Virus Bulletin encourages experienced speakers and newcomers alike to submit proposals for VB2019

Posted by   Martijn Grooten on   Feb 19, 2019

There is a little less than a month left until the deadline (17 March) of the call for papers for VB2019, the 29th Virus Bulletin International Conference.

Over almost three decades, the Virus Bulletin Conference has built a reputation as a conference that produces solid content. Some take this to mean that we are looking for experienced speakers with decades' worth of experience doing security research. This is not the case.

We aim for a diverse programme, not just in topics and in speakers' backgrounds, but also when it comes to the experience of speakers. We can all learn something from the fresh insights a new speaker can bring, or from the knowledge of a speaker who has thus far kept their work to themselves. Several people have given their first conference talk at VB only to go on to speak at many other events.

 

vb2019-montage.jpg

 

We aim to make the conference experience as pleasant as possible and won't interfere much with the more experienced speakers, but we're happy to help less experienced speakers with their papers and their talks if they wish.

The same goes for their abstract submissions, for that matter – don't hesitate to reach out ([email protected]) if you have any questions, or if you're still not sure whether you have something to bring. Otherwise, why not go ahead and submit your proposal now?

VB2019-withdate.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.