Security and Privacy - Is there an app for that?
February 16th - 18th, 2011
Victoria Conference Centre
Victoria, BC, Canada
2011 CALL FOR PAPERS
When: February 16 & 18, 2011
Where: The west coast of Canada in beautiful Victoria, British Columbia. The conference is held in the Victoria Conference Centre, downtown Victoria.1
Theme: 12th Annual Privacy and Security Conference will focus on enhanced collaboration and improved service delivery and citizen engagement through information sharing, while ensuring effective and appropriate privacy and security measures.
Details:
The Annual Privacy and Security Conference and Exposition is recognized as one of the top tier events in North America. Anyone working in the information privacy and security fields will benefit from the speakers, discussions and networking at the conference. Attendees are from every level both within government and private industry. The two-day conference draws an international audience of some 1,200 delegates with an interest in cutting edge policy, programs, law, research and technologies aimed at the protection of privacy and security.
Hosted by the Province of British Columbia, along with its partners and sponsors, the Annual Privacy and Security Conference is renowned for its outstanding content, world class experts and excellent peer to peer networking opportunities with industry and government leaders.
The Privacy and Security Conference Committee is pleased to extend an invitation to those working within the broad privacy and security communities to submit papers on their area of expertise. Of particular interest are briefs on cutting-edge subjects and themes suitable for presentation in either:
- 1 hour presentation - In-depth speech that allows for detailed presentation of a topic and discussion time with attendees
- 1 hour discussion panel - These are moderated panels where each speaker has an allotted time (usually 15-20 minutes) and discussions can occur both between the speakers and the attendees
- 15 minute 'Lightning speech' - The 'lightning speech' is a concentrated presentation allowing the speaker to bring high energy and focus to a key area of interest. These speeches will be held in sequence as part of a one hour time slot.
- 15 minute 'Second chance' - This is for keynote or 1 hour speakers who would also like to provide a summary version of their speech. These may be scheduled in the same or next day. This allows interested attendees to listen to topics they may otherwise have missed due to schedule conflicts. These will be held in sequence as part of a one hour time slot.
The Committee will be selecting the papers and issuing the invitations to selected speakers. The intellectual property rights of those submitting papers for review will be respected throughout the process.
Deadline:
All entries must be received by midnight of September 10, 2010. Invited speakers will be notified by September 30, 2010.
Submissions:
Submissions will be accepted electronically at:
http://rebootconference.com/privacy2011/callforpapersform.php
Please provide the following information:
- Speaker's name
- Speaker's title
- Organization the speaker works for or represents
- Speaker's phone number
- Speaker's e-mail address
- Technical or Expertise level for attendees:
Low: All attendees,
Medium: Some background knowledge or experience,
High: Lots of experience or subject matter experts. - The theme of the speech: Please see the suggested list below
- Topic, in 25 words or less
- The abstract of the speech, in 250 words or less
- Speaker's bio in 200 words or less
Speaker topic list:
This is not an exhaustive or exclusive list. If another topic is of interest, please contact us in advance of your submission.
- Cloud computing
- Digital Rights Management - preventing unauthorized use of digital files
- Social Media
- IT Infrastructure - Terrorism/crime/e-warfare
- Smart Grid
- Identity Management
- Identity tracking and profiling
- Biometrics
- Smartcards and smart documents
- e-Government
- Surveillance
- Information Sharing
- Data Mining & Data Matching
- Law and Legislation
- Open Source
- Electronic Health Records
- Hacking
- Mobile life
- Diverse platform security
- Managing resource access
- Virtualization
- Workplace privacy
- Electronic commerce, including Payment Card Industry (PCI)
- Routine Release
Presentation Types:
- Issue papers: An executive or management briefing on a prominent issue or aspect of information privacy or security.
- Case studies: Descriptions of a given information privacy or security situation or incident, or research results. Names of organizations can be kept anonymous to maintain confidentiality if necessary.
- New technology research: Results or developments in cutting edge research on new information privacy and security technologies.
- Sociological / Philosophical perspective: A candid and/or introspective look at the impacts of new technological developments on privacy, security, social consciousness, or social functioning.
Have Questions or Need More Information?
- For conference content, theme and agenda questions, please contact: [email protected]
- For venue and conference administration questions, please contact: Reboot Communications Ltd. at 1-604-534-0537, or [email protected]
- For sponsorship questions, please contact Reboot Communications Ltd. at 1.250.388.6060 or [email protected]
Follow the Conference on
Facebook