Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Dragos Ruiu (drkyx.net)
Date: Thu Apr 10 2008 - 16:54:08 CDT
(We've moved the conference this year to the a club
in Leicester Square in the heart of London and SoHo.
We'll be putting speakers up across the square at the
Radisson Edwardian Hampshire, but there are lots of
hotels in the region there in the center of London
for those who want to attend (the venue is physically
on top of a tube station on Circle line so easy to get to).
Registration is now open and we hope to have the
Dojo registrations on-line by this weekend. The conference
is on Wednesday/Thursday, which leaves Friday to fly
to Berlin for those going to ph-n. cheers, --dr)
EUSecWest CALL FOR PAPERS
LONDON, U.K. -- The second annual EUSecWest applied technical
security conference - where the eminent figures in the
international security industry will get together share best
practices and technology - will be held in downtown London at
the Sound club in Leicester Square on May 21/22 2008. The most
significant new discoveries about computer network hack attacks
and defenses, commercial security solutions, and pragmatic real
world security experience will be presented in a series of
The EUSecWest meeting provides international researchers a
relaxed, comfortable environment to learn from informative
tutorials on key developments in security technology, and
collaborate and socialize with their peers in one of the
world's most central cities.
The EUSecWest conference will also feature the availability of
the Security Masters Dojo expert network security sensei
instructors, and their advanced, and intermediate, hands-on
training courses - featuring small class sizes and practical
application excercises to maximize information transfer.
We would like to announce the opportunity to submit papers,
lightning talk proposals for selection by the EUSecWest
technical review committee.
Please make your paper proposal submissions before April 14th,
Some invited papers have been confirmed, but a limited number
of speaking slots are still available. The conference is
responsible for travel and accomodations for the speakers. If
you have a proposal for a tutorial session then please email a
synopsis of the material and your biography, papers and,
speaking background to secwest08 [at] eusecwest.com . Only
slides will be needed for the May paper deadline, full text
does not have to be submitted - but will be accepted if
The EUSecWest 2008 conference consists of tutorials on
technical details about current issues, innovative techniques
and best practices in the information security realm. The
audiences are a multi-national mix of professionals involved on
a daily basis with security work: security product vendors,
programmers, security officers, and network administrators. We
give preference to technical details and new education for a
The conference itself is a single track series of presentations
in a lecture theater environment. The presentations offer
speakers the opportunity to showcase on-going research and
collaborate with peers while educating and highlighting
advancements in security products and techniques. The focus is
on innovation, tutorials, and education instead of product
pitches. Some commercial content is tolerated, but it needs to
be backed up by a technical presenter - either giving a
valuable tutorial and best practices instruction or detailing
significant new technology in the products.
Paper proposals should consist of the following information:
1. Presenter, and geographical location (country of
origin/passport) and contact info (e-mail, postal address,
2. Employer and/or affiliations.
3. Brief biography, list of publications and papers.
4. Any significant presentation and educational
5. Topic synopsis, Proposed paper title, and a one paragraph
6. Reason why this material is innovative or significant or an
7. Optionally, any samples of prepared material or outlines
8. Will you have full text available or only slides?
9. Please list any other publications or conferences where
this material has been or will be published/submitted.
Please include the plain text version of this information in
your email as well as any file, pdf, sxw, ppt, or html
Please forward the above information to secwest08 [at]
eusecwest.com to be considered for placement on the speaker
roster, have your lightning talk scheduled.
World Security Pros. Cutting Edge Training, Tools, and Techniques
London, U.K. May 21/22 - 2008 http://eusecwest.com
pgpkey http://dragos.com/ kyxpgp
Sponsored by: Watchfire
Methodologies & Tools for Web Application Security Assessment
With the rapid rise in the number and types of security threats, web application security assessments should be considered a crucial phase in the development of any web application. What methodology should be followed? What tools can accelerate the assessment process? Download this Whitepaper today!