Call for Papers

BSides Kraków 2024 - T-shirt size

Call for Papers is closed. Submissions are no longer possible. Sorry.
finished 51 days ago

BSides Kraków 2024

event date

14 Sep 2024

location

Wydział Informatyki, AGH, D-17 Kraków, Poland

website

bsideskrakow.pl


BSides events combine security expertise from a variety of platforms in search of the “next big thing” in information security. BSides is an open platform that gives security experts and industry professionals the opportunity so share ideas, insights, and develop longstanding relationships with others in the community. It is a rare opportunity to directly connect and create trusted relationships with key members of the community.

finished 96 days ago
Call for Papers
Call opens at 12:00 AM

04 Sep 2023

Call closes at 11:59 AM

31 Jul 2024

Call closes in Central European Daylight Time (UTC+02:00) timezone.
Closing time in your timezone () is .

You are required to submit the:

Title/abstract for your talk/workshop

I. Talk/Workshop/Training Submission Guidelines

> Talks will need to be up to 60 minutes long. (Recommended 45m presentation + 15m for Q&A)

Provide the Title and a descriptive Abstract of what you are presenting. Keep it short and to the point (up to 150 words). Please respect the limits!

> Workshops/Trainings can last all day.

Provide the Title and a descriptive Abstract of what you are presenting. Keep it short and to the point (up to 200 words). Please respect the limits!

NOTE:

The conference will be held in English ONLY.

All submissions - abstracts and workshops MUST be in English.

If more than one speaker will be presenting, then please include the details (name, Twitter, photos, etc.) for each one in your submission.

If you want to give a rookie or lightning talk, then contact our CFP email (contact@bsideskrakow.pl) for more info.

IMPORTANT:

We do not accept product or vendor-related pitches. We are a vendor-neutral conference and any sponsorships received are under the agreement of supporting the Security BSides Kraków initiative, by making it available to the security community. If your presentation involves an advertisement for a new product or service your company is offering, please do not submit it. In addition, we do not accept presentations submitted by third parties including (but not limited to) company representatives, management bureaus, etc. Security BSides Kraków presentations should be focused on topics that are of interest to (cyber) security/technology professionals, researchers, and enthusiasts, who are paying attention to the current trends and emerging issues. We are committed to keeping Security BSides Kraków informative, educational, and entertaining to the attendees and the community.

POSTSCRIPT:

  1. If you want to submit more than one talk/workshop, use the form to submit each one separately. You may submit as many as you like.
  2. Given the fact you have a lot of time to submit your talk, take your time and prepare the best talk you can :)
  3. Don't be afraid to submit your talk, this is a community event made by and for the community, Join and enjoy!
  4. We plan to announce the acceptance of your submission by the middle of July.

Topics we would like to hear about

Preference is given to talks that are up-to-date, innovative, and provide solutions as well as insight into problems.

  • (anti)Forensics and Incident Response
  • Application Security / DevSecOps
  • Biometrics / Identity and Access Management
  • Bio Hacking
  • Cloud Security
  • Compliance / Regulations / Standards / Risk Man
  • Critical Infrastructure Security / Mission Critical Systems
  • CyberSecurity
  • Data Breaches for Stock Market Manipulation
  • Database Security
  • DDoS Extortion / Botnets / CEO Fraud / Compliance Extortion
  • Ethical Hacking / Security Projects & Tools
  • Firewalls / VPN / UTM
  • Hardware Security
  • Healthcare Security
  • Internet of Things (IoT)
  • Malware Analysis & Techniques
  • Mobile Security
  • National Security / CyberDefense
  • Network Infrastructure
  • Network Security / Monitoring
  • Offense and Exploitation
  • Open-source Intelligence (OSINT)
  • Penetration Testing
  • Physical Security
  • Privacy & Issues
  • Security Information and Event Management (SIEM)
  • Security Management
  • Transportation Hacking (Car, Bus, Airplanes, Ships, etc.)
  • Threat Intelligence
  • VoIP Security
  • Vulnerability Scanners
  • Web Application Security
  • Wireless Security


