This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

AppSec Israel 2016 CFP

From OWASP
Jump to: navigation, search

The annual OWASP AppSec Israel Conference will take place this year on Monday, September 19th, 2016. The conference will be held this year in The College of Management (Michlala l’Minhal), in Rishon LeZion.

OWASP AppSec Israel is the largest conference in Israel for application security, and regularly draws hundreds of participants. Last year more than 550 attended, this year we expect well over 600 – a great chance to present in front of a large audience of professionals!


Call For Presentations

In order to ensure fascinating lectures as every year, we are opening a Call for Presentations and anyone is invited to submit a proposal for a presentation. (See below for link to submission form.)

We would like to emphasize that we usually receive many more proposals than the number of slots we have for lectures at the conference. We apologize in advance that we cannot include all worthy proposals. However, this should not discourage anyone from submitting! It is important to the conference committee to have a variety of diverse speakers, and even if you've never done this before we will ensure that you have the support needed to give a great talk.

Please email Erez Metula for any issues or to discuss. (Don't email proposals to him, though, see below for link to submission form.)


Dates and Deadlines

  • Submission deadline: July 30, 2016
  • Notification of acceptance: August 15, 2016
  • Publication of agenda: August 18, 2016
  • Final materials due for review: September 12, 2016
  • Conference proceedings: September 19, 2016

Please make sure to submit your proposal before the deadline, to allow us enough time to review all the proposals and select the best ones, and still notify everybody with enough time. Only submissions entered into this form will be considered. In order to ensure that we can give serious consideration to the content of the lecture, please make sure your submission is as complete and specific as possible.

Tracks

The Conference will include 2 lecture tracks. The division of these tracks will be decided based on submissions. In previous years it was divided either according to more technical / less technical slant, or mostly aligned with OWASP's Builders / Breakers / Defenders nomenclature:

  1. Builders
    Targeting developers, testers, and managers involved in the secure software development lifecycle.
  2. Breakers
    Focusing on matters relevant to penetration testers, researchers, and other security professionals.
  3. Defenders
    Emphasizing operations issues affecting infrastructure security teams, administrators, support, etc.
  4. Policy and Legal
    Addressing privacy, compliance, and legal issues affecting development and security communities.


Topics of Interest

In general, there is no restriction on the subject of the talks, as long as the topic is related to Application Security (not necessarily Web). We will not accept any talks regarding other aspects of Security, that are not applicative in nature. Talks at any technical level can be accepted.

We especially appreciate talks from security folk in large organizations ("security consumers") who can share different Case Studies from the field.

Specifically, the topics we look for include, but are not limited to, the following subject areas:

  • Secure development: secure coding, static analysis, application threat modelling, web frameworks security, countermeasures, SDLC, DevOps, etc.
  • Mobile security: Development and/or testing devices and the mobile web
  • Cloud security: Offensive and defensive considerations for cloud-based web applications
  • Infrastructure security: Database security, VoIP, hardware, identity management
  • Penetration testing: Methodologies, tools, exploit development, evasion techniques, OSINT, etc.
  • Emerging web technologies and associated security considerations
  • Applied Cryptography: Relevant research, new models, algorithm usage, interesting attacks, and other applications.
  • Incident response: Threat detection, triage, malware analysis, forensics, rootkit detection
  • OWASP tools and projects in practice
  • Policy and legal: Legislation, privacy, regulations and compliance, C-level considerations, etc.
  • Cool hacks and other fun stuff: cryptography, social engineering, etc.


Submission

Please use this form to submit your proposal.

Only submissions entered into this form will be considered.

All OWASP speakers are required to abide by the Speaker Agreement. Submitting to the CFP will be considered implicit agreement to the OWASP Speaker Agreement, please make sure to read carefully.

If you have any issues or need to discuss this with a committee member, please email Erez Metula. (Please do not email him proposals, though, only via the submission form.)