Forwarded from: The Computer Forensics Show <fmanley (at) computerforensicshow.com> CALL FOR PAPERS: The Computer Forensics Show April 19-20, 2011 * New York City * NY For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when. THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL LEGAL, ACCOUNTING, IT SECURITY, RISK MANAGEMENT, AND LAW ENFORCEMENT PROFESSIONALS Forensic Trade Shows, LLC is proud to announce The Computer Forensics Show, April 19-20, 2011 in New York City, NY. The event will highlight exhibits from some of the leading companies in the industry, complemented by a comprehensive conference program to provide attendees with important information about the latest technological advancement, ideas and practical information available today. The Computer Forensics Show offers its speakers tremendous opportunities for exposure and recognition as industry leader. Your session will attract many technical professionals interested in learning from your example, expertise and experience. In appreciation of your contributions as a conference speaker, we provide the following benefits: * Complementary speaker registration to the exhibition and full conference pass; * Complementary session passes for your colleagues to attend your session (upon request); * Presenters will receive three promotional conference passes to promote their session. Please visit our speaker page from this year's show at http://www.computerforensicshow.com/speakers_panels.htm. There are 6 main tracks in the conference: Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today. Legal (A) - EDD, including Litigation and Best Practice Issues. Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy. IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today. IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training. Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures. Additional classes will also be available to attendees: Computer Forensics - CCFE Boot Camp - 3 Days Cell Phone Forensics - 3 Days C4SEM-CJ-103 Identity Theft-Fraudulent Documents Credit: 3 C4SEM-SEC-105 Cyber Terrorism - Security Credit: 3 The Show's Conference Department is asking industry executives to submit brief abstracts on some current topics to be presented to attendees in a solo presentation or as part of a conference panel. If you are interested, please review the following guidelines and contact information, and note the submission deadlines for the conference. Guidelines: Formatting * Paper size - letter/8.5" width X 11.0" height. * Margins - top/bottom/left/right - 1". * Font - Times New Roman 11 point. * Paragraph Spacing - single spaced. * The submission should be sent in Microsoft Word. The submission must include * The Presentation Title * Author Name(s) * Title * Company * Speaker Contact Information: Address * Phone Number * E-mail Address * Keywords (4-8 words) * ABSTRACT* The presentation abstract should outline your presentation and what attendees would learn. Please remember that all the content must be strictly educational and marketing oriented papers will not be accepted. The presentation has to be oriented for: Accounting, Legal, IT Security, Risk Management, and Law Enforcement professionals. * BIOGRAPHY* The speakers biography should be 60 to 100 words in paragraph form. These may include present position, titles, areas of professional expertise, experience, research interests, major publications, degrees, etc. * Abstract and Biography information should not extend more than one page and will be used for our Show Guide and Website if speaking. Please do not hesitate to include additional material regarding your presentation(s) for better evaluation. The total presentation length is 75 minutes: speech ~ 50-60min; Q&A ~ 15-20min. SUBMISSION DEADLINE: January 15th, 2011. Submissions will be evaluated for originality, significance of the work, technical content, and interest to a wide audience. Speakers may also be grouped into panels when there are overlapping topics of interest. Submissions should be in Microsoft Word and sent to Conference Coordinator at speaker_at_private Please note that due to the expected volume of submissions, Forensic Trade Shows, LLC will only contact speakers who are selected. By agreeing to speak, you grant one-time permission to Forensic Trade Shows, LLC to retain and publish a copy of your presentation. The copyright and all other rights to the presentation remain with the author(s). All rights to and use of The Computer Forensics Show name and logos are retained exclusively by its respective party. A copy of the presentation materials should be submitted to us no later than March 4th, 2011. It should be sent in Microsoft PowerPoint (.ppt) format on the Computer Forensics Show template that will be provided to you prior to the conference. If you use any animation or active content, please include that as well. For reliability and security purposes, all presentations will be preloaded onto the presentation computers at the conference. Note: Substitutions for speakers are only allowed under emergency circumstances, and tradeshow management must be immediately notified of any changes. All participants are selected at the discretion of show management. Suggested topics include: Accountant Malpractice Claims Anonymity and Proxies Authentication and Access Control Civil Litigation Class Action Disputes Computer Crime and Information Warfare Construction Solutions Corporate Governance Corporate Information Corporate Risk and Security Criminal Fraud and Deception Cases Cyber Forensics Damage Assessment Digital Forensic Case Studies Digital Forensic Processes and Workflow Models Digital Forensics and Internet Digital Law Digital Rights Management (DRM) Digital Signatures E-Discovery Employee Internet Abuse Employment and Family Law Cases Encryption and Decryption Environmental Litigation Financial Investigations and Forensic Accounting Forensics Accounting and the Internet Fraud Investigation General Commercial Disputes Identity Theft Industrial Espionage Insurance Claims and Digital Forensics Integrity of Archival Data Intellectual Property Claims International Risk and Investigations Intrusion Detection IT Security and Compliance Legal, Ethical and Policy Issues Mobile Forensics More General Criminal Cases Network Forensics New Firewall Technologies Portable Electronic Device Forensics Post-Acquisition Disputes Privacy and Data Mining Privacy issues in digital forensics Privacy Leakage Case Studies Privacy Policy Enforcement Security Education and Training Smart Card Applications Stealth Data Steganography Stylometric and Author Attribution Terrorist Use of the Internet Unauthorized Disclosure of Corporate Information If you have any questions about The Computer Forensics Conferences, please send us an e-mail to info_at_private If you do not wish to receive news e-mails about the show, please send us an e-mail at remove_at_private ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/Received on Wed Dec 08 2010 - 03:07:25 PST
This archive was generated by hypermail 2.2.0 : Wed Dec 08 2010 - 03:13:32 PST