The official Call for Papers (speakers) for NaijaSecCon 2019, being held May 3rd – 4th, 2019 in Lagos, Nigeria is open from 24th January, 2019 through 4th March, 2019.
NaijaSecCon is Nigeria’s first of its kind 100% technical Cyber-Security Conference that uniquely merges information about relevant threats from a Nigerian context with live technical demonstrations and hands-on workshops. The 2018 edition of the Nigeria Cybersecurity Conference (NaijaSecCon18) was one of the first ever gatherings of information security practitioners, enthusiasts, evangelists, penetration testers, crypto-crackers, reverse-engineers, digital forensics analysts, and of course 3lit3 h4ck3r5.
NaijaSecCon 2019 is expected to attract more than 300 professionals from various industries including Financial Services, Insurance firms, Telcos, Oil and Gas, Conglomerates, Privately-held organizations, Military, State and Federal Government.
Through the Call for Papers, our distinguished committee will accept speaker submissions for possible inclusion in the program at the 2018 NaijaSecCon.
Call For Paper Opens: January 24, 2019
Call For Paper Closes: March 4, 2019
Notification to Authors: End of March
Terms are subject to change
This is a strictly technical conference with slots for 20 speakers – 10 technical demo-based presentations and 10 GRC related presentations. Demo-based presentations will require live demo during the conference.
Submissions that highlight new research, tools, vulnerabilities, etc – with demos will be given priority.
Submissions that include White Papers will also be given priority.
Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
NaijaSecCon will disqualify incomplete submissions; complete your submission in its entirety.
Your submission should clearly detail the concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.
Each submission must include detailed biographies of the proposed speaking team.
Submitters will be contacted directly if Review Board members have any questions about a submission.
If you have any questions regarding your submission, please email them to email@example.com
HOW TO GET YOUR SUBMISSION REJECTED:
Submissions with incomplete application forms.
Submissions without an abstract, detailed outline, bio.
Submissions that have sent in only attached slides, papers, or point to a URL.
Submissions that have withheld details, or have knowingly falsified details.
Exploitation (Offensive & Defensive)
Big Data Techniques in Cyber Security
Forensic Analysis of Cyber Crimes
Curbing insider threats
Advance Persistent Threat
Security in Mobile Networks
The adoption and use of information security technologies and precautions
Compliance with security policies and mandates
The development of an information security culture
Improving security awareness
Individual motivators and inhibitors of employee (insider) computer crime
Legal, societal, cross-cultural and ethical issues related to information security
Human aspects of information security
Usability of Security Software, or Usability of Security Features of Other Software
Mitigating hardware and software vulnerabilities (incl. moving target defence, zero days)
Critical infrastructure protection and resilience (incl. ICS/SCADA, industrial platforms and protocols, undersea cables and smart grids)
The Internet of Things and cyber-physical systems
Mobile, cloud and big data security
Digital trust and authentication
State-sponsored cyber operations (incl. Advanced Persistent Threats, use of proxy actors)
Attribution and digital forensics
Personal data protection, surveillance and privacy
Governance of cyberspace