What kind of people attend Virus Bulletin conferences?

Posted by   Martijn Grooten on   Feb 17, 2018

The Call for Papers for VB2018, the 28th Virus Bulletin International Conference, which will take place in Montreal, 3-5 October 2018, opened last month. It will remain open until 18 March.

If you're considering submitting a paper and you have not attended a VB conference before, it might help to have a better understanding of the audience.

Many attendees are security researchers. They spend their days (and often nights) analysing malware, threats and vulnerabilities. They attend conferences like VB to talk about their work, learn what others have worked on and, perhaps most importantly, to make the contacts that are so essential for any security researcher.

Many other attendees, however, have less technical roles. They manage a product, a team, or both; they may be the 'evangelists' that spend their days talking to the wider audience about security issues; or they may work in the 'real world' in CISO-like roles. Such people often have a technical background but they rarely, if ever, get their hands dirty any more and depend on conferences like VB to learn about the current state of research.

 

montage.jpg

This means that any kind of security research, especially if it has practical relevance, is likely to be received with interest: analyses of malware, vulnerabilities and threat campaigns; detailed studies of one particular incident, or talks that take a bird's-eye view of a whole category of threats; talks about tools that make researchers' lives easier and tools that improve the detection of various threats.

But there is far more to security research than the cat-and-mouse game of extra layers of packers and the increasingly complex flow charts in IDA Pro. We very much welcome talks on non-technical aspects of security too, and in the past we have had important talks on topics as varied as user education, spyware used in domestic abuse cases, and the legal issues that may come with running a malware research lab.

One thing we are particularly interested in are talks from people who are at the forefront of protecting organisations, whether they are large companies, government institutions or NGOs. What attacks do you see and what are you doing to prevent them from impacting your organisation? What tools have you built that make your work a lot easier? And how does the real world differ from the picture painted by security vendors?

As I have said previously, we welcome both new and experienced speakers. We do not have a separate 'rookie' track, but  we are happy to support and help you to deliver your paper as well as possible.

We welcome speakers from all over the world. We attract a very global audience and, for many attendees, English is not their first language – so if this applies to you as well, do not let it put you off!

The FAQs we posted for last year's conference still apply, but please don't hesitate to contact me (martijn.grooten@virusbulletin.com) if you have any other questions. We look very much forward to your submission!

Finally, if this is the kind of audience your company likes to connect with, why not become a partner of the conference? Email us at conference@virusbulletin.com for more information.

VB2018-withdate-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Fantastic Information and Where to Find it: A guidebook to open-source OT reconnaissance

A VB2019 paper by FireEye researcher Daniel Kapellmann Zafra explained how open source intelligence (OSINT) can be used to learn crucial details of the inner workings of many a system. Today we publish Daniel's paper and the recording of his…

VB2019 paper: Different ways to cook a crab: GandCrab Ransomware-as-a-Service (RaaS) analysed in depth

Though active for not much longer than a year, GandCrab had been one of the most successful ransomware operations. In a paper presented at VB2019 in London, McAfee researchers John Fokker and Alexandre Mundo looked at the malware code, its evolution…

VB2019 paper: Domestic Kitten: an Iranian surveillance program

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video…

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

VB2019 paper: DNS on fire

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.