[Owasp-leaders] OWASP Morocco Cyber Security Conference in the Kingdom of Morocco/Africa 25/26 November 2016 the first OWASP AppSec Africa

Azzeddine Ramrami azzeddine.ramrami at owasp.org
Tue Jul 26 10:43:41 UTC 2016

*Dear Leaders, Dear Community,*

We are proud to announce the dates of the first edition of OWASP Cyber
Security Conference in the Kingdom of Morocco/Africa, as the first try for
AppSec Africa. The event will take place on 25 (conference and CTF) and 26
(CTF, trainings and conference) November 2016, in the Imperial City of
Marrakech - Kingdom of Morocco/North Africa.

I hope that the OWASP community participates in the success of this first
OWASP AppSec Africa event in our continent.

We need volonteers, speakers and sponsors.

This conference aim to be the first OWASP AppSec Africa conference. OWASP
AppSec are true security conferences with all talks and presentations
focusing on various areas of information security. Topics should focus on
the technical and social aspects of security, and should not contain
marketing or sales pitches.

We encourage and prioritize submissions covering research and new work

    -    Secure Engineering: secure coding, static analysis, intelligent
application threat modelling with real use case, web frameworks security,
countermeasures, SDLC, DevOps, etc.
    -    Cognitive Security (Machine Learning and BigData applied to find
cyber security threats with high accurate precision)
    -    Mobile security: Development and/or testing devices and the mobile
    -    Cloud security: Offensive and defensive considerations for
cloud-based web applications
    -    Infrastructure security: Database security, VoIP, hardware,
identity management
    -    Penetration testing: Methodologies, tools, exploit development,
evasion techniques, OSINT, etc.
    -    Emerging web technologies and associated security considerations
    -    Applied Cryptography: Relevant research, new models, algorithm
usage, interesting attacks, and other applications.
    -    Incident response: Threat detection, triage, malware analysis,
forensics, rootkit detection
    -    OWASP tools and projects in practice
    -    Policy and legal: Legislation, privacy, regulations and
compliance, C-level considerations, etc.
    -    Cool hacks and other fun stuff: cryptography, social engineering,


Please use Easy Chair to submit your proposal

Only submissions entered into this form will be considered.

To submit a proposal, please submit an abstract of your intended
presentation (500 to 4000 characters), a brief biography (150 to 800
characters), a headshot, and a signed copy of the speaker agreement. Talks
without all required information may not be considered. Your planned
presentation time is limited to a maximum of 15 minutes (excluding ~5
minutes for discussion and change of speaker). Feel free to attach a
preliminary version of your presentation if available. Any proposal
submitted is subject to a democratic vote by the program committee. Keep in
mind: The better your description of the talk, the better picture the
program committee will have to review your submission. Please proofread
your submission; after approval your abstract, biography, and headshot will
be published verbatim into the program and website.

If you have any issues or need to discuss this with a committee member,
please email cfp at owasp.ma (or contact Azzeddine RAMRAMI to
azzeddine.ramrami at owasp.org for more information, Please do not email me
proposals, though, only via the submission form EasyChair.)


Submission Deadlines: September 15, 2016

Notification of acceptance: September 30, 2016

Final materials due for review: October 20, 2016

Conference proceedings: November 25-26, 2016

Please make sure to submit your proposal before the deadline, to allow us
enough time to review all the proposals and select the best ones, and still
notify everybody with enough time. Only submissions entered into this form
will be considered. In order to ensure that we can give serious
consideration to the content of the lecture, please make sure your
submission is as complete and specific as possible.


By your submission you agree to the OWASP Speaker Agreement
It requires that you use an OWASP presentation template. Presentations may
not use company-themed decks or include a company logo except on the
speaker bio slide. Failure to observe these requirements will result in
talk removal.

All presentation slides will be published on the conference website.
Pictures and other materials in presentations should not violate any

Presentation submitter are solely liable for copyright violations. You may
choose any Creative Commons license for your slides, including CC0. OWASP
suggests the use of open licenses.

Kind regards,

The OWASP Moorocco Program Committee
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20160726/281c280a/attachment.html>

More information about the OWASP-Leaders mailing list