Call For Papers /Call For Trainers

The Call for Papers (CFP) and Call for Trainers (CFT) for AppSec USA 2013 is now open!

Important Dates:

CFP/CFT Open: April 1st
CFP/CFT Closes: April 30th
Acceptance Notification: May 31st
Conference Schedule Publication: June 14th

We invite all practitioners of application security and those who work or interact with all facets of application security to submit speaker and trainer proposals.

The 2013 Speaker Selection Committee consists of two components:

  • Transparent Process: selections are based on a published metric system that can be found on the AppSec USA CFP page. Full bios of all the Speaker Selection Committee members are featured on our website here.
  • Representation: committee members are from industry, government and media. With their diverse backgrounds, they will ensure a rigorous selection process and selection of the best speaker and trainer submissions.

 Selection Committee Members

israel-bryskiIsrael Bryski 
Vice President
TD Securities
pravir-chandraPravir Chandra
Security Architect
Bloomberg
kevin-greeneKevin Greene 
Software Assurance Program Manager
DHS S&T
joan-goodchild
Joan Goodchild
Executive Editor
CSO Magazine and Online

matt-joyce

Matt Joyce
Cloud Operations Engineer
Cloudscaling

ben-rothkeBen Rothke
Manager
Wyndham Worldwide
james-landisJames Landis
Senior Manager
Ebay
robert-martinRobert Martin
Principal Engineer
MITRE
hans-zaunereHans Zaunere
Managing Member
Stackware
guestName Withheld
Technology Risk Management
Large Bank

The Speaker Committee is seeking presentations and training sessions in the following subject areas:

  • Web Application Security – From language talks to frameworks to exploits.
  • Hardware – Including but not limited to: application bypass, hardware hacking basics, and defeating “secure” hardware.
  • Physical Security – Including but not limited to: badging applications, lock picking, physical access control, physical lock forensics and long range key duplication involving software.
  • Forensics – Including but not limited to: application, physical memory forensics, solid state disk forensics and network forensics.
  • Infrastructure – Including but not limited to: SCADA, routing, satellite and GSM.
  • Android/iPhone/Windows Mobile research
  • Reverse Engineering Malware and Malware Analysis
  • Rootkit Detection, Techniques, and Defenses
  • Exploitation Tactics
  • Cloud Security / Assessing Cloud Security
  • Legal Issues around EULA and related topics
  • Industry Panels

Acceptance Process

1)    All submissions will be saved in a database
2)    The Speaker Selection Committee will screen the submissions to ensure they achieve a minimum score of 10
3)    Incomplete submissions will be sent back to the trainer/speaker with guidance on how to amend and enhance their proposal.
4)    Submissions receiving a minimum score of 10 will be reviewed by the Speaker Selection Committee

Criteria

Points

Presentation related to an OWASP Project or activity (i.e. tool release) 3 Points
Relevance to industry trends (i.e. latest hacks, exploits etc.) 3 Points
Presentation is vendor neutral and OWASP branded 2 Points
Presentation includes a live demo 2 Points
Max 2 minute youtube video overview about your talk 2 Points
Submission includes link to recording of previous presenter performance 1 Point
Defined terms or acronyms throughout presentation for the average user 1 Point
For Speakers: Presentation duration is 40-50 minutes 1 Point
For Trainers: Session will take 2 full days. 1 Point
Previous Experience Training/Speaking at security conferences 1 Point
Complete speaker or trainer submission 1 Point

 

Submit Your Speaker Proposal

 

Submit Your Trainer Proposal