Time For Something New: Call For Presentations at the Packet Hacking Village

Security education is the mission of the Packet Hacking Village and the Wall of Sheep. We also take great pride in being a welcoming village for newcomers to DEF CON and to the Cyber Security field. We aim to act as a bridge between our visitors' existing knowledge and a better understanding of security topics by providing both knowledge of core fundamental concepts as well as advanced topics. Each year, there are thousands of newcomers into the Cyber Security field --technical or non-technical. We want to make sure that everyone has a solid foundation in Cyber Security. To that end, we're looking for pre-recorded talks in a 10-12 minute, 25-30 minute, OR 45-50 minute length, to teach our viewers something about one of these fundamental topics:

  • Disk structures
  • File systems
  • Core networking concepts
  • Operating Systems: *nix
  • Operating Systems: Windows
  • Operating Systems: macOS
  • Code/cipher/hash fundamentals
  • File analysis
  • Web traffic fundamentals
  • Network capture fundamentals
  • Email fundamentals
  • File/network/system forensics
  • File/network monitoring

We have identified these topics as the fundamental pillars of knowledge in Cyber Security. Our Packet Detective, Packet Inspector, and Capture The Packet events each provide attendees a way to apply knowledge from these topics and more in an engaging learning environment. Our goal is to build a glossary of fundamentals for Cyber Security people of all kinds: students, practitioners, teachers, lawmakers, government officials, and professionals.

Product or vendor related pitches are not welcomed.

To submit a talk, please provide the following information and link to presentation video in the form below to cfp2021[at]wallofsheep[dot]com. The Call for Presentations will close on Friday, July 30th, at 11:59 PM PDT. The list of talks will be finalized and published on Sunday, August 1st.

SPEAKER NAME:

SPEAKER TITLE AND COMPANY (IF APPLICABLE):

SPEAKER EMAIL ADDRESS:

SPEAKER TWITTER NAME (IF YOU WANT IT KNOWN IF YOU ARE ACCEPTED):

NAME OF PRESENTATION:

WHICH ONE OF THE CORE TOPICS DOES YOUR VIDEO FIT INTO (CHECK ONE ONLY):

  • Disk structures
  • File systems
  • Core networking concepts
  • Operating Systems: *nix
  • Operating Systems: Windows
  • Operating Systems: macOS
  • Code/cipher/hash fundamentals
  • File analysis
  • Web traffic fundamentals
  • Network capture fundamentals
  • Email fundamentals
  • File/network/system forensics
  • File/network monitoring

BRIEF DESCRIPTION OF YOUR VIDEO:

SPEAKER'S BIO:

This text will be used for the website and printed materials and should be written in the third person. Cover any professional history that is relevant to the presentation, including past jobs, tools that you have written, etc. Let people know who you are and why you are qualified to speak on your topic. Presentations that are submitted without biographies will not be considered.

WHERE TO DOWNLOAD YOUR VIDEO (e.g., Box, Dropbox, Google Drive, YouTube --unlisted), PROVIDE LINK:

As for video format, please use MP4.

TERMS AND CONDITIONS

By submitting you agree to the Terms and Conditions below. Please read and accept these terms by inserting your name in the appropriate area, otherwise your application will be considered incomplete and returned to you.

GRANT OF COPYRIGHT USE

I warrant that the above work has not been previously published elsewhere, or if it has, that I have obtained permission for its publication Aries Security, LLC. and that I will promptly supply Aries Security, LLC. with wording for crediting the original publication and copyright owner. If I am selected for presentation, I hereby give Aries Security, LLC. permission to duplicate, record and redistribute this presentation, which includes, but is not limited to, the conference proceedings, conference CD, video, audio, and hand-outs to the conference attendees for educational, on-line, and all other purposes.