Use Key Content for your Key Notes
There is some discussion about certain key note talks in the blogosphere and on mailing lists. Apparently there has been too much mentioning of mayhem and company ads lately. We will judge about this as soon as we have watched the video recordings of these talks. Until we have done that we’d like to point out that all our key note presentations go through the same Call for Papers mechanism as the „regular“ talks. This is true for DeepINTEL and DeepSec alike. It has also been true for all past DeepSec conferences.
While we don’t mind provocative content, we still like our speakers to present high quality content. Paid content on the contrary is not always of high quality. As soon as you enter the realm of sponsored talks you’ll suddenly realise that presentations morph into screen plays of your favourite security soap opera. We are going to die, no doubt about it, but Ebola turning digital might not be the cause. Hard facts and solid research with verified arguments can be entertaining and illuminating, too. Presentations featuring this content have more impact by far. This property can be applied to key notes. There’s nothing wrong with some speculation every once in a while. Security research is all about creative ways to breaks stolen eggs for your own omelette and finding ways to avoid it (pardon the bad analogy). However please don’t forget to back your claims properly. If you call yourself a security researcher, then don’t forget the bit about the research (you know, the part about arguments, references and proofs).