offline submission form - Emc-china.com

wanderooswarrenAI and Robotics

Nov 21, 2013 (3 years and 4 months ago)

63 views

PAGE
1

of
5

RSA
®

CONFERENCE

CHINA
20
1
2

Call for
Speakers
Submission Form

(
O
ff
-
L
ine)


---------------------------------------------------------------------------------------

Thank you for submitting

a proposal to share your experience and knowledge with
the delegates at RSA Conference China 2012. Please fill out the information below.

PRIMARY SPEAKER

INFORMATION:


Please fill out the following information

*= required input



Salutation
-

required

Dr./Mr./Mrs./Ms.



First Name


required



Middle Initial
-

optional



Last Name


required



Company

or Organization


required



Job Title


required



Address 1


required



Address 2


optional



Address 3


optional



City


required



Province / State


required



Country

-

required



Zip

/

Postal code (optional
)



Primary email address


required



Telephone Number (incl. country code)


required



Mobile Tel
e
phone Number


optional



Fax Number

Speaker Biography/CV

* (Limit
400
characters including spaces)

this

information
will appear on the website and in other marketing materials


Enter speaker biography/CV here




What is the Speaker’s first language? *

Enter language here




In which other langua
ge (s) is the Speaker verbally proficient?

Enter languages here


PAGE
2

of
5



Which language will this presentation be delivered in?

Enter language here

SESSION

INFORMATION

* = required input




Session Title

*

(Limit 75 characters

including spaces
)


Your session title should clearly indicate the topic of your presentation, and do so in a
way that attracts potential attendees for your presentation.


Enter Session Title Here




Short
Session Abstract

*

(
Limit
4
00 characters
including spaces
)


In a few sentences, explain what your session will cover (please do not use bullets
in your submission). This abstract will be included in our marketing materials,
website and program guide.
NOTE: How long is 400 characters? This paragraph
is 277 character
s including spaces.


Short Abstract





Long Session Abstract

*


(Limit 2,500 characters including) Provide a detailed synopsis of, and delivery
strategy for your
presentation. This long session abstract should be detailed
enough to clearly convey to the Program Committee the content and objectives of
your presentation. This is

the most important part of your submission
and is
used by the Program Committee to make t
heir decision. Consider submitting an
outline of your session.


Enter long session abstract here





Session Format *

(
select one
)



Individual Speaker

-

You (or the designated speaker if you’re submitting a
proposal on behalf of someone else) will be the only speaker.


Co
-
Speakers

-

This format has two speakers, one of whom is the Primary
Speaker and the other who is the Secondary Speaker. The Primary Speaker is the
person to whom the RSA Conference Speaker Mana
ger will come with questions
and decisions regarding your session.



PAGE
3

of
5



Session Length *


o

All sessions are 50 minutes

long


Session Profiling Information


The following information will help ensure that
the attendees clearly understand if they have the appropriate experience to get the
most benefit from your session.


Session Classification

*
Please choose one of the following:


Intermediate:
Focused on principles and concepts that would appeal to attendees
with more than 5 years of experience.




Little, if any, time is spent on definitional terms
and concepts.


Contains instructive

demos, line code, tools, architectural discussions, or
similar level of content.




Advanced:

Sessions focused on advanced principles and concepts, geared toward
attendees with deep subject knowledge and 10 or more years of experience. Little/no time
is spent on defining terms an
d background.


Contains instructive demos, line code,
advanced architecture discussions, tools that can be shared, or similar level of content.







General Interest:
This classi
fication is used for compelling strategic sessions,
introductions to new technology, or sessions or tracks where ratings are not as relevant.


Session

Track Selection


Select up to two
session

tracks you would like you submission to be considered
for.


Yo
ur submission will only be accepted in one class track.



Application Security & Cryptography


Sessions in this track will focus on topics related to the secure development,
implementation and operation of package and custom developed applications and
c
onsiderations for the deployment of security
-
enabled technologies including conformed
and verifiable system security behavior of the storage and network infrastructure,
operating systems and applications and identity and certification management.
Discussio
ns on Cryptography and applied cryptography are also in this track.



Security Business Management


This track covers emerging technology/business trends and market directions, wi
th strong
emphasis on new developments and how the business environment will be impacted. This
track will be of special interest to senior business and information security executives.
Sessions also include non
-
implementation issues about the security indu
stry and broad
service offerings such as auditing, systems integration and upcoming changes in the IT
security ecosystem.



Cloud Security


Cloud Security includes security archi
tecture in the cloud, cloud security governance,
issues involved in migrating to the cloud, cloud security risks, vendor Service Level
Agreements (SLAs), cloud security related case studies and related topics. This track also
PAGE
4

of
5

includes sessions on the secur
ity aspects of virtualization such as deployment models,
VM integrity, virtualization security architecture, and other related topics.



Mobile and Network Computing


This track
focuses on two important areas of security: the security of the network
infrastructure and the mobile devices that form the edges of the enterprise. In this track
you’ll find sessions on network monitoring, intrusion prevention, firewalls, new threats to
n
etworks, information on DoS and DDoS attacks, and other emerging issues in network
security. This track also covers mobile security including management of mobile devices,
mobile malware, and how consumerization impacts mobile security.



Threats


In this advanced technical track you will find discussions about threats, social
engineering (spam, phishing, pharming, etc.) and vulnerabilities and/or exploits that are
in the wild.
You will find sessions on the underground economy, new classes of
vulnerabilities, exploitation techniques, reverse engineering and how to combat these
problems. Sessions will also include physical security and threats to critical
infrastructure.



Trusted Computing


Major topics include attestation aspects including the measurement and verification,
intellectual property protection, enterprise rights management and privacy. This
track
also includes sessions on risk management frameworks and how to better quantify and
manage risk.


Submitters Comments

(limit 400 characters
including spaces
)


Enter comments here


PROPOSED
Co
-
SPEAKER

An
Individual

session may have only one
Speaker
,

and

a
Co
-
Speaker
session has
two
Speakers
.


Complete the following information for
the

Co
-
S
peaker

if applicable
.

* = required input
:

Has the proposed
Co
-
S
peaker
approved his or her participation in the session?
Yes/No



Salutation
-

required
Dr./Mr./Mrs./Ms.



First Name


required



Middle Initial
-

optional

PAGE
5

of
5



Last Name


required



Company or Organization


required



Job Title


required



Address 1


required



Address 2


optional



Address 3


optional



City


required



Province / State


required



Country

-

required



Zip

/

Postal code (optional)



Primary email address


required



Telephone Number (incl. country code)


required



Mobile Tel
e
phone Number


optional



Fax Number

Co
-
Speaker Biography/CV * (Limit
400
characters including spaces)

This
information will appear on the website and in other marketing materials


Enter speaker biography/CV here


What is the
Co
-
Speaker’s first language? *

Enter language here


In which other language (s)

is the
Co
-
Speaker verbally proficient?

Enter languages here