Securitybyte Conference | Information Security Conference | Securitybyte 2011
And we have got one more security conference – Securitybyte 2011. This 4-day event features two days of conferences and two days of post-conference hands-on Trainings & Certifications covering every aspect of Information Security. The Securitybyte conference features some of the most respected names in the Security space and is focused around new research and innovation. The Securitybyte Conference 2011 is planned for Sept 6th through 9th, 2011 at The Sheraton Hotel in Bangalore, India.
The two-day conference (Sept 6th & 7th) will have the following three
tracks:
- Basic
- Deep Technical
- Manager
Submission Deadline: The first round of submission of papers for conference talks and trainings should be done no later than June 15th, 2011. Please send all your submissions to cfp@securitybyte.org
TOPICS
Got a new attack against any technology or device? We want to see it.Topics of interest include, but are not limited to, the following:
Technology-Focused
- Application & Web Security
- SOA & Cloud Security
- Electronic Device Security (Cell Phones / PDA's)
- Defeating Biometrics
- 3G/4G Cellular Network Security
- WLAN, RFID and Bluetooth Security
- Data Recovery and Incident Response
- Virtualization Security
- Satellite Hacking
- Hacking Electronic Voting systems
- Next-gen BOTNets
- Worms & Malware
- Protocol exploits
- Database Security
- Forensic & Cyber security
- Social Engineering
- Hacker media/film presentations
- Firmware & Hardware hacking
- Physical Security
- Embedded systems hacking
- Smartcard technologies
- Credit card and financial instrument technologies
Regulatory & Law
- Copyright infringement and anti-copyright infringement enforcement technologies
- Critical infrastructure issues
- Data security and privacy issues
- Identity theft, identity creation & identity fraud
- Corporate Espionage
Management
- Enterprise Risk management framework
- SOA Governance
- Understanding the true value of GRC
- Information Security Governance
- Cloud Computing
- Unified Compliance Framework
- Security Metrics
National Security
- Cyber forensics
- Cyber warfare
- Cyber Espionage
- Next hyphenGen Cyber threats
- Critical Infrastructure protection
- Surveillance & counter-surveillance
Speaker Submission:
Please use the following submission form template to respond:
- Name, title, address, email, and phone/contact number
- Short biography, qualifications, occupation, achievements, and affiliations (limit 250 words.)
- Summary or abstract of your presentation (limit 1250 words.)
- Technical requirements (video, internet, wireless, audio, etc.)
- References (Contact name, title, and email address of two
- conferences you have spoken at or comparable references.)
Training Submission: (Sept 8th & 9th, 2011)
Please include the following information for your training proposal:
- Name, title, address, email, and phone/contact number
- Short biography, qualifications, occupation, achievements, and affiliations (limit 250 words)
- Training Overview
- Who should attend
- Course Syllabus
- Length
- Proposed Pricing
- Technical Requirements (Videos, internet, wireless, audio, laptop,etc.)
- Hands-on/ Demo-based/ labs
- References (Contact name, title, and email address of two conferences you have taught at or comparable references)
Please note, product or vendor pitches are not accepted. If your talk involves an advertisement for a new product or service your company is offering, please do not submit a proposal.