Topics: Authorization, Authentication, Access Control, Availability, Confidentiality, Integrity Botnets and Botnet Monitoring, Dependability, Resilience, Designing Security Requirements, Digital Forensics, Human Factors in Security and Privacy, Identity Management, Incident Response an Prevention, Information Hiding and Steganography, Intrusion Detection and Fraud Detection, Legal issues related to security and privacy, Machine Learning for Security and Security for machine learning, mobile security, network security, Privacy-enhancing Technologies (PETs), Process based Security Models and Methods, Risk Analysis, Security an Privacy for E-Health, E-Payments, E-Voting, E-Commerce, Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications, Security and Privacy for Critical infrastructures, Smart Grids, Internet of Things, RFID, Security and Privacy Awareness, Security and Usability, Side Channels, Software Security, Threats and Attack Modelling, Trusted Computing, Trust Models and Trust Management, Wireless Security, Web Security