Forwarded from: AusCERT2009 <auscert (at) auscert.org.au> AusCERT2009 Call for Presentations and Tutorials http://conference.auscert.org.au/conf2009/cfp2009.html The conference will take place from 17th - 22nd May 2009 at Crowne Plaza Royal Pines Resort, Gold Coast, Australia. Note that this is not an academic refereed call for papers. A separate refereed stream for research and development is available for this purpose and a call for papers will be announced separately. Presentation/Tutorial Submission: The programme committee welcomes original contributions not previously published nor submitted in parallel for publication to any other conference or workshop. Highly desirable topics are: . (Web) Application Security and Software Assurance . Business Continuity and Disaster Recovery . Compliance, Audit and Security Management . Computer/Network Forensics and Investigations . Critical (Information) Infrastructure Protection . Cybercrime & Identity Theft . Malicious Software, Honeynets and Honeypots and Intelligence gathering/analysis . Infrastructure, Network, Virtualisation, Mobile and Wireless Security . Incident Response . Legal and Privacy and Information Security Submissions promoting specific products or services will not be considered nor accepted. Presentation summaries should be between 2 and 8 pages - typeset in a 12-point font. Submissions will only be considered if they provide a clear idea of the presentation content, key points to be covered during the presentation and are followed by the PowerPoint presentation at a later date. Summaries should be submitted in text, PDF or html formats. Submissions will be accepted until the 17:00 AEST, 5th December 2008. All presentations and tutorial submissions will be handled electronically. Authors should submit their presentation electronically via the AusCERT website: https://www.auscert.org.au/callforpapers Presentation requirements: Presentations run for 40 minutes, however, we would recommend a 30-35 minute presentation to allow time for questions. Note that if your presentation is selected you must comply with the following: 1. Provide PowerPoint or PDF slides by 6 March 2009 for inclusion on the conference CDROM in PDF form. 2. If PowerPoint or PDF slides are NOT received by 6 March 2009 then the programme committee may decide to replace the presentation with an alternative. 3. If for any reason the nominated speaker cannot present then the conference programme committee or the conference organisers must be informed as soon as possible and no later than seven days prior to the commencement of the conference. The program committee reserves the right to allocate the presentation slot to another presenter in this event. AusCERT2009 requires a non-exclusive copyright license for all presentations at the conference and for the presentation material. This includes potential distribution on a conference CDROM and the conference website. Tutorial requirements: Tutorials may be half (3.5 hours) or full day (7 hours) or two days (14 hours) and can cover topics with a business or technical focus. Note that if a tutorial is selected, handout material for distribution to tutorial attendees must be provided at least 14 days prior to the commencement of the conference. AusCERT2009 requires a non-exclusive copyright license for all tutorial handout material for distribution to tutorial attendees. Important Dates: Presentation/Tutorial Summary Submission deadline: 5 December 2008 Notification of acceptance: 30 January 2009 Final presentation material (slides) due: 6 March 2009 AusCERT2009 Conference 17-22 May 2009 Presentation and Tutorial Selection: The AusCERT2009 Program Committee will independently select all topics and speakers based on the quality of presentations. Acceptance of these submissions is at the discretion of the Program Committee which has the right to refuse any submission. The Program Committee's decisions are final. __________________________________________________ Register now for HITBSecConf2008 - Malaysia! With a new triple-track conference featuring 4 keynote speakers and over 35 international experts, this is the largest network security event in Asia and the Middle East! http://conference.hackinthebox.org/hitbsecconf2008kl/Received on Fri Oct 24 2008 - 02:09:32 PDT
This archive was generated by hypermail 2.2.0 : Fri Oct 24 2008 - 02:26:10 PDT