Call for Papers

Great to have you here! Our invitation to apply for a speaking slot at DefCamp is open to all application security practitioners and those who work or interact with all facets of application security.

DefCamp is a longstanding international conference focused on deep technical knowledge which more than 2,000 people from around the world attend each year.

Be the next DefCamp Superstar

Summaries not exceeding 500 words should be submitted (in plain text format) to us through our online CFP form for review and possible inclusion in the schedule. White paper and/or slides are a plus.

SUBMIT YOUR PRESENTATION

Technical presentations are very appreciated

We encourage you to apply with your findings and research! Check out the topics of interest below and if you still have second thoughts on the subject, drop us a line

Cybersecurity has become vital for businesses

we’ve included this category of talks to offer the DefCamp audience information on trends and statistics from the market as well as good practices and methodologies. 

Speakers Benefits

/ round economy class air tickets for one speaker
/ hotel accommodation
/ free Breakfast, lunch, and dinner / of course drinking
/ speakers dinner
/ free conference ticket (access to all areas)
/ up to 60 minutes presentation slot with an expected audience of more than 2,000 international attendees
/ exposure in one of the largest hacker communities in Central Eastern Europe
/ feedback from thousands of security specialists throughout our network
/ Meet & network with world-wide recognised speakers & professionals
/ Position yourself as an expert
/ 1 day trip after DefCamp – final details to be announced soon

Call for Paper Schedule

1st July – 15th August

FIRST CFP SELECTION ROUND

15th August – 15th September

SECOND CFP SELECTION ROUND, IF SLOTS ARE STILL AVAILABLE

15th September – 15th October

LAST CFP SELECTION ROUND, IF SLOTS ARE STILL AVAILABLE

Please note

The results might be delayed up to 14 days from the official schedule, depending on the number of submissions.

The slots for DefCamp are filled by the FIFO rule (First in, First Selected) after the Conference Committee shared their opinion. That means that some CFP rounds might never happen if we fill in all the slots fast.

If you would like to showcase your company’s products or technology, please review our Sponsorship opportunities and email us at [email protected]

DefCamp doesn’t place any restrictions on topic. However, DefCamp requests something specific as well as general. If you presented your topic in the past, DefCamp will not accept your paper. DefCamp only wants new, creative and cool content. All speakers should show ‘real’ demo(attack) to prove their theory.

Topics of Interest

/ Web Application Security – From language talks to frameworks and exploits.

/ Hardware – Including but not limited to: application bypass, hardware hacking basics, and defeating “secure” hardware.

/ Physical Security – Including but not limited to: badging applications, lock picking, physical access control, physical lock forensics and long range key duplication involving software.

/ Forensics – Including but not limited to: application, physical memory forensics, solid state disk forensics and network forensics.

/ Critical Infrastructure Security – Including but not limited to: SCADA, routing, satellite, Cloud and GSM.

/ Android/iPhone/Windows Mobile research

/ Reverse Engineering Malware and Malware Analysis

/ Rootkit Detection, Techniques, and Defenses

/ Exploitation Tactics

/ Cloud Security / Assessing Cloud Security

/ Legal Issues around EULA and related topics

/ Industry Panels

/ Critical Infrastructure Security

/ Applications of Cryptographic Techniques

/ Next Generation Exploit and Exploit Mitigation Techniques

/ NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security

and much more…

Here’s what happened last time.

Recently accepted speakers

Koen Vanhees

Security Operations Manager Cegeka

BIOGRAPHY Koen Vanhees holds a master in electronics, but soon in his career his passion moved to Linux, ..

Dragos Dabija

Security Manager Accenture

BIOGRAPHY Dragos is a Security Manager with more than 6 year experience in areas like : IoT Security, ..

Cristian Gogosila

Software Developer BullGuard

BIOGRAPHY Cristian is a Software Developer at the BullGuard Antivirus Team. Since he was eager to learn new ..
0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS