June 11-12 • Pennsylvania Hotel, New York City • NY


Cyber Security: The interdependent network of information technology infrastructures, including the internet, telecommunications networks (satellite communications), computer systems, embedded processors and controllers in critical industries. Government officials, corporations and institutions involved in military, intelligence, and national security matters.

IT Security: Information security applications and processes including: securing networks and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics.

The Computer Forensics Show:

For some companies, it is not a question if one of their computers will be used as evidence in a legal matter; it is a question of when. Like it or not, every computer is a potential crime scene and must be treated with care.

When companies need to conduct internal investigations—especially those involving litigation—discovering and maintaining evidence becomes paramount.

We are proud to announce The Computer Forensics Show, and with CyBit (IT Security and Cyber Security)

June 11-12 in New York City, NY.

The events will highlight exhibits from some of the leading companies in the industries, complemented by a comprehensive conference program to provide attendees with important information about the latest technological advancement, ideas and practical information available today.

The Computer Forensics Show and CyBit offer its speakers tremendous opportunities for exposure and recognition as industry leader. Your session will attract many technical professionals interested in learning from your example, expertise and experience. In appreciation of your contributions as a conference speaker, we provide the following benefits:

– Complementary speaker registration to the exhibition and full conference pass.
– Complementary session passes for your colleagues to attend your session (upon request).
– Presenters will receive three promotional conference passes to promote their session.

Tracks for CyBit:
– IT Security – Governance, Risk & Compliance
– IT Security – Data Security/Cloud Security
– Cyber Security Secure Communications, Electronics, Critical Infrastructure
Cyber Security Command and Control, Readiness and Tactical Operations

Tracks for The Computer Forensics Show:
Legal Track A – Electronic Discovery
Legal Track B – Records/Document Management
Investigations/Incident Management
Mobile Devices/ Mobile Risk Management
Forensic Accounting: Case Management and Forensic Analytics

The Show’s Conference Department is asking industry executives to submit brief abstracts on some current topics to be presented to attendees in a solo presentation or as part of a conference panel. If you are interested, please review the following guidelines and contact information, and note the submission deadlines for the conference.

– Paper size – letter/8.5″ width X 11.0″ height.
– Margins – top/bottom/left/right – 1″.
– Font – Times New Roman 11 point.
– Paragraph Spacing – single spaced.
– The submission should be sent in Microsoft Word.

The submission must include
– The Presentation Title
– Author Name(s)
– Title
– Company

Speaker Contact Information:
– Address
– Phone Number
– E-mail Address
– Keywords (4-8 words)

ABSTRACT* The presentation abstract should outline your presentation and what attendees would learn. Please remember that all the content must be strictly educational and marketing oriented papers will not be accepted. The presentation has to be oriented towards the intended audiences for each event.

BIOGRAPHY* The speakers biography should be 60 to 100 words in paragraph form. These may include present position, titles, areas of professional expertise, experience, research interests, major publications, degrees, etc.

*Abstract and Biography information should not extend more than one page and will be used for our Show Guide and Website if speaking.

Please do not hesitate to include additional material regarding your presentation(s) for better evaluation.

The total presentation length is 60 minutes
Submissions will be evaluated for originality, significance of the work, technical content, and interest to a wide audience. Speakers may also be grouped into panels when there are overlapping topics of interest.

Submissions should be in Microsoft Word and sent to Conference Coordinator at note that due to the expected volume of submissions, Mountain Top Expos, LLC will only contact speakers who are selected.

By agreeing to speak, you grant one-time permission to Mountain Top Expos, LLC to retain and publish a copy of your presentation. The copyright and all other rights to the presentation remain with the author(s). All rights to and use of The Computer Forensics Show and CyBit name and logos are retained exclusively by its respective party.

A copy of the presentation materials should be submitted to us no later than January 15th, 2014. It should be sent in Microsoft PowerPoint (.ppt) format on the Computer Forensics Show and CyBit template that will be provided to you prior to the conference. If you use any animation or active content, please include that as well. For reliability and security purposes, all presentations will be preloaded onto the presentation computers at the conference.

Note:Substitutions for speakers are only allowed under emergency circumstances, and trade show management must be immediately notified of any changes. All participants are selected at the discretion of show management.

If you have any questions about the conferences, please send us an e-mail to

To be removed from further emails, please send an email to, subject: remove