Call For Papers /Call For Trainers
The Call for Papers (CFP) and Call for Trainers (CFT) for AppSec USA 2013 is now open!
Important Dates:
CFP/CFT Open: April 1st
CFP/CFT Closes: April 30th
Acceptance Notification: May 31st
Conference Schedule Publication: June 14th
We invite all practitioners of application security and those who work or interact with all facets of application security to submit speaker and trainer proposals.
The 2013 Speaker Selection Committee consists of two components:
- Transparent Process: selections are based on a published metric system that can be found on the AppSec USA CFP page. Full bios of all the Speaker Selection Committee members are featured on our website here.
- Representation: committee members are from industry, government and media. With their diverse backgrounds, they will ensure a rigorous selection process and selection of the best speaker and trainer submissions.
Selection Committee Members
The Speaker Committee is seeking presentations and training sessions in the following subject areas:
- Web Application Security – From language talks to frameworks to exploits.
- Hardware – Including but not limited to: application bypass, hardware hacking basics, and defeating “secure” hardware.
- Physical Security – Including but not limited to: badging applications, lock picking, physical access control, physical lock forensics and long range key duplication involving software.
- Forensics – Including but not limited to: application, physical memory forensics, solid state disk forensics and network forensics.
- Infrastructure – Including but not limited to: SCADA, routing, satellite and GSM.
- Android/iPhone/Windows Mobile research
- Reverse Engineering Malware and Malware Analysis
- Rootkit Detection, Techniques, and Defenses
- Exploitation Tactics
- Cloud Security / Assessing Cloud Security
- Legal Issues around EULA and related topics
- Industry Panels
Acceptance Process
1) All submissions will be saved in a database
2) The Speaker Selection Committee will screen the submissions to ensure they achieve a minimum score of 10
3) Incomplete submissions will be sent back to the trainer/speaker with guidance on how to amend and enhance their proposal.
4) Submissions receiving a minimum score of 10 will be reviewed by the Speaker Selection Committee
Criteria |
Points |
Presentation related to an OWASP Project or activity (i.e. tool release) | 3 Points |
Relevance to industry trends (i.e. latest hacks, exploits etc.) | 3 Points |
Presentation is vendor neutral and OWASP branded | 2 Points |
Presentation includes a live demo | 2 Points |
Max 2 minute youtube video overview about your talk | 2 Points |
Submission includes link to recording of previous presenter performance | 1 Point |
Defined terms or acronyms throughout presentation for the average user | 1 Point |
For Speakers: Presentation duration is 40-50 minutes | 1 Point |
For Trainers: Session will take 2 full days. | 1 Point |
Previous Experience Training/Speaking at security conferences | 1 Point |
Complete speaker or trainer submission | 1 Point |