Our digital world is in peril! Schneier, the spirit of security, can no longer stand the terrible destruction plaguing our Internet. He sends five magic IoT Things to five special whitehats...
If only we really could summon Captain Security to defeat all the baddies, fix the broken protocols, clean up our insecure technology and save the day! In reality, it is up to all of us. The need for security in all levels of the software (and hardware) lifecycle and for usable privacy and anonymity tools in an age of surveillance is abundantly clear. How can we achieve these goals? The Security and Privacy Miniconf is here to help!
The linux.conf.au 2017 Security and Privacy Miniconf will bring together users, researchers and practitioners involved in, or simply interested in, security topics in Open Source software and hardware. The program will feature a series of talks explaining and demonstrating important security and privacy concepts, techniques and initiatives. Whether you are a researcher, developer, sysadmin, UX designer or anthropologist, there will be something at the Security Miniconf to help you or your users live a more secure digital life.
Call for Proposals
The deadline for proposals is Sunday 27th November.
We are seeking two kinds of presentations:
- standard talk (30 minutes including time for questions)
- turbo talk/demo (10-15 minutes)
We are looking for talks that demonstrate and explain important security concepts, tools or practices for end users of technology and for developers, engineers, designers, project managers and operations staff building and delivering the technology (software or hardware).
The shorter turbo talk format is ideal for short demos, project status updates, or simply to raise awareness of an important security tool or technique.
Possible topic areas include, but are not limited to:
- Introductions to popular or emerging open source security tools
- How UX/UI design can influence application security
- Security features in open source operating systems or programs, and how to use them
- Authentication and authorisation technologies
- Secure software development techniques/practices
- Offensive techniques (including social engineering)
- Security incident detection, forensics and response
- Web, Cloud or IoT security
- Hardware and physical security
Presentations with live demos or interactive aspects are encouraged. Please include details of such in your proposal, especially if the conference network will be used.
If you have any questions please email frase @ frase.id.au.
Fraser is an identity management engineer at Red Hat where he works on FreeIPA and Dogtag Certificate System. He is interested in security and cryptography and cares about making it easier for humans to use technology securely. By night Fraser writes programs in Haskell, proves theorems in Coq and is exploring dependent types, category theory and other exciting intersections of mathematics and computer science.
Dr. Jason Cohen is a senior technology consultant at Hewlett Packard Enterprise, with over 15 years of industry experience in the area of enterprise information technology for the US public sector with a focus on complex systems integration and security solutions. He has extensive expertise in IT architecture, security, secure application design, distributed systems, trusted computing, and secure cross-domain solutions. Jason has several published research articles related to the application of Trusted Computing technology in distributed systems to combat advanced threats. Jason holds a Doctor of Science in Information Technology from Towson University, a Master’s degree from Towson University in Applied Information Technology, and a Bachelor’s degree in Computer Science from Goucher College.