exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Rocky Mountain Information Security Conference Call For Papers

Rocky Mountain Information Security Conference Call For Papers
Posted Jan 12, 2011
Site eiseverywhere.com

The Rocky Mountain Information Security Conference has announced its call for papers. It will be held Friday, May 13, 2001 in Denver, Colorado, USA.

tags | paper, conference
SHA-256 | a66583474f7cd4e4922ddc80781bf8e40c9be8d2d5dfc987ad432dcb0d66b284

Rocky Mountain Information Security Conference Call For Papers

Change Mirror Download
Rocky Mountain Information Security Conference
Call for Papers
Friday, May 13, 2011
(PreConference Workshops on Thursday, May 12, 2011)
Sheraton Denver Downtown
Denver, CO 80202

DEADLINE FOR PAPER SUBMISSION: FEBRUARY 11, 2011

Go Here to Submit a Paper:
https://www.eiseverywhere.com/ereg/index.php?eventid=18885&

The Rocky Mountain Information Security Conference Organizing Committee is proud to announce the call for papers for the fifth annual Rocky Mountain Information Security Conference on May 13th (PreConference workshops on May 12th), co-hosted by the ISSA Denver and ISACA Denver Chapters. This call for papers ends Saturday, February 11, 2011.

If your presentation is selected for inclusion in the conference, you will be informed in late February. Submitted papers will also be considered for the PreConference Workshops on Thursday, May 12th. Those selected to present will receive a complimentary registration for the conference.

Guidelines for Submission

RMISC is looking for presentations covering a variety of current and future Information Technology Security, Auditing, Compliance, Privacy, and Cloud Computing topics. Presentations should be geared toward a Management, Technical, Auditing, Compliance, or IT Governance audience. Based on feedback from conference attendees, presentations should be in-depth and focused on a specific issue or technology. Please try to stay away from overviews or summaries. Hands-on demos and case studies with actionable outcomes are encouraged. Participants want to take away skills and information that they can use.

Presentation lengths will be in 60 or 90 minute blocks. If warranted, a presentation may be given two 60-minute blocks. Thursday's sessions are approximately 4 hours. Please plan the content of your presentations accordingly.

For a partial list of security and auditing subjects, click here; however, do not feel obligated to choose a topic from this list in which to categorize your paper.


Vendor-specific only presentations and sales pitches will not be considered. Please present on the concepts of a product/technology/concept and how the technology will help the attendees. Deviations from this theme will not be tolerated. Under no circumstances will a presentation geared toward a single commercial product be accepted.

Go Here to Submit a Paper: https://www.eiseverywhere.com/ereg/index.php?eventid=18885&
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close