Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Fwd: Security Conference Spam, Should we put up with it?
From: n3td3v <xploitable () gmail com>
Date: Sun, 29 Jun 2008 23:24:58 +0100

From the same guy who spammed us with EuSecWest 2008, and refuses to buy
banner ads on web sites like any other legitimate company, I bring you
BA-Con 2008 CFP - Buenos Aires, Sept. 30 / Oct. 1 (closes July 11 2008).

All the best,

n3td3v

Forwarded conversation
Subject: [Full-disclosure] BA-Con 2008 CFP - Buenos Aires, Sept. 30 / Oct. 1
(closes July 11 2008)
------------------------

From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:05 PM
To: full-disclosure () lists grok org uk


BA-Con 2008 CALL FOR PAPERS

   BUENOS AIRES, Argentina -- The first annual BA-Con applied
   technical security conference - where the eminent figures in the
   international and South American security industry will get together
   and share best practices and technology - will be held in Buenos
   Aires on September 30 and October 1st. 2008. The most
   significant new discoveries about computer network hack attacks
   and defenses, commercial security solutions, and pragmatic real
   world security experience will be presented in a series of
   informative tutorials.

   The BA-Con meeting provides local and international researchers
   a relaxed, comfortable environment to learn from informative
   tutorials on key developments in security technology, and
   collaborate and socialize with their peers in one of South
   America's largest metropolises. All material will be translated
   into both Spanish and English.  Evening social activities will be
   planned to provide personal networking opportunities.

   The BA-Con conference will also feature the availability of
   the Security Masters Dojo expert network security sensei
   instructors, and their advanced, and intermediate, hands-on
   training courses - featuring small class sizes and practical
   application exercises to maximize information transfer.

   We would like to announce the opportunity to submit papers,
   lightning talk proposals for selection by the international BA-Con
   technical review committee.

   Please make your paper proposal submissions before July 11th,
   2008.

   Some invited papers have been confirmed, but a limited number
   of speaking slots are still available. The conference is
   responsible for travel and accommodations for the speakers. If
   you have a proposal for a tutorial session then please email a
   synopsis of the material and your biography, papers and,
   speaking background to secwest08 [at] ba-con.com.ar . Only
   slides will be needed for the September paper deadline, full text
   does not have to be submitted - but will be accepted and
   translated on a best effort basis if available.

   The BA-Con 2008 conference consists of tutorials on
   technical details about current issues, innovative techniques
   and best practices in the information security realm. The
   audiences are a multi-national mix of professionals involved on
   a daily basis with security work: security product vendors,
   programmers, security officers, and network administrators. We
   give preference to technical details and new education for a
   technical audience.

   The conference itself is a single track series of presentations
   in a lecture theater environment. The presentations offer
   speakers the opportunity to showcase on-going research and
   collaborate with peers while educating and highlighting
   advancements in security products and techniques. The focus is
   on innovation, tutorials, and education instead of product
   pitches. Some commercial content is tolerated, but it needs to
   be backed up by a technical presenter - either giving a
   valuable tutorial and best practices instruction or detailing
   significant new technology in the products.

   Paper proposals should consist of the following information:
    1. Presenter, and geographical location (country of
       origin/passport) and contact info (e-mail, postal address,
       phone, fax).
    2. Employer and/or affiliations.
    3. Brief biography, list of publications and papers.
    4. Any significant presentation and educational
       experience/background.
    5. Topic synopsis, Proposed paper title, and a one paragraph
       description.
    6. Reason why this material is innovative or significant or an
       important tutorial.
    7. Optionally, any samples of prepared material or outlines
       ready.
    8. Will you have full text available or only slides?
    9. Please list any other publications or conferences where
       this material has been or will be published/submitted.
    10. Do you have any special demo or network requirements
       for your presentation?

   Please include the plain text version of this information in
   your email as well as any file, pdf, sxw, ppt, or html
   attachments.

   Please forward the above information to secwest08 [at]
   ba-con.com.ar to be considered for placement on the speaker
   roster, have your lightning talk scheduled.

   We would like to extend a special thanks to our local partners
   at Core Security Technologies, and the gracious sponsorship
   of Microsoft, and Symantec for making this event possible and
   letting us keep the registration fee lower in local currency
   while letting us cover the costs of international speakers.

cheers,
--dr

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
Buenos Aires, Argentina    Sept. 30 / Oct. 1 - 2008    http://ba-con.com.ar
Tokyo, Japan   November 13/14 - 2008   http://pacsec.jp
pgpkey http://dragos.com/ kyxpgp

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:17 PM
To: honeypots () securityfocus com


   Aires on September 30th and October 1st. 2008. The most
----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:21 PM
To: binaryanalysis () securityfocus com


----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:25 PM
To: focus-virus () securityfocus com


---------------------------------------------------------------------------
This list is sponsored by: Black Hat

Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier
technical event for ICT security experts. Featuring 30 hands-on training
courses and 90 Briefings presentations with lots of new content and new
tools.  Network with 4,000 delegates from 70 nations.  Visit product
displays by 30 top sponsors in a relaxed setting.

http://www.blackhat.com
---------------------------------------------------------------------------

----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:16 PM
To: pen-test () securityfocus com


This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------

----------
From: Arturo 'Buanzo' Busleiman <buanzo () buanzo com ar>
Date: Fri, Jun 27, 2008 at 7:02 PM
To: full-disclosure () lists grok org uk


Microsoft, yeah right... Symantec... funny. First conference? Not at all...

Anyway, good luck.

PS: I'm from Buenos Aires.
----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 4:57 PM
To: bugtraq () securityfocus com


----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:25 PM
To: focus-linux () securityfocus com


   Aires on September 30th and October 1st. 2008. The most
----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:15 PM
To: webappsec () securityfocus com


-------------------------------------------------------------------------
Sponsored by: Watchfire
Methodologies & Tools for Web Application Security Assessment
With the rapid rise in the number and types of security threats, web
application security assessments should be considered a crucial phase in the
development of any web application. What methodology should be followed?
What tools can accelerate the assessment process? Download this Whitepaper
today!

https://www.watchfire.com/securearea/whitepapers.aspx?id=70170000000940F
-------------------------------------------------------------------------

----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:24 PM
To: focus-apple () securityfocus com


----------
From: Dragos Ruiu <dr () kyx net>
Date: Fri, Jun 27, 2008 at 5:20 PM
To: crypto () securityfocus com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • Fwd: Security Conference Spam, Should we put up with it? n3td3v (Jun 29)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault