Mudanças entre as edições de "O Outro Lado BSidesSP ed 3/CFP EN"
(Criou página com '- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - {Call For Papers} - "Conferencia O Outro Lado" (Co0L) Security BSidesSP - 3rd Edition Sao Paulo, May 6, 201...') |
|||
(Uma revisão intermediária pelo mesmo usuário não está sendo mostrada) | |||
Linha 1: | Linha 1: | ||
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - |
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - |
||
+ | |||
− | + | {Call For Papers} - "Conferencia O Outro Lado" (Co0L) Security BSidesSP - 3rd Edition |
|
+ | |||
Sao Paulo, May 6, 2012 |
Sao Paulo, May 6, 2012 |
||
+ | |||
http://garoa.net.br/wiki/BSidesSP |
http://garoa.net.br/wiki/BSidesSP |
||
+ | |||
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - |
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - |
||
. - = - = - = - = - = -. |
. - = - = - = - = - = -. |
||
+ | |||
− | | About the |
+ | | About the Conference | |
+ | |||
. - = - = - = - = - = -. |
. - = - = - = - = - = -. |
||
+ | |||
− | The "Conferencia O Outro Lado" Security BSides |
+ | The "Conferencia O Outro Lado" Security BSides São Paulo" (Co0L |
− | BSidesSP) is a free mini-conference that |
+ | BSidesSP) is a free mini-conference that aim to complement and |
− | expand the spectrum of interaction beyond the limits of |
+ | expand the spectrum of interaction beyond the limits of a regular event |
and enable the dissemination, discussion and exchange of knowledge on |
and enable the dissemination, discussion and exchange of knowledge on |
||
information security and hacker culture between attendees, speakers, |
information security and hacker culture between attendees, speakers, |
||
− | and the companies involved |
+ | and the companies involved. |
It is organized by the Garoa Hacker Clube and one committee involved |
It is organized by the Garoa Hacker Clube and one committee involved |
||
− | with the hacker culture and the information security |
+ | with the hacker culture and the information security industry. The main |
− | objective of Co0L |
+ | objective of Co0L BSidesSP is to allow innovation, discussion and |
exchange of knowledge about information security and hacker culture, |
exchange of knowledge about information security and hacker culture, |
||
− | with a relaxed atmosphere and |
+ | with a relaxed atmosphere and where these disciplines became complementary. |
− | be complementary. |
||
⚫ | |||
− | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
structure, besides encouraging the integration of the participants and |
structure, besides encouraging the integration of the participants and |
||
− | occur in places more relaxed with refreshments at the disposal of |
+ | occur in places more relaxed with refreshments at the disposal of presents. |
− | Enjoying a weekend close to a |
+ | Enjoying a weekend close to a relevant conference to the national |
− | + | information security community, the "Co0L BSidesSP" conference will |
|
− | bring lectures, debates and workshops presented |
+ | bring lectures, debates and workshops presented by respected members |
− | of |
+ | of security community. The conference has a unique format in |
− | Brazil - very successful here and in several geographies |
+ | Brazil - very successful here and in several geographies around the world |
- combining the exchange of information with a unique opportunity for |
- combining the exchange of information with a unique opportunity for |
||
− | networking in a unique space provided by "Casa |
+ | networking in a unique space provided by "Casa |
da Cultura Digital" and the Garoa Hacker Clube, the first hackerspace |
da Cultura Digital" and the Garoa Hacker Clube, the first hackerspace |
||
− | + | in Brazil. |
|
More information: http://garoa.net.br/wiki/O_Outro_Lado_BSidesSP_ed_3 |
More information: http://garoa.net.br/wiki/O_Outro_Lado_BSidesSP_ed_3 |
||
. - = - =-. |
. - = - =-. |
||
+ | |||
− | + | | CFP | |
|
+ | |||
. - = - =-. |
. - = - =-. |
||
− | If you believe you have some interesting content about security |
+ | If you believe you have some interesting content about information security |
− | + | and want to share your knowledge and/or discoveries with |
|
− | the community, do not miss |
+ | the community, do not miss the opportunity! Send a |
− | paper to our |
+ | paper to our conference. The lectures will be 40 minutes long each and these are |
− | suggested topics: |
+ | some suggested topics: |
+ | * Malware Analysis |
||
* Secure System Architectures |
* Secure System Architectures |
||
* Audit and Control |
* Audit and Control |
||
Linha 59: | Linha 67: | ||
* Heuristic Algorithms Applied to Security |
* Heuristic Algorithms Applied to Security |
||
* Botnets |
* Botnets |
||
⚫ | |||
− | * Computing in the Clouds |
||
+ | * Cloud Computing |
||
* Contactless - Security and Privacy |
* Contactless - Security and Privacy |
||
* Correlation of security events |
* Correlation of security events |
||
* Digital Crimes |
* Digital Crimes |
||
* Cryptography & Cryptanalysis |
* Cryptography & Cryptanalysis |
||
+ | * Hacker culture |
||
⚫ | |||
* Reverse Engineering |
* Reverse Engineering |
||
* Social Engineering |
* Social Engineering |
||
+ | * Information Security tools |
||
* Weaknesses in systems |
* Weaknesses in systems |
||
* Fuzzing protocols or applications |
* Fuzzing protocols or applications |
||
* Cyber War |
* Cyber War |
||
* Hackerspaces |
* Hackerspaces |
||
+ | * Hardware hacking |
||
* Hardware Insurance |
* Hardware Insurance |
||
− | * Malware |
+ | * Malware and malicious code |
* Information Security Policy |
* Information Security Policy |
||
* Privacy |
* Privacy |
||
+ | * Vulnerability Research |
||
* Problems with network protocols |
* Problems with network protocols |
||
