The Call for Papers of DeepSec 2015 is open! We are looking for your presentation and your in-depth training to add to our schedule. There has been a lot of activity in the past six months with regards to information security. Given the cultural and political impact of vulnerable code there are ample topics to talk about and to teach.
Cryptography has its place in the limelight since the high impact but with a cute logo. Getting cryptography right has been the problem of developers and academics since decades. Now everyone knows about it. So if you have some research on encryption, authentication, and secure communication in general, send us your thoughts along with your submission.
Protecting your infrastructure is harder than ever before. Once upon a time only your servers and classic clients used the network. Now your telephone, your refrigerator, air conditioning, the light bulbs in the office, coffee machines, door bells, and many devices have network access too. The Internet of Things (IoT) is slowly taking shape. IoT won’t disappear, so you have to adapt. How does this change your information technology architecture? Share your thoughts on this matter with the DeepSec audience.
Are you afraid of the digital age? Do you fear getting your data stolen? Germany may switch back to the good old typewriters to protect data from high-tech espionage. What do you do? How do you prevent spies from using your network and your systems as a drive-through? Let us know.
Software developers and security researcher have left the Golden Age of Science behind. Involuntarily. Now everything bit we do is literally being categorised as „cyber war“. There’s the current debate about the handling of 0days by the Wassenaar Arrangement impacts the IT security industry and academic research. The question is: Will the Internet kill you or will the Internet kill your research? We are used to publish security vulnerabilities and to talk openly about them. This has changed, and this change is reflected in current policies and laws. We like to hear your ideas about this matter.
Speaking of policies and laws, we also need to look into this direction. Information security has always been a very interdisciplinary field. Now it reaches far into politics, military, aspects of society, and culture. If you have facts about the interaction between infosec and the rest of our world(s), you should consider presenting at DeepSec in November.
We all put a varying degree of trust in devices, network, software, hardware, and algorithms. Have you ever questioned the way we handle trust in a digital world? Of course you can always go with your gut feeling, but this is probably not what you want when it comes to important decisions. We have entered a research project to take the trust in technology apart and put it back together. In case you have some opinions on this matter that can be turned into a submission for DeepSec 2015, let us know.
When everything fails, you can always use forensics. The pathologist knows what went wrong. Sometimes we have no other means to improve but to learn about what we should have done. The same is true for the digital age. If you are into IT forensics, we like to hear about what you have seen and what methods work best.
If you have questions, don’t hesitate to get into contact. We are looking forward to receive your submissions for DeepSec 2015 as soon as possible!