{"id":806,"date":"2017-03-01T13:42:00","date_gmt":"2017-03-01T13:42:00","guid":{"rendered":""},"modified":"2018-06-20T00:38:46","modified_gmt":"2018-06-19T22:38:46","slug":"brucon-0x09-cfp-cft-announcement","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2017\/03\/01\/brucon-0x09-cfp-cft-announcement\/","title":{"rendered":"BruCON 0x09 CFP\/CFT Announcement"},"content":{"rendered":"<div style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\"><span style=\"line-height: 20px\">This is the\u00a0<b>Call for Papers<\/b>\u00a0(CFP) for talks and workshops and\u00a0<b>Call for Training<\/b>\u00a0(CFT) for the 9th edition of BruCON.\u00a0<\/span><br \/>\n<span style=\"line-height: 20px\"><br \/>\n<\/span><span style=\"line-height: 20px\">On the off chance you don&#8217;t know BruCON (where have you been?). We host a 2-day Security and Hacking Conference full of interesting presentations, workshops and security challenges for about 600 attendees.\u00a0<\/span>BruCON is an open-minded gathering of people discussing computer security, privacy, and information technology. The conference tries to create bridges between the various actors active in the computer security world including (but not limited to) hackers, security professionals, security communities, non-profit organisations, CERTs, students, law enforcement agencies, and many more. Next to the conference we offer several world-class, deep-dive mostly offensive technical training courses given by the most recognised experts with huge industry experience in their domain! These training sessions take place twice a year, Spring Training takes places on 19, 20 and 21st of April 2017 (Registration and line-up\u00a0<a href=\"http:\/\/2017.brucon.org\/index.php\/Training\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">here<\/a>) and conference training tracks are on 2, 3 and 4th October 2017. Our slogan is &#8220;<i>Hacking for Beer<\/i>&#8221; of which you&#8217;ll find plenty during and after the conference.<br \/>\n<span style=\"line-height: 20px\"><br \/>\n<\/span><span style=\"line-height: 20px\">The conference will be held in Ghent\u00a0<\/span><span style=\"line-height: 20px\">on the <b>5th and 6th of October 2017<\/b>. The training sessions will be held from <b>2nd\u00a0until 4th of October 2017<\/b>\u00a0(all courses start on the 2nd!).<\/span><\/div>\n<div style=\"background-color: white;color: #333333;line-height: 20.8px\">\n<div style=\"font-size: 13px\"><\/div>\n<p><b style=\"line-height: 20px\">[CONFERENCE]<\/b><\/p>\n<\/div>\n<p><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">Topics of interest for the conference include, but are not limited to :<\/span><\/p>\n<ul>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Electronic\/Digital Privacy<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">IoT Security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Wireless Network and Security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Attacks on Information Systems and\/or Digital Information Storage<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Web Application and Web Services Security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Lockpicking &amp; physical security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Honeypots\/Honeynets<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Spyware, Phishing and Botnets (Distributed attacks)<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Hardware hacking, embedded systems and other electronic devices<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Mobile devices exploitation, Symbian, P2K and bluetooth technologies<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Electronic Voting<\/span><\/li>\n<li><span style=\"background-color: white;font-size: 13px\">Vulnerability research and disclosure<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Free Software and Security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Legal and Social Aspect of Information Security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Software Engineering and Security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Security in Information Retrieval<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Security aspects in SCADA, industrial environments and &#8220;obscure&#8221; networks<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Forensics and Anti-Forensics<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Mobile communications security and vulnerabilities<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Information warfare and industrial espionage<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Social Engineering<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Virtualisation Security<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">&#8230;<\/span><\/li>\n<\/ul>\n<p>Possible formats are:<\/p>\n<ul>\n<li>1hr talk<\/li>\n<li>2hr workshop (preferably hands on)<\/li>\n<li>4hr workshop (preferably hands on)<\/li>\n<\/ul>\n<div><span style=\"font-size: 13px\">If you want to get an idea about the atmosphere at BruCON, check out the previous talks on our <a href=\"https:\/\/www.youtube.com\/user\/brucontalks\/playlists\" target=\"_blank\" rel=\"noopener\">Youtube channel<\/a>.\u00a0<\/span><\/div>\n<p><span style=\"background-color: white;color: #333333;line-height: 20.8px\"><b>[TRAINING]<\/b><\/span><br \/>\n<span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">Please take into account the following guidelines :\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">BruCON hosts predominantly offensive technical security training sessions. We don&#8217;t have any specific focus areas for now, so please submit any training you deem interesting !<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Training should be either 2 or 3 days with a preference for the latter.<\/span><\/li>\n<li><span style=\"background-color: white;font-size: 13px\">You are allowed to submit multiple training suggestions, however please specify if they can be hosted simultaneously.