all submitted sessions

publicly listed on this page

event fee

free for speakers
65 submissions
Submitted sessions
Cássio Pereira
  • When your infrastructure becomes your enemy - an introduction to network overtake attacks
  • The magic of ASPM
Pawel Olbrycht
  • The not-ultimately-boring introduction to HIPAA compliance in web applications
Aliaksandr Rahavy, Mikayel Minasyan
  • AI in Action: Enhancing Security with LLMs Agents.
Aliaksandr Valialkin
  • Writing a TSDB from Scratch: Performance Optimization
  • Measuring Complexity in PromQL/MetricsQL Expressions
  • Developing a Monitoring Solution with Time Series Databases
  • Large-Scale Logging Made Easy
Marcelo Toran
  • Get high as a Threat Actor - Rootkits and Kernel security
Pawel Piwosz
  • AWS and SBOM - Better Together
John Strand
  • A Quick, Efficient Yet Not Entirely Sane Introduction to Deception
Aishwarya R
  • Using Generative AI for Business Success
Hpar3s
  • Biometrics RMTC: Reality, Myths, Threats & Countermeasures
Kamil Nowak
  • Leveraging Certificate Transparency Logs to Disrupt Scammers
show all submissions
Brian Vlootman
  • If you want to be a CISO, then check this first
Elliot Ward
  • Leveraging Features for Privilege Escalation in Ubuntu 24.04
Grzegorz Zagraba
  • CyberRisks in DevOps- staying ahead for cyber resilience & compliance
Abdessamad Temmar
  • Five Deadly Sins of Using OAuth for SSO
Julia Zduńczyk
  • How to Break into Organizations with Style: Hacking Access Control Systems
Shahmeer Amir
  • The Art of cyber espionage: Unleashing the power of Cyber Physical System Hacking
  • Attacking the Final Frontier: Exploring Satellite Vulnerabilities and Cyber Threats
  • Machine Learning Poisoning: How Attackers Can Manipulate AI Models for Malicious Purposes
  • Breaking Barriers: A Deep Dive into Bypassing Next-Gen 2FA and MFA Security Measures
Yoad Fekete
  • XZ Backdoor: Navigating the Complexities of Supply Chain Attacks Detected by Accident
Wojciech Ciemski
  • Digital Lures for Winnie the Pooh: How honeypots protect our data from the bears in cyberspace
Kirill Efimov
  • Don’t Make This Mistake: Painful Learnings of Applying AI in Security
Marcos Vinicius
  • Secure code training - Stop creating shit code
Dorota Kozlowska
  • Social engineering and elicitation techniques of hacking a human being.
Giorgio Perticone
  • The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts
CAT
  • The Physical Security Blind Spot
Adam Paciuszkiewicz
  • Vishing, Quishing i inne sposoby na podryw. Czyli jak się nie dać oszukać w prosty sposób.
Klaus Agnoletti
  • I’m ok, you’re ok, we’re ok: Living with AD(H)D in infosec
  • Dungeons & Dragons: The security powertool you didn’t know you needed
Mikołaj Kowalczyk
  • The Questionable State of ML(Ops) Security
Sam Macdonald
  • Dealing With Imposter Syndrome
Michal Salanci
  • Goodbye server. Refactoring an app to serverless in AWS
  • Monitor AWS network resources with Telegraf, managed by Fargate
  • Instance Store in Fargate: Efficient Main-Sidecar container communication?
  • More Network Security: Forward Proxy on AWS Network Firewall & Fargate
Abhinav singh
  • AI SecureOps: Attacking & Defending GenAI Applications and Services
cocomelonc
  • Malware, Persistence and Cryptography
  • How my cybersecurity books saved lives and how I raised over $20,000 in donations
  • Malware and Hunting for Persistence: how adversaries hacking your Windows?
Manfred Bjørlin, Pål Bendiksen
  • Advancing Azure Security: Modern Solutions for Integration Services
Manfred Bjørlin
  • AI: The Good, The Bad, and The Certainly Unregulated -s
Danish Tariq, Hassan Khan Yusufzai
  • Secret scanning in open source at scale (in-depth)
Fabian Kammel
  • Demystifying Confidential Computing: A Practical Introduction for Cloud Native Engineers
  • Learning from Open Source: A Developer-First Approach to Security.
Pedro Dallegrave
  • Improving security with Kubernetes
Tushar
  • SSE: The New Edge of Security
Grzegorz Kalwig
  • Mitigating Layer 7 Threats to E-commerce IAM Solution with WAF
jcchavezs
  • Web Application Firewalls Revisited
  • Fine-grained policies RBAC with OpenFGA
Paul Molin
  • From Text to Flaws: vulnerabilities in applications with Generative AI and LLMs
  • Once upon a flaw: 5 AppSec stories, and what we can learn from them
DCam
  • Ignore Previous Instructions: Embracing AI Red Teaming
Tech Over with Sumaiya
  • Developing Soft/ Transferable Skills for a sustainable Tech Career
rvrsh3ll
  • Offensive Operations Against Foreign Adversaries: Russia
Prajakta
  • Harnessing Microservices Architecture in Cloud Computing for Agile and Scalable Solutions
Mykola Kolomiiets
  • Integrating Secure SDLC into an Ongoing Project: Elevating Security from the Ground Up
Andrii Mytroshyn
  • Expanding Security Horizons: SIMD-Based Threats
Tayla Micael Sellschop
  • Chessboard of War: Breaching the perimeter on physical cyber security engagements
Noah Jelich
  • Unveiling WasmCov: Revolutionizing Test Coverage Across Wasm Ecosystems
Arun Nair
  • Red Team Infrastructure Setup and Automation
Aryan, Chetanya Kunndra
  • Playing the game of tag with modern day AV and EDRs: A guide to evading the watchdogs.