Who can submit a proposal?
The call for research is open to everyone and there is no charge to speak at the event. The event is strictly vendor neutral and is a forum for the open sharing of research, tools and techniques.
The submission must be made by the speaker/s. Submissions by PR agencies or other third parties on behalf of a speaker will not be accepted. Any sales or product related presentations such as product demos will not be considered.
When do the Geek Street sessions take place?
They take place on 18th-19th November 2020 at Javits Center New York City during Infosecurity New York City.
How long are the sessions?
Each session is 45 minutes long to enable a deep-dive into the technical research/topic. This will include 35-40 minutes for the presentation and 5-10 minutes for Q&A.
Can I make more than one submission?
Yes, there is no limit on the number of submissions you can make.
What is the review panel looking for?
The review panel is looking for unique and original content, deep-diving into practical case studies and unique business solutions. Presentations that highlight new vulnerabilities and exploits will be particularly appealing to the review panel. Please do not reuse previous conference presentations, and let us know if the content has been presented before and where. If the content has been presented before please let us know how the Infosecurity Geek Street presentation will be different. Preference will be given to material that has not been presented before, however updates on earlier research are acceptable.
What must the presentation include?
The presentation must include original research and concrete guidelines and best practices to protect against and mitigate the effects of any exploit that is revealed.
How to complete the submission form
- Click on the submit proposal link on the Infosecurity New York City website
- This will take you to the Geek Street Call for Speakers 123 Form where you will fill in all the information required for your submission to be reviewed.
- Seminar Details
- Provide as much depth as possible and use the full word limit.
- Ensure that the title of the session clearly shows what the session will cover and ensure the title highlights the benefits of the session for the audience.
- Provide an interesting, engaging and informative outline of the session.
- Speaker Details
- Full contact details are required for all speakers.
- We will not accept changes to speakers once the submission has been accepted.
- Additional Details
- This information will help us to market your seminar if successful
We will contact the submitter directly as soon as a submission has been successful. If the proposed speaker is not available you will not be able to submit a replacement.
Once I’ve made my submission, can I amend it before the deadline?
Yes, after making your initial submission you will receive an email link with instructions on how to edit it at a later time.
Can you explain the review and selection process?
The review panel will evaluate all submissions and create a shortlist. They may ask for further details of your presentation if it is shortlisted. The final selection will then be made.
How will I know you’ve received my submission?
You will receive an automated email notification that your submission has been received.
How will I know whether my submission has been successful?
All submitters will be emailed to let them know whether they have been successful or unsuccessful in their submission. This notification will be sent out during the week commencing 3 August 2020.
When will the details of my presentation be published on the Geek Street agenda?
The programme will be published during the week of 10 August 2020.
If my submission is accepted, can I request a specific timeslot for my talk?
The schedule will be decided by the Conference Team based on the flow of the day, so you will need to ensure that you are available all day across the 2-day conference programme.
Are you looking for any specific topic areas for submissions?
We are looking for a wide range of topics, including those below. Please note this is by no means an exhaustive list but is intended to provide guidance.
- New risks, vulnerabilities and exploits
- Network security
- Application security
- Securing CNI
- Cyber physical
- Cloud security
- Digital forensics
- Mobile security
- Reverse engineering
- Malware analysis
- Defensive tools and techniques
- Incident response and management
- Vulnerability management