Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA Journal Call for Articles

 

The ISSA Editorial Advisory Board seeks article submissions from information security professionals throughout the industry. Security experts in the enterprise, academia, and government are encouraged to share their expertise to the advancement of our industry. ISSA members and non-members are welcome to contribute. Please submit articles to the ISSA Journal Editor and review in advance the Editorial Guidelines. Include the copyright release and submission checklist with your article. Note that accepted articles may be eligible for CPE credits.

We occasionally revisit past topics for inclusion when space permits: see below.


The Open Forum

The Open Forum is a vehicle for individuals to provide opinions or commentaries on infosec ideas, technologies, strategies, legislation, standards, and other topics of interest to the ISSA community. Open Forum articles are not intended for reporting news; they must provide insight, opinion, or commentary to initiate a dialog as to be expected from an editorial. The views expressed in this column are the author’s and do not reflect the position of the ISSA, the ISSA Journal, or the Editorial Advisory Board. Columns should be 800 words maximum and include a title, a short bio, and a photo.


2016

October: Cybersecurity Careers & Guidance

Articles in the October 2015 issue of The ISSA Journal on Infosec Career Path indicated there are many cybersecurity jobs that are unfilled in the government and private sectors. While the market demand may be an enticement in your decision to pursue a degree in information security/assurance, cybersecurity, and other related fields, it is finding and fulfilling your personal passions about your work and determining what you want to achieve as a security professional that will enable you to fulfill your career goals. The security profession has benefited from—and will continue to achieve its objectives with—persons with multi-discipline educational and work experiences working in technical, non-technical, and management positions. This month’s issue discusses cybersecurity careers, and we are asking our readers to share their experiences by identifying the processes, core skills, and resources that supported their decisions in education, certifications, work opportunities, and their own career paths. These experiences will provide encouragement and guidance for the new generation of security professionals—and for those security professionals who want to expand their areas of work expertise.

Articles Due: NOW


November: Practical Application and Use of Cryptography

Cryptography is a core requirement for secure, reliable communications. Its applications allow us to identify each other over a network, control access to our applications and data, and protect the confidentiality, integrity, and authenticity of our information. Articles accepted for this issue of the ISSA Journal can include any topic related to cryptography, including security techniques, cryptographic protocols, entity authentication, public key infrastructure, key exchange, cryptocurrency, data confidentiality, message authenticity, entropy, digital signatures, key generation, security proofs and tools, the key management life cycle, and cryptanalysis.

Articles Due: 9/22/16


December: Security Architecture

Developing a security architecture is tantamount to developing an architecture for a building. Like a building, security is meant to support and protect the environment in which activities transpire. In order to successfully establish a security architecture an organization needs to fully understand what is being supported and protected, and what threats may be present, both currently and in the future. Because the environment and threats are dynamic in nature, a security architecture needs to incorporate enough flexibility to allow changes to the framework, without ever compromising the ability to support and protect. Until recently, security architecture was an activity undertaken by network engineers and security professionals who had minimal collaboration with the business operations professionals in the organization, resulting in rigid architectures that were challenged by business changes and business operations that felt burdened when the security architecture forced a change in workflow. Organizations are now beginning to collaborate better and this has led to security architecture implementations that can grow with the changing environment, without threatening business operations. The ISSA Journal would like to hear about your experiences in developing security architectures, and understand what you have learned from challenged implementations, and what you have learned from implementing architectures that you deem successful.

Articles Due: 10/22/16


 

Past Topics

September: Payment Security

August: Internet of Things

July: Social Media Impact

June: Legal, Privacy, Regulation

May: Breach Reports - Compare/Contrast

April: Malware Threat Evolution

March: Mobile Apps

February: Big Data / Data Mining & Analytics

January: Securing the Cloud

November: Social Media and Security

October: Infosec Career Path

September: Academia and Research

August: Privacy

July: Malware and How to Deal with It?

June: The Internet of Things

May: Infosec Tools

April: Security Architecture / Security Management

March: Physical Security

February: The State of Cybersecurity

January: Legal and Regulatory Issues

November: Cyber Security / Cyber Defense

October: Data Protection Strategies and Controls

September: History of Information Security

August: Big Data: Use and Security Ramifications

July: Practical Use of Infosec Tools

June: Identity Management

May: Healthcare Threats and Controls

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/26/2016
Secure360-Wisconsin

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information