Call for Papers - Black Hat Regional Summit - Sau Paulo 2013
Submit proposals by completing the submissions form on the CFP server at https://cfp.blackhat.com/. We strongly suggest that you submit earlier than later since we will close the CFP early if we receive enough quality submissions to fill all available time slots. All applicants should take the time to closely review the Call for Papers Terms and Conditions AND all information on this page PRIOR to making the submission so that you are clear on our expectations and deadlines. All submissions must be received on or before June 30, 2013.
WHAT IS THE BLACK HAT Summit?
The Black Hat Summit was created to fill the need for computer security professionals to better understand the security risks to information infrastructures and computer systems. Black Hat accomplishes this by assembling a group of vendor-neutral security professionals and having them speak candidly about the problems businesses and governments face as well as potential solutions to those problems. No gimmicks - just straight talk by people who make it their business to know the information security space. The following timeslots are available: 25, 50, and 120 minutes (please note the 120 minute timeslots are only available for workshops).
IF YOU WANT TO SUBMIT, PLEASE NOTE
Black Hat does not accept product- or vendor related-pitches. If your talk is a thinly-veiled advertisement for a new product or service your company is offering, please do not apply.
- All presentations must be submitted by the original authors.
- We currently only accept submissions by original authors of the presentations. PR firms, speaking relation firms, and all other parties who are not direct authors of submitted presentations ARE NOT ALLOWED to submit materials on behalf of speakers or presenters. We require direct contact with presenters to expedite questions from the reviewers and to fulfill Speaker Obligations as detailed on the Call for Papers Terms and Conditions.
- Decide which conference you would be able to present at.
- Speakers who are chosen to speak at one event are not automatically chosen to speak at another. Selecting the event that you are speaking at will determine if you will meet the deadlines for the event. You are currently on the Black Hat Regional Summit - Sau Paulo 2013 CFP page.
- Decide on key subjects/topics your presentation will cover and if it is appropriate for this venue
- Understand the different time constraints.
- The following time slots are available and it is expected that the presenters will budget time for audience participation and Q&A within this time frame:
- Summit: Traditional presentation format
- This year we will not be asking for submissions to fill pre-determined tracks. We will populate the event with best submissions received.
- We always try to give extra attention to submissions that highlight new research, tools, vulnerabilities, etc. The more technical the content, the better.
- In our experience security professionals are always looking for the latest tools and resources to perform their jobs effectively and efficiently. Do you have a great tool or app that you have been dying to bring to the attention of the Black Hat community? Is your Ruby, or Python, or Perl developer toolbox full of scripts and techniques that can be of advantage to fellow pen-testers? Or if you just want to give delegates a teaser on a course you will be instructing (now or in the future)?
- These sessions are primarily aimed at independent researchers and the open source community and will allow you to showcase your work.
- The concept is simple:
- The following timeslots are available: 25, 50 and 120 minutes (please note the 120 minute timeslots are only available for workshops).
- The sessions will be open to all Summit delegates to attend – we do not intend to host the workshops "by registration only". The space is limited to first come, first seated delegates as these sessions will be hosted in smaller rooms.
- What we hope to achieve: Greater awareness and access to terrific work for the security world at large. These should be highly technical sessions that can give delegates a chance to delve deeply into your work and hopefully take away practical applications for the information presented.
- What this is not: an overblown vendor pitch or a place for your soapbox
- What the delegates want: other than your knowledge in a basket, a takeaway – a copy of your tools, a small sample of the course slides…we can help you get these materials to the masses!
- Submit a presentation.
- Please submit all prospective proposals by completing the submissions form on the CFP server at https://cfp.blackhat.com/. Speakers may submit more than one proposal but each proposal must be submitted separately. Create an account at https://cfp.blackhat.com, verify your email address, and away you go. You MAY NOT submit presentations if you are a third party that wishes to submit materials on behalf of a potential speaker. Only original authors of presentations may submit for the Call for Papers. Submissions are due no later than June 7, 2013.
- Submit supporting material.
- Please submit any additional materials after completing the online submission form. Additional materials may include but not be limited to items such as white papers, code, demos, proofs of concept, references, résumés, etc. that may enable us to decide whether your topic would be appropriate. To upload materials, select "ACTIONS" for the appropriate presentation. Materials may also be sent along to: firstname.lastname@example.org
- If you experience problems with https://cfp.blackhat.com, send email to email@example.com and we will work to resolve the problem.
