Print Page   |   Contact Us   |   Sign In   |   Register
ISSA Journal Call for Articles


The ISSA Editorial Advisory Board seeks article submissions from information security professionals throughout the industry. Security experts in the enterprise, academia, and government are encouraged to share their expertise to the advancement of our industry. ISSA members and non-members are welcome to contribute. Please submit articles to the ISSA Journal Editor and review in advance the Editorial Guidelines. Include the copyright release and submission checklist with your article. Note that accepted articles may be eligible for CPE credits.

We occasionally revisit past topics for inclusion when space permits: see below.

The Open Forum

The Open Forum is a vehicle for individuals to provide opinions or commentaries on infosec ideas, technologies, strategies, legislation, standards, and other topics of interest to the ISSA community. Open Forum articles are not intended for reporting news; they must provide insight, opinion, or commentary to initiate a dialog as to be expected from an editorial. The views expressed in this column are the author’s and do not reflect the position of the ISSA, the ISSA Journal, or the Editorial Advisory Board. Columns should be 800 words maximum and include a title, a short bio, and a photo.


November: Cryptography & Quantum Computing

Quantum computing offers great promise, the potential for us to solve problems that were not feasible to solve on classical computers. But there's a downside to this promise. In the quantum computer future, attackers will enjoy improved cryptanalysis capabilities. These improvements will make some of our existing cryptographic security controls more vulnerable to attack and make it much harder to defend our systems. This issue of the Journal seeks articles that can help security professionals navigate the quantum future. Topics of interest include, but are not limited to, Quantum Computers, Quantum Random Number Generators (QRNG), standardization activities, Quantum Safe Computing, and Quantum Cryptography (e.g., Lattice-based unique key exchange, McEliece code-based encryption, Leighton-Micali signatures, etc.).

Articles Due: NOW

December: Social Media, Gaming, and Security

Based on 2016 statistics, 155 million Americans play online games regularly and 78 percent of the population has a social networking profile. With staggering numbers like this, these industries will probably thrive for the foreseeable future. Being interconnected with others in the community and around the world through these vehicles can be exciting but also poses numerous risks such as predators, addiction, identity theft, malware intrusion, and social engineering. These issues require both the vendors and consumers to become more vigilant to effectively protect themselves. Furthermore, tackling them can be complicated and time consuming and will inevitably impact this landscape. What research, experience, or best practices do you have to share in this area? The ISSA Journal is interested in hearing from you.

Articles Due: 10/22/17


Past Topics

October: Addressing Malware

September: Health Care

August: Disruptive Technologies

July: Cybersecurity in World Politics

June: Big Data/Machine Learning/Adaptive Systems

May: The Cloud

April: New Technologies in Security

March: Internet of Things

February: Legal, Privacy, Regulation, Ethics

December: Security Architecture

November: Practical Application and Use of Cryptography

October: Cybersecurity Careers & Guidance

September: Payment Security

August: Internet of Things

July: Social Media Impact

June: Legal, Privacy, Regulation

May: Breach Reports - Compare/Contrast

April: Malware Threat Evolution

March: Mobile Apps

February: Big Data / Data Mining & Analytics

January: Securing the Cloud

November: Social Media and Security

October: Infosec Career Path

September: Academia and Research

August: Privacy

July: Malware and How to Deal with It?

June: The Internet of Things

May: Infosec Tools

April: Security Architecture / Security Management

March: Physical Security

February: The State of Cybersecurity

January: Legal and Regulatory Issues

November: Cyber Security / Cyber Defense

October: Data Protection Strategies and Controls

September: History of Information Security

August: Big Data: Use and Security Ramifications

July: Practical Use of Infosec Tools

June: Identity Management

May: Healthcare Threats and Controls

Community Search
Sign In


ISSA Denver's Oil & Gas SIG Presents: Cyber Security in O&G

Triangle InfoSeCon

Pre-Professional Meetup: Success Stories from former Pre-Professionals

Cyber Espionage - An ISSA Security Education and Awareness SIG Webinar

CISO Mentoring Webinar Series

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information