HITB GSEC Singapore 2018 - August 27th - 31st @ InterContinental Singapore
HITB GSEC is a deep-knowledge security conference where attendees get to vote on the final agenda of talks. Attendees can also opt to be introduced to speakers and each other based on the votes they cast.
We have a total of 12 speaking slots available and are looking for 60-minute, offensive focused deep-knowledge presentations. Research that is new, novel and most importantly material that has not been presented elsewhere prior. We are also hoping to see more women researchers take the stage at HITB GSEC - if you are a woman in IT, we STRONGLY ENCOURAGE you to submit.
Submission Process:
1.) Register for an account at GSEC CFP
2.) Send us the following:
- - Presentation abstract (1000 - 1500 words)
- - Draft White Paper (3500 - 5000 words)
- - Supporting material (poc code, slides, video etc)
- - A recent photograph
3.) When CFP closes, audience voting begins. Each registered delegate gets 3 votes to cast against any presentations they like.
4.) When a presentation receives 8 votes it is removed from voting. You then receive an email introduction to voters which allows you to further fine tune your presentation to suit the audience profile.
Each accepted submission will entitle speaker(s) to:
- Accommodation for 3 nights / 4 days
- Travel expense reimbursement up to USD1500.00 per slot
- A USD1000 honorarium per slot
Topics:
Topics of interest include, but are not limited to the following:
- Cloud Security
- File System Security
- 3G/4G/WIMAX Security
- SS7/GSM/VoIP Security
- Security of Medical Devices
- Critical Infrastructure Security
- Smartphone / MobileSecurity
- Smart Card and Physical Security
- Network Protocols, Analysis and Attacks
- Applications of Cryptographic Techniques
- Side Channel Analysis of Hardware Devices
- Analysis of Malicious Code / Viruses / Malware
- Data Recovery, Forensics and Incident Response
- Hardware based attacks and reverse engineering
- Windows / Linux / OS X / *NIX Security Vulnerabilities
- Next Generation Exploit and Exploit Mitigation Techniques
- NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security
Please note:
As always, we do not accept product or vendor related pitches though speaking opportunities and more are available for sponsors.