<\/span><\/li>\n<li><span style=\"background-color: white;font-size: 13px\">If you have additional hardware that need to be taken into account, please specify including the additional costs.<\/span><\/li>\n<\/ul>\n<div>\n<p><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">If you submit a training, please include, at minimum, the following information :\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Description<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Course content<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Target audience<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Level (Beginner, Advanced, Expert)<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Trainer(s) Biography<\/span><\/li>\n<li><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20px\">Hosted before? If so, where and when<\/span><\/li>\n<\/ul>\n<div>\n<p><span style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">Possible formats are:<\/span><\/p>\n<ul>\n<li><span style=\"background-color: white;font-size: 13px\">2-day training (1100 \u20ac Early-bird \/ 1200 \u20ac Regular)<\/span><\/li>\n<li><span style=\"background-color: white;font-size: 13px\">3-day training (1400 \u20ac Early-bird \/ 1500 \u20ac Regular)<\/span><\/li>\n<\/ul>\n<div><\/div>\n<\/div>\n<\/div>\n<div style=\"background-color: white;color: #333333;line-height: 20.8px\"><b><span style=\"line-height: 20px\">[SUBMISSION GUIDELINES]<\/span><\/b><\/div>\n<div style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">Submissions will contain as much detail as possible and will be written in English.<\/div>\n<div style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">We use EasyChair to collect and review talk, workshop and training proposals.<\/div>\n<div style=\"font-size: 13px;line-height: 20.8px\"><span style=\"line-height: 20px\"><span style=\"background-color: white;color: #333333\">You will submit your proposal online:\u00a0<\/span><\/span><a style=\"background-color: white;color: #1155cc;font-family: arial, sans-serif;font-size: 12.8px\" href=\"https:\/\/www.easychair.org\/conferences\/?conf=brucon0x09\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 12.8px\">https:\/\/www.easychair.<\/span><span style=\"font-size: 12.8px\">org\/conferences\/?conf=<\/span><span style=\"font-size: 12.8px\">brucon0x0<\/span>9<\/a><\/div>\n<div style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">Your submission will contain at least the following details:<\/div>\n<div style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">\n<ul>\n<li>Your name<\/li>\n<li>Where do you live (country)<\/li>\n<li>How to reach you<\/li>\n<li>The title of your talk\/workshop\/training, including type [talk|2h workshop|4h workshop|2 day training|3 day training]<\/li>\n<li>An abstract of your talk\/workshop\/training, including\u00a0<span style=\"line-height: 20px\">a brief biography<\/span><\/li>\n<li>A number of keywords to\u00a0characterise\u00a0your submission<\/li>\n<li>Whether you submitted and\/or presented this proposal at other conferences, and which<\/li>\n<li>Additionally you are encouraged to include, in plain text or PDF format, supporting materials such as slide decks, white papers, curriculum, prerequisites for talk\/workshop\/training, outline,&#8230;<\/li>\n<\/ul>\n<\/div>\n<div style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\">Our speaker treatment hasn&#8217;t changed since the first year. You&#8217;re our guest and we will do anything to make your stay and experience as enjoyable as possible. This includes helping you with travel and accommodation and providing ample opportunities to sample the best of whatever Belgium has to offer. You know what we&#8217;re talking about so &#8230; submit now!<\/div>\n<div style=\"background-color: white;color: #333333;font-size: 13px;line-height: 20.8px\"><span style=\"line-height: 20px\"><br \/>\n<\/span><span style=\"line-height: 20px\"><b>This CFP closes on April 30th 2017 at midnight CET &#8212; CFP feedback will be sent before May 30th 2017. All accepted talks and workshops will be published before June 15th 2017.<\/b><\/span><\/div>\n<p><span style=\"background-color: white;color: #333333;font-size: xx-small;line-height: 20.8px\"><span style=\"line-height: 20px\"><br \/>\n<\/span><\/span><span style=\"background-color: white;color: #333333;font-size: xx-small;line-height: 20.8px\"><span style=\"line-height: 20px\">Small print: We do not accept product or vendor related pitches. If your presentation involves an advertisement for a new product or service your company is offering, please do not submit. Also, we do not accept presentations submitted by a third party including (but not limited to) company representatives, management bureau&#8217;s, etc. BruCON presentations should be focused on topics that are of interest to security and technology professionals who are paying attention to current trends and issues. We want BruCON to be educational and entertaining to the attendees and the community.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the\u00a0Call for Papers\u00a0(CFP) for talks and workshops and\u00a0Call for Training\u00a0(CFT) for the 9th edition of BruCON.\u00a0 On the off chance you don&#8217;t know BruCON (where have you been?). We host a 2-day Security and Hacking Conference full of interesting presentations, workshops and security challenges for about 600 attendees.\u00a0BruCON is an open-minded gathering of people discussing computer security, privacy, and information technology. The conference tries to create bridges between the various actors active in&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-806","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=806"}],"version-history":[{"count":2,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/806\/revisions"}],"predecessor-version":[{"id":1459,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/806\/revisions\/1459"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}