___ ___ ___ ___ __ __ / _ \ / _ \ |__ \ / _ \/_ | / / ___| | | | ___| | | |_ __ ) | | | || |/ /_ / __| | | |/ __| | | | '_ \ / /| | | || | '_ \ | (__| |_| | (__| |_| | | | | / /_| |_| || | (_) | \___|\___/ \___|\___/|_| |_| |____|\___/ |_|\___/
################################################################# c0c0n 2016 | The cy0ps c0n - Call For Papers & Call For Workshops ################################################################# August 18-20, 2016 - Kollam / Quilon (Coulão), India Buenos dmas from the God's Own Country! We are extremely delighted to announce the Call for Papers and Call for Workshops for c0c0n 2016 <http://www.is-ra.org/c0c0n/>, a 3-day Security and Hacking Conference (2 day conference and 1 day pre-conference workshop), full of interesting presentations, talks and of course filled with fun! The conference topics are divided into four domains as follows: >> Info Sec - Technical >> Info Sec - Management >> Digital Forensics and Investigations >> Cyber Laws and Governance. We are expecting conference and workshop submissions on the following topics, but are not limited to: >> Smart Cities >> Cloud Security >> Browser Security >> Honeypots/Honeynets >> Offensive forensics >> Software Testing/Fuzzing >> Network and Router Hacking >> WLAN and Bluetooth Security >> Hacking virtualized environment >> Lockpicking & physical security >> National Security & Cyber Warfare >> Open Source Security&Hacking Tools >> Web Application Security & Hacking >> Exploiting Layer 8/Social Engineering >> Malware analysis & Reverse Engineering >> New Vulnerabilities and Exploits/0-days >> Advanced Penetration testing techniques >> Antivirus/Firewall/UTM Evasion Techniques >> IT Auditing/Risk management and IS Management >> Cyber Forensics, Cyber Crime & Law Enforcement >> Mobile Application Security-Threats and Exploits >> Critical Infrastructure & SCADA networks Security Presentations/topics that haven't been presented before will be preferred. ##################### Submission Guidelines: ##################### Email your submission to: cfp [at] is-ra [dot]org Email subject should be: CFP c0c0n 2016 - <Paper Title> Email Body: Personal Information: ===================== Speaker Name: Job Role/Handle: Company/Organization: Country: Email ID: Contact Number: Speaker Profile: (max 1000 words) If there is additional speaker please mention it here following the above format. Presentation Details: ===================== Name/Title of the presentation: Paper Abstract: (max 3000 words) Presentation Time Required (20, 30, 50 Minutes) Is there any demonstration? Yes or No Are you releasing any new tool? Yes or No Are you releasing any new exploit? Yes or No Have you presented the paper before on any other security / technology conference(s)? Yes or No Other Needs & Requirements: =========================== Do you need any special equipment? We will be providing 1 LCD projector feed, 2 screens, microphones, wired and/or wireless Internet. If you have any other requirement, Please mention it here and the reason. ##################### Remember these Dates! ##################### CFP Opens: 04 Apr 2016 CFP Closing Date: 15 May 2016 Conference Dates: 19 - 20 Aug 2016 Workshop Dates: 18 Aug 2016 *NOTE:* We do not promote vendor/product oriented submissions hence it will be rejected. ################## Speaker Benefits: ################## >> Complimentary Conference registration. >> Complementary Accommodation for 2 nights. >> Invitation to Day 1 Networking Dinner / Party. >> Travel Reimbursement (maximum upto below mentioned amount) # International Speaker (outside India) (USD $1000) # Speakers from India (INR Rs.6000) >> Only one speaker will be eligible for the benefits in case there are two or more speakers for a talk. Thanks and Regards, - c0c0n 2016 Team -
_______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________