[prev in list] [next in list] [prev in thread] [next in thread] 

List:       darklab
Subject:    Re: [Darklab] BA-Con 2008 CFP - Buenos Aires,
From:       "Oscar Bacelar" <oscarbm () gmail ! com>
Date:       2008-06-27 16:33:25
Message-ID: ea0267ec0806270933w69f34aah253c60b97cac8aff () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Mira te esto.
Check this
Veja isso.



  ekoparty Security Conference - 4th edition

       Buenos Aires, 2 y 3 de Octubre del 2008

http://www.ekoparty.com.ar/

2008/6/27 Dragos Ruiu <dr@kyx.net>:

> BA-Con 2008 CALL FOR PAPERS
>
>    BUENOS AIRES, Argentina -- The first annual BA-Con applied
>    technical security conference - where the eminent figures in the
>    international and South American security industry will get together
>    and share best practices and technology - will be held in Buenos
>    Aires on September 30 and October 1st. 2008. The most
>    significant new discoveries about computer network hack attacks
>    and defenses, commercial security solutions, and pragmatic real
>    world security experience will be presented in a series of
>    informative tutorials.
>
>    The BA-Con meeting provides local and international researchers
>    a relaxed, comfortable environment to learn from informative
>    tutorials on key developments in security technology, and
>    collaborate and socialize with their peers in one of South
>    America's largest metropolises. All material will be translated
>    into both Spanish and English.  Evening social activities will be
>    planned to provide personal networking opportunities.
>
>    The BA-Con conference will also feature the availability of
>    the Security Masters Dojo expert network security sensei
>    instructors, and their advanced, and intermediate, hands-on
>    training courses - featuring small class sizes and practical
>    application exercises to maximize information transfer.
>
>    We would like to announce the opportunity to submit papers,
>    lightning talk proposals for selection by the international BA-Con
>    technical review committee.
>
>    Please make your paper proposal submissions before July 11th,
>    2008.
>
>    Some invited papers have been confirmed, but a limited number
>    of speaking slots are still available. The conference is
>    responsible for travel and accommodations for the speakers. If
>    you have a proposal for a tutorial session then please email a
>    synopsis of the material and your biography, papers and,
>    speaking background to secwest08 [at] ba-con.com.ar . Only
>    slides will be needed for the September paper deadline, full text
>    does not have to be submitted - but will be accepted and
>    translated on a best effort basis if available.
>
>    The BA-Con 2008 conference consists of tutorials on
>    technical details about current issues, innovative techniques
>    and best practices in the information security realm. The
>    audiences are a multi-national mix of professionals involved on
>    a daily basis with security work: security product vendors,
>    programmers, security officers, and network administrators. We
>    give preference to technical details and new education for a
>    technical audience.
>
>    The conference itself is a single track series of presentations
>    in a lecture theater environment. The presentations offer
>    speakers the opportunity to showcase on-going research and
>    collaborate with peers while educating and highlighting
>    advancements in security products and techniques. The focus is
>    on innovation, tutorials, and education instead of product
>    pitches. Some commercial content is tolerated, but it needs to
>    be backed up by a technical presenter - either giving a
>    valuable tutorial and best practices instruction or detailing
>    significant new technology in the products.
>    Paper proposals should consist of the following information:
>     1. Presenter, and geographical location (country of
>        origin/passport) and contact info (e-mail, postal address,
>        phone, fax).
>     2. Employer and/or affiliations.
>     3. Brief biography, list of publications and papers.
>     4. Any significant presentation and educational
>        experience/background.
>     5. Topic synopsis, Proposed paper title, and a one paragraph
>        description.
>     6. Reason why this material is innovative or significant or an
>        important tutorial.
>     7. Optionally, any samples of prepared material or outlines
>        ready.
>     8. Will you have full text available or only slides?
>     9. Please list any other publications or conferences where
>        this material has been or will be published/submitted.
>     10. Do you have any special demo or network requirements
>        for your presentation?
>
>    Please include the plain text version of this information in
>    your email as well as any file, pdf, sxw, ppt, or html
>    attachments.
>
>    Please forward the above information to secwest08 [at]
>    ba-con.com.ar to be considered for placement on the speaker
>    roster, have your lightning talk scheduled.
>
>    We would like to extend a special thanks to our local partners
>    at Core Security Technologies, and the gracious sponsorship
>    of Microsoft, and Symantec for making this event possible and
>    letting us keep the registration fee lower in local currency
>    while letting us cover the costs of international speakers.
>
> cheers,
> --dr
>
> --
> World Security Pros. Cutting Edge Training, Tools, and Techniques
> Buenos Aires, Argentina    Sept. 30 / Oct. 1 - 2008
> http://ba-con.com.ar
> Tokyo, Japan   November 13/14 - 2008   http://pacsec.jp
> pgpkey http://dragos.com/ kyxpgp
> _______________________________________________
> darklab mailing list
> darklab@lists.darklab.org
> http://lists.darklab.org/cgi-bin/mailman/listinfo/darklab
>

