t2 was born at a time when there was a need for a conference that was “from hacker to hacker” when there was not one single independent, technically oriented, information security conference in Finland in existence.
The mission of t2 has remained the same from its commencement, to be an annual conference dedicated to those who are interested in the technical aspects of information security. t2 offers the opportunity to publish new research and ideas as well as networking, the latter an elemental part of s ideology.
By and large, while there is a focus on newly emerging information security research, presentations at the conference address all aspects of information security, from auditing, to pen-testing, to security and defensive strategies. The presenters are not only experienced security professionals, leading the vanguard within information security technology, but also experienced instructors, helping you stay abreast of the latest developments in this rapidly moving technological field through prepared tutorials.
t2 offers a unique opportunity to have visibility among seasoned information security practitioners. There are many different ways to support t2 — here are a few examples:
- WWW-pages: logo, that links to a s homepage
- Footer: slogan or one paragraph of text e.g. at the end of mailing list messages
- Materials: logo branded usb-sticks, binders, pens, textpads, etc.
- Event: T-shirts, name badges, booths, brochures, branded cocktails & networking etc.
Details on sponsorship are always discussed on a case-by-case basis.
In order to guarantee the independent nature of t2, the following guidelines have been established:
- No sponsor can affect the agenda. In order to run an independent conference, it is essential that no sponsor influence the topic or content of any given presentation.
- Each and every presenter is there because of his or her skills. Sponsorship is not a fast lane past the CFP, meaning that sponsorship will not guarantee you a presentation slot at the conference. It does not prevent it either; the bottom line is that the advisory board handles all submissions equally.