RSA® CONFERENCE 2014

Call for Speakers Offline Submission Form

SUBMITTER INFORMATION:

The information you provide in this section pertains to you as the Submitter. If you’re also the Speaker, your account information can be carried forward in the Speaker Information section.

Please fill out the following information

*= required input

·  Salutation * Dr./Mr./Mrs./Ms.

·  First name *

·  Middle Initial

·  Last Name *

·  Suffix

·  Company *

·  Job Title *

·  Address 1*

·  Address 2

·  Address 3

·  City*

·  Country*

o  If Country is USA or Canada

§  State/Province*

§  Zip/Postal Code*

o  If Country is United Kingdom

§  UK Country*

§  UK County*

§  Foreign Postal Code*

o  If Country is NOT USA, Canada or United Kingdom

§  Foreign State

§  Foreign Postal Code

·  Primary email address *

·  Secondary email address

·  Primary Telephone *

SESSION INFORMATION

* = required input

Are you the proposed speaker or panel moderator?* Yes /No

If you are not the proposed speaker:

We require each speaker to approve their participation in the submission. Notifications will go out to all speakers, moderators and panelists and submissions will be disqualified if any participants have not approved their participation in the session.

·  Session Title * (Limit 75 characters including spaces)

Your session title should clearly indicate the topic of your presentation, and do so in a way that attracts potential attendees for your presentation.


Enter Session Title Here

·  Short Session Abstract * (Limit 400 characters including spaces)

In a few sentences, explain what your session will cover (please do not use bullets in your submission). This abstract will be included in our marketing materials, website and program guide. NOTE: How long is 400 characters? This paragraph is 275 characters including spaces.
Enter Short Abstract Here

·  Quick Abstract * (Limit 200 characters including spaces)

This shorter abstract will be used for pocket guides, mobile apps, etc. NOTE: How long is 200 characters? This paragraph is 156 characters including spaces.
Enter Quick Abstract Here

·  Session Detail (Limit 2,500 characters including spaces.)

Describe the architecture of your session here. What are the main points you plan to cover (note: bullets not supported)? Describe the presentation flow. If a panel what are the specific issues will you have the panelists address? Where will the difference of opinions come from?

Enter Session Details Here

·  Session Format * (select one)

Individual Speaker - One speaker only

Co-Speakers - This format has two speakers, one is designated as Primary Speaker and the other as Secondary Speaker. The Primary Speaker is the main contact for the RSA Conference Speaker Manager.

Panel Discussion - This is a session with a Moderator and up to four Panelists. The Moderator is responsible for facilitating the panel discussion and is the main contact for the RSA Conference Speaker Manager..

·  Session Length *

20 minutes

60 minutes

·  Will this presentation be seen elsewhere within 45 days before or after the Conference? * Yes/No

If Yes please provide details:

·  Submitters Comments (limit 400 characters including spaces)
Enter your comments here

Session Profiling Information – The following information will help ensure that the attendees clearly understand if they have the appropriate experience to get the most benefit from your session.

Session Classification * Please choose one of the following:

Intermediate

Focused on principles and concepts that would appeal to attendees with more than 5 years of experience. Little, if any, time is spent on definitional terms and concepts. Contains instructive demos, management tools, deep process discussions, or similar level of content.

Advanced

Sessions focused on advanced principles and concepts, geared toward attendees with deep subject knowledge and 10 or more years of experience. Little/no time is spent on defining terms and background. Contains demonstrations, line code, advanced architecture discussions, tools that can be shared, or similar level of content. .

Advanced sessions are in high demand. If you choose ‘advanced’ you will be asked to justify this classification.

General Interest

This classification is used for compelling strategic sessions, introductions to new technology, or sessions or tracks where ratings are not as relevant (e.g. Professional Development).

·  Select the Topic Category that would be most appropriate for your topic. *

Select that Conference Topic Category which best fits your presentation.

