what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Bellua2008-CFP.txt

Bellua2008-CFP.txt
Posted May 9, 2008
Site bellua.com

The call for papers and conference registration is now open for Bellua Cyber Security Asia 2008. This is the fourth annual Bellua conference and is being held in Jakarta, Indonesia November 18th through the 19th, 2008.

tags | paper, conference
SHA-256 | a5856ab9e3dd2e2f5612681923e4be2b3ba3d529dbb3f9107d4f1d818cc88a29

Bellua2008-CFP.txt

Change Mirror Download
The call for papers and conference registration is now open for Bellua Cyber
Security Asia 2008, our fourth annual information security & hacking
conference.

Speakers from numerous disciplines are invited to join Bellua Cyber Security
Asia 2008 to discuss present and future information security and hacking
issues through an intensive series of business and technical sessions and
demonstrations.

>From 18th—19th November 2008, Bellua Cyber Security Asia 2008 will take place
in the city of Jakarta, Indonesia, with sessions hosted at Jakarta Convention
Centre.

We invite proposals for paper presentations and demonstrations on any topic
relevant to information security and hacking including but not limited to:

Business Topics
* ISO 27001—Information Security Management Systems (ISMS)
* Business processes & security
* Compliance management
* Handling security failure & incidents
* Banking security
* Telecommunication security
* Internet fraud
* Security awareness
* Social engineering
* Privacy, anonymity, ethics
* Cyberlaw and enforcement

Technical Topics
* 0-day hacking & security
* Penetration testing
* Telecom security/phreaking
* Secure programming
* Reverse engineering
* Exploit development
* Computer forensics
* Wireless security & hacking
* Web application security
* Cryptography
* Spyware/malware/worm/virus
* Physical security

Your submission should include:
1. Name, title, address, email and phone number
2. Draft of the proposed presentation (in PDF, PowerPoint or Keynote
format), proof of concept for tools and exploits, etc.
3. Short biography, qualification, occupation, achievement and
affiliations (limit 150 words).
4. Summary or abstract for your presentation (limit 150 words)
5. Time (40-60 minutes). Include time for discussion and questions.
6. Technical requirements (video, internet, wireless, audio, etc.)

Please send your proposal to bcs2008-cfp@bellua.com as soon as possible
and no later than 30 September 2008. Proposals will be evaluated
in the order received; submit early to maximise your chances of being
selected.

Each non-resident speaker will receive accommodation for 3 nights at the
Hotel Mulia Senayan and Bellua Cyber Security Asia 2008 will cover travel
expenses up to USD 1,000.

We do not accept product, service or vendor related presentations.

Bellua Cyber Security is endorsed by the Ministry of Communication and
Information of Republic Indonesia and is hosted by Bellua Asia Pacific.

Links:
* Bellua Cyber Security Asia 2008
http://www.bellua.com/bcs/
* Bellua Cyber Security Annual Conferences in Facebook:
http://www.facebook.com/group.php?gid=8357873979

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close