Call for Speakers & Papers Deadlines
Compiled by WISP
You know a lot and have a lot that you can teach others about in our community. Draft those calls for papers & submit them!
We're back again for DEF CON 24! You've had a year to absorb the possibilities that our new venue has to offer, now what are you gonna do about it? Do you want to drop the bass till it melts your face? Awesome, everyone loves tinnitus. Do that! Want to rent a million arcade machines and pretend it's 1986? Sounds great Daddy Warbucks. We love it. Do that!
Do you want to get together a group of like minded individuals and talk about current events? That sounds super boring, but we're not here to judge. Do that! The point is, we love your creativity, and we love what you guys bring to the table every year. We've got space to use up, and we want you to use it. So show us what you've got DEF CON.
Once again, we'll be paying the cost for all bars this year. Not the cost of the booze, just the cost of the bartender. This will allow you to spend the money you would've spent on having a bartender on site for 4+ hours, on pacifiers, Mardi Gras beads, a small pony, or whatever instead. So start filling out the questions below and get them submitted. We'll pick the best ideas, and give them a space to turn their nerdtastic fantasies, into a reality, if only for a night. The Call for Parties...is open.
(ISC)² Secure Events are a series of seminars that provide continuing education for our members - cyber, information, software and infrastructure security professionals - on the issues and challenges the industry faces today, and what may loom on the horizon. These events are typically held in one day in various cities across North America. Secure Events give our members a unique, first-hand experience on emerging issues with engaging speakers, arming them with the latest information on current trends and hot-button topics as well as the opportunity to automatically earn CPEs. Members, as well as our sponsors, inform us that Secure Events are invaluable for networking, learning, and ensuring continued value within the roles that they deliver. Certification is just the beginning, and we rely upon experts to help keep our members educated and informed.
If you are a proven speaker in this field and offer valuable knowledge and subject matter expertise across cyber, information, software and infrastructure security arena that will help our members, we invite you to share your expertise and join our community.
The Call for Speakers for the 2017 (ISC)² Secure Events is officially open. Click on the link provided to submit your speaking proposal.
As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.
The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.
We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.