If you like the website, feel free to:

HITB GSEC Singapore


City Singapore
Province Singapore
Country SG
Twitter @HITBGSEC
Website https://gsec.hitb.org/sg2018/
CFP Deadline April 30, 2018, 11:59 p.m.

Details

HITB GSEC is a deep-knowledge security conference where attendees get to vote on the final agenda of talks. Attendees can also opt to be introduced to speakers and each other based on the votes they cast.

We have a total of 12 speaking slots available and are looking for 60-minute, offensive focused deep-knowledge presentations. Research that is new, novel and most importantly material that has not been presented elsewhere prior. We are also hoping to see more women researchers take the stage at HITB GSEC - if you are a woman in IT, we STRONGLY ENCOURAGE you to submit.
Submission Process:

1.) Register for an account at GSEC CFP

2.) Send us the following:

- Presentation abstract (1000 - 1500 words)
- Draft White Paper (3500 - 5000 words)
- Supporting material (poc code, slides, video etc)
- A recent photograph

3.) When CFP closes, audience voting begins. Each registered delegate gets 3 votes to cast against any presentations they like.

4.) When a presentation receives 8 votes it is removed from voting. You then receive an email introduction to voters which allows you to further fine tune your presentation to suit the audience profile.

Each accepted submission will entitle speaker(s) to:

Accommodation for 3 nights / 4 days
Travel expense reimbursement up to USD1500.00 per slot
A USD1000 honorarium per slot

Topics:

Topics of interest include, but are not limited to the following:

Cloud Security
File System Security
3G/4G/WIMAX Security
SS7/GSM/VoIP Security
Security of Medical Devices
Critical Infrastructure Security
Smartphone / MobileSecurity
Smart Card and Physical Security
Network Protocols, Analysis and Attacks
Applications of Cryptographic Techniques
Side Channel Analysis of Hardware Devices
Analysis of Malicious Code / Viruses / Malware
Data Recovery, Forensics and Incident Response
Hardware based attacks and reverse engineering
Windows / Linux / OS X / *NIX Security Vulnerabilities
Next Generation Exploit and Exploit Mitigation Techniques
NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security

Please note: As always, we do not accept product or vendor related pitches though speaking opportunities and more are available for sponsors.