EUSecWest CFP Closes April 14th (conf May 21/22 2008)

EUSecWest CFP Closes April 14th (conf May 21/22 2008)
EUSecWest CFP Closes April 14th (conf May 21/22 2008)

Forwarded from: Dragos Ruiu 

(We've moved the conference this year to the a club in Leicester Square 
in the heart of London and SoHo. We'll be putting speakers up across the 
square at the Radisson Edwardian Hampshire, but there are lots of hotels 
in the region there in the center of London for those who want to attend 
(the venue is physically on top of a tube station on Circle line so easy 
to get to). Registration is now open and we hope to have the Dojo 
registrations on-line by this weekend. The conference is on 
Wednesday/Thursday, which leaves Friday to fly to Berlin for those going 
to ph-n. cheers, --dr)


  LONDON, U.K. -- The second annual EUSecWest applied technical security 
  conference - where the eminent figures in the international security 
  industry will get together share best practices and technology - will 
  be held in downtown London at the Sound club in Leicester Square on 
  May 21/22 2008. The most significant new discoveries about computer 
  network hack attacks and defenses, commercial security solutions, and 
  pragmatic real world security experience will be presented in a series 
  of informative tutorials.

  The EUSecWest meeting provides international researchers a relaxed, 
  comfortable environment to learn from informative tutorials on key 
  developments in security technology, and collaborate and socialize 
  with their peers in one of the world's most central cities.

  The EUSecWest conference will also feature the availability of the 
  Security Masters Dojo expert network security sensei instructors, and 
  their advanced, and intermediate, hands-on training courses - 
  featuring small class sizes and practical application excercises to 
  maximize information transfer.

  We would like to announce the opportunity to submit papers, lightning 
  talk proposals for selection by the EUSecWest technical review 

  Please make your paper proposal submissions before April 14th, 2008.

  Some invited papers have been confirmed, but a limited number of 
  speaking slots are still available. The conference is responsible for 
  travel and accomodations for the speakers. If you have a proposal for 
  a tutorial session then please email a synopsis of the material and 
  your biography, papers and, speaking background to secwest08 [at] . Only slides will be needed for the May paper deadline, 
  full text does not have to be submitted - but will be accepted if 

  The EUSecWest 2008 conference consists of tutorials on technical 
  details about current issues, innovative techniques and best practices 
  in the information security realm. The audiences are a multi-national 
  mix of professionals involved on a daily basis with security work: 
  security product vendors, programmers, security officers, and network 
  administrators. We give preference to technical details and new 
  education for a technical audience.

  The conference itself is a single track series of presentations in a 
  lecture theater environment. The presentations offer speakers the 
  opportunity to showcase on-going research and collaborate with peers 
  while educating and highlighting advancements in security products and 
  techniques. The focus is on innovation, tutorials, and education 
  instead of product pitches. Some commercial content is tolerated, but 
  it needs to be backed up by a technical presenter - either giving a 
  valuable tutorial and best practices instruction or detailing 
  significant new technology in the products.

  Paper proposals should consist of the following information:

   1. Presenter, and geographical location (country of origin/passport) 
      and contact info (e-mail, postal address, phone, fax).
   2. Employer and/or affiliations.
   3. Brief biography, list of publications and papers.
   4. Any significant presentation and educational 
   5. Topic synopsis, Proposed paper title, and a one paragraph 
   6. Reason why this material is innovative or significant or an 
      important tutorial.
   7. Optionally, any samples of prepared material or outlines ready.
   8. Will you have full text available or only slides?
   9. Please list any other publications or conferences where this 
      material has been or will be published/submitted.

  Please include the plain text version of this information in your 
  email as well as any file, pdf, sxw, ppt, or html attachments.

  Please forward the above information to secwest08 [at] 
  to be considered for placement on the speaker roster, have your 
  lightning talk scheduled.

World Security Pros. Cutting Edge Training, Tools, and Techniques
London, U.K. May 21/22 - 2008 
pgpkey kyxpgp 

Subscribe to InfoSec News 

Site design & layout copyright © 1986-2015 CodeGods