exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Rocky Mountain Information Security Conference Call For Papers

Rocky Mountain Information Security Conference Call For Papers
Posted Jan 12, 2011
Site eiseverywhere.com

The Rocky Mountain Information Security Conference has announced its call for papers. It will be held Friday, May 13, 2001 in Denver, Colorado, USA.

tags | paper, conference
SHA-256 | a66583474f7cd4e4922ddc80781bf8e40c9be8d2d5dfc987ad432dcb0d66b284

Rocky Mountain Information Security Conference Call For Papers

Change Mirror Download
Rocky Mountain Information Security Conference
Call for Papers
Friday, May 13, 2011
(PreConference Workshops on Thursday, May 12, 2011)
Sheraton Denver Downtown
Denver, CO 80202

DEADLINE FOR PAPER SUBMISSION: FEBRUARY 11, 2011

Go Here to Submit a Paper:
https://www.eiseverywhere.com/ereg/index.php?eventid=18885&

The Rocky Mountain Information Security Conference Organizing Committee is proud to announce the call for papers for the fifth annual Rocky Mountain Information Security Conference on May 13th (PreConference workshops on May 12th), co-hosted by the ISSA Denver and ISACA Denver Chapters. This call for papers ends Saturday, February 11, 2011.

If your presentation is selected for inclusion in the conference, you will be informed in late February. Submitted papers will also be considered for the PreConference Workshops on Thursday, May 12th. Those selected to present will receive a complimentary registration for the conference.

Guidelines for Submission

RMISC is looking for presentations covering a variety of current and future Information Technology Security, Auditing, Compliance, Privacy, and Cloud Computing topics. Presentations should be geared toward a Management, Technical, Auditing, Compliance, or IT Governance audience. Based on feedback from conference attendees, presentations should be in-depth and focused on a specific issue or technology. Please try to stay away from overviews or summaries. Hands-on demos and case studies with actionable outcomes are encouraged. Participants want to take away skills and information that they can use.

Presentation lengths will be in 60 or 90 minute blocks. If warranted, a presentation may be given two 60-minute blocks. Thursday's sessions are approximately 4 hours. Please plan the content of your presentations accordingly.

For a partial list of security and auditing subjects, click here; however, do not feel obligated to choose a topic from this list in which to categorize your paper.


Vendor-specific only presentations and sales pitches will not be considered. Please present on the concepts of a product/technology/concept and how the technology will help the attendees. Deviations from this theme will not be tolerated. Under no circumstances will a presentation geared toward a single commercial product be accepted.

Go Here to Submit a Paper: https://www.eiseverywhere.com/ereg/index.php?eventid=18885&
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close