[Attachment #5 (text/html)]

Mira te esto.<br>Check this<br>Veja isso.<br><br><table width="100%" border="0" \
cellpadding="0" cellspacing="0"><tbody><tr></tr><tr><td>  <br><br>
                                 <img \
                src="http://www.ekoparty.com.ar/img/item.jpg">&nbsp;
                                 <span class="letrasupertitulo">ekoparty Security \
Conference - 4th edition</span>  <br><br>
                                 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                                 <span class="texto18">Buenos Aires, 2 y 3 de Octubre \
del 2008</span>  <br>
                              </td></tr></tbody></table><br><a \
href="http://www.ekoparty.com.ar/">http://www.ekoparty.com.ar/</a><br><br><div \
class="gmail_quote">2008/6/27 Dragos Ruiu &lt;<a \
href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;:<br> <blockquote class="gmail_quote" \
style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; \
padding-left: 1ex;">BA-Con 2008 CALL FOR PAPERS<br> <br>
 &nbsp; &nbsp;BUENOS AIRES, Argentina -- The first annual BA-Con applied<br>
 &nbsp; &nbsp;technical security conference - where the eminent figures in the<br>
 &nbsp; &nbsp;international and South American security industry will get \
together<br>  &nbsp; &nbsp;and share best practices and technology - will be held in \
Buenos<br>  &nbsp; &nbsp;Aires on September 30 and October 1st. 2008. The most<br>
 &nbsp; &nbsp;significant new discoveries about computer network hack attacks<br>
 &nbsp; &nbsp;and defenses, commercial security solutions, and pragmatic real<br>
 &nbsp; &nbsp;world security experience will be presented in a series of<br>
 &nbsp; &nbsp;informative tutorials.<br>
<br>
 &nbsp; &nbsp;The BA-Con meeting provides local and international researchers<br>
 &nbsp; &nbsp;a relaxed, comfortable environment to learn from informative<br>
 &nbsp; &nbsp;tutorials on key developments in security technology, and<br>
 &nbsp; &nbsp;collaborate and socialize with their peers in one of South<br>
 &nbsp; &nbsp;America&#39;s largest metropolises. All material will be translated<br>
 &nbsp; &nbsp;into both Spanish and English. &nbsp;Evening social activities will \
be<br>  &nbsp; &nbsp;planned to provide personal networking opportunities.<br>
<br>
 &nbsp; &nbsp;The BA-Con conference will also feature the availability of<br>
 &nbsp; &nbsp;the Security Masters Dojo expert network security sensei<br>
 &nbsp; &nbsp;instructors, and their advanced, and intermediate, hands-on<br>
 &nbsp; &nbsp;training courses - featuring small class sizes and practical<br>
 &nbsp; &nbsp;application exercises to maximize information transfer.<br>
<br>
 &nbsp; &nbsp;We would like to announce the opportunity to submit papers,<br>
 &nbsp; &nbsp;lightning talk proposals for selection by the international BA-Con<br>
 &nbsp; &nbsp;technical review committee.<br>
<br>
 &nbsp; &nbsp;Please make your paper proposal submissions before July 11th,<br>
 &nbsp; &nbsp;2008.<br>
<br>
 &nbsp; &nbsp;Some invited papers have been confirmed, but a limited number<br>
 &nbsp; &nbsp;of speaking slots are still available. The conference is<br>
 &nbsp; &nbsp;responsible for travel and accommodations for the speakers. If<br>
 &nbsp; &nbsp;you have a proposal for a tutorial session then please email a<br>
 &nbsp; &nbsp;synopsis of the material and your biography, papers and,<br>
 &nbsp; &nbsp;speaking background to secwest08 [at] <a href="http://ba-con.com.ar" \
target="_blank">ba-con.com.ar</a> . Only<br>  &nbsp; &nbsp;slides will be needed for \
the September paper deadline, full text<br>  &nbsp; &nbsp;does not have to be \
submitted - but will be accepted and<br>  &nbsp; &nbsp;translated on a best effort \
basis if available.<br> <br>
 &nbsp; &nbsp;The BA-Con 2008 conference consists of tutorials on<br>
 &nbsp; &nbsp;technical details about current issues, innovative techniques<br>
 &nbsp; &nbsp;and best practices in the information security realm. The<br>
 &nbsp; &nbsp;audiences are a multi-national mix of professionals involved on<br>
 &nbsp; &nbsp;a daily basis with security work: security product vendors,<br>
