General Meetings of The Messaging Malware Mobile Anti-Abuse Working Group (M3AAWG) will be held on the following dates:
59th General Meeting- October 9-12, 2023 (Brooklyn, NY) Submission deadline - August 14, 2023, open now
60th General Meeting - February 19 -22, 2024 (San Francisco, CA) Submission deadline - December 6, 2023, open now
61st General Meeting - June 3-6, 2024 (Vienna, Austria) Submission deadline - April 8, 2024, open now
M3AAWG welcomes proposals for keynotes, sessions, panels, and training sessions for these future meetings. We are currently seeking proposals for sessions that can be held virtually or in-person. Decisions regarding each meeting will be made by M3AAWG leadership while considering our member’s health, the logistics of a socially-distanced meeting, and ability to travel. You can find meeting information here.
Sessions generally involve a single speaker or panels (up to six people) and are typically 30-40 minutes long with time allotted for Q&A.
M3AAWG Priorities and Focus Areas
M3AAWG Presentation/Training Session Requirements, please review this document before making your submission - PDF
Submit your session proposals at https://www.m3aawg.org/submissions
Our priorities and focus areas include yet are not limited to:
- Diversity and Inclusion
- Prevention and Mitigation
- Threat intelligence/monitoring/modeling
- Detection, respond, recover
- Timeliness of deprecation of older technologies
- Emerging threats and technologies
- Quantum Computing, adversarial AI, communications
- Post-quantum cryptography, biometrics, artificial intelligence
- Identity protection
- Multi-factor authentication, account compromise, ransomware
- Data privacy and security
- Legislation, policies, governance
- Encryption, encrypted protocols, authentication
- Zero Trust principles
- Verify explicitly, least privilege, assume breach
- Network, Messaging, Mobile, IoT
- Traffic analysis, transport security, endpoint security
- Abuse Desk, Malware, DMARC, DNS, Spam, DDoS
- Messaging, operating system, phishing, applications
- Device security, data security, Mfg. dependencies
- Dependencies, Risk Management, Vulnerability management, Verification
- Open-source software, services
- Assess, monitor
- Detection, remediation
- Secure development, testing
The contents of this Call For Proposals are public.