If you like the website, feel free to: Buy Me a Coffee at ko-fi.com

Info! CFPTime is a non-profit organization, community-based. Using CFP Time data (through the site and/or API) is allowed but can't be used for commercial purposes.

HITB GSEC Singapore

City Singapore
Province Singapore
Country SG
Website https://gsec.hitb.org/sg2018/
Code of Conduct Not populated yet
CFP Deadline

April 30, 2018, 11:59 p.m.   

Conference Date

Aug. 27, 2018, 9 a.m.   


HITB GSEC is a deep-knowledge security conference where attendees get to vote on the final agenda of talks. Attendees can also opt to be introduced to speakers and each other based on the votes they cast.

We have a total of 12 speaking slots available and are looking for 60-minute, offensive focused deep-knowledge presentations. Research that is new, novel and most importantly material that has not been presented elsewhere prior. We are also hoping to see more women researchers take the stage at HITB GSEC - if you are a woman in IT, we STRONGLY ENCOURAGE you to submit.
Submission Process:

1.) Register for an account at GSEC CFP

2.) Send us the following:

- Presentation abstract (1000 - 1500 words)
- Draft White Paper (3500 - 5000 words)
- Supporting material (poc code, slides, video etc)
- A recent photograph

3.) When CFP closes, audience voting begins. Each registered delegate gets 3 votes to cast against any presentations they like.

4.) When a presentation receives 8 votes it is removed from voting. You then receive an email introduction to voters which allows you to further fine tune your presentation to suit the audience profile.

Each accepted submission will entitle speaker(s) to:

Accommodation for 3 nights / 4 days
Travel expense reimbursement up to USD1500.00 per slot
A USD1000 honorarium per slot


Topics of interest include, but are not limited to the following:

Cloud Security
File System Security
3G/4G/WIMAX Security
SS7/GSM/VoIP Security
Security of Medical Devices
Critical Infrastructure Security
Smartphone / MobileSecurity
Smart Card and Physical Security
Network Protocols, Analysis and Attacks
Applications of Cryptographic Techniques
Side Channel Analysis of Hardware Devices
Analysis of Malicious Code / Viruses / Malware
Data Recovery, Forensics and Incident Response
Hardware based attacks and reverse engineering
Windows / Linux / OS X / *NIX Security Vulnerabilities
Next Generation Exploit and Exploit Mitigation Techniques
NFC, WLAN, GPS, HAM Radio, Satellite, RFID and Bluetooth Security

Please note: As always, we do not accept product or vendor related pitches though speaking opportunities and more are available for sponsors.

Speaker benefits

Not populated yet