exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

GrrCON 12 Call For Papers

GrrCON 12 Call For Papers
Posted Mar 13, 2012
Site grrcon.org

GrrCON is an information security and hacking conference held annually in the Midwest. This conference was put together to provide the information security community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere. It will take place September 27th through the 28th, 2012 in Grand Rapids, MI, USA.

tags | paper, conference
SHA-256 | c10fc8f54afc04f8551c1bdf5575e9141c59fce332c5fa9a6dd487d0543e2719

GrrCON 12 Call For Papers

Change Mirror Download

----===============================----
GrrCON '12 - Michigan

Midwest Information Security & Hacker CON

CALL FOR PAPERS

www.http://grrcon.org/speakers/
----===================================----

-= GrrCON 2012
-= September 27 & 28, 2012
-= Grand Rapids, MI

-= Priority consideration will be given to submissions received before
May 1st, 2012


==[Overview]==
GrrCON is an information security and hacking conference held annually
in the Midwest. This conference was put together to provide the
information security community with a venue to come together and share
ideas, information, solutions, forge relationships, and most importantly
engage with like minded people in a fun atmosphere. We completely sold
out in 2011 and have increased capacity in 2012.

First round or speakers have already been announced.

==[GrrCON is DIFFERENT]==
We are not JUST a Hacker Conference talking about pen testing and
exploits NOR are we JUST an Information Security Conference discussing
risk and strategy. GrrCON is unique in we have significant portions
DEDICATED to both. We bring together the CISO, the hacker, the security
practitioner, and the researcher in an intimate one-of-a-kind experience
you CANNOT get elsewhere.

We’ve taken ideas from all the major security conferences and put the
best ones into GrrCON to provide the most value to our attendees.
Whether you are a Fortune 500 executive, security researcher, security
industry professional, student, or a hacker of “flexible” morals you
will find something for you at GrrCON.


==[Why GrrCON]==
We offer two tracks, training, workshops, solutions arena, Bsides,
contests, an after party, and more to ensure you get the most out of the
event.

-= oh yea.. and FREE BEER and FOOD both days for EVERYBODY =====
-= As always we try to PAY our speakers as much as possible for speaking
at GrrCON =====

Not all speakers or presentations are created equally, we hold to this
ideal by varying the honorarium we provide.
-= For example, in 2011 the honorariums we paid out ranged from $200 to
over $4,000 per speaker =====

We also understand not all speakers can accept payment. Therefore,
speakers can negotiate additional tickets in exchange for honorariums,
subject to approval on an individual basis. Like everything we do,
we’re flexible and want to ensure everybody (even our speakers) have a
great time. If you have any thoughts or crazy negotiation ideas let us
know.
-= All accepted speakers will also receive a VIP Ticket for themselves
to enjoy the rest of the conference =====



==[Submit your CFP SOOON]==

-= Call for papers will close on June 1st or when we have filled all
available slots.
-= Priority consideration will be given to submissions received before
May 1st.
-= Speaker announcements will be made in rounds, with the final round no
later than July 5th, 2012
-= 25 or 50 minute presentations
-= CFP Form is available at http://grrcon.org/speakers/cfp/


GrrCON attendees represent a BROAD section of Information Security
community.
We encourage both technical & non-technical submissions on all aspects
of security. We’re looking for talks about information security,
hacking, regulatory compliance, risk mitigation, application security,
web security, privacy issues, database hacking, criminal law, civil law,
hardware hacking, BCP, exploit development, your grandmothers cookie
recipe, cyber _fill in the blank_ (or any other hacker fantasy),
malware, ect…
If it’s interesting and related to InfoSec or Hacking it’s for
GrrCON. Absolutely NO SALES
presentations will be accepted.




More conference information, registration details, ect:

http://www.GrrCON.org


Follow Status on:

www.twitter.com/GrrCON




Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close