SecurityTube is pleased to announce the CFP for SecurityTubeCon, the first hacker conference, to be held completely online!
SecurityTubeCon is aimed at democratizing hacker conferences by allowing any researcher, regardless of his physical location, to share his work with the community. Unlike other Cons we will not *accept / reject* speakers. If you have something interesting to share, you WILL be heard. The idea behind SecurityTubeCon is not to pass judgments on your work, instead, it aims at providing a platform for knowledge exchange.
Once speakers send in their talk abstracts, we will put it online for the community members to decide which talks they want to attend. On the day of the conference, speakers will broadcast their talks using screencasting software and the interested participants will tune in. The participants will use IRC / chat rooms to ask questions to the speakers during the talks.
What else is unique about SecurityTubeCon?
a. This conference will be held completely online!
b. Location No Barrier - speak / attend SecurityTubeCon from your bedroom :)
c. Language No Barrier - though we would recommend English as the preferred language so you can address a global audience, feel free to speak in the language you are most comfortable with
d. $0 is the conference registration fees - absolutely free
We've laid out the CFP in an FAQ format:
1. When and Where will SecurityTubeCon be held?
Dates: 6th, 7th and 8th November, 2009
2. How will it all work?
a. Interested speakers will send us their talk details
a. We will post the list of speakers and abstracts online
b. Participants will register for talks and will receive webinar invitations
c. Speakers will broadcast their talks using screencasting / web conferencing software and invited participants will join in
d. The participants will use IRC / Chat rooms to ask questions to the speakers during the talks
3. Are there any requirements to become a speaker?
1. You should know what you are talking about :)
2. You will need to submit a video recording of your entire talk before the deadline. This will ensure that participants have something to watch in case there is a last minute technical issue or some other problem. These videos will be made available absolutely free to everyone a week after the conference.
4. Awesome! I want to register as a speaker! How do I apply?
To Become a Speaker at SecurityTubeCon, please follow the following steps:
a. Send an email to firstname.lastname@example.org containing the following information:
I. Talk Title
II. Abstract: Minimum 250 words
III. Language in which talk will be delivered in
IV. Desired Duration: 15 mins / 30 mins / 60 mins?
V. Speaker Names with Email addresses
VI. Speaker Bios: As detailed as possible
b. Once we receive your email, we will post your talk online and send you a confirmation
c. You will need to submit the presentation, tools, other relevant material and a video of the entire talk by October 20th, 2009. We will send you the details on where to upload via email.
d. If the material mentioned in (c) is not received by the deadline, your talk will be removed from the website
e. For any additional questions, please contact us at email@example.com
5. How long can a talk be?
15 mins, 30 mins and 60 mins talk slots are available
6. What are the Deadlines?
1. Deadline to Submit Abstracts: October 10th, 2009
2. Deadline to submit the full presentation and video: October 20th, 2009
3. Conference Dates: 6th, 7th and 8th November
7. What kind of talks will be accepted at SecurityTubeCon?
Very broadly, there will be 4 tracks in SecurityTubeCon:
a. Research Track: Show your bleeding edge research and zero days here
b. Tutorials Track: In-depth Tutorials on security technologies can be given here by domain experts
c. Tool Demos: Demonstration of new and cutting edge tools by their original authors
d. Security Product Demos: Demos of state of the art security products by companies and organizations
Topics can belong to a broad spectrum, here are a couple (neither exhaustive nor limited to):
a. Protocol / Application based vulnerability in networks and computers
b. Firewall Evasion techniques
c. Intrusion detection/prevention
d. Data Recovery and Incident Response
e. Mobile Security (cellular technologies)
f. Virus and Worms
g. WLAN and Bluetooth Security
h. Analysis of malicious code
i. Cryptography and Cryptanalysis
j. Computer forensics
k. Cyber Crime & law
8. How can I help?
a. Please forward this CFP link / email to your friends in the security / hacking community
b. Send this CFP to any mailing lists related to security
c. Post a link to the conference website on forums, discussion groups you frequent
d. Particpate either as a Speaker or as an Attendee :)
9. I have a question? Need more info?
Write to us at firstname.lastname@example.org