[Hipsec] Call for Papers/ San Francisco, CA
"Becky Vandorn" <becky.vandorn@computerforensicshow.com> Thu, 27 May 2010 15:45 UTC
Return-Path: <becky.vandorn@computerforensicshow.com>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4C0E23A6359 for <hipsec@core3.amsl.com>; Thu, 27 May 2010 08:45:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.789
X-Spam-Level:
X-Spam-Status: No, score=0.789 tagged_above=-999 required=5 tests=[AWL=-0.712, BAYES_99=3.5, GB_I_LETTER=-2, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LPqfpmZ8PoXw for <hipsec@core3.amsl.com>; Thu, 27 May 2010 08:45:39 -0700 (PDT)
Received: from computerforensicshow.com (computerforensicshow.com [198.171.167.178]) by core3.amsl.com (Postfix) with ESMTP id E80753A68CB for <hipsec@ietf.org>; Thu, 27 May 2010 08:45:38 -0700 (PDT)
Received: from p2e90gwm (ool-44c631e5.dyn.optonline.net [68.198.49.229]) (authenticated bits=0) by computerforensicshow.com (8.14.4/8.14.4) with ESMTP id o4RF57nB019588; Thu, 27 May 2010 15:05:09 GMT
Message-ID: <B4B5658EF660420F9820EF78DFA7FC98@p2e90gwm>
From: Becky Vandorn <becky.vandorn@computerforensicshow.com>
To: Becky Vandorn <becky.vandorn@computerforensicshow.com>
Date: Thu, 27 May 2010 11:03:10 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00FE_01CAFD8C.31F578A0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5931
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5931
X-Mailman-Approved-At: Mon, 31 May 2010 03:49:33 -0700
Subject: [Hipsec] Call for Papers/ San Francisco, CA
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 May 2010 15:45:41 -0000
CALL FOR PAPERS: The Computer Forensics ShowCALL FOR PAPERS: The Computer Forensics Show November 1-2, 2010 . Fort Mason Convention Center . San Francisco, CA IMAGINE THE ABILITY TO VIEW ANYTHING THAT EVER APPEARED ON ALMOST ANY COMPUTER THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL LEGAL, ACCOUNTING, IT SECURITY, RISK MANAGEMENT, AND LAW ENFORCEMENT PROFESSIONALS Forensic Trade Shows, LLC is proud to announce The Computer Forensics Show, November 1st and 2nd, 2010 at the Fort Mason Convention Center, San Francisco, CA. The Computer Forensics Show is geared to meet the needs of industry professionals by providing detailed information regarding the changes and advancements in the IT security marketplace. The event will highlight exhibits from some of the leading companies in the industry, complemented by a comprehensive conference program to provide attendees with important information about the latest technological advancement, ideas and practical information available today. The Computer Forensics Show offers its speakers tremendous opportunities for exposure and recognition as industry leader. Your session will attract many technical professionals interested in learning from your example, expertise and experience. In appreciation of your contributions as a conference speaker, we provide the following benefits: . Complementary speaker registration to the exhibition and full conference pass; . Complementary session passes for your colleagues to attend your session (upon request); . Presenters will receive three promotional conference passes to promote their session. Please visit our speaker page from this year's show at http://www.computerforensicshow.com/speakers_panels.htm. There are 6 main tracks in the conference Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today. Legal (A) - EDD, including Litigation and Best Practice Issues. Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy. IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today. IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training. Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures. The first and last sessions of each track on both days will be vendor only and will be open to all attendees at no charge. The Show's Conference Department is asking industry executives to submit brief abstracts on some current topics to be presented to attendees in a solo presentation or as part of a conference panel. If you are interested, please review the following guidelines and contact information, and note the submission deadlines for the conference. Guidelines Formatting: . Paper size - letter/8.5" width X 11.0" height. . Margins - top/bottom/left/right - 1". . Font - Times New Roman 11 point. . Paragraph Spacing - single spaced. . The submission should be sent in Microsoft Word. The submission must include: . The Presentation Title . Author Name(s) . Title . Company . Speaker Contact Information: Address . Phone Number . E-mail Address . Keywords (4-8 words) . ABSTRACT* The presentation abstract should outline your presentation and what attendees would learn. Please remember that all the content must be strictly educational and marketing oriented papers will not be accepted. The presentation has to be oriented for: Accounting, Legal, IT Security, Risk Management, and Law Enforcement professionals. . BIOGRAPHY* The speakers biography should be 60 to 100 words in paragraph form. These may include present position, titles, areas of professional expertise, experience, research interests, major publications, degrees, etc. * Abstract and Biography information should not extend more than one page and will be used for our Show Guide and Website if speaking. Please do not hesitate to include additional material regarding your presentation(s) for better evaluation. The total presentation length is 75 minutes: speech ~ 50-60min; Q&A ~ 15-20min. SUBMISSION DEADLINE: July 20th, 2010. Submissions will be evaluated for originality, significance of the work, technical content, and interest to a wide audience. Speakers may also be grouped into panels when there are overlapping topics of interest. Submissions should be in Microsoft Word and sent to nmanley@computerforensicshow.com. Please note that due to the expected volume of submissions, Forensic Trade Shows, LLC will only contact speakers who are selected. By agreeing to speak, you grant one-time permission to Forensic Trade Shows, LLC to retain and publish a copy of your presentation. The copyright and all other rights to the presentation remain with the author(s). All rights to and use of The Computer Forensics Show name and logos are retained exclusively by its respective party. A copy of the presentation materials should be submitted to us no later than August 20th, 2010. It should be sent in Microsoft PowerPoint (.ppt) format on the Computer Forensics Show template that will be provided to you prior to the conference. If you use any animation or active content, please include that as well. For reliability and security purposes, all presentations will be preloaded onto the presentation computers at the conference. Note: Substitutions for speakers are only allowed under emergency circumstances, and tradeshow management must be immediately notified of any changes. All participants are selected at the discretion of show management. Suggested topics include Accountant Malpractice Claims Anonymity and Proxies Authentication and Access Control Civil Litigation Class Action Disputes Computer Crime and Information Warfare Construction Solutions Corporate Governance Corporate Information Corporate Risk and Security Criminal Fraud and Deception Cases Cyber Forensics Damage Assessment Digital Forensic Case Studies Digital Forensic Processes and Workflow Models Digital Forensics and Internet Digital Law Digital Rights Management (DRM) Digital Signatures E-Discovery Employee Internet Abuse Employment and Family Law Cases Encryption and Decryption Environmental Litigation Financial Investigations and Forensic Accounting Forensics Accounting and the Internet Fraud Investigation General Commercial Disputes Identity Theft Industrial Espionage Insurance Claims and Digital Forensics Integrity of Archival Data Intellectual Property Claims International Risk and Investigations Intrusion Detection IT Security and Compliance Legal, Ethical and Policy Issues Mobile Forensics More General Criminal Cases Network Forensics New Firewall Technologies Portable Electronic Device Forensics Post-Acquisition Disputes Privacy and Data Mining Privacy issues in digital forensics Privacy Leakage Case Studies Privacy Policy Enforcement Security Education and Training Smart Card Applications Stealth Data Steganography Stylometrics and Author Attribution Terrorist Use of the Internet Unauthorized Disclosure of Corporate Information Additional classes will also be available to attendees such as: Computer Forensics - CCFE Boot Camp - 5 Days Advanced Computer Forensics - 5 Days Cell Phone Forensics - 2 Days Live Memory Forensics - 2 Days Linux Forensics - 3 Days Mac Forensics - 3 Days Reverse Engineering Malware - CREA Boot Camp - 5 Days Ethical Hacking - CPT/CEH Boot Camp - 5 Days If you have any questions about The Computer Forensics Conferences, please send us an e-mail to info@computerforensicshow.com. # # # To be removed from the mailing list please send us an e-mail to: remove@computerforensicshow.com.
- [Hipsec] Call for Papers/ San Francisco, CA Becky Vandorn