Program. Check. Not.

Going to present at a conference. You know, to raise one’s reputation that is the single currency in independent-consultancyland, and to gain feedback on one’s private research and professional (industry) development zeal.

So, I was to present at (ISC)2, or rather, not, as notified in an email of May 7th, less than 2 months after proposal submission.
And indeed the program/agenda presented online then (and the weeks before already), didn’t show my name. Bummer. Was granted a slot at a back-up filing (ISACA Copenhagen) but had to decline, due to private circumstances.
Over the course of the last couple of months, did receive some (Google)anonymous cell calls from the UK. Dismiss, obviously, as this is the Fast Route to phone bill exploitation by connect-throughs; everyone knows this, right? The some that I could (Google)trace, and the some that left voice messages, I reacted and sometimes responded to. Lesson: Be traceable via your cell number or else.
And then, yesterday this guru peer sent me a message whether I would be in town already — the town being far away, vaguely recalling the above conference of first preference…

So, … checking the conference agenda (PDF here) … my name is there …!
Texted back whether peer might present the rejection email to conference organizers which he did, causing some more cell calls with some voice mail (08:49h) about ‘terrible mistake’ and whether I could still present, at 12:10h — considering having to dress up, make a full professional presentation, pack up, get to the bus, get to the train or to the airport, get a suitable ticket, get on (train takes only 8,5hrs; plane: gate time delay, flight time, offboard delay = ?), transfer to the conference venue, for half an hour talk time … Oh. Or go the next day, in the slot that the replacement speaker got instead but then, I’d still lose out all credibility before having even started.

This just in: per tweet, MIS Training EMEA thanks me for my session… Adding to the audience that will be aware that I didn’t deliver.

Now, still awaiting a proposal from their side, how to compensate for the:

  • Reputational damage of being shown as if not delivering, to a crowd of foremost peers and potential clients;
  • Loss of outright marketing opportunity [note: not ‘sales’], to the same;
  • Feedback not received, which could greatly have enhanced both my service offering and the acceptance and acceptability of the same;
  • Loss of (permanent) education I would have got from being at the conference and hearing all the cutting edge developments in the field (that the organizers promise);
  • Expense and leisure of private travel (incl. spouse) that would have shouldered the conference and would have been half deductible on business for income tax.

I’ll stop now and wait. Some time, before switching to legal recourse.
DSC_0945
[Justice will be served.]

Advertisements

About maverisk

Maverisk Consultancy, IS Audit and Advisory services: Wikinomics meets governance and audit; otherwise, see my personal LinkedIn profile
This entry was posted in ERM, Information Risk Management, Information Security, Sociological and tagged , , , . Bookmark the permalink.

Your comments are welcomed!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s