c0c0n International Information Security Conference
2014-03-24 05:50:47 UTC
___ ___ ___ ___ __ _ _
/ _ \ / _ \ |__ \ / _ \/_ | || |
___| | | | ___| | | |_ __ ) | | | || | || |_
/ __| | | |/ __| | | | '_ \ / /| | | || |__ _|
| (__| |_| | (__| |_| | | | | / /_| |_| || | | |
\___|\___/ \___|\___/|_| |_| |____|\___/ |_| |_|
#################################################################
c0c0n 2014 | The cy0ps c0n - Call For Papers & Call For Workshops
#################################################################
August 22-23, 2014 - Cochin, India
Buenos Dias from the God's Own Country!
We are extremely delighted to announce the Call for Papers and Call for
Workshops for c0c0n 2014 <http://www.is-ra.org/c0c0n/>, a 3-day Security and
Hacking Conference (1 day pre-conference workshop and 2 day conference), full of
interesting presentations, talks and of course filled with fun!
are looking for the hottest presentation topics based on the research and
*HOTNESS* of the topic. To follow a fair process of speaker selection, the
selection committee is only given the abstract without revealing the identities,
ensuring a transparent and fair policy for all submissions.
#####################
CFP Review Committee:
#####################
http://is-ra.org/c0c0n/cfp.html
#####################
Submission Guidelines:
#####################
Email your submission to: cfp [at] is-ra [dot]org
Email subject should be: CFP c0c0n 2014 - <Paper Title>
Email Body:
Personal Information:
=====================
Speaker Name:
Job Role/Handle:
Company/Organization:
Country:
Email ID:
Contact Number:
Speaker Profile: (max 1000 words)
If there is additional speaker please mention it here following the above
format.
Presentation Details:
=====================
Name/Title of the presentation:
Paper Abstract: (max 3000 words)
Presentation Time Required (20, 30, 50 Minutes)
Is there any demonstration? Yes or No
Are you releasing any new tool? Yes or No
Are you releasing any new exploit? Yes or No
Have you presented the paper before on any other security / technology
conference(s)? Yes or No
Anything the committee should know about your presentation
Other Needs & Requirements:
===========================
Do you need any special equipment?
We will be providing 1 LCD projector feed, 2 screens, microphones, wired
and/or wireless Internet.
If you have any other requirement, Please mention it here and the reason.
#####################
Remember these Dates!
#####################
CFP Opens: 22 March 2014
CFP Closing Date: 25 May 2014
Speakers list (First Set) online: 15 June 2014
Workshop Dates: 21 Aug 2014
Conference Dates: 22 - 23 Aug 2014
*NOTE:* We do not promote vendor/product oriented submissions hence it will
be rejected.
##################
Speaker Benefits:
##################
Thanks and Regards,
- c0c0n 2014 Team -
------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board
Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
http://www.iacertification.org
------------------------------------------------------------------------
/ _ \ / _ \ |__ \ / _ \/_ | || |
___| | | | ___| | | |_ __ ) | | | || | || |_
/ __| | | |/ __| | | | '_ \ / /| | | || |__ _|
| (__| |_| | (__| |_| | | | | / /_| |_| || | | |
\___|\___/ \___|\___/|_| |_| |____|\___/ |_| |_|
#################################################################
c0c0n 2014 | The cy0ps c0n - Call For Papers & Call For Workshops
#################################################################
August 22-23, 2014 - Cochin, India
Buenos Dias from the God's Own Country!
We are extremely delighted to announce the Call for Papers and Call for
Workshops for c0c0n 2014 <http://www.is-ra.org/c0c0n/>, a 3-day Security and
Hacking Conference (1 day pre-conference workshop and 2 day conference), full of
interesting presentations, talks and of course filled with fun!
Info Sec - Technical
Info Sec - Management
Digital Forensics and Investigations
Cyber Laws and Governance.
We are expecting conference and workshop submissions on the following topics,Info Sec - Management
Digital Forensics and Investigations
Cyber Laws and Governance.
