[ISN] Call For Papers CFS NYC

From: InfoSec News <alerts_at_private>
Date: Wed, 8 Dec 2010 05:07:25 -0600 (CST)
Forwarded from: The Computer Forensics Show <fmanley (at) computerforensicshow.com>

CALL FOR PAPERS: The Computer Forensics Show

April 19-20, 2011 * New York City * NY

For some companies, it is not a question if one of their computers will 
be used as evidence in a legal matter, it is a question of when.

THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL
LEGAL, ACCOUNTING, IT SECURITY, RISK MANAGEMENT, AND LAW ENFORCEMENT PROFESSIONALS

Forensic Trade Shows, LLC is proud to announce The Computer Forensics 
Show, April 19-20, 2011 in New York City, NY.

The event will highlight exhibits from some of the leading companies in 
the industry, complemented by a comprehensive conference program to 
provide attendees with important information about the latest 
technological advancement, ideas and practical information available 
today.

The Computer Forensics Show offers its speakers tremendous opportunities 
for exposure and recognition as industry leader. Your session will 
attract many technical professionals interested in learning from your 
example, expertise and experience. In appreciation of your contributions 
as a conference speaker, we provide the following benefits:

  * Complementary speaker registration to the exhibition and full conference pass;
  * Complementary session passes for your colleagues to attend your session
    (upon request);
  * Presenters will receive three promotional conference passes to promote their session.

Please visit our speaker page from this year's show at http://www.computerforensicshow.com/speakers_panels.htm.

There are 6 main tracks in the conference:

Forensic Accounting - Fraud, Financial Investigations, Compliance, Best 
Practices, Litigation. Forensic accounting is the number one growing 
field in accounting today.

Legal (A) - EDD, including Litigation and Best Practice Issues.

Legal (B) - Emerging Technologies/Litigation, Data/Records Management, 
Reporting, and Privacy.

IT Security - For organizations that are just beginning to encounter 
security issues and deals with more broad issues effecting organizations 
today.

IT Security Advanced Track - Encompasses more complex and in-depth 
issues and can highlight the need for additional training.

Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and 
terrorism as it relates to Homeland Security, public and corporate 
policy, risk management, and the protection of our nation's critical 
infrastructures.

Additional classes will also be available to attendees:
Computer Forensics - CCFE Boot Camp - 3 Days
Cell Phone Forensics - 3 Days
C4SEM-CJ-103 Identity Theft-Fraudulent Documents
Credit: 3
C4SEM-SEC-105 Cyber Terrorism - Security
Credit: 3


The Show's Conference Department is asking industry executives to submit 
brief abstracts on some current topics to be presented to attendees in a 
solo presentation or as part of a conference panel. If you are 
interested, please review the following guidelines and contact 
information, and note the submission deadlines for the conference.

Guidelines:

 Formatting
   * Paper size - letter/8.5" width X 11.0" height.
   * Margins - top/bottom/left/right - 1".
   * Font - Times New Roman 11 point.
   * Paragraph Spacing - single spaced.
   * The submission should be sent in Microsoft Word.

The submission must include
   * The Presentation Title
   * Author Name(s) * Title * Company
   * Speaker Contact Information: Address * Phone Number * E-mail Address
   * Keywords (4-8 words)

   * ABSTRACT* The presentation abstract should outline your 
     presentation and what attendees would learn. Please remember that 
     all the content must be strictly educational and marketing oriented 
     papers will not be accepted. The presentation has to be oriented 
     for: Accounting, Legal, IT Security, Risk Management, and Law 
     Enforcement professionals.

   * BIOGRAPHY* The speakers biography should be 60 to 100 words in 
     paragraph form. These may include present position, titles, areas 
     of professional expertise, experience, research interests, major 
     publications, degrees, etc.

* Abstract and Biography information should not extend more than one 
  page and will be used for our Show Guide and Website if speaking.

Please do not hesitate to include additional material regarding your 
presentation(s) for better evaluation.

The total presentation length is 75 minutes: speech ~ 50-60min; Q&A ~ 
15-20min.

SUBMISSION DEADLINE: January 15th, 2011.

Submissions will be evaluated for originality, significance of the work, 
technical content, and interest to a wide audience. Speakers may also be 
grouped into panels when there are overlapping topics of interest.

Submissions should be in Microsoft Word and sent to Conference 
Coordinator at speaker_at_private Please note that due to 
the expected volume of submissions, Forensic Trade Shows, LLC will only 
contact speakers who are selected.

By agreeing to speak, you grant one-time permission to Forensic Trade 
Shows, LLC to retain and publish a copy of your presentation. The 
copyright and all other rights to the presentation remain with the 
author(s). All rights to and use of The Computer Forensics Show name and 
logos are retained exclusively by its respective party.

A copy of the presentation materials should be submitted to us no later 
than March 4th, 2011. It should be sent in Microsoft PowerPoint (.ppt) 
format on the Computer Forensics Show template that will be provided to 
you prior to the conference. If you use any animation or active content, 
please include that as well. For reliability and security purposes, all 
presentations will be preloaded onto the presentation computers at the 
conference.

Note: Substitutions for speakers are only allowed under emergency 
circumstances, and tradeshow management must be immediately notified of 
any changes.  All participants are selected at the discretion of show 
management.

Suggested topics include:

Accountant Malpractice Claims
Anonymity and Proxies
Authentication and Access Control
Civil Litigation
Class Action Disputes
Computer Crime and Information Warfare
Construction Solutions
Corporate Governance
Corporate Information
Corporate Risk and Security
Criminal Fraud and Deception Cases
Cyber Forensics
Damage Assessment
Digital Forensic Case Studies
Digital Forensic Processes and Workflow Models
Digital Forensics and Internet
Digital Law
Digital Rights Management (DRM)
Digital Signatures
E-Discovery
Employee Internet Abuse
Employment and Family Law Cases
Encryption and Decryption
Environmental Litigation
Financial Investigations and Forensic Accounting
Forensics Accounting and the Internet
Fraud Investigation
General Commercial Disputes
Identity Theft
Industrial Espionage
Insurance Claims and Digital Forensics
Integrity of Archival Data
Intellectual Property Claims
International Risk and Investigations
Intrusion Detection
IT Security and Compliance
Legal, Ethical and Policy Issues
Mobile Forensics
More General Criminal Cases
Network Forensics
New Firewall Technologies
Portable Electronic Device Forensics
Post-Acquisition Disputes
Privacy and Data Mining
Privacy issues in digital forensics
Privacy Leakage Case Studies
Privacy Policy Enforcement
Security Education and Training
Smart Card Applications
Stealth Data
Steganography
Stylometric and Author Attribution
Terrorist Use of the Internet
Unauthorized Disclosure of Corporate Information

If you have any questions about The Computer Forensics Conferences, 
please send us an e-mail to info_at_private

If you do not wish to receive news e-mails about the show, please send 
us an e-mail at remove_at_private


___________________________________________________________      
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery 
Network, Cisco Switches, SAS 70 Type II Datacenter. 
Find peace of mind, Defend your Critical Infrastructure.
http://www.tegataiphoenix.com/
Received on Wed Dec 08 2010 - 03:07:25 PST

This archive was generated by hypermail 2.2.0 : Wed Dec 08 2010 - 03:13:32 PST