* Secure Process Development Life Cycle |
* Secure Process Development Life Cycle |
||
* Secure Programming |
* Secure Programming |
||
− | * Response |
+ | * Incident Response |
− | * Security |
+ | * Security from layer 1 to 8 |
+ | * Web application security |
||
− | * Security in web applications |
||
+ | * Database security |
||
− | * Security in Databases |
||
+ | * Mobile devices security |
||
− | * Security in mobile devices |
||
− | * |
+ | * Critical embedded systems security |
* Physical Security |
* Physical Security |
||
− | * |
+ | * Critical Infrastructure Systems |
* Operating Systems |
* Operating Systems |
||
* Pen-Test Techniques |
* Pen-Test Techniques |
||
* Issues related to 802.11 networks and Radio Frequency |
* Issues related to 802.11 networks and Radio Frequency |
||
− | * Topics in Management |
+ | * Topics in Management, Business and Career |
* Topics in Social networks and search engines |
* Topics in Social networks and search engines |
||
* Virtualization |
* Virtualization |
||
Linha 99: | Linha 111: | ||
* Summary biography and qualifications |
* Summary biography and qualifications |
||
* Summary of the presentation |
* Summary of the presentation |
||
+ | |||
Important Dates |
Important Dates |
||
Final submission - March 31, 2012 |
Final submission - March 31, 2012 |
||
+ | |||
Notification to authors - April 10, 2012 |
Notification to authors - April 10, 2012 |
||
+ | |||
Submission of material to be presented - April 30, 2012 |
Submission of material to be presented - April 30, 2012 |
||
+ | |||
Event and Presentation - May 6, 2012 |
Event and Presentation - May 6, 2012 |
||
+ | |||
Submissions should be sent to: cfp at garoa.net.br |
Submissions should be sent to: cfp at garoa.net.br |
Edição atual tal como às 19h46min de 21 de março de 2012
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = -
{Call For Papers} - "Conferencia O Outro Lado" (Co0L) Security BSidesSP - 3rd Edition
Sao Paulo, May 6, 2012
http://garoa.net.br/wiki/BSidesSP
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = -
. - = - = - = - = - = -.
| About the Conference |
. - = - = - = - = - = -.
The "Conferencia O Outro Lado" Security BSides São Paulo" (Co0L
BSidesSP) is a free mini-conference that aim to complement and
expand the spectrum of interaction beyond the limits of a regular event
and enable the dissemination, discussion and exchange of knowledge on
information security and hacker culture between attendees, speakers,
and the companies involved.
It is organized by the Garoa Hacker Clube and one committee involved with the hacker culture and the information security industry. The main objective of Co0L BSidesSP is to allow innovation, discussion and exchange of knowledge about information security and hacker culture, with a relaxed atmosphere and where these disciplines became complementary.
Co0L BSidesSP was inspired by the existing model of the conference "Security B-Sides" (www.securitybsides.com) in various countries, but with a typical Brazilian flavor addapted to your reality. The so-called "B-Sides" conferences are mini-conferences that take place in conjunction with some great event in the same city, but usually have a less formal structure, besides encouraging the integration of the participants and occur in places more relaxed with refreshments at the disposal of presents.
Enjoying a weekend close to a relevant conference to the national information security community, the "Co0L BSidesSP" conference will bring lectures, debates and workshops presented by respected members of security community. The conference has a unique format in Brazil - very successful here and in several geographies around the world - combining the exchange of information with a unique opportunity for networking in a unique space provided by "Casa da Cultura Digital" and the Garoa Hacker Clube, the first hackerspace in Brazil.
More information: http://garoa.net.br/wiki/O_Outro_Lado_BSidesSP_ed_3
. - = - =-.
| CFP |
. - = - =-.
If you believe you have some interesting content about information security and want to share your knowledge and/or discoveries with the community, do not miss the opportunity! Send a paper to our conference. The lectures will be 40 minutes long each and these are some suggested topics:
- Malware Analysis
- Secure System Architectures
- Audit and Control
- Authentication
- Heuristic Algorithms Applied to Security
- Botnets
- Cyber intelligence
- Cloud Computing
- Contactless - Security and Privacy
- Correlation of security events
- Digital Crimes
- Cryptography & Cryptanalysis
- Hacker culture
- Reverse Engineering
- Social Engineering
- Information Security tools
- Weaknesses in systems
- Fuzzing protocols or applications
- Cyber War
- Hackerspaces
- Hardware hacking
- Hardware Insurance
- Malware and malicious code
- Information Security Policy
- Privacy
- Vulnerability Research
- Problems with network protocols
- Secure Process Development Life Cycle
- Secure Programming
- Incident Response
- Security from layer 1 to 8
- Web application security
- Database security
- Mobile devices security
- Critical embedded systems security
- Physical Security
- Critical Infrastructure Systems
- Operating Systems
- Pen-Test Techniques
- Issues related to 802.11 networks and Radio Frequency
- Topics in Management, Business and Career
- Topics in Social networks and search engines
- Virtualization
- Vulnerability Research
Each submission should include the following information
- Name of speaker, title, address, email and telephone contact
- Summary biography and qualifications
- Summary of the presentation
Important Dates
Final submission - March 31, 2012
Notification to authors - April 10, 2012
Submission of material to be presented - April 30, 2012
Event and Presentation - May 6, 2012
Submissions should be sent to: cfp at garoa.net.br