DEF CON Forum Site Header Art

Announcement

Collapse
No announcement yet.

Call for Hands-On Workshops for Packet Hacking Village at DEF CON 28 Now Open

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Call for Hands-On Workshops for Packet Hacking Village at DEF CON 28 Now Open

    Overview

    The Wall of Sheep would like to announce a call for Workshops at DEF CON 28 in Las Vegas, NV from Thursday, August 6th to Sunday, August 9th. The Packet Hacking Village Workshop's goal is to deliver hands-on training sessions that increase security awareness and provide skills that can be immediately applied after the conference. Our audience ranges from those who are new to security to the most seasoned practitioners in the security industry. Introductory workshops are welcome! A very nominal fee will be charged for advanced registration of these workshops. However, all proceeds will go directly to Hackers for Charity. This is your chance to give back to the community in multiple ways!
    The hands-on workshops area will have 40 computers pre-loaded with the necessary tools so attendees will not need to bring their own laptop. There will be one computer available for the presenter that is a mirror of the attendees. The mirror laptop will be displayed on one screen; a second projected display and hookups is available for you to present your material. We will be able to pre-load any software (within reason) including one virtual machine for your presentation. The computers will boot Kali Linux. While network access is available to all machines, it should not be relied upon for your presentation... this is DEF CON after all. :)
    Topics of interest include:
    • Tools for Network sniffing, intrusion detection, monitoring, reverse engineering, forensics, penetration testing, data collection and visualization
    • Purple teaming
    • Secure Software Development
    • Training in hacking/security tools and their usage in the corporate world
    • Programming for security practitioners
    • Tool/task automation and optimization
    • Incident response process and procedures
    The Wall of Sheep will not accept product or vendor related pitches. If your content is a thinly-veiled advertisement for a product or service your company is offering, please do not apply!
    The Call for Workshops will close on Friday, June 12th at 11:59 PM PDT. The list of talks will be finalized and published on Friday, June 26th.

    Speaking Format

    Each teaching slot is 1, 1.5 or 2 hours maximum, including time for Q&A. If we have time and it is in line with our goals mentioned above, then there is a good chance you will be selected.

    To submit a workshop, please provide the following information in the form below to cfw2020[at]wallofsheep[dot]com

    Primary Speaker Name:

    Primary Speaker Title and Company (if applicable):

    Primary Speaker Email Address:

    Primary Speaker Phone Number (to contact you if necessary during the conference):

    Primary Speaker Twitter name (if you want it known if you are accepted):

    Additional Speakers' name(s), titles, and social information:

    Additional Email Addresses:

    Is there a specific day or time you MUST speak by?

    Name of Workshop:

    Length of Workshop:

    (1, 1.5, or 2 hours)

    How many VMs do you require on each student's laptop?

    (0, 1, 2, 3+, unknown)

    Abstract:

    Your abstract will be used for the website and printed materials. Summarize what your workshop will cover. Attendees will read this to get an idea of what they should know before your presentation, and what they will learn after. Use this to inform about how technical your talk is. This abstract is the primary way people will be drawn to your session. CFW reviewers like to see what tools will be used and what materials you suggest to read in advance to get the most out of your presentation.

    Equipment Needs & Special Requests:

    The Wall of Sheep will provide laptops pre-loaded with software for the attendees, you will have 1 projected laptop setup the same as the attendees for demonstration, 1 projector feed for your laptop/material, and microphones. The laptops will boot Kali; please let us know if there is any software you will need pre-loaded on the workshop laptops. If you have a VM, please make sure it works with VirtualBox. One month before DEF CON, you will be asked to provide all software so it can be pre-loaded on the systems. Changes to your software configuration cannot be made after this time or during the conference. We cannot accept workshops that require multiple VMs to be running simultaneously.

    Speaker's Bio(s):

    This text will be used for the website and printed materials and should be written in the third person. Cover any professional history that is relevant to the presentation, including past jobs, tools that you have written, etc. Let people know who you are and why you are qualified to speak on your topic. Presentations that are submitted without biographies will not be considered.

    Detailed Outline:

    You must provide a detailed outline containing the main points and navigation through your workshop. Show how you intend to begin, where you intend to lead the audience and how you plan to get there. The outline may be provided in a separate attachment and may be as simple as a text file or as detailed as a "bare bones" presentation. The better your outline then the better we are able to best review your presentation against other submissions (and the higher chance you have of being accepted). SUBMISSION NOTE: Presentations that are submitted without abstracts, outlines, or speaker bios (e.g., that have only PDFs, PPTs, or white papers attached or only point to a URL) will not be considered.

    Supporting File(s):

    Additional supporting materials such as code, white papers, proof of concept, etc. should be sent along with this email to cfw2020[at]wallofsheep[dot]com. Note that additional files that may help in the selection process should be included. We are not asking for a complete presentation for this initial submission. That will only be required if you are selected for presenting.

    Note:

    Attendees will be allowed to pre-register for the workshop prior to DEF CON; there will be a small charge with the proceeds going to a charity of the Packet Hacking Village's choice.

    Terms and Conditions

    By submitting you agree to the Terms and Conditions below. Please read and accept these terms by inserting your name in the appropriate area, otherwise your application will be considered incomplete and returned to you.

    Grant of Copyright Use

    I warrant that the above work has not been previously published elsewhere, or if it has, that I have obtained permission for its publication Aries Security, LLC. and that I will promptly supply Aries Security, LLC. with wording for crediting the original publication and copyright owner. If I am selected for presentation, I hereby give Aries Security, LLC. permission to duplicate, record and redistribute this presentation, which includes, but is not limited to, the conference proceedings, conference CD, video, audio, and hand-outs to the conference attendees for educational, on-line, and all other purposes.

    Terms of Speaking Requirements

    1. I will submit a completed (and possibly updated) presentation and a reference to all of the tool(s), law(s), Web sites and/or publications referenced to at the end of my talk and as described in this CFW submission by noon PST, June 30th, 2020.
    2. I will submit a final Abstract and Biography to the Wall of Sheep by noon PST, June 30th, 2020.
    3. I will include a detailed bibliography as either a separate document or included within the presentation of all resources cited and/or used in my presentation.
    4. I will complete my presentation within the time allocated to me - not running over the time allocation.
    5. I understand that the Wall of Sheep will provide 1 Laptop pre-loaded with software with a projector feed, 1 LCD projector feed, and microphones. I understand that I am responsible for providing all other necessary equipment, including laptops and machines (with VGA output), to complete my presentation.
    6. I understand that I will be responsible for my own hotel and travel expenses, and admissions to the DEF CON Conference.
    Yes, I, (insert primary speaker name), have read and agree to the Grant of Copyright Use.

    I, (insert your name here), have read and understand and agree to the terms as detailed in the Agreement to Terms of Speaking Requirements.

    In the case that a speaker is a child under the age of 13 years old: in compliance with the Children's Online Privacy Protection Act (COPPA) regulations, http://www.coppa.org, any child under age 13 must have parental consent for the collection, use, or disclosure of that child's personal information by a website. Parent/Guardian Consent: I (insert parent/guardian's name here) am the parent or guardian of the minor/s named above. I have read and understand and agree to the terms as detailed in the Agreement to Terms of Speaking Requirements.
    Last edited by Dark Tangent; March 9, 2020, 21:39. Reason: Added tags
Working...
X