exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SOURCE Dublin 2015 Call For Papers

SOURCE Dublin 2015 Call For Papers
Posted Jun 2, 2015
Site sourcedublin2015.busyconf.com

The SOURCE Dublin 2015 Call For Papers has been announced. It will take place September 7th through the 8th, 2015 at Trinity College, dublin, Ireland.

tags | paper, conference
SHA-256 | 5d4e9dc1d340934aa808e982cbcbd25ee88bbc3364b647dc110b83060cc61942

SOURCE Dublin 2015 Call For Papers

Change Mirror Download
------------------------BEGIN TRANSMISSION--------------------

**SOURCE Dublin 2015 Call for Papers is Open!**

SOURCE Dublin
Training September 5-6, 2015
Conference September 7-8, 2015
Trinity College

Submit at: https://sourcedublin2015.busyconf.com/proposals/new


**What is SOURCE?**

SOURCE Conference brings security experts and business professionals
together in an intimate and personal environment to discuss the security
industry’s most important issues, technologies, and business trends. SOURCE
places the technical excellence and expertise found at top hacker
conferences in an executive environment where business professionals can
gain insight into the security industry’s most important issues,
technologies, and business trends.

**Who Attends SOURCE?**

SOURCE is designed for top security professionals, advanced IT
professionals, senior and top-level executives, company chief officers
(e.g. CTOs, CISOs), faculty and students from colleges and universities,
members of management and business communities who are looking to connect
with security and technology experts.

**The SOURCE Experience**

SOURCE Dublin attendees experience two full days of world-class sessions
taught by top business and security experts. SOURCE prides itself on
providing an intimate environment where attendees can ask questions,
participate in discussions, and interact with other delegates and speakers.

SOURCE Dublin offers three primary tracks:

- **Security and Technology** : Security software, cloud security, secure
coding practices, reverse engineering, new software releases and technology
demonstrations
- **Business of Security** : Critical decision-making, entrepreneurship,
issues of compliance, vulnerability management, SaaS, privacy laws,
disclosure, and economics
- **Application Security** : Threats, attacks, vulnerabilities,
countermeasures, testing, mobile application security, security testing,
penetration testing, code analysis, process, metrics, etc.

However, we often mix in some talks that we feel are relevant to our
audience, but don’t necessarily fit anywhere else. Preference typically
goes to talks that fit the tracks, but if you have something compelling &
relevant that doesn’t quite fit elsewhere, feel free to submit it anyway.

**What We're Looking For**

SOURCE is focused on bridging the concerns of security and technology
experts with the realities of business. Specifically, we seek:

- Practical and proven security methodologies which provide satisfying
results for business
- Unique perspectives and experience into the security industry
- Information about new security technologies and tools
- Solution-based presentations for a specific business problem
- Practical applications of new technology to solve security problems

**Suggested Topics**

- Applied Cryptography
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- CyberSecurity
- Data Integrity and Protection
- Database Security and Privacy
- Digital Forensics
- Ethical and Legal Implications of Security and Privacy
- Exploitation Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- International and Homeland Security
- Intrusion Detection & Prevention
- Management of Computing Security
- Mobile Security
- Organizational Security Policies
- Privacy
- Risk Assessment
- Secure Cloud Computing
- Security Information Systems Architecture and Design and Security Patterns
- Security Management
- Security Metrics and Measurement
- Security Requirements (threats, vulnerabilities, risk, formal methods,
etc.)
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Wireless Network Security (WiFi, WiMAX, WiMedia and others)

Consideration will be given first to ORIGINAL work and content that has not
been duplicated at any other security or networking conference prior to
September 1st, 2015. Submissions with video links (see below) will be given
preference.

**What We Will NOT Accept**

- Submissions from PR agencies or in-house PR or marketing professionals
- Presentations that focus on marketing or promoting a company's products
- Generic presentations that do not offer any new perspectives or insight
- Re-hashes of other people’s original work that add no new insights

**Important Dates**

CFP Closes: June 28, 2015
Notification Deadline: July 10th, 2015

SOURCE Conference holds no copyright on the content. Abstract information
can be freely used after September 10, 2015 for other presentations,
articles, etc. SOURCE 2015 speakers may be called upon by the SOURCE
Conference media relations team for information in advance of the
conference in order to promote the conference tracks. Speakers are asked
not to give the same presentation within 250 miles of Dublin between August
1st and September 8th, 2015.

**Speaker Perks**

SOURCE has limited travel funds, but speakers who request travel assistance
may be eligible to receive the following:

- Air/Train/Bus fare up to 250 Euro (we cannot reimburse past 250 Euro per
speaker, even for international travel, sorry.)
- 3 nights hotel at prefered conference hotel

*** Companies that fund their speaker's travel are eligible to receive a
COMPLIMENTARY Basic Sponsorship ***

All speakers receive:

- SOURCE Dublin t-shirt
-  Invitation to the SOURCE Dublin speaker party
-  One 50% off pass for a friend or co-worker

Submit your abstract here:
https://sourcedublin2015.busyconf.com/proposals/new

Questions? Email cfp at sourceconference dot com

---------------------------END TRANSMISSION-------------------------

*Genevieve Southwick*
Founder and Chief Squirrel Herder
Squirrel Herder Productions, LLC
www.squirrelherderproductions.com
gksouthwick@squirrelherderproductions.com
@SqrlHrdrProdLLC
415.742.2342


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close