _July 31th 2010, 23:59 CEST_.
All proposals should be submitted through our web site https://deepsec.net/cfp/ or by email to: cfp (at) deepsec.net
== About DeepSec ==
DeepSec IDSC is an annual European two-day in-depth conference on computer, network, and application security. It takes place in November and aims to bring together the world's leading security professionals from academics, government, industry, business, and the underground hacking community. The conference offers two days of security talks and two days of trainings, covering the latest topics in network and IT security.
DeepSec offers a neutral ground to exchange ideas and experiences, thus making it a unique event where all participants can get in contact freely.
== Speakers/Trainers ==
Speaker privileges include:
- One economy class return-ticket to Vienna. - 3 nights of accommodation in the conference hotel. - Breakfast, lunch, and two coffee breaks - Speaker activities during, before, and after the conference. - Speaker's Dinner. - Speaker After-Party in the Metalab Hackerspace.
Instructor privileges include:
- 50% of the net profit of the class. - Breakfast, lunch, and two coffee breaks. - Free ticket for the conference. - Speaker activities during, before, and after the conference. - Speaker After-Party in the Metalab Hackerspace.
If you have questions, want to send us additional material, or have problems with the web form, feel free to contact us at: cfp (at) deepsec.net
Best regards, DeepSec In-Depth Security Conference organisation team.
https://deepsec.net/contact/

Maley: Here's How Firing REALLY Went Down

Posted:

InfoSec News: Maley: Here's How Firing REALLY Went Down: http://www.csoonline.com/article/589831/Maley_Here_s_How_Firing_REALLY_Went_Down
By Bill Brenner Senior Editor CSO April 06, 2010
SANTA CLARA, Calif. -- Former State of Pennsylvania CISO Robert Maley has been watching all the news about his firing for talking about a [...]

'Activist' UCSD professor facing unusual scrutiny

Posted:

InfoSec News: 'Activist' UCSD professor facing unusual scrutiny: http://www.signonsandiego.com/news/2010/apr/06/activist-ucsd-professor-facing-unusual-scrutiny/
By Eleanor Yang Su Union-Tribune Staff Writer April 6, 2010
UCSD professor Ricardo Dominguez is facing unusual scrutiny from campus police and auditors for his involvement in two divisive projects -- one that helps migrants find water stored along the border and another that disrupted the UC president's Web site through a virtual sit-in.
Dominguez, 50, is a self-described activist and new media artist who is accustomed to stirring up controversy. But he said he's troubled that his tenured status may be revoked for work that promotes his academic specialty of electronic civil disobedience.
His supporters said Dominguez's academic freedom is being trampled because he targeted administrators last month over its financial management. The sympathizers include coalitions of more than 50 faculty members at the University of California San Diego.
Others, including three Republican congressmen who have written to UCSD Chancellor Marye Anne Fox, said Dominguez should not be using taxpayer money to develop programs that aid illegal immigrants.
Last week, UCSD police questioned Dominguez about whether he committed a crime with the virtual sit-in.
[...]

Customers Sue Countrywide Financial Over Theft And Sale Of Personal Data

Posted:

InfoSec News: Customers Sue Countrywide Financial Over Theft And Sale Of Personal Data: http://www.darkreading.com/database_security/security/privacy/showArticle.jhtml?articleID=224201969
By Tim Wilson DarkReading April 07, 2010
Customers of Countrywide Financial have filed a class-action lawsuit over the 2008 data breach that enabled company insiders to steal and [...]

Navy cyber leader expects proactive capabilities this year

Posted:

InfoSec News: Navy cyber leader expects proactive capabilities this year: http://fcw.com/articles/2010/04/07/navy-cyber-command-update.aspx
By Amber Corrin FCW.com April 07, 2010
Fragile, antiquated networks and a departmental inability so far to fully grasp the idea of a network domain as battlespace are slowing establishment of formal military cyber operations. [...]

Romania Swoops In on 70 Cybertheft Suspects

Posted:

InfoSec News: Romania Swoops In on 70 Cybertheft Suspects: http://www.wired.com/threatlevel/2010/04/romania-cyber-thieves
By Kim Zetter Threat Level Wired.com April 7, 2010
Romanian police arrested 70 suspects Tuesday who they claim were involved in eBay scams and other cybercrimes since 2006.
Believed to be members of three separate gangs, the scammers used phishing attacks to get the login credentials of eBay account holders, then used the accounts to auction nonexistent goods. Police have identified approximately 800 victims who sent money for non-existent Rolex watches, cars, yachts, private airplanes and other luxury goods. Buyers from around the world lost an estimated $1 million after they sent money for winning auctions, but never received goods. According to one Romanian news source, an American buyer paid about $90,000 for a luxury aircraft in one auction.
The crooks allegedly operated in Austria, Canada, Denmark, France, Germany, Italy, New Zealand, Spain, Sweden, Switzerland and the United States. Police have so far recovered only a small, undetermined amount of money in the raids. Romanian authorities posted a video of one of the police raids on YouTube [1].
Suspects in several countries reportedly exchanged homes, cars and phone cards among themselves.
[1] http://www.youtube.com/watch?v=I1R8vKYemLc
[...]

BofA insider to plead guilty to hacking ATMs

Posted:

InfoSec News: BofA insider to plead guilty to hacking ATMs: http://www.computerworld.com/s/article/9174991/BofA_insider_to_plead_guilty_to_hacking_ATMs?taxonomyId=17
By Robert McMillan IDG News Service April 7, 2010
A Bank of America computer specialist is set to plead guilty to charges that he hacked the bank's automated tellers to dispense cash without [...]

Medical Data At Risk

Posted:

InfoSec News: Medical Data At Risk: http://www.informationweek.com/news/healthcare/EMR/showArticle.jhtml?articleID=224201775
By Nicole Lewis InformationWeek April 7, 2010
A new study from the Healthcare Information and Management Systems Society reports that since January 2008, more than 110 healthcare [...]

0 comments:

Post a Comment