Call for Papers

Call For Papers (CFP) is open until August 26th! Go Submit!

In true Security B-Sides (BSides) form, BSides Wellington is a community security conference. What better way to pay tribute to that community than inviting consultants, hackers, hobbyists, academics, students, and public-sector type folks to a conference hall to share their ideas, experiences and knowledge?

All submissions will be reviewed by our CFP review board. We will be accepting talks in 2 rounds. So, if you have something to say, submit your talk now because the second round will be a little less flexible in terms of time/format/topics.

Topics & Format

We want BSides Wellington 2017 to be an inclusive and diverse conference, both in terms of its participants and content. We are interested in talks covering all aspects of security.

Here are a few ideas of talks or workshops just to get the brain juice flowing Keep in mind these are just examples – not a complete list. We are interested in all talks related to security:

  • How to establish an effective security culture
  • Security as a business risk management discipline
  • Effective trade-off with management on business and security decisions
  • Effectively communicating security to the business
  • Establishing an effective security awareness programme
  • Delivering effective security on a small, shoe string budget
  • Formal ‘cybersecurity’ training and the security skills shortage
  • Delivering security outcomes without a dedicated security team
  • Relationship between security and compliance
  • How security does not equal privacy
  • Improving diversity and inclusivity in security teams
  • Benefits of building diverse and inclusive security teams
  • Security for Small to Medium-sized Businesses
  • How contempt culture affects security
  • True cost of security issues and failures
  • Mental health in the security community
  • Drinking culture in the security community
  • Better UX/user experience design to improve security outcomes
  • How DevOps/DevSecOps culture and practices can improve security
  • Infrastructure as Code and automating infrastructure to improve security
  • Benefits and challenges of Enterprise Security Architecture
  • Effective Identity and Access Management processes and tools
  • Secure development practices
  • Innovative approaches to solving old security problems
  • Security benefits and challenges of cloud computing
  • Practical threat modelling techniques
  • Practical security metrics and using data to identify what actually works
  • Reducing complexity and technical debt to improve security
  • Effective, pragmatic and sustainable defensive security strategies and tools
  • Using security metrics to inform risk analysis, identify priorities and measure progress
  • Using machine learning to improve security
  • Using big data and data visualisation to improve incident detection and response
  • Effective security incident management and response
  • Lessons learned from security incidents
  • Zero trust networking/the death of the network perimeter
  • Evolution and history of physical security
  • Using and defending against Open Source Intelligence (OSINT) techniques
  • Demonstrating penetration testing tools and techniques
  • Threat modelling and OpSec techniques for high-risk people
  • Focused research into the security of cars, medical devices, smart toys, Internet of Things (IoT), web applications, cloud services, hardware, etc.

Length

When you submit, you can decide on your talk length. We are happy to support anything from a 10-minute lightning talk through to a 60-minute demonstration or talk. In addition to this, we are also interested in submissions for 60-minute to 3-hour workshops.

Diversity and Inclusivity

We are committed to promoting diversity and inclusivity in the security community. We are particularly keen to receive submissions from women, LGBTQI, people of colour, younger, older, financially less resourced, and other groups who are underrepresented in the security and wider tech industry. We believe that information security outcomes are significantly improved when we are inclusive and listen to the ideas, experiences and knowledge from as diverse group of people as possible.

If you are a representative of such a group and need financial assistance to present at BSides Wellington then please let us know.

Mentoring

Is this your first time speaking? Are you thinking of giving a talk? Or maybe you want a bit of feedback on your presentation? Are you not sure if your idea would make a good presentation? or do you just have a question?

Then reach out to us at [email protected] and we will try to pair you up with a mentor to help form your idea or submission and polish your presentation with more cat gifs (please note talks advocating for soft “g” in the pronunciation of gif will not be accepted).

Tips for Submitting a Successful CFP

Following these tips will help us understand why we should select your presentation for BSides Wellington 2017.

  • Give your proposal a simple and straightforward title.
  • Ensure that your talk is authentic, your peers will want original ideas, real-world scenarios, relevant examples or to learn something cool.
  • Include as much detail about the presentation as possible.
  • Explain why people will want to attend your talk and what they’ll take away from it.
  • Keep your proposal free of marketing, sales, buzzwords, jargon and Fear Uncertainty and Doubt (FUD).
  • Limit the scope of your talk and ensure that you cover the interesting idea, concept, technique or finding in the presentation time you have selected.
  • If you only have enough material to present for 30 minutes, please don’t propose a 60-minute talk and then stretch your material to fill time.

We are not accepting any vendor pitches or corporate cheerleading talks. You are welcome to talk briefly about what your company does, or use corporate slides. However, your talk must focus on sharing your ideas, experience and knowledge with the community, and not selling products and services.

Our code of conduct applies to all speakers, and we will not hesitate to blast “Flight of the Bumblebee” and usher you off stage if necessary. If you made it this far through reading, go ahead and submit!

Go Submit!