Call for Papers

in 86 days

BSides Kraków 2024

event date

14 Sep 2024

location

Wydział Informatyki, AGH, D-17 Kraków, Poland

website

bsideskrakow.pl


BSides events combine security expertise from a variety of platforms in search of the “next big thing” in information security. BSides is an open platform that gives security experts and industry professionals the opportunity so share ideas, insights, and develop longstanding relationships with others in the community. It is a rare opportunity to directly connect and create trusted relationships with key members of the community.

open, 42 days left
Call for Papers
Call opens at 12:00 AM

04 Sep 2023

Call closes at 11:59 PM

31 Jul 2024

Call closes in Central European Daylight Time (UTC+02:00) timezone.
Closing time in your timezone () is .

You are required to submit the:

Title/abstract for your talk/workshop

I. Talk/Workshop/Training Submission Guidelines

> Talks will need to be up to 60 minutes long. (Recommended 45m presentation + 15m for Q&A)

Provide the Title and a descriptive Abstract of what you are presenting. Keep it short and to the point (up to 150 words). Please respect the limits!

> Workshops/Trainings can last all day.

Provide the Title and a descriptive Abstract of what you are presenting. Keep it short and to the point (up to 200 words). Please respect the limits!

NOTE:

The conference will be held in English ONLY.

All submissions - abstracts and workshops MUST be in English.

If more than one speaker will be presenting, then please include the details (name, Twitter, photos, etc.) for each one in your submission.

If you want to give a rookie or lightning talk, then contact our CFP email (contact@bsideskrakow.pl) for more info.

IMPORTANT:

We do not accept product or vendor-related pitches. We are a vendor-neutral conference and any sponsorships received are under the agreement of supporting the Security BSides Kraków initiative, by making it available to the security community. If your presentation involves an advertisement for a new product or service your company is offering, please do not submit it. In addition, we do not accept presentations submitted by third parties including (but not limited to) company representatives, management bureaus, etc. Security BSides Kraków presentations should be focused on topics that are of interest to (cyber) security/technology professionals, researchers, and enthusiasts, who are paying attention to the current trends and emerging issues. We are committed to keeping Security BSides Kraków informative, educational, and entertaining to the attendees and the community.

POSTSCRIPT:

  1. If you want to submit more than one talk/workshop, use the form to submit each one separately. You may submit as many as you like.
  2. Given the fact you have a lot of time to submit your talk, take your time and prepare the best talk you can :)
  3. Don't be afraid to submit your talk, this is a community event made by and for the community, Join and enjoy!
  4. We plan to announce the acceptance of your submission by the middle of July.

Topics we would like to hear about

Preference is given to talks that are up-to-date, innovative, and provide solutions as well as insight into problems.

  • (anti)Forensics and Incident Response
  • Application Security / DevSecOps
  • Biometrics / Identity and Access Management
  • Bio Hacking
  • Cloud Security
  • Compliance / Regulations / Standards / Risk Man
  • Critical Infrastructure Security / Mission Critical Systems
  • CyberSecurity
  • Data Breaches for Stock Market Manipulation
  • Database Security
  • DDoS Extortion / Botnets / CEO Fraud / Compliance Extortion
  • Ethical Hacking / Security Projects & Tools
  • Firewalls / VPN / UTM
  • Hardware Security
  • Healthcare Security
  • Internet of Things (IoT)
  • Malware Analysis & Techniques
  • Mobile Security
  • National Security / CyberDefense
  • Network Infrastructure
  • Network Security / Monitoring
  • Offense and Exploitation
  • Open-source Intelligence (OSINT)
  • Penetration Testing
  • Physical Security
  • Privacy & Issues
  • Security Information and Event Management (SIEM)
  • Security Management
  • Transportation Hacking (Car, Bus, Airplanes, Ships, etc.)
  • Threat Intelligence
  • VoIP Security
  • Vulnerability Scanners
  • Web Application Security
  • Wireless Security


all submitted sessions

publicly listed on this page

event fee

free for speakers

Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.

36 submissions
Submitted sessions
CAT
  • The Physical Security Blind Spot
Adam Paciuszkiewicz
  • Vishing, Quishing i inne sposoby na podryw. Czyli jak się nie dać oszukać w prosty sposób.
Klaus Agnoletti
  • I’m ok, you’re ok, we’re ok: Living with AD(H)D in infosec
  • Dungeons & Dragons: The security powertool you didn’t know you needed
Mikołaj Kowalczyk
  • The Questionable State of ML(Ops) Security
Sam Macdonald
  • Dealing With Imposter Syndrome
Michal Salanci
  • Goodbye server. Refactoring an app to serverless in AWS
  • Monitor AWS network resources with Telegraf, managed by Fargate
  • Instance Store in Fargate: Efficient Main-Sidecar container communication?
  • More Network Security: Forward Proxy on AWS Network Firewall & Fargate
Abhinav singh
  • AI SecureOps: Attacking & Defending GenAI Applications and Services
cocomelonc
  • Malware, Persistence and Cryptography
  • How my cybersecurity books saved lives and how I raised over $20,000 in donations
  • Malware and Hunting for Persistence: how adversaries hacking your Windows?
Manfred Bjørlin, Pål Bendiksen
  • Advancing Azure Security: Modern Solutions for Integration Services
Manfred Bjørlin
  • AI: The Good, The Bad, and The Certainly Unregulated -s
show all submissions
Danish Tariq, Hassan Khan Yusufzai
  • Secret scanning in open source at scale (in-depth)
Fabian Kammel
  • Demystifying Confidential Computing: A Practical Introduction for Cloud Native Engineers
  • Learning from Open Source: A Developer-First Approach to Security.
Pedro Dallegrave
  • Improving security with Kubernetes
Tushar
  • SSE: The New Edge of Security
Grzegorz Kalwig
  • Mitigating Layer 7 Threats to E-commerce IAM Solution with WAF
jcchavezs
  • Web Application Firewalls Revisited
  • Fine-grained policies RBAC with OpenFGA
Paul Molin
  • From Text to Flaws: vulnerabilities in applications with Generative AI and LLMs
  • Once upon a flaw: 5 AppSec stories, and what we can learn from them
DCam
  • Ignore Previous Instructions: Embracing AI Red Teaming
Tech Over with Sumaiya
  • Developing Soft/ Transferable Skills for a sustainable Tech Career
rvrsh3ll
  • Offensive Operations Against Foreign Adversaries: Russia
Prajakta
  • Harnessing Microservices Architecture in Cloud Computing for Agile and Scalable Solutions
Mykola Kolomiiets
  • Integrating Secure SDLC into an Ongoing Project: Elevating Security from the Ground Up
Andrii Mytroshyn
  • Expanding Security Horizons: SIMD-Based Threats
Tayla Micael Sellschop
  • Chessboard of War: Breaching the perimeter on physical cyber security engagements
Noah Jelich
  • Unveiling WasmCov: Revolutionizing Test Coverage Across Wasm Ecosystems
Arun Nair
  • Red Team Infrastructure Setup and Automation
Aryan, Chetanya Kunndra
  • Playing the game of tag with modern day AV and EDRs: A guide to evading the watchdogs.