SECURE 2011 – Call for Speakers otwarte!

Date of publication: 13/03/2012, CERT Polska

Secure 2011

The previous year was a continuous evolution of IT security. During that time CERT Polska received over 12 million incident reports about phishing, spam, DDoS attacks, botnet activity and other threats. We witnessed the attack of Stuxnet that targeted specific control networks, and DDoS attacks of the Anonymous became a real threat for governments. Miscreants continued to improve their techniques and 2011 brought us attacks on e-banking accounts that employed mobile phones. SECURE is a unique place to exchange opinions on such events with top experts in IT security.

This year SECURE will continue its successful transformation which started in 2010. The international formula, high professional level and current topics are ensured by CERT Polska – the incident response team within Research and Academic Network NASK. SECURE is dedicated entirely to IT security and addressed to the administrators, security team members and practitioners in this field. Particular emphasis is on practical solutions, latest trends in countering threats as well as important legal issues. Participants have an opportunity to gain the latest knowledge, improve their qualifications and exchange experience with experts.

SECURE 2011 will be held on October 24-26 at Adgar Conference Center in Warsaw, Poland, focused around three main tracks:

    • technical – practical aspects of implementation and integration of security solutions
    • organisational – new trends in attacks, threats and their mitigation
    • legal

    Full presentations

    We are looking for speakers ready to willing deliver a talk covering one or more of the following subjects:

    • malware analysis, including viruses, worms and botnets
    • monitoring of network threats
    • intrusion detection
    • innovatory honeypot and sandbox applications
    • security of smartphones and other mobile systems
    • security events visualisation
    • Advanced Persistent Threat attacks
    • cloud security
    • security of IPv6
    • VoIP security
    • security of SCADA systems and control networks
    • early warning systems
    • incident handling
    • standards for security incident data exchange
    • new attacks, threats and mitigation techniques
    • evaluation of efficiency of known tools in new attack scenarios
    • open source security tools
    • protection of online identity
    • threats from user-generated content
    • steganography in telecommunication networks
    • human factor in computer and network security
    • Polish and European law in regards to computer and information security
    • law enforcement tasks in regards to computer and information security
    • research projects in the area of computer and information security
    • international cooperation in the area of computer and information security
    • public-private partnership in the area of computer and information security

    Important information about full presentations:

    • proposals for presentations should be submitted via email to [email protected] and should include the title of presentation, its abstract and short bio of the author, mentioning former conference talks where applicable
    • time for presentation: 45 minutes, including q&a
    • commercial presentations will not be accepted
    • all materials should be submitted in one of the following formats: OpenOffice, Microsoft Office, PDF
    • slides of presentations will be made available to all participants in an electronic versions unless strictly prohibited by the speaker
    • authors of accepted proposals will receive a full conference package (zero conference fees, workshops not inclusive), but they are responsible for arranging and covering costs of their travel and accomodation

    Important dates

    • Proposals submission until July 4, 2011
    • Acceptance notice by July 19, 2011
    • Presentation submission by October 10, 2011

    Lightning talks

    We encourage participants of SECURE to share their thoughts. One of the conference blocks will include lightning talks, allowing everyone to talk briefly about their projects, works, ideas or problems. Everything goes, as long as it touches IT security.

    Important information about lightning talks:

    • maximum time for a talk is 5 minutes and total time for all talks will be limited
    • application for a lightning talk can be submitted anytime after you have registered for the conference; this can be done early, by sending an email to: [email protected], or at the conference
    • the organisers reserve the right to accept or refuse any lightning talk application