Intelligent Defence

  • Call for Papers Now Closed

    Infosecurity Intelligent Defence 2017 will feature in-depth technical research sessions and we want to hear about your new research projects.

    Deadline for Submissions: Thursday 15th December 2016

     

    About Infosecurity Intelligent Defence

    Who can submit?

    Anyone can submit their research to be considered for inclusion on the programme.

    How are successful submissions selected?

    Submissions will be reviewed by the Infosecurity Intelligent Defence 2017 Advisory Council comprising a distinguished panel of information security professionals, well known for their expertise and thought leadership.

    Terms and conditions of submitting/speaking

  • Key dates and deadlines at a glance

    • Call for papers open: Tuesday 18th October
    • Call for papers deadline: Thursday 15th December
    • Successful and unsuccessful submissions notified: Mid February 2017
    • Programme published: Week commencing 27 February 2017
  • Submission guidelines

    • Who can submit a proposal?

      The call for research is open to everyone and there is no charge to speak at the event. The event is strictly vendor neutral and is a forum for the open sharing of research, tools and techniques.

      Please note:

      • The submission must be made by the speaker(s). Submissions by PR agencies or other third parties on behalf of a speaker will not be accepted.
      • Any sales or product related presentations such as product demos will not be considered.
    • When do the Infosecurity Intelligent Defence sessions take place?

      They take place on Tuesday 6 June at Olympia London during Infosecurity Europe 2017.

    • Are you looking for any specific topic areas for submissions?

      We are looking for a wide range of topics, including those below. Please note this is by no means an exhaustive list but is intending to provide guidance.

      • New risks, vulnerabilities and exploits
      • Network security
      • Application security
      • Securing CNI
      • Cyber physical
      • Cloud security
      • IoT
      • Digital forensics
      • Encryption
      • Mobile security
      • Reverse engineering
      • Malware analysis
      • Defensive tools and techniques
      • Governance
      • Incident response and management
      • Vulnerability management
    • What is the Advisory Council looking for?

      The Advisory Council is looking for unique and original content. Presentations that highlight new vulnerabilities and exploits will be particularly appealing to the Advisory Council. Please do not reuse previous conference presentations and let us know if the content has been presented before and where. If the content has been presented before please let us know how the Infosecurity Intelligent Defence 2017 presentation will be different. Preference will be given to material that has not been presented before, however updates on earlier research are acceptable.

    • How long are the sessions?

      Each session is 50 minutes long to enable a deep-dive into the technical research/topic. This will include 40-45 minutes for the presentation and 5-10 minutes for the Q&A.

    • Can I make more than one submission?

      Yes, there is no limit on the numberof submissions you can make.

    • What must the presentation include?

      The presentation must include original research and concrete guidelines and best practices to protect against and mitigate the effects of any exploit that is revealed.

    • What do I need to include in my submission?

      You must include all required information in your submission in order to be considered. The submission must include the following:

      • Title of presentation
      • Presentation abstract: 300 words describing the proposed presentation and what will be covered
      • Presentation synopsis: A shorter summary of the session that will be used in all promotional material if your submission is accepted.
      • Clear learning outcomes for the audience: This should include best practices to mitigate the effects of the vulnerability or exploit. Clearly explain what the audience will gain by attending your presentation.
      • Details of if and when this research has been published/presented elsewhere and how your Intelligent Defence presentation will be different
      • An outline of your presentation and how you will navigate through the 60 minutes. Explain why the presentation is new, interesting and appropriate for the conference.
    • Can you explain the review and selection process?

      The Advisory Council will review all submissions and create shortlist. They may ask for further details of your presentation if it is shortlisted. The final selection will then be made.

    • How will I know that you have received my submission?

      You will receive an automated email notification that your submission has been received.

    • How will I know whether my submission has been successful?

      All submitters will be emailed to let them know whether they have been successful or unsuccessful in their submission. This notification will be sent out during the week commencing 6 February 2017.

    • If my submission is accepted, can I request a specific timeslot for my talk?

      The schedule will be decided by the Advisory Council based on flow of the day, so you will need to ensure that you are available all day. Once a slot has been confirmed and allocated we are unable to change this.

    • Once I’ve made my submission, can I amend it before the deadline?

      No, you cannot amend your submission once made. You can resubmit if you choose but you will need to inform the Content Executive nitka.sharma@reedexpo.co.uk so that your previous submission can be discounted.

    • When will the details of my presentation be published on the Infosecurity Intelligent Defence 2016 agenda?

      The programme will be published during the week of 27 February 2017.

    • Should I make my submission directly onto the online form?

      You are advised to produce your submission as a word document so you have a saved submission, before completing the online form, in case of any technical problems.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.