CanSecWest 2024 will be held at the Vancouver Sheraton Wall Centre. The conference covers travel and accommodations for selected speakers.
Dojo Courses are March 15-19.
The first CFP deadline is Dec 30, but there will be a smaller second paper selection round two weeks after that. Your best chance of having your submission selected happens in the larger first round of review.
Some topic areas we are looking for presentations, workshops, and trainings for specifically in this CFP, among our usual sought topics of advancements in information attacks and defenses:
Cloud Security, Multi-Cloud, and Hybrid On-Prem Environments: Inviting presentations on the dynamic field of cloud security, with a special focus on multi-cloud strategies. Areas of interest include data sovereignty, tackling security challenges in multi-tenant environments, and approaches to securing cloud-native applications, all within the context of emerging threats and innovative defenses.
5G Network and Device Security: Calling for presentations on the unique security challenges of 5G network deployment. Key areas include addressing vulnerabilities due to increased network speeds, enhanced capacities, and the proliferation of connected devices, with a focus on securing 5G infrastructures in critical infrastructure and service contexts.
Automotive Cybersecurity: Seeking presentations on the escalating need for advanced automotive cybersecurity in the era of increasingly connected and autonomous vehicles. Topics of interest are securing vehicular networks, defending against remote attacks, and ensuring the integrity of software updates, considering the unique challenges of the automotive industry.
AI and Machine Learning Security: Looking for presentations that address the security aspects of AI and machine learning technologies. Emphasis is on protecting these systems from adversarial attacks, ensuring data integrity, and understanding vulnerabilities specific to AI, especially in adversarial settings.
IoT System and Embedded Firmware Security: Inviting discussions on securing the burgeoning IoT ecosystem. Presentations sought cover device security, update management, integration challenges, and data handling, aiming to tackle the broad security implications of the rapidly expanding array of IoT devices.
Supply Chain Security: Encouraging presentations that explore the complex risks associated with supply chains across various industries. Focus areas include developing methodologies for vetting third-party vendors, understanding supply chain interdependencies, and mitigating risks from embedded vulnerabilities, drawing insights from incidents like the SolarWinds attack.
Electronic Warfare and Emerging Wireless Communications Security: Welcoming presentations on the security challenges brought by technologies like LoRa, Bluetooth, and new WiFi standards. Topics include exploring vulnerabilities, developing advanced encryption methods, and designing countermeasures against electronic warfare tactics in these communication systems, with an emphasis on their roles in IoT and critical infrastructure.
Advanced Hardware Security - Novel Attacks and Strategic Defenses: This combined topic seeks presentations on the forefront of hardware security, spanning innovative attack methods and strategic defensive approaches. This includes presentations on exploiting hardware vulnerabilities through techniques like 3D glitching and EMI information leakage, understanding and mitigating microarchitectural attacks on CPUs, developing robust hardware design principles and mitigation techniques against sophisticated attacks, ensuring firmware security and integrity, and delving into the forensic analysis of embedded systems and IoT devices to unearth and analyze compromised devices. Looking for a comprehensive range of hardware security challenges and innovative solutions.
Mobile and App Security with a Focus on Reverse Engineering: Soliciting presentations on securing mobile ecosystems, particularly Android and iOS. Topics include strategies against reverse engineering threats, safeguarding app data, and addressing mobile-specific vulnerabilities. Emphasis on practical approaches to detect and counteract mobile app and OS security threats, with insights into reverse engineering techniques and their implications in security contexts.
The first talk selection round closes at the end of the month. Early, pre-selection discount registration is open.