• Home
  • /
  • Call For Papers

The official Call for Papers (speakers) for NaijaSecCon 2018, being held May 3rd – 4th, 2018 in Lagos, Nigeria is open from 8th January 2018 through 22nd February 2018.

NaijaSecCon is Nigeria’s first of its kind 100% technical Cyber-Security Conference that uniquely merges information about relevant threats from a Nigerian context with live technical demonstrations and hands-on workshops. The 2017 maiden edition of the Nigeria Cybersecurity Conference (NaijaSecCon17) was one of the first ever gatherings of information security practitioners, enthusiasts, evangelists, penetration testers, crypto-crackers, reverse-engineers, digital forensics analysts, and of course 3lit3 h4ck3r5.

NaijaSecCon 2018 is expected to attract more than 300 professionals from various industries including Financial Services, Insurance firms, Telcos, Oil and Gas, Conglomerates, Privately-held organizations, Military, State and Federal Government.

Through the Call for Papers, our distinguished committee will accept speaker submissions for possible inclusion in the program at the 2018 NaijaSecCon.

IMPORTANT DATES

Call For Paper Opens: January 8, 2017

Call For Paper Closes: February 22, 2018

Notification to Authors: End of March

Terms are subject to change

SUBMISSION INFORMATION

  1. This is a strictly technical conference with slots for 12 speakers – 10 technical demo-based presentations and 2 GRC related presentations. Demo-based presentations will require live demo during the conference.
  2. Submissions that highlight new research, tools, vulnerabilities, etc – with demos will be given priority.
  3. Submissions that include White Papers will also be given priority.
  4. Submissions may only be entered by researchers/speakers (no submissions from PR firms/marketing representatives).
  5. NaijaSecCon will disqualify incomplete submissions; complete your submission in its entirety.
  6. Your submission should clearly detail the concepts, ideas, findings, and solutions a researcher or speaking team plans to present.
  7. Individuals may submit more than one proposal but each proposal must be submitted via a separate submission form.
  8. Each submission must include detailed biographies of the proposed speaking team.
  9. Submitters will be contacted directly if Review Board members have any questions about a submission.
  10. If you have any questions regarding your submission, please email them to cfp@naijaseccon.com

HOW TO GET YOUR SUBMISSION REJECTED:

  1. Submissions with incomplete application forms.
  2. Submissions without an abstract, detailed outline, bio.
  3. Submissions that have sent in only attached slides, papers, or point to a URL.
  4. Submissions that have withheld details, or have knowingly falsified details.

APPLY NOW

TOPICS OF INTEREST

  • Reverse Engineering
  • Exploitation (Offensive & Defensive)
  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Curbing insider threats
  • Spam Protection
  • Advance Persistent Threat
  • Security in Mobile Networks
  • Hardware Security
  • Cloud Security
  • Network Security
  • The adoption and use of information security technologies and precautions
  • Compliance with security policies and mandates
  • The development of an information security culture
  • Improving security awareness
  • Individual motivators and inhibitors of employee (insider) computer crime
  • Legal, societal, cross-cultural and ethical issues related to information security
  • Human aspects of information security
  • Usability of Security Software, or Usability of Security Features of Other Software
  • Mitigating hardware and software vulnerabilities (incl. moving target defence, zero days)
  • Critical infrastructure protection and resilience (incl. ICS/SCADA, industrial platforms and protocols, undersea cables and smart grids)
  • The Internet of Things and cyber-physical systems
  • Mobile, cloud and big data security
  • Digital trust and authentication
  • State-sponsored cyber operations (incl. Advanced Persistent Threats, use of proxy actors)
  • Attribution and digital forensics
  • Personal data protection, surveillance and privacy
  • Governance of cyberspace

Recent Comments

    Archives

    Categories

    • No categories

    Categories

    • No categories

    Facebook

    Latest Posts