Hackation 2024 | Call for Presentations

Our Call for Presentations (CFP) is now closed. Thank you everyone who submitted a proposal.
**Who Should Submit?**
This is a chance to share about that thing you are really good at, just getting started with, or are excited to share experiences about. Looking for ‘The Next Big Thing’ takes all kinds, so that means you. Yes YOU. The person reading this. If you find yourself here and aren’t sure if you should submit, that’s a definite sign that we want to help you get your start.
Presenters are expected to bring their own devices, although it may be possible to work with those who only are able to bring slide decks. A limited range of adapters may be available, but better to plan to bring your own, just in case.
The more information you share ahead of time the more we have to base our selections on. The submission deadline is June 15, 2024.
SWFLSec and Hackation 2024 do not provide honorariums or travel assistance for speakers. We apologize if this impacts your ability to present.
Relevant topics may include but are not limited to:
-
Blue team skills
-
Red team skills
-
AI/ML security topics
-
System security
-
Operating systems security
-
Web security
-
Mobile systems security
-
Distributed systems security
-
Cloud computing security
-
-
Network security
-
Intrusion and anomaly detection and prevention
-
Network infrastructure security
-
Denial-of-service attacks and countermeasures
-
Wireless security
-
-
Security analysis
-
Malware analysis
-
Analysis of network and security protocols
-
Attacks with novel insights, techniques, or results
-
Forensics and diagnostics for security
-
Automated security analysis of hardware designs and implementation
-
Automated security analysis of source code and binaries
-
Program analysis
-
-
Privacy-enhancing technologies and anonymity
-
SDR and RF-related security topics
-
Space security topics (i.e. satellites, ground stations, etc)
-
Hardware security
-
Secure computer architectures
-
Embedded systems security
-
Methods for detection of malicious or counterfeit hardware
-
Side channels
-
