RSA Conference Europe 2006

RSA Conference Europe 2006

<p> RSA® CONFERENCE 2017 Call for Speakers Offline Submission Form</p><p>SUBMITTER INFORMATION: The information you provide in this section pertains to you as the Submitter. If you’re also the Speaker, your account information can be carried forward in the Speaker Information section. </p><p>Please fill out the following information</p><p>*= required input  Salutation * Dr./Mr./Mrs./Ms.  First name *  Middle Initial  Last Name *  Suffix  Company *  Job Title *  Address 1*  Address 2  Address 3  City*  Country* o If Country is USA or Canada . State/Province* . Zip/Postal Code* o If Country is United Kingdom . UK Country* . UK County* . Foreign Postal Code* o If Country is NOT USA, Canada or United Kingdom . Foreign State . Foreign Postal Code  Primary email address *  Secondary email address  Primary Telephone *  Mobile Telephone </p><p>PAGE 1 of 12 SESSION INFORMATION</p><p>* = required input</p><p> Are you the proposed speaker or panel moderator?* Yes /No </p><p>If you are not the proposed speaker: We require each proposed participant to approve their participation in the submission. Notifications will go out to all speakers, moderators and panelists and submissions will be disqualified if any participants have not approved their participation in the session.  Session Title * (Limit 75 characters including spaces)</p><p>Your session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation. Your title should attract the interest of the Program Committee – and subsequently your audience.</p><p>Enter Session Title Here</p><p> Abstract * (Limit 400 characters including spaces) In a few sentences, explain what your session will cover (please do not use bullets in your submission). This abstract will be included in our marketing materials, website and program guide. NOTE: How long is 400 characters? This paragraph is 275 characters including spaces.</p><p>Enter Short Abstract Here</p><p> Quick Abstract * (Limit 200 characters including spaces) This shorter abstract will be used for pocket guides, mobile apps, etc. NOTE: How long is 200 characters? This paragraph is 156 characters including spaces.</p><p>Enter Quick Abstract Here</p><p> Session Detail * (Limit 2,500 characters including spaces.) Describe the architecture of your session here. What are the main points you plan to cover? (Note: bullets not supported) Describe the presentation flow. If a panel what are the specific issues will you have the panelists address? Where will the difference of opinions come from? This is the most important part of your submission for Program Committee review—please be thorough and specific to increase your chance of acceptance by differentiating your submission from others.</p><p>PAGE 2 of 12 Enter Session Details Here</p><p>PAGE 3 of 12  Session Format * (select one) Individual Speaker - One speaker only</p><p>Co-Speakers - This format has two speakers, one is designated as Primary Speaker and the other as Secondary Speaker. The Primary Speaker is the main contact for the RSA Conference Speaker Manager. Panel Discussion - This is a session with a Moderator and up to three Panelists. The Moderator is responsible for facilitating the panel discussion and is the main contact for the RSA Conference Speaker Manager. </p><p> Will this presentation be seen elsewhere within 45 days before or after the Conference? * Yes/No If Yes, please provide details: </p><p> Submitters Comments (Limit 400 characters including spaces) Is there anything else you want to tell the Program Committee? </p><p>Enter your comments here</p><p>Session Profiling Information – The following information will help ensure that the attendees clearly understand if they have the appropriate experience to get the most benefit from your session. </p><p>Session Classification * Please choose one of the following: Intermediate Focused on principles and concepts that would appeal to attendees with more than 5 years of experience. Little, if any, time is spent on definitional terms and concepts. Contains instructive demos, management tools, deep process discussions, or similar level of content. Advanced Sessions focused on advanced principles and concepts, geared toward attendees with deep subject knowledge and 10 or more years of experience. Little/no time is spent on defining terms and background. Contains demonstrations, line code, advanced architecture discussions, tools that can be shared, or similar level of content. </p><p>Advanced sessions are in high demand. If you choose ‘advanced’ you will be asked to justify this classification. Enter your justification here General Interest This classification is used for compelling strategic sessions, introductions to new technology, or sessions or tracks where ratings are not as relevant (e.g. Professional Development). </p><p>PAGE 4 of 12 PAGE 5 of 12 How many years of security experience should an attendee have to understand the concepts presented in this session? * (Select one)</p><p>Less than 1 year</p><p>1 - 2 years</p><p>3 - 5 years</p><p>6 - 9 years</p><p>10 - 12 years</p><p>13 - 15 years</p><p>16+ years</p><p>Who is the target audience for this session? *</p><p>Administration Legal</p><p>Customer Service Management</p><p>Engineering Marketing</p><p>Finance Operations/Production</p><p>Information Security Quality Control/Research & Development </p><p>Information Technology Sales</p><p>Other – Please Specify: </p><p>Select the Topic Category that would be most appropriate for your topic. * Advanced Targeted Identity Management Research Attacks Application Security & Insider Threats Security Analytics & DevOps Incident Response Awareness & Education Internet of Things Security Services Big Data Law Security Trends Cloud Security Mobile Security Social Engineering Cyber Warfare Network Security Social Networking Data Security Physical Security & Strategy & Architecture Critical Infrastructure</p><p>PAGE 6 of 