Geek Street Call for Papers

  • Geek Street Call for Papers - Deadline extended to Thursday 1st March

    Do you have new, independent information security research that you would like to reveal in June 2018?

  • Geek Street is an exciting new feature for Infosecurity Europe 2018, which will consist of in-depth, independent technical research sessions and immersive, hands on experiences. Therefore we want to hear from you!

    We are looking for independent research for these sessions. If you have research that you want considered for inclusion on the programme make your submission below. Please note there are a limited number of sessions to be filled.

    The submissions will be reviewed by the Geek Street review panel; a distinguished panel of information security professionals, well known for their expertise and thought leadership.

    Click here to read the Geek Street Call for Papers Terms and Conditions


  • Key dates & deadlines

    C4P opens: Tuesday 30th January
    C4P deadline: Thursday 1st March
    Successful and unsuccessful submissions notified: w/c 19th March
    Programme published: w/c 26th March

  • Submission FAQs

    Who can submit a proposal?

    The call for papers is open to everyone and there is no charge to speak at the event. The event is strictly vendor neutral and is a forum for the open sharing of research, tools and techniques.

    Please note:

    • The submission must be made by the speaker/s. Submissions by PR agencies or other third parties on behalf of a speaker will not be accepted
    • Any sales or product related presentations such as product demos will not be considered

    When do the Geek Street sessions take place?

    They take place on 5-7th June 2018 at Olympia London during Infosecurity Europe 2018.

    How long are the sessions?

    Each session is 60 minutes long to enable a deep-dive into the technical research/topic. This will include 45-50 minutes for the presentation and 5-10 minutes for Q&A.

    Can I make more than one submission?

    Yes, there is no limit on the number of submissions you can make.

    What is the review panel looking for?

    The review panel is looking for unique and original content. Presentations that highlight new vulnerabilities and exploits will be particularly appealing to the review panel. Please do not reuse previous conference presentations and let us know if the content has been presented before and where. If the content has been presented before please let us know how the Infosecurity Geek Street presentation will be different. Preference will be given to material that has not been presented before, however updates on earlier research are acceptable.

    What must the presentation include?

    The presentation must include original research and concrete guidelines and best practices to protect against and mitigate the effects of any exploit that is revealed.

    What do I need to include in my submission?

    You must include all required information in your submission in order to be considered. The submission must include the following

    • Title of presentation
    • Presentation abstract: 300 words describing the proposed presentation and what will be covered
    • Presentation synopsis: A shorter summary of the session that will be used in all promotional material if your submission is accepted
    • Five learning outcomes for the audience: This should include best practices to mitigate the effects of the vulnerability or exploit. Clearly explain what the audience will gain by attending your presentation
    • Details of if and when this research has been published/presented elsewhere and how your Geek Street presentation will be different
    • An outline of your presentation and how you will navigate through the 60 minutes. Explain why the presentation is new, interesting and appropriate for the conference

    Once I’ve made my submission, can I amend it before the deadline?

    No, you cannot amend your submission once made. You can resubmit if you choose but you will need to inform the Content Executive, so that your previous submission can be discounted.

    Can you explain the review and selection process?

    The review panel will evaluate all submissions and create a shortlist. They may ask for further details of your presentation if it is shortlisted. The final selection will then be made.

    How will I know you’ve received my submission?

    You will receive an automated email notification that your submission has been received.

    How will I know whether my submission has been successful?

    All submitters will be emailed to let them know whether they have been successful or unsuccessful in their submission. This notification will be sent out during the week commencing 19th March 2018.

    When will the details of my presentation be published on the Geek Street agenda?

    The programme will be published during the week of 26 March 2018.

    If my submission is accepted, can I request a specific timeslot for my talk?

    The schedule will be decided by the Advisory Council based on flow of the day, so you will need to ensure that you are available all day.

    Are you looking for any specific topic areas for submissions?

    We are looking for a wide range of topics, including those below. Please note this is by no means an exhaustive list but is intended to provide guidance.

    • New risks, vulnerabilities and exploits
    • Network security
    • Application security
    • Securing CNI
    • Cyber physical
    • Cloud security
    • IoT
    • Digital forensics
    • Encryption
    • Mobile security
    • Reverse engineering
    • Malware analysis
    • Defensive tools and techniques
    • Incident response and management
    • Vulnerability management

    Should I make my submission directly onto the online form?

    You are advised to produce your submission as a word document so you have a saved submission, before completing the online form, in case of any technical problems.

  • Questions on Geek Street?

    Please contact our Content Executive, Hannah Brewer.

    Email Hannah

    Conference Programme

    See what else is on at Infosecurity Europe 2018

    Conference Programme

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.