 &nbsp; &nbsp;programmers, security officers, and network administrators. We<br>
 &nbsp; &nbsp;give preference to technical details and new education for a<br>
 &nbsp; &nbsp;technical audience.<br>
<br>
 &nbsp; &nbsp;The conference itself is a single track series of presentations<br>
 &nbsp; &nbsp;in a lecture theater environment. The presentations offer<br>
 &nbsp; &nbsp;speakers the opportunity to showcase on-going research and<br>
 &nbsp; &nbsp;collaborate with peers while educating and highlighting<br>
 &nbsp; &nbsp;advancements in security products and techniques. The focus is<br>
 &nbsp; &nbsp;on innovation, tutorials, and education instead of product<br>
 &nbsp; &nbsp;pitches. Some commercial content is tolerated, but it needs to<br>
 &nbsp; &nbsp;be backed up by a technical presenter - either giving a<br>
 &nbsp; &nbsp;valuable tutorial and best practices instruction or detailing<br>
 &nbsp; &nbsp;significant new technology in the products.<br>
 &nbsp; &nbsp;Paper proposals should consist of the following information:<br>
 &nbsp; &nbsp; 1. Presenter, and geographical location (country of<br>
 &nbsp; &nbsp; &nbsp; &nbsp;origin/passport) and contact info (e-mail, postal \
address,<br>  &nbsp; &nbsp; &nbsp; &nbsp;phone, fax).<br>
 &nbsp; &nbsp; 2. Employer and/or affiliations.<br>
 &nbsp; &nbsp; 3. Brief biography, list of publications and papers.<br>
 &nbsp; &nbsp; 4. Any significant presentation and educational<br>
 &nbsp; &nbsp; &nbsp; &nbsp;experience/background.<br>
 &nbsp; &nbsp; 5. Topic synopsis, Proposed paper title, and a one paragraph<br>
 &nbsp; &nbsp; &nbsp; &nbsp;description.<br>
 &nbsp; &nbsp; 6. Reason why this material is innovative or significant or an<br>
 &nbsp; &nbsp; &nbsp; &nbsp;important tutorial.<br>
 &nbsp; &nbsp; 7. Optionally, any samples of prepared material or outlines<br>
 &nbsp; &nbsp; &nbsp; &nbsp;ready.<br>
 &nbsp; &nbsp; 8. Will you have full text available or only slides?<br>
 &nbsp; &nbsp; 9. Please list any other publications or conferences where<br>
 &nbsp; &nbsp; &nbsp; &nbsp;this material has been or will be \
published/submitted.<br>  &nbsp; &nbsp; 10. Do you have any special demo or network \
requirements<br>  &nbsp; &nbsp; &nbsp; &nbsp;for your presentation?<br>
<br>
 &nbsp; &nbsp;Please include the plain text version of this information in<br>
 &nbsp; &nbsp;your email as well as any file, pdf, sxw, ppt, or html<br>
 &nbsp; &nbsp;attachments.<br>
<br>
 &nbsp; &nbsp;Please forward the above information to secwest08 [at]<br>
 &nbsp; &nbsp;<a href="http://ba-con.com.ar" target="_blank">ba-con.com.ar</a> to be \
considered for placement on the speaker<br>  &nbsp; &nbsp;roster, have your lightning \
talk scheduled.<br> <br>
 &nbsp; &nbsp;We would like to extend a special thanks to our local partners<br>
 &nbsp; &nbsp;at Core Security Technologies, and the gracious sponsorship<br>
 &nbsp; &nbsp;of Microsoft, and Symantec for making this event possible and<br>
 &nbsp; &nbsp;letting us keep the registration fee lower in local currency<br>
 &nbsp; &nbsp;while letting us cover the costs of international speakers.<br>
<br>
cheers,<br>
--dr<br>
<br>
--<br>
World Security Pros. Cutting Edge Training, Tools, and Techniques<br>
Buenos Aires, Argentina &nbsp; &nbsp;Sept. 30 / Oct. 1 - 2008 &nbsp; &nbsp;<a \
href="http://ba-con.com.ar" target="_blank">http://ba-con.com.ar</a><br> Tokyo, Japan \
&nbsp; November 13/14 - 2008 &nbsp; <a href="http://pacsec.jp" \
target="_blank">http://pacsec.jp</a><br> pgpkey <a href="http://dragos.com/" \
target="_blank">http://dragos.com/</a> kyxpgp<br> \
_______________________________________________<br> darklab mailing list<br>
<a href="mailto:darklab@lists.darklab.org">darklab@lists.darklab.org</a><br>
<a href="http://lists.darklab.org/cgi-bin/mailman/listinfo/darklab" \
target="_blank">http://lists.darklab.org/cgi-bin/mailman/listinfo/darklab</a><br> \
</blockquote></div><br>



_______________________________________________
darklab mailing list
darklab@lists.darklab.org
http://lists.darklab.org/cgi-bin/mailman/listinfo/darklab


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic