Date: 22 November 2012
Click here for printable version
AusCERT2013, the Asia-Pacific Information Security Conference is to be held at the Gold Coast, Australia from 20 May to 24 May 2013.
AusCERT is able to assist in covering the travel and accommodation
costs for conference speakers. The standard offer includes:
- Return economy class airfares (round trip)
- Accommodation at the five star Royal Pines Resort (3 nights for international speakers or 2 nights for local speakers)
- Free registration to the three day conference
- Meals: breakfast, lunch, dinner, morning and afternoon tea breaks (please note: dinner is not provided on the Monday and Friday evenings)
The above conditions may be varied under special circumstances.
As an invited speaker, you’ll be asked to deliver a presentation or a tutorial. Presentations are usually in one of the following formats:
- Keynote session (1 hour): a large session at the start of the day attended by all conference attendees
- Main program session (40 minutes: 35 minute presentation + 5 minutes for questions): one of the streams in either Monday, Tuesday or Wednesday
- Indepth Technical and Business sessions: Longer sessions which offer the opportunity to examine a topic in greater detail may be negotiated
- Executive Program: a smaller, interactive session for C-level executives
- Tutorials: AusCERT also runs practical, hands-on tutorial sessions on the first two days of the conference in either a half day, a full day or two full days timeslots
AusCERT conferences attract a thousand attendees from CIOs, CEOS, senior executives and security managers to technical experts from all over the world.
The conference format is:
- Monday/Tuesday: Tutorials (half/one/two day choices)
- Tuesday: Golf (for those who choose to play - please advise)
- Tuesday evening: Welcome cocktail party
- Wednesday/Thursday/Friday: Main conference program
- Wednesday evening: Sponsors Cocktail Party and Dinner
- Thursday evening: Gala Dinner and Australian Information Security Awards 2013
- Friday: Conference concludes
Please visit the AusCERT conference website for more information about the event. There are also links to previous conferences.
Past speakers have also included:
- Ross Anderson, Cambridge University
- Bennett Arron, Writer & Comedian, Identity Theft Victim & Perpetrator
- Brad Barker, The HALO Corporation
- Whitfield Diffie, co-inventor of public key cryptography in 1975
- Roger Dingeldine, The Tor Project
- Ofir Arkin, Sys-Security Group
- Husin Bin Jazri, Cyber Security Malaysia
- Steven M. Bellovin, Columbia University
- Scott Charney, Microsoft
- Bill Cheswick, Lumeta
- KC Claffy, CAIDA
- Charles Cresson Wood
- Renaud Deraison, Tenable Network Security
- Dave Dittrich, Washington University
- Mark Fabro, Lofty Perch
- Peter Gutmann, Auckland University
- Christofer Hoff, Juniper Networks
- Mikko Hyppönen, F-Secure
- Eugene Kaspersky, Kaspersky Laboratories
- Ivan Krstic, One Laptop Per Child
- David Litchfield, NGSSoftware
- Petko Petkov (GnuCitizen)
- Marcus Ranum, Tenable Network Security
- David Rice, Geekonomics
- Marty Roesch, Sourcefire
- Marcus Sachs, SRI
- Bruce Schneier, Counterpane
- Dr. Corey Schou, NIATEC & Idaho State University
- Brian Snow, formerly NSA
- Eugene Spafford, Purdue University
- Adam Spencer, Celebrity, Comedian and Mathemetician
- Lance Spitzner, Honeynet Project
- John Stewart, Cisco
- Jennifer Stisa Granick, Stanford Law School
- Colin Percival, Tarsnap
- Richard Thieme, ThiemeWorks
- Paul Twomey, ICANN
- Wietse Venema, IBM T.J. Watson Research Center
- Paul Vixie, Internet Systems Consortium
- Kenneth R. van Wyk, KRvW Associates
A key to the success of our conference has been our ability to attract a number of high profile speakers who are leaders in their field of information
security. We sincerely hope to see you at our event.
An important note about avoiding product or service promotions
The conference program includes streams for highly regarded security experts who are specifically selected by the AusCERT program committee, and a portion of whom will be selected in response to our call for papers. To ensure the integrity of the conference format, we request that speakers who are invited by us, or who are selected by us in response to the call for papers, refrain from making product or service specific promotions in their presentations.
|