Call for Papers
Great to have you here!
First we are a community built in many years and as a community, we encourage knowledge sharing and collaboration.
We encourage all application security practitioners or security researchers to contribute to the DefCamp community by writing articles for the blog and show their work to the world or attending the conference and showcase the research on stage.
What are the benefits for speakers?
- access to one of the largest cyber security communities from CEE
- exposure for your security research
- travel expenses covered by us
- VIP treatment (including free attendee access for one of your friends or family)
Deadlines
Our Call for Papers has three main rounds, however we select speakers based on FIFO (first-in-first-out) rule, meaning that you have more chances of being accepted now than later.
- Deadline #1 of submissions: August 15th, 2024
- Deadline #2 of submissions: September 15th, 2024
- Deadline #3 of submissions: October 30th, 2024
What we are looking for?
As long as it is fascinating for the DefCamp community, we place a high emphasis on both unique content that has never been seen before as well as tried and tested content. In addition, we are excited to provide content that is at both the beginner and the advanced level. It’s possible that DefCamp has had introductory speeches before, but they’re still quite helpful for people who are just starting out. At DefCamp, not only will you widen your knowledge, but you will also deepen it.
Review process
Each entry will be evaluated based on the quality of its material as well as how well it fits within the program. We will adopt a procedure known as double blinding to eliminate any possibility of prejudice based on the writers’ color, gender, or any other characteristic. However, the event organizers reserve the right to make adjustments to the program for the event or to dismiss any proposal if they believe it would be inappropriate for the conference.
Be the next DefCamp Superstar
First, submit a preview of your paper on our online CFP platform for review. Documents may include videos and pictures, as well as a more extensive version of the research in a different download-able format. White paper and/or slides are a plus.
SUBMIT YOUR PRESENTATIONTechnical presentations are very appreciated
We encourage you to apply with your findings and research! Check out the topics of interest below and if you still have second thoughts on the subject, drop us a line.
Cybersecurity has become vital for businesses
We’ve included this category of articles to offer the DefCamp audience information on trends and statistics from the market as well as good practices, guides and methodologies.
Topics of Interest
Please note that the following list is not exhaustive. We love innovation but we can’t keep up with it on this page!
/Web, Software, and Infrastructure Security
- Web Application Security
- Secure Software Development Lifecycle (SSDLC)
- Cloud & Infrastructure Security
- Critical Infrastructure Security – SCADA, routing, satellite, Cloud and GSM, automotive
- Android/iPhone security research
- Governance, Compliance, and Business Strategy
/Security Governance & Compliance
- Legal Issues & related topics (e.g., NIS directive, GDPR, EU & international regulations, etc.)
- Business, Management & Innovation
- Digital Transformation & Security Awareness
- Cyber-Operations, AI & Emerging Technologies
/DevSecOps & Security Automation
- Case studies of Cybersecurity incidents/breaches
- Applications of Cryptographic Techniques, including PQC
- AI in Cybersecurity
- Next-gen Exploits and Mitigation Techniques
- Hardware, Forensics, and Reverse Engineering
/Hardware application bypass, hardware hacking basics, defeating “secure” hardware
- Forensics applications, physical memory forensics, solid-state disk forensics, network forensics
- Reverse Engineering Malware and Malware Analysis
/Wireless, Communication, and Physical Security
- NFC, WLAN, GPS, HAM Radio, Satellite, RFID, and Bluetooth Security Development
- Badging applications, lock-picking, physical access control, physical lock forensics
/ Articles on specific topics related to:
- Security trends and patterns the researcher noticed and supports through strong arguments
- New and relevant infosec statistics and infographics
- Best practices and methodologies in cybersecurity and how they’re evolving to adapt to the new environment we operate in.