posted by organizer: nsan || 2701 views || tracked by 3 users: [display]

Hacktivity 2021 : Hacktivity - The IT Security Festival in Central and Eastern Europe


When Oct 8, 2021 - Oct 8, 2021
Where Budapest, Hungary
Submission Deadline Jul 25, 2021
Notification Due Jul 31, 2021
Categories    computer security   cyber security

Call For Papers

# The Concept of Hacktivity2021

We all know that the pandemic had a radical impact on the world. Traveling is not as easy nowadays as it was before. So we would like to encourage you to submit your talks, even if you are not sure now that you can travel to Budapest for the conference. If you have valuable content, the Program Committee will put it on the schedule, and in case you cannot make it to Hungary in October, your presentation will still be projected at the venue for the audience, and on the online stream as well. In this case, we’ll call you on Zoom after your talk, so you can answer the questions of the audience, may they arise at the venue or at the official chat room of #Hacktivity2021. That is why we will ask every chosen speaker to record their presentations in advance, so we can have a plan B if something bad happens. However, we would be really happy to meet you personally at the conference!

# The Hacktivity Crew

The Hacktivity hacking conference brings together the official and alternative representatives of the information security profession with all those interested in the area, in an informal, yet educational, and most of the times highly technical.

# Call For Contributions/Speakers

This year we are offering two alternatives: you can either give a presentation as usual or you can give a workshop.

# Presentations

This is the business as usual. We require a similar thing as in any other IT security conference CFP. We are accepting presentations from a wide spectrum of IT security topics. It is up to you to apply for a presentation which is in line with the spirit of Hacktivity. We favour presentations with a demo.

Please write your slide deck in English. Your speech can be in English (favoured) or Hungarian.

As a speaker, you can have either a 20­ minutes or a 40 ­minutes slot to present your topic.

# Comprehensive workshop

We all know there is a huge difference between seeing and doing. Real knowledge grows from issuing your first command. Therefore, to help visitors start off learning we organize workshops. Comprehensive workshops are 2 hours long courses introducing basic/intermediate IT security skills. Previous years included topics like:

- Burp Extensions
- Malicious PDF analysis
- Basic rootkit techniques
- SQL injections

A comprehensive workshop should meet the following requirements:

- participants should acquire a definite and useful piece of knowledge;
- participants bring their own equipment you should calculate with the diversity;
- a workshop will not have more than 25 attendees;
- it should fit into 60 plus 60 minutes (seeing plus doing) from preparation to take­aways.
- one workshop will be held max. 2 times during the two days

# Topics

Here are some topics that we are especially interested in:

- Vulnerabilities at unexpected territories
- Exploit mitigations and their mitigations
- Malware analysis inside or outside the sandbox
- Blue Team techniques / operation
- Big Data / Cloud / APT / any_fancy_buzzword ­ What’s the big deal? Are there any / What are the new threats?
- Extraordinary stories of #FAIL
- Any research which brings something brand new to the security world

These are just examples though, please feel free to submit your talk as long as it fits to the spirit of Hacktivity.

# How to apply as a speaker?

Please fill out our CFP application form:

In case the Program Committee accepts your submission, we will get in touch with you to get the Speaker Agreement signed and to finalize every detail of your travel, accommodation & presentation.

# Speaker benefits

In 2020 everyone learned the hard way that there is no such thing as certainty regarding personal events and traveling the world. We would be very happy to greet our speakers personally in Budapest at our on-site event, but we also would like to ask them to record their presentations prior to the conference and send them to us, so in case any problem occurs due to the pandemic, we have a plan B to provide the talks to our audience.

Based on the above-mentioned circumstances, this year we can provide a speaker’s dinner on the evening before #Hacktivity2021 and a sightseeing tour the day after the conference for speakers who are traveling to Budapest for #Hacktivity2021 conference. Also, we can provide assistance to speakers in finding proper accommodation.

# Great travel option

If you have ever considered visiting Hungary, this might be a good opportunity for you to see Budapest, meet the Hungarian IT security community & experience Hungarian hospitality and cuisine as well.

The capital of Hungary is situated along the Danube, in the heart of the Carpathian basin. Hilly Buda, which comprises one-third of the city’s area is located along the right bank of the Danube surrounded by low mountains. Across the river sprawls flat Pest. The geology of Budapest has played a determining role in the city’s life over the course of history. Hot springs breaking through limestone mountains supplying water of 35-76 degrees centigrade gave rise to a flourishing culture of spas in the Roman Age and made Budapest one of the most popular spa cities of Europe.

# Copyright

As a speaker or workshop presenter you should accept the following use of your intellectual properties:

Presentations will be recorded and made available on our website.

​To the event, a conference paper will be published with presentation/workshop titles and abstracts, the presenters’ bio and their photos. The brochures will be distributed at the registration for all participants of the conference.

​Presentations and workshop materials will available on the conference web page after the event in pdf form.

During the presentation, we will take photos and use them in our publications and will be published on our site.

We are not going to use your materials in any other form mentioned above without your prior consent.

# Someone you would like to see present? Let us know!

If you are not decided yet on the subject you’d like to present, but know someone who is likely to accept speaking at the event, write to us at cfp[at] including that person’s contact info, and we’ll do our best to reach out for him/her!

Related Resources

IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
SECRYPT 2022   19th International Conference on Security and Cryptography
B-Sides Tampa 2022   B-Sides Tampa IT Security Conference 2022
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
WSCG 2022   30. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)