[<prev] [next>] [day] [month] [year] [list]
Message-ID: <49613435.9030709@securenetwork.it>
Date: Sun, 04 Jan 2009 23:12:05 +0100
From: Stefano Zanero <s.zanero@...urenetwork.it>
To: Bugtraq <bugtraq@...urityfocus.com>
Subject: Call for papers and trainers - SeacureIT 2009
Dear colleagues,
it is my pleasure to officially announce the launch of SEaCURE.IT, the
first international technical conference ever held in Italy on security
releated topics (http://www.seacure.it).
The 2009 edition will be held from May 19th to 22nd in the wonderful
seaside resort Tanka Village, located in Villasimius, Sardinia, a large
and beautiful island in the Mediterranean sea.
Besides the main conference, featuring two tracks of top-notch
presentations over two intense days, the programme will include two days
of advanced trainings, and a set of unique social events (Italian
style), in order to foster networking.
A number of key speakers already confirmed their presence, and we warmly
thank them for the trust placed in us. With this call for papers, we
invite submission of papers from researchers worldwide for presentation
at our conference.
== About SEaCURE.it ==
SEaCURE.IT is the first international technical conference ever held in
Italy on security releated topics, aimed at bringing together the
leading experts from all over the world, to create a unique setting for
networking and discussion among the speakers and the attendees.
The 2009 edition will be held from May 19th to 22nd in the wonderful
seaside resort Tanka Village, located in Villasimius. In a relaxed
setting, our attendees and speakers will be able to meet and discuss in
an informal, highly profitable way.
Besides the main conference, featuring two tracks of top-notch
presentations over two intense days, the programme includes two days of
advanced trainings, and a set of unique social events (Italian style),
in order to foster networking.
SeacureIT is a non-vendor biased conference, strongly believing that it
is possible to put together the brightest minds from the university,
goverment, industry and hacking community to provide the audience with
cutting-edge research in the field.
Target Audience: Security Officers, Security Professionals and Product
Vendors, IT Decision Makers, Policy Makers, Security-, Network-, and
Firewall-Admins, and Software Developers.
== Speakers/Trainers ==
Until February 10th, 23:59 CET, we'll be accepting speech proposals.
Please note we are a non-product, non-vendor biased security conference,
and do not accept vendor pitches. Any talk evidently aimed at selling
products or services will be rejected without consideration. We look for
novel research and contributions in the fields of computer, network and
information security. Please, submit your idea to us: we will carefully
evaluate it. We will also evaluate proposals for 2-days technical
trainings on the same topics.
We offer the following speaker privileges:
* * One economy class return-ticket to Cagliari for each accepted
presentation.
* * 3 nights of accomodation in the Conference Hotel.
* * Meals for the speakers, and speaker activities during, before,
and after the conference.
* * A comprehensive program of activities for non-geek partners :)
* * Speaker party
We offer the following trainer privileges:
* * 50% of the net profit of the class
* * 3 nights of accomodation in the Conference Hotel
* * Meals during the days of the training
* * Free access to the Conference
* * Participation to speaker activities
== Topics ==
We are interested in bleeding edge security research, directly from
leading researchers, professionals in academics, industry, and
government, and the underground security community. Topics of special
interest include, but are not limited to:
* * Vista, Linux, OSX Security
* * E/I-Voting Case-Studies, Attacks, Weaknesses
* * Mobile Security
* * Network Protocol Analysis
* * AJAX/Web2.0/Javascript Security
* * Secure Software Development
* * VoIP
* * Perimeter Defense / Firewall Technology
* * Digital Forensics
* * WLAN/WiFi, GPRS, IPv6 and 3G Security
* * IPv6
* * Smart Card Security
* * Cryptography
* * Intrusion Detection
* * Incident Response
* * Rootkit Detection, Techniques, and Defense
* * Security Properties of Web-Frameworks
* * Malicious Code Analysis
* * Secure Framework Design
* * .Net and Java Security
== Submissions ==
Please send your submission to cfp@...cure.it with the following
information IN PLAIN TEXT in your email:
1. Presenter name and affiliation
2. Country and city of origin for your travel to the conference, as
well as nationality/passport for visa requirements
4. contact information (e-mail address and a landline phone if possible)
5. SHORT biography, and a list of SELECTED publications and papers
6. Proposed paper title / proposed training title
7. Proposed paper abstract / proposed training outline
8. Three key reasons why you want to speak at SEaCURE.IT and why we
would want you to speak :)
9. Optionally, any samples of prepared material or outlines (for
this, a pdf attachment is acceptable)
10. Please list any other publications or conferences where this
material has been or will be published/submitted. Concurrent submission
is not a reason for rejection, while un-announced multiple submissions
will make you look considerably bad ;-)
This last point also applies for the trainings, please let us know how
many times the training has been delivered and where.
Regards,
Stefano Zanero
Powered by blists - more mailing lists