Cisco Blogs


Cisco Blog > Security

Call for Speakers – FIRST Security Conference 2011, Vienna

Cisco has had a long history of supporting the Forum of Incident Response Teams (FIRST), as members in the organization, as chairs of various programs, steering committee members, and conference organizers. Cisco has also been providing the network for the global conference for many years. This year I am chairing the conference that will be held in Vienna on June 12-17, 2011. To that end, I am asking for some good security presentations for this year’s conference. We already have some great submissions from Interpol, Kapersky ENISA, etc. As chair I would really like to differentiate the conference with presentations based on real-world cybercrime defense. As we look back we see how rapidly the environment has changed over the past 10 years, starting to bring focus on upcoming changes on the horizon with things like borderless networks, externalization of services, and cloud. And then, further, combine that with the increasing monetization and militarization of cyber threats. FIRST would like to take a close look at the protections and responses of the past, and whether they will be up to the challenge or part of the problem. I talk more about the theme and the conference in this short podcast.

If you have something you would like to share with the security community please read below and contact us using the Speakers Submission Form.

The following is a copy of the Call For Speakers letter:

The Forum of Incident Response and Security Teams (FIRST.Org) is issuing a Call for Speakers (CFS) for the 23rd Annual FIRST Conference to be held in Vienna, Austria, 12-17th June 2011.

The 2011 Program will have three tracks focusing on Management, Incident Response and Technical topics relevant to computer security teams and practitioners.

The FIRST program committee solicits original contributions for this conference, which are broadly based on the theme of Security Lessons: What Can History Teach Us?

All submissions must reflect original work and must adequately document any overlap with previously published or simultaneously submitted presentations or papers from any of the authors. If authors have any doubts regarding whether such overlap exists, they should contact the Program Chair prior to submission.

Presentations Timeslots are available in two lengths:

a.) 30 Minutes, which includes 10 minutes of Q&A
b.) 60 Minutes, which includes 10 minutes of Q&A

There will be no presentations with the aim of gaining the audience’s interest in any commercial application or product, in other words: NO MARKETING PRESENTATIONS. We are especially interested in presentations that trace real cybercrime through detection to action. We would also like to see case studies focusing on incidents/issues that did not conclude ideally and that lead to learning experiences. Lastly, we are interested in presentations focusing on the monetization of cybercrime.

Topics of interest include, but not limited to:

  • Cybercrime Case Studies
  • Mobile Threats & Technologies
  • Video
  • The Cloud -- tech releases & case studies
  • DNS Security
  • Targeted Attacks -- specifically real world defenses & APT response
  • Incident Response & Management -- best practices
  • Errors in Response
  • IPv6
  • Appliance Security
  • Tools & Standards
  • ID Theft, Banks & Regulations in the Finance World
  • NetFlow in Security & Incident Response
  • Protecting global events like the World Cup, elections, major conferences
  • Emerging Technologies
  • Voice/VoIP, including infrastructures (e.g. SS7+IP)
  • Social Media Threats & Security
  • Route Security
  • Rogue Networks & Criminal Network Services
  • The Malware Ecosystem
  • Underground Economy

All submissions must be in English and can be submitted via the Presentation Management Site starting 1st September 2010. You may also upload your submissions via the Presentation Management Site in MS Office, OpenOffice or PDF format. Please be sure to include a 1-2 paragraph biography.

Process of Selection

All submissions will be handled through the Presentation Management Site starting 1st September 2010, available at: https://reg.first.org/papers/presenter.

The Program Committee will evaluate all submissions based on quality and relevance. All accepted submissions are held in confidence for publication until after the conference. When you submit please ensure there is enough material for us to make a good determination as to content.

Submissions received after 10 December 2010 will not be considered. Where employer, client or government authorization is needed, it is the responsibility of the author(s) to obtain such authorization prior to submitting final materials.

Accepted speaker submissions shall be presented by their author(s). After the conference, the presentations will be published on the FIRST website and archived in the FIRST Security Library.

Speaker Privileges

A discount off the conference fee(s) will be offered to each accepted presentation.

Important Upcoming Dates:

1st September 2010 -- Publication of Call for Speakers
10th December 2010 -- Submission Deadline
1st February 2011 -- Notice of Acceptance
3rd June 2011 -- Final Submissions Due
12-17th June 2011 -- 23rd Annual FIRST Conference at the Hilton Vienna

Questions?

If you have any questions about the conference submission process, or require more information, please send your query to first-2011chair@first.org.

Hope to see you in Vienna!

Best regards,
Gavin Reid

FIRST 2011 Program Chair
FIRST.Org, Inc.

Tags: , , , ,

Comments Are Closed