The events of the co-organizers are known for practical value for all persons engaged in cyber security, either in incident management, operations, product security, threat intelligence, information sharing or other required functions and services. Leading practitioners, researchers as well as scientist and managers will provide insights and present lessons learned. All in all providing great opportunities to learn or to start active collaborations and new projects.
We also invite original contributions as research papers, tutorials/workshops, panels, demonstrations, or posters!
What we are looking for are leading-edge experiences, deep research, challenging discoveries, working solutions, and established best practices applicable for single teams, communities and on global scale. We also invite fresh ideas and challenges presented to the global community for further discussion and consideration. What we look for are perspectives that should have an impact for the work of CSIRTs, ISACs, PSIRTs, SOCs, or other security teams.
We regard the audience as experts from the field, either technical or managerial, although they might be new to some area of response to cyber threats.
Therefore, introductory presentations on routine topics such as how cryptography or intrusion detection systems work, the need for a CSIRT for a particular well-understood constituency, or the basic plans necessary to establish a new team are probably not appropriate. This is not the objective of this conference. However as explained above we would consider new attacks on cryptography, new IDS evasion techniques or the need for a new type of incident response team not heard of before.
And before we forget:
NO SALES OR MARKETING PRESENTATIONS!