Cloud Security
Browser Security
Honeypots/Honeynets
Offensive forensics
Software Testing/Fuzzing
Network and Router Hacking
WLAN and Bluetooth Security
Hacking virtualized environment
Lockpicking & physical security
National Security & Cyber Warfare
Open Source Security&Hacking Tools
Web Application Security & Hacking
Exploiting Layer 8/Social Engineering
Malware analysis & Reverse Engineering
New Vulnerabilities and Exploits/0-days
Advanced Penetration testing techniques
Antivirus/Firewall/UTM Evasion Techniques
IT Auditing/Risk management and IS Management
Cyber Forensics, Cyber Crime & Law Enforcement
Mobile Application Security-Threats and Exploits
Critical Infrastructure & SCADA networks Security
Presentations/topics that haven't been presented before will be preferred. WeBrowser Security
Honeypots/Honeynets
Offensive forensics
Software Testing/Fuzzing
Network and Router Hacking
WLAN and Bluetooth Security
Hacking virtualized environment
Lockpicking & physical security
National Security & Cyber Warfare
Open Source Security&Hacking Tools
Web Application Security & Hacking
Exploiting Layer 8/Social Engineering
Malware analysis & Reverse Engineering
New Vulnerabilities and Exploits/0-days
Advanced Penetration testing techniques
Antivirus/Firewall/UTM Evasion Techniques
IT Auditing/Risk management and IS Management
Cyber Forensics, Cyber Crime & Law Enforcement
Mobile Application Security-Threats and Exploits
Critical Infrastructure & SCADA networks Security
are looking for the hottest presentation topics based on the research and
*HOTNESS* of the topic. To follow a fair process of speaker selection, the
selection committee is only given the abstract without revealing the identities,
ensuring a transparent and fair policy for all submissions.
#####################
CFP Review Committee:
#####################
Forensics, Bloomsburg University
0x02 - Elad Shapira (‘Zest’), Mobile security researcher, AVG
0x03 - Robin Wood (aka digininja), Freelance Security Consultant and
Researcher
For more details about the Review Committee, visit -0x02 - Elad Shapira (‘Zest’), Mobile security researcher, AVG
0x03 - Robin Wood (aka digininja), Freelance Security Consultant and
Researcher
http://is-ra.org/c0c0n/cfp.html
#####################
Submission Guidelines:
#####################
Email your submission to: cfp [at] is-ra [dot]org
Email subject should be: CFP c0c0n 2014 - <Paper Title>
Email Body:
Personal Information:
=====================
Speaker Name:
Job Role/Handle:
Company/Organization:
Country:
Email ID:
Contact Number:
Speaker Profile: (max 1000 words)
If there is additional speaker please mention it here following the above
format.
Presentation Details:
=====================
Name/Title of the presentation:
Paper Abstract: (max 3000 words)
Presentation Time Required (20, 30, 50 Minutes)
Is there any demonstration? Yes or No
Are you releasing any new tool? Yes or No
Are you releasing any new exploit? Yes or No
Have you presented the paper before on any other security / technology
conference(s)? Yes or No
Anything the committee should know about your presentation
Other Needs & Requirements:
===========================
Do you need any special equipment?
We will be providing 1 LCD projector feed, 2 screens, microphones, wired
and/or wireless Internet.
If you have any other requirement, Please mention it here and the reason.
#####################
Remember these Dates!
#####################
CFP Opens: 22 March 2014
CFP Closing Date: 25 May 2014
Speakers list (First Set) online: 15 June 2014
Workshop Dates: 21 Aug 2014
Conference Dates: 22 - 23 Aug 2014
*NOTE:* We do not promote vendor/product oriented submissions hence it will
be rejected.
##################
Speaker Benefits:
##################
Complimentary Conference registration.
Complementary Accommodation for 2 nights.
Invitation to Day 1 Networking Dinner / Party.
Travel Reimbursement - The selected speaker will receive travel
reimbursement, to the extent available with existing ISRA /conference funds.Complementary Accommodation for 2 nights.
Invitation to Day 1 Networking Dinner / Party.
Travel Reimbursement - The selected speaker will receive travel
Only one speaker will be eligible for the benefits in case there are two or
more speakers for a talk.Thanks and Regards,
- c0c0n 2014 Team -
------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board
Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
http://www.iacertification.org
------------------------------------------------------------------------