12 Endpoints Policy & Government Supply Chain Security Executive & Board Practitioner Perspective Threat Intelligence Governance, Risk & Privacy Virtualization Compliance Hackers & Threats Professional Development & Workforce</p><p>Security Tags: Please provide up to 5 keywords to describe your session. * access control data security identity penetration security management & testing services governance anti-malware data identity theft phishing SIEM sovereignty anti-spam denial of incident physical social service response security engineering application DevOps insider PII social security threats networking audit digital rights Internet of policy software code Things management vulnerability analysis authentication e-discovery intrusion privacy software detection defined networking big data encryption key professional SSO management development & workforce biometrics endpoint law remote standards security access botnets ethics legislation research supply chain</p><p>BYOD exploit of machine risk threat vulnerability learning management intelligence sharing case studies firewalls malware secure coding threat management cloud security forensics managed security user behavior security analytics analytics services fraud metrics security virtualization consumerization architecture critical governance mobile security visualization infrastructure risk and applications awareness compliance cryptography government mobile security vulnerability regulations security consulting assessment</p><p>PAGE 7 of 12 cyberterrorism government network security web services spying security education security cyber warfare hackers and password security zero day threats management intelligence vulnerability data loss hacktivism patch security prevention management operations</p><p>PAGE 8 of 12 PROPOSED SPEAKERS</p><p>Add a Speaker The number of participants that can be added to this session is based on the Session Format selected in the prior Session Information section. An Individual Speaker session may have only one speaker, a Co-Speakers session has two speakers and a Panel Discussion session requires a Moderator and up to three Panelists. Speaker roles for Panel Discussion sessions:  Moderator - The Moderator will lead in the development and planning of a panel, is responsible for facilitating the panel discussion and is the main contact for the RSA Conference Speaker Manager.  Panelist – The panelists should have differing areas of focus and expertise around a common theme to ensure interactive debate. All proposed Speakers, Moderators and Panelists will be notified that they were included in a proposed submission. If a Speaker, Moderator or Panelists has not approved their participation in a proposed submission, the proposed submission will be disqualified. Complete the following information for each participant you wish to add. Note: each participant must have a unique email address. * = required input:  Has the proposed speaker approved his or her participation in the session? Yes/No  Session Role * Individual or Co-Speaker/Moderator/Panelist  Salutation * Dr./Mr./Mrs./Ms.  First name *  Middle Initial  Last Name *  Suffix Jr./ Sr./ Other  Company/Organization *  Company Type * Enterprise/Vendor/Government/Association/None  Job Title *  Address 1*  Address 2  City*  Country* o If Country is USA or Canada . State/Province* . Zip/Postal Code* o If Country is United Kingdom . UK Country* . UK County*</p><p>PAGE 9 of 12 . Foreign Postal Code* o If Country is NOT USA, Canada or United Kingdom . Foreign State . Foreign Postal Code  Primary email address * (must be unique)  Secondary email address  Primary Telephone *  Mobile Telephone * </p><p> Please specify the speaker’s gender * Male Female</p><p>Prefer not to disclose</p><p> Speaker Biography/CV * (Limit 800 characters including spaces) This information will appear on the website and in other marketing materials. Please do not use bullets.</p><p>Enter speaker biography/CV here</p><p> What is the primary industry of the Speaker’s organization?</p><p>Computer Security Healthcare</p><p>Computer Technology & Communications Insurance</p><p>Education Manufacturing</p><p>Energy/Utilities News or Entertainment</p><p>Financial Services Retail</p><p>Government Technology</p><p>Other – Please Specify: </p><p> What is the Speaker’s first language?* Enter language here</p><p> Is the proposed speaker a Certified Information Systems Security Professional (CISSP)? * Yes/No/Not Known</p><p> Does the proposed Speaker have other security certifications? </p><p>PAGE 10 of 12 Yes/No/Not Known If yes, please provide details: </p><p> If the proposed speaker has a blog, please enter blog link here: Enter blog link here</p><p> If the proposed speaker has a Twitter handle, please enter the Twitter handle here: Enter Twitter handle here</p><p> LinkedIn or Professional Website Address: Enter URL here</p><p> Has the proposed speaker spoken at an RSA Conference before? * Yes/No If yes, please identify the Conference(s) years:  RSA Conference 2016 Abu Dhabi  RSA Conference 2016 APJ  RSA Conference 2016  RSA Conference 2015 Abu Dhabi  RSA Conference 2015 APJ  RSA Conference 2015  RSA Conference 2014 APJ  RSA Conference 2014  RSA Conference 2013 Europe  RSA Conference 2013 APJ  RSA Conference 2013  RSA Conference 2012 Europe  RSA Conference 2012 China  RSA Conference 2012  RSA Conference 2011 Europe  RSA Conference 2011 China  RSA Conference 2011  RSA Conference 2010 Europe  RSA Conference 2010 China  RSA Conference 2010  RSA Conference 2009 Europe  RSA Conference 2009  RSA Conference 2008 Europe  RSA Conference 2008  RSA Conference 2007 Europe  RSA Conference 2007  RSA Conference 2006 Europe  RSA Conference 2006</p><p>PAGE 11 of 12  RSA Conference 2005 Europe  RSA Conference 2005  RSA Conference 2004 Europe  RSA Conference 2004  RSA Conference 2003 Europe  RSA Conference 2003  Other: </p><p>PAGE 12 of 12</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us