[Hipsec] Call for Papers/ San Francisco, CA

"Becky Vandorn" <becky.vandorn@computerforensicshow.com> Thu, 27 May 2010 15:45 UTC

Return-Path: <becky.vandorn@computerforensicshow.com>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4C0E23A6359 for <hipsec@core3.amsl.com>; Thu, 27 May 2010 08:45:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.789
X-Spam-Level:
X-Spam-Status: No, score=0.789 tagged_above=-999 required=5 tests=[AWL=-0.712, BAYES_99=3.5, GB_I_LETTER=-2, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LPqfpmZ8PoXw for <hipsec@core3.amsl.com>; Thu, 27 May 2010 08:45:39 -0700 (PDT)
Received: from computerforensicshow.com (computerforensicshow.com [198.171.167.178]) by core3.amsl.com (Postfix) with ESMTP id E80753A68CB for <hipsec@ietf.org>; Thu, 27 May 2010 08:45:38 -0700 (PDT)
Received: from p2e90gwm (ool-44c631e5.dyn.optonline.net [68.198.49.229]) (authenticated bits=0) by computerforensicshow.com (8.14.4/8.14.4) with ESMTP id o4RF57nB019588; Thu, 27 May 2010 15:05:09 GMT
Message-ID: <B4B5658EF660420F9820EF78DFA7FC98@p2e90gwm>
From: Becky Vandorn <becky.vandorn@computerforensicshow.com>
To: Becky Vandorn <becky.vandorn@computerforensicshow.com>
Date: Thu, 27 May 2010 11:03:10 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00FE_01CAFD8C.31F578A0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5931
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5931
X-Mailman-Approved-At: Mon, 31 May 2010 03:49:33 -0700
Subject: [Hipsec] Call for Papers/ San Francisco, CA
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 May 2010 15:45:41 -0000

CALL FOR PAPERS: The Computer Forensics ShowCALL FOR PAPERS: The Computer Forensics Show
 

November 1-2, 2010 . Fort Mason Convention Center . San Francisco, CA

 

IMAGINE THE ABILITY TO VIEW ANYTHING THAT EVER APPEARED ON ALMOST ANY COMPUTER

THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL

 

LEGAL, ACCOUNTING, IT SECURITY, RISK MANAGEMENT, AND LAW ENFORCEMENT PROFESSIONALS

 

Forensic Trade Shows, LLC is proud to announce The Computer Forensics Show, November 1st and 2nd, 2010 at the Fort Mason Convention Center, San Francisco, CA.

 

The Computer Forensics Show is geared to meet the needs of industry professionals by providing detailed information regarding the changes and advancements in the IT security marketplace.

 

The event will highlight exhibits from some of the leading companies in the industry, complemented by a comprehensive conference program to provide attendees with important information about the latest technological advancement, ideas and practical information available today.

 

The Computer Forensics Show offers its speakers tremendous opportunities for exposure and recognition as industry leader. Your session will attract many technical professionals interested in learning from your example, expertise and experience. In appreciation of your contributions as a conference speaker, we provide the following benefits:

 

   . Complementary speaker registration to the exhibition and full conference pass;

   . Complementary session passes for your colleagues to attend your session (upon request);

   . Presenters will receive three promotional conference passes to promote their session.

 

Please visit our speaker page from this year's show at http://www.computerforensicshow.com/speakers_panels.htm. 

 

There are 6 main tracks in the conference 

 

Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today.

Legal (A) - EDD, including Litigation and Best Practice Issues.

Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy.

IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today.

IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training.

Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures.

 

The first and last sessions of each track on both days will be vendor only and will be open to all attendees at no charge.

 

The Show's Conference Department is asking industry executives to submit brief abstracts on some current topics to be presented to attendees in a solo presentation or as part of a conference panel. If you are interested, please review the following guidelines and contact information, and note the submission deadlines for the conference.  

 

Guidelines

 

Formatting:

   . Paper size - letter/8.5" width X 11.0" height.

   . Margins - top/bottom/left/right - 1".

   . Font - Times New Roman 11 point.

   . Paragraph Spacing - single spaced. 

   . The submission should be sent in Microsoft Word.

