<html>
<head>
<body>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<pre>
______________________________________________________________
_._) (_._
| .%$$% .. |
' __________. ._____ ________.&&$ '$$%$.__________ '
._\ /___.___\ \_____/ ____/$&# &&$\ /_
-:-\ \_____\ | /____/ /________\'$#%. .$&&'/____/ /-:-
/____/ \________/ \____\ ' %$$$%' /_____/
. www.ruxcon.org.au .
_|_ _|_
'(______________________________________________________________)'
</pre>
<br></br>
<b>Introduction</b>
<p>The Ruxcon team is pleased to announce the final round of Call For Presentations for Ruxcon 2015.</p>
<p>This year the conference will take place over the weekend of the 24th and 25th of October at the CQ Function Centre, Melbourne, Australia.</p>
<p>The deadline for final submissions is the <strong>15th of September, 2015</strong>.</p>
<b>About Ruxcon</b>
<p>Ruxcon is the premier technical computer security conference in Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations.</p>
<p>The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security.</p>
<p>Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community.</p>
<b>Important Dates</b>
<p></p>
<ul>
<li>September 15 - Final Call For Presentations Close</li>
<li>October 22-23 - Breakpoint Conference</li>
<li>October 24-25 - Ruxcon Conference</li>
</ul>
<p></p>
<b>Topic Scope</b>
<p>Topics of interest include, but are not limited to:</p>
<ul>
<li>Mobile Device Security</li>
<li>Virtualization, Hypervisor, and Cloud Security</li>
<li>Malware Analysis</li>
<li>Reverse Engineering</li>
<li>Exploitation Techniques</li>
<li>Rootkit Development</li>
<li>Code Analysis</li>
<li>Forensics and Anti-Forensics</li>
<li>Embedded Device Security</li>
<li>Web Application Security</li>
<li>Threat Intelligence</li>
<li>Wireless Network Security</li>
<li>Cryptography and Cryptanalysis</li>
<li>Social Engineering</li>
<li>Law Enforcement Activities</li>
<li>Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)</li>
</ul>
<b>Submission Guidelines</b>
<p></p>
<p>In order for us to process your submission we require the following information:</p>
<p>1. Presentation title<br>2. Detailed summary of your presentation material<br>3. Name/Nickname<br>4. Mobile phone number<br>5. Brief personal biography<br>6. Description of any demonstrations involved in the presentation<br>7. Information on where the presentation material has or will be presented before Ruxcon</p>
<strong><p>To submit a presentation please use our submission form: <a href="http://goo.gl/WXNBvr">http://goo.gl/WXNBvr</a></p></strong>
<p>As a general guideline, Ruxcon presentations are between 45 and 60 minutes, including question time.</p>
<p>Please note that Ruxcon isn't able to cover any travel expenses for speakers. Speakers in the past have had success in having their employer cover conference related expenses. Our other conference <a href="http://www.ruxconbreakpoint.com">Breakpoint</a> does cover travel expenses and runs 2 days before Ruxcon. </p>
<p>If you have any enquiries about submissions please send an email to <a href="mailto:presentations@ruxcon.org.au">presentations@ruxcon.org.au</a></p>