NOTE: If you have questions about the legal implications of your security research or presentation, consider contacting the Electronic Frontier Foundation, a non-profit legal service organization, for a pro bono initial consultation by emailing firstname.lastname@example.org
Please include Black Hat Regional Summit - Sau Paulo 2013 in the subject line.
If you have questions regarding your submission, please email them to email@example.com. We ask that all persons who submit to the Call for Papers DO NOT contact Review Board members individually regarding your submission.
- Presentations will be reviewed through a voting process by the Black Hat Review Board. Submissions get rated on a one to five scale by each of the reviewers in four areas, and the resulting scores are added up. Those submissions in each category with the highest scores are considered first. In the case of topic overlap, a lesser scoring submission may be selected to keep variety in the program. As the complexity and specialization of submissions grow, more reviewers are added to the process.
- Submissions that include white papers will be given first priority and consideration for review.
- People submitting a talk proposal will generally get email notification that Black Hat has received the proposal within 48-72 hours of receipt of the submission. Once selection has been completed you will receive an email confirmation of acceptance or rejection.
- Speakers will be contacted if there are any questions about their presentations. If your talk is accepted, you can continue to modify and evolve it up until the materials due date, at which time it is frozen for the printed materials and DVD-ROM.
All presentations must be vendor neutral (no sales pitches for services or products are permitted). Presentations which demonstrate proprietary tool(s) must provide a copy of the tool(s) for distribution on the Black Hat CD and web site. All sources of information, software, etc. should be properly cited.
Things that get our attention:
Talks that are more technical or reveal new vulnerabilities are of more interest than a review of material covered many times before. We are striving to create a high-end technical conference and any talk that helps reach this goal will be given extra attention.
Original content or research that has been created specifically for Black Hat and has not been seen before always gets extra priority as well as demonstrations involving new material, or a new way of presenting information to the attendees.
Please ensure your submissions have detailed bibliographies acknowledging prior work in the space, distinguishing or highlighting how your presentation is different. We believe this is important to help move the security community to a more professional and respected position, as well as make all of our work easier to reference for those seeking to understand prior art.
Note: By speaking at the Black Hat Summit you are granting Black Hat permission to reproduce, distribute, advertise and show your presentation including but not limited to http://www.blackhat.com, printed and/or electronic ads, fliers, mailers, etc. as detailed in http://blackhat.com/sp-13-new/call-for-papers-terms.html
To meet the goals outlined above, Black Hat expects several things from selected speakers. Full details may be found on the CFP Terms and Conditions page.
- If you are going to announce or demonstrate a new tool as the primary focus of your talk, that tool must be made available for the conference DVD-ROM. We don't want a room full of people all excited about what you have demonstrated only to learn the tool is $12,000 and not available to the general public.
- Delegates expect to receive copies of your presentation, a White Paper supporting your work, RFC's and tools/code (if applicable). In your presentation or White Paper please include a reference to all of the tool(s), law(s), web site(s) or publication(s) you refer to. This bibliography will greatly help attendees who wish to learn more about your subject, but are not sure where to start. Please do not disappoint them and be mindful of the deadlines as specified in the CFP Terms and Conditions as well as the CFP Letter of Acceptance.
- Black Hat expects speakers to be available during the lunches and reception in order to meet and mingle with the attendees. Attendees want to meet the presenters and ask questions. I If you cannot do so, for example because of a business commitment, please let us know when you submit your materials.
- Assume that the attendees already understand the basic concepts regarding your topic. For example, if you are talking about cryptography, assume that everyone knows the difference between public key vs. secret key algorithms. Black Hat strives to be known as a more technical security conference, and as such, expects more high-level details from their speakers. If you must err in one direction or the other, err on the side of more technical.
There are several categories of speakers based on the type of presentation delivered. Please review the CFP Terms and Conditions to see what Category presenter you are.
The Black Hat Regional Summit - Sau Paulo 2013 Summit will take place September 10-12 at the beautiful new Halic Congress Center by the shores of the Bosphorus. Please see the Black Hat Regional Summit - Sau Paulo 2013 pages for more information on hotel, venue, schedules, etc.
MORE EVENT INFORMATION
Please visit https://www.blackhat.com/ for previous conference archives, information, and speeches. Updated announcements will be posted to newsgroups, security mailing lists, and the Black Hat web site when available.
Thank you for your time!
We reserve the right to change or modify our Terms, dates, and/or content of this page at any time without prior notice.