<div id=":a1" class="ii gt"><div id=":a2"><div><div><p class="MsoNormal"><span style="color:rgb(31, 73, 125);font-size:11pt">Hi All,</span></p><p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"><br> </span></p>

<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">The 
first round of speakers have been selected for Securitybyte, please 
follow us on twitter @securitybyte to get the latest updates on speakers
 and event.</span></p>


<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Deral Heiland, From Printer to Owned: Leveraging Multifunction Printers During Penetration Testing</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Nithya Raman, Security threats on social networks</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Alexander Polyakov, A Crushing Blow At the Heart of SAP J2EE Engine</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Bishan Singh, Enabling Un-trusted Mashups</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Krzysztof Kotowicz, HTML5: Something Wicked This Way Comes</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">John McColl, Hacking Corporate Telephony</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Aseem Jakhar, Runtime thread injection and execution in Linux processes</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">George Nicolaou, Alternative Exploitation Vectors (A study of CVE-3333)</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Michele Orru, Securing the Browser</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Kanwal K. Mookhey, The Data Theft Epidemic in India</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Vivek Ramachandran, Enterprise Wi-Fi Worms, Backdoors and Botnets for Fun and Profit</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">The 2nd round of CFP is out</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">CFP/CTP</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Securitybyte
 is proud to announce its Second Annual International Information 
Security Conference, &quot;Securitybyte 2011&quot; in Bangalore, India. This 4-day
 event features two days of conferences and two days of post-conference 
hands-on Trainings &amp; Certifications covering every aspect of 
Information Security. The Securitybyte conference features some of the 
most respected names in the Security space and is focused around new 
research and innovation. The Securitybyte Conference 2011 is planned for
 Sept 6th through 9th, 2011 at The Taj Hotel in Bangalore, India.</span></p>


<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">The two-day conference (Sept 6th &amp; 7th) will have the following three tracks:</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Deep Technical</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">   Government &amp; Governance</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Management</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Submission
 Deadline: The first round of submission of papers for conference talks 
and trainings should be done no later than August 5th, 2011. Please send
 all your submissions to <a href="mailto:cfp@securitybyte.org" target="_blank">cfp@securitybyte.org</a>, keeping subject line as &quot;SB 2011 CFP Submission&quot;.</span></p>


<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">TOPICS</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Got a new attack against any technology or device? We want to see it.</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Topics of interest include, but are not limited to, the following:</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Management</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">               
 Case studies around any of the topics above of how the implementation 
was done and what were some of the lessons learned.</span></p>


<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Technology-Focused</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Cloud Security</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Electronic Device Security (Cell Phones / PDA&#39;s)</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Defeating Biometrics</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                WLAN, RFID and Bluetooth Security</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Data Recovery and Incident Response</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Virtualization Security</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Database Security</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Forensic &amp; Cyber security</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Regulatory &amp; Law</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Copyright infringement and anti-copyright infringement enforcement technologies</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Critical infrastructure issues</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Data security and privacy issues</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Identity theft, identity creation &amp; identity fraud</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                Corporate Espionage</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">                </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">National Security</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Cyber forensics</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Cyber warfare</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Cyber Espionage</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Next hyphenGen Cyber threats</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Critical Infrastructure protection</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Surveillance &amp; counter-surveillance</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Speaker Submission:</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">Please use the following submission form template to respond:</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Name, title, address, email, and phone/contact number</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Short biography, qualifications, occupation, achievements, and affiliations (limit 250 words.)</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Summary or abstract of your presentation (limit 1250 words.)</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    Technical requirements (video, internet, wireless, audio, etc.)</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt">    References (Contact name, title, and email address of two conferences you have spoken at or comparable references.)</span></p>
<p class="MsoNormal"><span style="color:#1f497d;font-size:11pt"> </span></p>
<p class="MsoNormal"><span style="color:rgb(31, 73, 125);font-size:11pt">Please
 note, product or vendor pitches are not accepted. If your talk involves
 an advertisement for a new product or service your company is offering,
 please do not submit a proposal.</span></p>
<p class="MsoNormal"><br><span style="color:rgb(31, 73, 125);font-size:11pt"></span></p><p class="MsoNormal"><span style="color:rgb(31, 73, 125);font-size:11pt">Regards</span></p><span style="color:#1f497d;font-size:11pt">SecurityBytes</span>
</div></div>
</div></div>