exploit the possibilities

GrrCON 12 Call For Papers

GrrCON 12 Call For Papers
Posted Mar 13, 2012
Site grrcon.org

GrrCON is an information security and hacking conference held annually in the Midwest. This conference was put together to provide the information security community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere. It will take place September 27th through the 28th, 2012 in Grand Rapids, MI, USA.

tags | paper, conference
MD5 | 1446f6e8122e9a804c3e85d442fa4fab

GrrCON 12 Call For Papers

Change Mirror Download

----===============================----
GrrCON '12 - Michigan

Midwest Information Security & Hacker CON

CALL FOR PAPERS

www.http://grrcon.org/speakers/
----===================================----

-= GrrCON 2012
-= September 27 & 28, 2012
-= Grand Rapids, MI

-= Priority consideration will be given to submissions received before
May 1st, 2012


==[Overview]==
GrrCON is an information security and hacking conference held annually
in the Midwest. This conference was put together to provide the
information security community with a venue to come together and share
ideas, information, solutions, forge relationships, and most importantly
engage with like minded people in a fun atmosphere. We completely sold
out in 2011 and have increased capacity in 2012.

First round or speakers have already been announced.

==[GrrCON is DIFFERENT]==
We are not JUST a Hacker Conference talking about pen testing and
exploits NOR are we JUST an Information Security Conference discussing
risk and strategy. GrrCON is unique in we have significant portions
DEDICATED to both. We bring together the CISO, the hacker, the security
practitioner, and the researcher in an intimate one-of-a-kind experience
you CANNOT get elsewhere.

We’ve taken ideas from all the major security conferences and put the
best ones into GrrCON to provide the most value to our attendees.
Whether you are a Fortune 500 executive, security researcher, security
industry professional, student, or a hacker of “flexible” morals you
will find something for you at GrrCON.


==[Why GrrCON]==
We offer two tracks, training, workshops, solutions arena, Bsides,
contests, an after party, and more to ensure you get the most out of the
event.

-= oh yea.. and FREE BEER and FOOD both days for EVERYBODY =====
-= As always we try to PAY our speakers as much as possible for speaking
at GrrCON =====

Not all speakers or presentations are created equally, we hold to this
ideal by varying the honorarium we provide.
-= For example, in 2011 the honorariums we paid out ranged from $200 to
over $4,000 per speaker =====

We also understand not all speakers can accept payment. Therefore,
speakers can negotiate additional tickets in exchange for honorariums,
subject to approval on an individual basis. Like everything we do,
we’re flexible and want to ensure everybody (even our speakers) have a
great time. If you have any thoughts or crazy negotiation ideas let us
know.
-= All accepted speakers will also receive a VIP Ticket for themselves
to enjoy the rest of the conference =====



==[Submit your CFP SOOON]==

-= Call for papers will close on June 1st or when we have filled all
available slots.
-= Priority consideration will be given to submissions received before
May 1st.
-= Speaker announcements will be made in rounds, with the final round no
later than July 5th, 2012
-= 25 or 50 minute presentations
-= CFP Form is available at http://grrcon.org/speakers/cfp/


GrrCON attendees represent a BROAD section of Information Security
community.
We encourage both technical & non-technical submissions on all aspects
of security. We’re looking for talks about information security,
hacking, regulatory compliance, risk mitigation, application security,
web security, privacy issues, database hacking, criminal law, civil law,
hardware hacking, BCP, exploit development, your grandmothers cookie
recipe, cyber _fill in the blank_ (or any other hacker fantasy),
malware, ect…
If it’s interesting and related to InfoSec or Hacking it’s for
GrrCON. Absolutely NO SALES
presentations will be accepted.




More conference information, registration details, ect:

http://www.GrrCON.org


Follow Status on:

www.twitter.com/GrrCON




Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close