Call for Papers

Great to have you here! Our invitation to apply for a speaking slot at DefCamp is open to all application security practitioners and those who work or interact with all facets of application security.

DefCamp is a longstanding international conference focused on deep technical knowledge which more than 2,000 people from around the world attend each year.

Be the next DefCamp Superstar

Summaries not exceeding 500 words should be submitted (in plain text format) to us through our online CFP form for review and possible inclusion in the schedule. White paper and/or slides are a plus.

SUBMIT YOUR PRESENTATION

Technical presentations are very appreciated

We encourage you to apply with your findings and research! Check out the topics of interest below and if you still have second thoughts on the subject, drop us a line

Cybersecurity has become vital for businesses

we’ve included this category of talks to offer the DefCamp audience information on trends and statistics from the market as well as good practices and methodologies. 

Speakers Benefits

/ round economy class air tickets for one speaker
/ hotel accommodation
/ free Breakfast, lunch, and dinner / of course drinking
/ speakers dinner
/ free conference ticket (access to all areas)
/ up to 60 minutes presentation slot with an expected audience of more than 2,000 international attendees
/ exposure in one of the largest hacker communities in Central Eastern Europe
/ feedback from thousands of security specialists throughout our network
/ Meet & network with world-wide recognised speakers & professionals
/ Position yourself as an expert
/ 1 day trip after DefCamp – final details to be announced soon

Call for Paper Schedule

1st July – 15th August

FIRST CFP SELECTION ROUND

15th August – 15th September

SECOND CFP SELECTION ROUND, IF SLOTS ARE STILL AVAILABLE

15th September – 15th October

LAST CFP SELECTION ROUND, IF SLOTS ARE STILL AVAILABLE

Please note

The results might be delayed up to 14 days from the official schedule, depending on the number of submissions.

The slots for DefCamp are filled by the FIFO rule (First in, First Selected) after the Conference Committee shared their opinion. That means that some CFP rounds might never happen if we fill in all the slots fast.

If you would like to showcase your company’s products or technology, please review our Sponsorship opportunities and email us at contact@defcamp.ro.

DefCamp doesn’t place any restrictions on topic. However, DefCamp requests something specific as well as general. If you presented your topic in the past, DefCamp will not accept your paper. DefCamp only wants new, creative and cool content. All speakers should show ‘real’ demo(attack) to prove their theory.

Topics of Interest

/ Web Application Security – From language talks to frameworks and exploits.

/ Hardware – Including but not limited to: application bypass, hardware hacking basics, and defeating “secure” hardware.

/ Physical Security – Including but not limited to: badging applications, lock picking, physical access control, physical lock forensics and long range key duplication involving software.

/ Forensics – Including but not limited to: application, physical memory forensics, solid state disk forensics and network forensics.

/ Critical Infrastructure Security – Including but not limited to: SCADA, routing, satellite, Cloud and GSM.

/ Android/iPhone/Windows Mobile research

/ Reverse Engineering Malware and Malware Analysis

/ Rootkit Detection, Techniques, and Defenses

/ Exploitation Tactics

/ Cloud Security / Assessing Cloud Security

/ Legal Issues around EULA and related topics

/ Industry Panels

/ Critical Infrastructure Security

/ Applications of Cryptographic Techniques

/ Next Generation Exploit and Exploit Mitigation Techniques

/ NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security

and much more…

Here’s what happened last time.

Recently accepted speakers

Petr Kunstat

Presales Consultant Thales

BIOGRAPHY Petr Kunstat has experience with IT management in multinational companies and IT consulting in the ..

Mihai Petre

Lead Software Engineer Garrett - Advancing Motion

BIOGRAPHY Mihai is an automotive lead embedded hardware and software development engineer for Garrett Motion. ..

Gabriel Ciubotaru

Lead Security Researcher Garrett - Advancing Motion

BIOGRAPHY Gabriel, is an automotive lead security researcher for Garrett Motion. His interests are finding ..
0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS