What kind of people attend Virus Bulletin conferences?

Posted by   Martijn Grooten on   Feb 17, 2018

The Call for Papers for VB2018, the 28th Virus Bulletin International Conference, which will take place in Montreal, 3-5 October 2018, opened last month. It will remain open until 18 March.

If you're considering submitting a paper and you have not attended a VB conference before, it might help to have a better understanding of the audience.

Many attendees are security researchers. They spend their days (and often nights) analysing malware, threats and vulnerabilities. They attend conferences like VB to talk about their work, learn what others have worked on and, perhaps most importantly, to make the contacts that are so essential for any security researcher.

Many other attendees, however, have less technical roles. They manage a product, a team, or both; they may be the 'evangelists' that spend their days talking to the wider audience about security issues; or they may work in the 'real world' in CISO-like roles. Such people often have a technical background but they rarely, if ever, get their hands dirty any more and depend on conferences like VB to learn about the current state of research.

 

montage.jpg

This means that any kind of security research, especially if it has practical relevance, is likely to be received with interest: analyses of malware, vulnerabilities and threat campaigns; detailed studies of one particular incident, or talks that take a bird's-eye view of a whole category of threats; talks about tools that make researchers' lives easier and tools that improve the detection of various threats.

But there is far more to security research than the cat-and-mouse game of extra layers of packers and the increasingly complex flow charts in IDA Pro. We very much welcome talks on non-technical aspects of security too, and in the past we have had important talks on topics as varied as user education, spyware used in domestic abuse cases, and the legal issues that may come with running a malware research lab.

One thing we are particularly interested in are talks from people who are at the forefront of protecting organisations, whether they are large companies, government institutions or NGOs. What attacks do you see and what are you doing to prevent them from impacting your organisation? What tools have you built that make your work a lot easier? And how does the real world differ from the picture painted by security vendors?

As I have said previously, we welcome both new and experienced speakers. We do not have a separate 'rookie' track, but  we are happy to support and help you to deliver your paper as well as possible.

We welcome speakers from all over the world. We attract a very global audience and, for many attendees, English is not their first language – so if this applies to you as well, do not let it put you off!

The FAQs we posted for last year's conference still apply, but please don't hesitate to contact me (martijn.grooten@virusbulletin.com) if you have any other questions. We look very much forward to your submission!

Finally, if this is the kind of audience your company likes to connect with, why not become a partner of the conference? Email us at conference@virusbulletin.com for more information.

VB2018-withdate-325w.jpg

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their…

New paper: Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

In a follow-up to a paper presented at VB2019, Prismo Systems researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting (XSS), and server‑side request…

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.

VB2019 paper: Cyber espionage in the Middle East: unravelling OSX.WindTail

At VB2019 in London, Jamf's Patrick Wardle analysed the WindTail macOS malware used by the WindShift APT group, active in the Middle East. Today we publish both Patrick's paper and the recording of his presentation.

VB2019 paper: 2,000 reactions to a malware attack – accidental study

At VB2019 cybercrime journalist and researcher Adam Haertlé presented an analysis of almost 2000 unsolicited responses sent by victims of a malicious email campaign. Today we publish both his paper and the recording of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.