[Full-disclosure] GrrCON 2012: Grand Rapids, MI - Sept 27-28

GrrCON '12 - Michigan

Midwest Information Security & Hacker CON



-= GrrCON 2012
-= September 27 & 28, 2012
-= Grand Rapids, MI

-= Priority consideration will be given to submissions received before
May 1st, 2012

GrrCON is an information security and hacking conference held annually
in the Midwest. This conference was put together to provide the
information security community with a venue to come together and share
ideas, information, solutions, forge relationships, and most importantly
engage with like minded people in a fun atmosphere. We completely sold
out in 2011 and have increased capacity in 2012.

First round or speakers have already been announced.

We are not JUST a Hacker Conference talking about pen testing and
exploits NOR are we JUST an Information Security Conference discussing
risk and strategy. GrrCON is unique in we have significant portions
DEDICATED to both. We bring together the CISO, the hacker, the security
practitioner, and the researcher in an intimate one-of-a-kind experience
you CANNOT get elsewhere.

We’ve taken ideas from all the major security conferences and put the
best ones into GrrCON to provide the most value to our attendees.
Whether you are a Fortune 500 executive, security researcher, security
industry professional, student, or a hacker of “flexible” morals you
will find something for you at GrrCON.

==[Why GrrCON]==
We offer two tracks, training, workshops, solutions arena, Bsides,
contests, an after party, and more to ensure you get the most out of the

-= oh yea.. and FREE BEER and FOOD both days for EVERYBODY =====
-= As always we try to PAY our speakers as much as possible for speaking
at GrrCON =====

Not all speakers or presentations are created equally, we hold to this
ideal by varying the honorarium we provide.
-= For example, in 2011 the honorariums we paid out ranged from $200 to
over $4,000 per speaker =====

We also understand not all speakers can accept payment. Therefore,
speakers can negotiate additional tickets in exchange for honorariums,
subject to approval on an individual basis. Like everything we do,
we’re flexible and want to ensure everybody (even our speakers) have a
great time. If you have any thoughts or crazy negotiation ideas let us
-= All accepted speakers will also receive a VIP Ticket for themselves
to enjoy the rest of the conference =====

==[Submit your CFP SOOON]==

-= Call for papers will close on June 1st or when we have filled all
available slots.
-= Priority consideration will be given to submissions received before
May 1st.
-= Speaker announcements will be made in rounds, with the final round no
later than July 5th, 2012
-= 25 or 50 minute presentations
-= CFP Form is available at http://grrcon.org/speakers/cfp/

GrrCON attendees represent a BROAD section of Information Security
We encourage both technical & non-technical submissions on all aspects
of security. We’re looking for talks about information security,
hacking, regulatory compliance, risk mitigation, application security,
web security, privacy issues, database hacking, criminal law, civil law,
hardware hacking, BCP, exploit development, your grandmothers cookie
recipe, cyber _fill in the blank_ (or any other hacker fantasy),
malware, ect…
If it’s interesting and related to InfoSec or Hacking it’s for
GrrCON. Absolutely NO SALES
presentations will be accepted.

More conference information, registration details, ect:


Follow Status on:


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Relevant Pages

  • [Full-Disclosure] Administrivia
    ... directly related to security concerns per se. ... I consider myself to be a hacker, ... >> was the motivation in days gone by. ... >> The idea that with great power comes great responsibility is one that I ...
  • ISO 27001 Newsletter: Edition 17 Released
    ... The latest issue of the newsletter covering the ISO information ... news and background with respect to the ISO security standards. ... Trials and Tribulations of an Information Security Officer ... Business Continuity Management: Preparation and Risk ...
  • Re: Mac OS X hacked under 30 minutes
    ... a Swedish Mac fan posted a web site that challenged all ... updated it to Mac OS X 10.4.5 and fixed some security issues. ... As there was no cash prize associated with the contest, ... The hacker, known only as "gwerdna," explained what he ...
  • RE: 0-day exploit..do i hear $1000?
    ... security industry, then after money is confirmed deposited to fund, hacker ... Security firm 123 implement patches for brain dead clients. ... CUA codes the exploit ...
  • Re: A Challenge
    ... It is not a crime to be a hacker. ... > This section is called paranoia. ... > criminals as a result of the popular media. ... We didn't design some new security ...