Call for Papers
IMPORTANT DATES
4/30/2023 – Open CFP & CFT
6/11/2023 – End 1st round, start 2nd round
6/28/2023 – Notify accepted 1st round speakers
7/16/2023 – End 2nd round, start 3rd round
8/2/2023 – Notify accepted 2nd round speakers
8/27/2023 – Close CFP
9/6/2023 – Notify accepted 3rd round speakers
10/7/2023 – BSidesKC 2023
SHARE YOUR PASSION, EXPERIENCE AND RESEARCH
BSidesKC aims to provide a diverse range of talks covering both conventional cybersecurity topics as well as emerging threats and technologies. Topics can range from completed or near-complete research, tool development, best practices, lessons learned and experiences. Generally speaking, if it deals with security, it is applicable. BSides conferences are designed to be conversations and should allow for interaction with the attendees, as lectures are nice from time to time, but new insights or ancillary work often comes from dialogue.
Why should you consider presenting?
Increase the overall strength of our community by sharing your knowledge, best practices and experiences with peers and emerging professionals
Have the opportunity to share your interests and network with other like-minded individuals
Develop collaborative relationships and crowd source new ideas and solutions
Immediate feedback from your audience
BSidesKC provides all attendees surveys for every talk. This helps our speakers get better!
About Presentations
Proposals will be considered for the following types of presentations:
15 minute (or less) lightning talk – For those new to presenting, have a partial research topic, or looking for feedback on a topic.
20 minutes – Maybe you have a well-formed topic, but it wouldn’t keep an audience engaged for 50 minutes? Or maybe you get dry mouth when talking > 21 minutes? 😉
50 minutes – For the seasoned presenter or maybe you just like to talk a lot.
Discussions panels – Have an idea for a discussion panel, we’re open to the idea.
BSidesKC typically consists of trainings/workshops, talks, and villages. The talks and villages are typically held on the second day. The content of the tracks will be determined by our open Call For Papers/Proposals.
Topics of Interest (Not limited to):
IOT
Vulnerabilities
ICS & SCADA
Telecommunications
Threat Intelligence
Incident Handling & Incident Response
Digital Forensics
Network Infrastructure
Critical Infrastructure
Exploits
Reverse Engineering
Tool Development
Secure Coding
Application Security
Database Security
Wireless
New Technologies
Cryptography
Mobile Security
Cloud Security
Malware
Monitoring and Analysis
Analytics