Application Development / Hackers & Threats / Research
Application Security / Identity Management / Research Revealed
Big Data / Insider Threats / Security Awareness
Business of Security / Law / Security Intelligence
Case Studies / Mobile Applications / Security Services
Cloud Security / Mobile Security / Security Trends
Cybercrime / Network Security / Social Engineering
Cyber Warfare / Physical Security & Critical Infrastructure / Social Networking
Data Security / Policy & Government / Strategy and Architecture
Endpoints / Privacy / Virtualization
Enterprise Defense / Professional Development / War Stories
Governance, Risk & Compliance / Security Analytics / Wireless Security

Security Tags: Please provide up to 5 keywords to describe your session.

anti malware / digital rights / intellectual property protection / professional certification / threat management
anti spam / e-discovery / intrusion detection / professional development / time services
application development / embedded device security / jurisdiction / provisioning / timing analysis
application security / encryption / law / remote access / virtualization
apt / encryption key management / legislation / research / visualization
audit / endpoints / lessons learned / research revealed / voip security
authentication / endpoint security / liability / risk management / vpn
big data / enterprise defense / linear cryptanalysis / secure ecommerce / vulnerability assessment
biometrics / enterprise security management / managed security services / secure file transfer / wan security
block ciphers / ethics / messaging security / security analytics / war story
botnets / exploit of vulnerability / metrics / security architecture / web 2.0
business of security / fault_analysis / mobile applications / security awareness / web server security
case studies / federated identity / mobile device security / security consulting / web services security
cloud computing / financial services / mobile security / security education / wireless security
cloud security / firewalls / mock trial / security intelligence / zero day vulnerability
compliance / forensics / network protocol security / security jobs
content filtering / fraud / network security / security operations
consumerization / governance / oem appliance / security services
controls / government regulations / online security / security trends
critical infrastructure / government risk and compliance / outsourcing / sha3
cryptographic protocols / government standards / password management / side channel attacks
cryptography research / hackers and threats / patch management / siem
cybercrime / hacking / pci / spam
cyberterrorism / hacktivism / penetration testing / soa
cyberwarfare / hashing functions / phishing / social engineering
data security / healthcare / physical security / social networking
database security / hypervisors / pii / software code vulnerability analysis
denial of service / identity management / pki / strategy and architecture
digital certificates / identity theft / policy management / sso
digital evidence / incident response / power analysis / standards
digital signatures / insider threats / privacy / storage security
data loss prevention / internet protocol / product certification / supply chain

PROPOSED SPEAKERS

Add a Speaker

An Individual session may have only one speaker, a Co-Speaker session has two speakers, and Panel Discussions require a Moderator and up to four Panelists.

All proposed Speakers, Moderators and Panelists will be notified that they were included in a proposed submission.

If we discover a Speaker or Panelist hasn’t approved their participation in a session, your submission will disqualified.

Complete the following information for each speaker. You’ll also be given the option to prefill the form with your information, if you are both the Submitter and a Speaker.

NOTE: Each speaker must have a unique email address

* = required input:

Has the proposed speaker approved his or her participation in the session? Yes/No

Session Role * Individual or Co-Speaker/Moderator/Panelist

·  Salutation * Dr./Mr./Mrs./Ms.

·  First name *

·  Middle Initial

·  Last Name *

·  Suffix

·  Preferred Name

·  Company *

·  Company Type * Enterprise/Vendor/Government/Association/None

·  Job Title *

·  Country*

·  Email address * (must be unique)

·  Primary Telephone *

·  Mobile Telephone*

·  Speaker Biography/CV * (Limit 800 characters including spaces) This information will appear on the website and in other marketing materials
Enter speaker biography/CV here

·  What is the Speaker’s first language?* Enter language here

·  Is the proposed speaker a Certified Information Systems Security Professional (CISSP)? *

Yes/No/Not Known

·  Does the proposed Speaker have other security certifications?

Yes/No/Not Known

If yes, please provide details:

·  If the proposed speaker has a blog, please enter blog link here:

Enter blog link here

·  If the proposed speaker has a Twitter handle, please enter the Twitter handle here:

Enter Twitter handle here

·  Has the proposed speaker spoken at an RSA Conference before? *

Yes/No

If yes, please identify the Conference(s) years:

PAGE 1 of 7