[Wasc-honeypots] CFP SecurityByte Conference India

Papers, Call For cfpt at securitybyte.org
Mon Jul 25 13:32:33 EDT 2011


Hello Everyone,

The first round of speakers have been selected for Securitybyte, please
follow us on twitter @securitybyte to get the latest updates on speakers and
event.

Deral Heiland, From Printer to Owned: Leveraging Multifunction Printers
During Penetration Testing
Nithya Raman, Security threats on social networks
Alexander Polyakov, A Crushing Blow At the Heart of SAP J2EE Engine
Bishan Singh, Enabling Un-trusted Mashups
Krzysztof Kotowicz, HTML5: Something Wicked This Way Comes
John McColl, Hacking Corporate Telephony
Aseem Jakhar, Runtime thread injection and execution in Linux processes
George Nicolaou, Alternative Exploitation Vectors (A study of CVE-3333)
Michele Orru, Securing the Browser
Kanwal K. Mookhey, The Data Theft Epidemic in India
Vivek Ramachandran, Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun
and Profit

The 2nd round of CFP is out

CFP/CTP

Securitybyte is proud to announce its Second Annual International
Information Security Conference, "Securitybyte 2011" in Bangalore, India.
This 4-day event features two days of conferences and two days of
post-conference hands-on Trainings & Certifications covering every aspect of
Information Security. The Securitybyte conference features some of the most
respected names in the Security space and is focused around new research and
innovation. The Securitybyte Conference 2011 is planned for Sept 6th through
9th, 2011 at The Taj Hotel in Bangalore, India.

The two-day conference (Sept 6th & 7th) will have the following three
tracks:

    Deep Technical
   Government & Governance
    Management

Submission Deadline: The first round of submission of papers for conference
talks and trainings should be done no later than August 5th, 2011. Please
send all your submissions to cfp at securitybyte.org, keeping subject line as
"SB 2011 CFP Submission".

TOPICS

Got a new attack against any technology or device? We want to see it.

Topics of interest include, but are not limited to, the following:

Management
                Case studies around any of the topics above of how the
implementation was done and what were some of the lessons learned.

Technology-Focused

                Cloud Security
                Electronic Device Security (Cell Phones / PDA's)
                Defeating Biometrics
                WLAN, RFID and Bluetooth Security
                Data Recovery and Incident Response
                Virtualization Security
                Database Security
                Forensic & Cyber security

Regulatory & Law

                Copyright infringement and anti-copyright infringement
enforcement technologies
                Critical infrastructure issues
                Data security and privacy issues
                Identity theft, identity creation & identity fraud
                Corporate Espionage


National Security

    Cyber forensics
    Cyber warfare
    Cyber Espionage
    Next hyphenGen Cyber threats
    Critical Infrastructure protection
    Surveillance & counter-surveillance

Speaker Submission:

Please use the following submission form template to respond:

    Name, title, address, email, and phone/contact number
    Short biography, qualifications, occupation, achievements, and
affiliations (limit 250 words.)
    Summary or abstract of your presentation (limit 1250 words.)
    Technical requirements (video, internet, wireless, audio, etc.)
    References (Contact name, title, and email address of two conferences
you have spoken at or comparable references.)

Please note, product or vendor pitches are not accepted. If your talk
involves an advertisement for a new product or service your company is
offering, please do not submit a proposal.

Regards,
SecurityByte

On Mon, Jul 25, 2011 at 10:38 PM, <
wasc-honeypots-request at lists.webappsec.org> wrote:

> Mailing list subscription confirmation notice for mailing list
> wasc-honeypots
>
> We have received a request from 14.96.157.123 for subscription of your
> email address, "cfpt at securitybyte.org", to the
> wasc-honeypots at lists.webappsec.org mailing list.  To confirm that you
> want to be added to this mailing list, simply reply to this message,
> keeping the Subject: header intact.  Or visit this web page:
>
>
> http://lists.webappsec.org/mailman/confirm/wasc-honeypots_lists.webappsec.org/3efde1a8cc44e4c7ac1ab6c9bf60459da6adff60
>
>
> Or include the following line -- and only the following line -- in a
> message to wasc-honeypots-request at lists.webappsec.org:
>
>    confirm 3efde1a8cc44e4c7ac1ab6c9bf60459da6adff60
>
> Note that simply sending a `reply' to this message should work from
> most mail readers, since that usually leaves the Subject: line in the
> right form (additional "Re:" text in the Subject: is okay).
>
> If you do not wish to be subscribed to this list, please simply
> disregard this message.  If you think you are being maliciously
> subscribed to the list, or have any other questions, send them to
> wasc-honeypots-owner at lists.webappsec.org.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webappsec.org/pipermail/wasc-honeypots_lists.webappsec.org/attachments/20110725/9df698c5/attachment-0003.html>


More information about the wasc-honeypots mailing list