Pages

2015/05/12

【HITCON 2015 Enterprise Call For Papers】


Succeeding HITCON X, the 10th annivarsary of the Hacks in Taiwan Conference (HITCON), this year’s HITCON will continue with the Training and Enterprise events that was introduced last year, and will be a six day event being held from 24th Aug to 29th Aug. There will be three components in this year’s HITCON: The HITCON Training, a workshop type conference. The HITCON Enterprise, an event aimed at the enterprises and government sectors, similiar to the BlackHat Briefings. The HITCON Community, the rename and continuation of the classical HITCON event, and is similar to DEFCON.

HITCON Enterprise will be held in Sheraton Taipei, and is a conference for representatives from international corporations in informational security industry, IT department managers and personels from businesses, engineers, researchers and analysts working in the information security field, and everyone interested in information security. The following are the Call For Paper details:

Call for Papers topics:

There are four featuring topics in HITCON Enterprise 2015:
Security of Things: Security of Thigs is an extension of Internet of Things (IoT). As the IoT industry experiencing intense growth, and will likely be all around us in the future, deeply intertwined with our lives, its security is not something that we can ignore. Convience almost always brought about insecurities, and while expecting the convience brought by IoT, can it really protect our privacy?

Cyber Threat Intelligence: The topic of Cyber Threat Intelligence is getting popular recently, but what exactly is Cyber Threat Intelligence? As it is gaining significance everyday, we should discuss why it matters and how is it applicable to enterprises. Furthermore, discuss how Cyber Threat Intelligence can be used to properly identify the threat when under attack, and thus react and respond appropriately, in order to reduce the losses caused by these attacks.

Cyber Security Crisis Management: There’s no lack of encounters with hackers whether is life or in corporate environment, however, should a cyber security crisis arises, how should we respond to it? Are there any case studies that can be discussed?

Training of Information Security Personnels: How should information security professionals be cultivated from the government standpoint, and how should information security awareness be blended into education? What are the ways of recruiting and locating information security talents for corporations?

Aside from the 4 topics above, we are also interested in other information security topics, including but not limited to:

Advanced Malware Analysis, Security Incident Detection, Network Monitoring, Mobile Devices Security, Intelligence Collection and Analysis, Mobile Apps Security, Wireless Device Security, Information Security Policies and management, Cloud Security, Protection of Basic Infrastructure, Laws and Regulations regarding Inforamtion Security.


Submission Format, Procedures and Other Considerations:

The presentation format is 40 to 50 minutes of speech and it is preferred that the presentations covers actual implementation techniques and technologies.

For those intending to submit their paper, please apply for an account at the call for papers website ( https://cfp2015.hitcon.org ) and upload the paper before July 5th.

Submissions will be reviewed on a rolling basis. The review committee reserves the right to end the call for papers before the dealine if quota is met.

For more informations on the terms and remunerations for accepted papers, please refer to our Terms and Conditions document on the HITCON CFP website.

Important Dates:

Call for papers :2015 / 5 / 12 ~ 2015 / 7 / 5
HITCON Training:2015 / 8/ 24 - 2015 / 8 / 25
HITCON Enterprise:2015 / 8 / 26 - 2015 / 8 / 27
HITCON Community:2015 / 8 / 28 - 2015 / 8 / 29

No comments:

Post a Comment