 

The submission must include:

   . The Presentation Title

   . Author Name(s) . Title . Company

   . Speaker Contact Information: Address . Phone Number . E-mail Address

   . Keywords (4-8 words)

   . ABSTRACT* The presentation abstract should outline your presentation and what attendees would learn. Please    remember that all the content must be strictly educational and marketing oriented papers will not be accepted. The presentation has to be oriented for: Accounting, Legal, IT Security, Risk Management, and Law Enforcement professionals.

   . BIOGRAPHY* The speakers biography should be 60 to 100 words in paragraph form. These may include present position, titles, areas of professional expertise, experience, research interests, major publications, degrees, etc.

 

* Abstract and Biography information should not extend more than one page and will be used for our Show Guide and Website if speaking.

 

Please do not hesitate to include additional material regarding your presentation(s) for better evaluation.

 

The total presentation length is 75 minutes: speech ~ 50-60min; Q&A ~ 15-20min.

 

SUBMISSION DEADLINE: July 20th, 2010. 

 

Submissions will be evaluated for originality, significance of the work, technical content, and interest to a wide audience. Speakers may also be grouped into panels when there are overlapping topics of interest.

 

Submissions should be in Microsoft Word and sent to nmanley@computerforensicshow.com.  Please note that due to the expected volume of submissions, Forensic Trade Shows, LLC will only contact speakers who are selected. 

 

By agreeing to speak, you grant one-time permission to Forensic Trade Shows, LLC to retain and publish a copy of your presentation. The copyright and all other rights to the presentation remain with the author(s). All rights to and use of The Computer Forensics Show name and logos are retained exclusively by its respective party.

 

A copy of the presentation materials should be submitted to us no later than August 20th, 2010. It should be sent in Microsoft PowerPoint (.ppt) format on the Computer Forensics Show template that will be provided to you prior to the conference. If you use any animation or active content, please include that as well. For reliability and security purposes, all presentations will be preloaded onto the presentation computers at the conference.

 

Note: Substitutions for speakers are only allowed under emergency circumstances, and tradeshow management must be immediately notified of any changes.  All participants are selected at the discretion of show management.

 

Suggested topics include

      Accountant Malpractice Claims 

      Anonymity and Proxies

      Authentication and Access Control 

      Civil Litigation 

      Class Action Disputes 

      Computer Crime and Information Warfare

      Construction Solutions 

      Corporate Governance 

      Corporate Information 

      Corporate Risk and Security 

      Criminal Fraud and Deception Cases 

      Cyber Forensics 

      Damage Assessment 

      Digital Forensic Case Studies 

      Digital Forensic Processes and Workflow Models 

      Digital Forensics and Internet

      Digital Law 

       
     Digital Rights Management (DRM)

      Digital Signatures 

      E-Discovery 

      Employee Internet Abuse 

      Employment and Family Law Cases 

      Encryption and Decryption

      Environmental Litigation 

      Financial Investigations and Forensic Accounting 

      Forensics Accounting and the Internet

      Fraud Investigation 

      General Commercial Disputes 

      Identity Theft

      Industrial Espionage 

      Insurance Claims and Digital Forensics

      Integrity of Archival Data 

      Intellectual Property Claims 

      International Risk and Investigations

      Intrusion Detection 
     IT Security and Compliance 

      Legal, Ethical and Policy Issues 

      Mobile Forensics 

      More General Criminal Cases 

      Network Forensics 

      New Firewall Technologies 

      Portable Electronic Device Forensics 

      Post-Acquisition Disputes 

      Privacy and Data Mining 

      Privacy issues in digital forensics

      Privacy Leakage Case Studies 

      Privacy Policy Enforcement 

      Security Education and Training 

      Smart Card Applications 

      Stealth Data 

      Steganography

      Stylometrics and Author Attribution

      Terrorist Use of the Internet 

      Unauthorized Disclosure of Corporate Information
     

Additional classes will also be available to attendees such as: 

Computer Forensics - CCFE Boot Camp - 5 Days

Advanced Computer Forensics - 5 Days

Cell Phone Forensics - 2 Days

Live Memory Forensics - 2 Days

Linux Forensics - 3 Days

Mac Forensics - 3 Days

Reverse Engineering Malware - CREA Boot Camp - 5 Days

Ethical Hacking - CPT/CEH Boot Camp - 5 Days

 

If you have any questions about The Computer Forensics Conferences, please send us an e-mail to info@computerforensicshow.com. 

 

# # #

 

To be removed from the mailing list please send us an e-mail to: remove@computerforensicshow.com.