exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Bellua2008-CFP.txt

Bellua2008-CFP.txt
Posted May 9, 2008
Site bellua.com

The call for papers and conference registration is now open for Bellua Cyber Security Asia 2008. This is the fourth annual Bellua conference and is being held in Jakarta, Indonesia November 18th through the 19th, 2008.

tags | paper, conference
SHA-256 | a5856ab9e3dd2e2f5612681923e4be2b3ba3d529dbb3f9107d4f1d818cc88a29

Bellua2008-CFP.txt

Change Mirror Download
The call for papers and conference registration is now open for Bellua Cyber
Security Asia 2008, our fourth annual information security & hacking
conference.

Speakers from numerous disciplines are invited to join Bellua Cyber Security
Asia 2008 to discuss present and future information security and hacking
issues through an intensive series of business and technical sessions and
demonstrations.

>From 18th—19th November 2008, Bellua Cyber Security Asia 2008 will take place
in the city of Jakarta, Indonesia, with sessions hosted at Jakarta Convention
Centre.

We invite proposals for paper presentations and demonstrations on any topic
relevant to information security and hacking including but not limited to:

Business Topics
* ISO 27001—Information Security Management Systems (ISMS)
* Business processes & security
* Compliance management
* Handling security failure & incidents
* Banking security
* Telecommunication security
* Internet fraud
* Security awareness
* Social engineering
* Privacy, anonymity, ethics
* Cyberlaw and enforcement

Technical Topics
* 0-day hacking & security
* Penetration testing
* Telecom security/phreaking
* Secure programming
* Reverse engineering
* Exploit development
* Computer forensics
* Wireless security & hacking
* Web application security
* Cryptography
* Spyware/malware/worm/virus
* Physical security

Your submission should include:
1. Name, title, address, email and phone number
2. Draft of the proposed presentation (in PDF, PowerPoint or Keynote
format), proof of concept for tools and exploits, etc.
3. Short biography, qualification, occupation, achievement and
affiliations (limit 150 words).
4. Summary or abstract for your presentation (limit 150 words)
5. Time (40-60 minutes). Include time for discussion and questions.
6. Technical requirements (video, internet, wireless, audio, etc.)

Please send your proposal to bcs2008-cfp@bellua.com as soon as possible
and no later than 30 September 2008. Proposals will be evaluated
in the order received; submit early to maximise your chances of being
selected.

Each non-resident speaker will receive accommodation for 3 nights at the
Hotel Mulia Senayan and Bellua Cyber Security Asia 2008 will cover travel
expenses up to USD 1,000.

We do not accept product, service or vendor related presentations.

Bellua Cyber Security is endorsed by the Ministry of Communication and
Information of Republic Indonesia and is hosted by Bellua Asia Pacific.

Links:
* Bellua Cyber Security Asia 2008
http://www.bellua.com/bcs/
* Bellua Cyber Security Annual Conferences in Facebook:
http://www.facebook.com/group.php?gid=8357873979

Login or Register to add favorites

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close