exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

LayerOneCFP.txt

LayerOneCFP.txt
Posted Nov 9, 2005
Authored by LayerOne | Site layerone.info

LayerOne 2006 - Call for Papers - LayerOne is now officially accepting papers and presentations for consideration at our 2006 show. We are looking for people to speak on a broad range of topics, so all submissions will be considered. At the moment we're interested in hearing from potential speakers with the following interests: Data Forensics, Reverse Engineering, VoIP (security and development), Emerging Security Trends, Regulatory Issues (SOX, PCI, ISO 17799, etc), Firmware/Embedded Systems Hacking.

tags | paper, conference
SHA-256 | 38046b10e761b0737f9adaecc125068acd262730c34c2288dde55dce30615e6b

LayerOneCFP.txt

Change Mirror Download
LayerOne 2006 - Call for Papers
April 22 & 23, 2006
Los Angeles, California
At the Pasadena Hilton
http://layerone.info

What is LayerOne? Currently in its 3rd year, LayerOne is computer
security and technology conference held in the Los Angeles area. The
purpose of LayerOne is to bring together the many different types of
folks who make up the security community for a 2 day discussion of the
technologies that impact our professional and personal lives.

Who should attend LayerOne? Just about anyone who is concerned with
computer, information, and Internet security and the issues arising
from it. Developers, System Administrators, Lawyers, IT managers,
Students, Hackers, Engineers, Privacy Advocates, Hardware Hackers,
Open Source fans, and garden variety Geeks will all find something of
interest at LayerOne. Previous speakers have included the likes of Dan
Kaminsky (Doxpara Research), Dave Hulton (Toorcon), Danny O'Brien
(NTK), and Bruce Potter (Shmoo Group).

Call for Papers. LayerOne is now officially accepting papers and
presentations for consideration at our 2006 show. We are looking for
people to speak on a broad range of topics, so all submissions will be
considered. At the moment we're interested in hearing from potential
speakers with the following interests:

* Data Forensics
* Reverse Engineering
* VoIP (security and development)
* Emerging Security Trends
* Regulatory Issues (SOX, PCI, ISO 17799, etc)
* Firmware/Embedded Systems Hacking


Please note that we'd love to see as broad a range of topics this year
as we did last year, so don't consider this to be a strict guideline
on what we'd like people to be submitting. If you've got something
that you think will fit, by all means send it in. To see a list of
topics from 2005, please visit our website.

Please be sure to include the following information in your submission:

* Presentation name
* A one-sentence synopsis of your presentation
* A longer one to three paragraph synopsis or short outline of
what you plan on covering
* Names of and URLs to presenter(s)
* A short (single-paragraph) biography of the presenter(s)


Once everything's ready to go, send your submission to cfp [at]
layerone [dot] info no later than March 31, 2006. All papers submitted
by then will receive either an acceptance or rejection notice no later
than April 5th, 2006. Speaker selection is expected to be finalized on
this date.

Although we only have one speaking track, please bear in mind that
speaking slots are limited to one hour. How you use that time is
entirely up to you - but most people tend to divide it between
presentation and a Q&A session. If you think your presentation will
run longer please advise us when you turn in your proposal and we will
do our best take your needs into consideration.

If the presentation is based on code or a particular technique the
presenter must be one of the developers of the code/technique and be
prepared to perform a demonstration.

We look forward to reading over your submissions, which we are sure
will be outstanding. Once again, if you have any questions or
submissions please email cfp [at] layerone [dot] info. Thank you for
your interest, and we look forward to seeing you there.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close