/**************************************************************************** * ___ _____ ______ _ _______ ___ ____ ______ * * / | / ___// ____/ | | / / ___/ |__ \ / __ < /__ \ * * / /| | \__ \/ /______| | /| / /\__ \ __/ // / / / /__/ / * * / ___ |___/ / __/_____/ |/ |/ /___/ / / __// /_/ / // __/ * * /_/ |_/____/_/ |__/|__//____/ /____/\____/_//____/ * * * * November 6,7,8 2012, YVERDON-LES-BAINS (SWITZERLAND) * * * * CALL FOR SPEAKERS - 2nd. round * * * ****************************************************************************/ Notice: - Use this template for conference proposals only - Use the alternative 'CFT' template for training/workshop proposals - *One template per proposition only* - Speakers can submit more than one proposition (each will be evaluated individually) - This template is to be returned in plain text format *only* - Return address: cfp@appsec-forum.ch - Submission deadline: September 15th. 2012 11:59pmGMT+1 1. SPEAKER INFO ============================================================================== First name(s): Last name(s): Street/Number: ZIP: City of departure: Country: Email: Mobile number: Site or blog address: LinkedIn profile: Twitter profile: Company/Organization: Role: Personal introduction (bio): (1-3 paragraphs) 2. CO-SPEAKER ============================================================================== (if the conference is hosted by more than one speaker, please fill in the same details as in section 1. under this section) 3. REFERENCES ============================================================================== (Include references or links that could help the Committee evaluate your talk submission.) 4. TALK DESCRIPTION ============================================================================== Topic(s): (remove all topics that do not apply in the list below) Access control technologies Cryptography Cybercrime and organised crime Development lifecycle: deployment Development lifecycle: design Development lifecycle: disposal Development lifecycle: governance Development lifecycle: implementation Development lifecycle: inception Development lifecycle: incident response and vulnerability management Development lifecycle: operations Development lifecycle: verification Digital identity and e-reputation Federated identities, identity management, identity outsourcing Legal, regulatory compliance and standards Log management and intrusion detection OWASP-related project Research work, new body of knowledge, academic paper Risk management Software acquisition lifecycle / outsourcing projects Software models: client/server and/or services Software models: embedded software Software models: mobile applications Software models: rich clients Software models: web applications Specific risks: academic / teaching Specific risks: banking / insurance / financial Specific risks: cloud computing Specific risks: critical infrastructures Specific risks: energy Specific risks: high availability Specific risks: industry Specific risks: large organizations Specific risks: legal / compliance Specific risks: military / defense Specific risks: new risks and trends Specific risks: small organizations Specific risks: transportation Strong authentication Talk title: Language(s): (indicate languages on which you can present the topic) Expected technical level of the audience: (introduction, intermediate, expert) Talk summary: 5. SUGGESTIONS / QUESTIONS / COMMENTS ============================================================================== -- //end of file