Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA International Conference - Call for Speakers

Dates:
October 22-23, 2014
Link:
www.issaconference.org
Location:
Disney Contemporary Resort
Orlando, Florida - US

The call for speaker's submission deadline has passed. You may still use the below speaker form to submit a proposed session, yet late proposal will only be reviewed if needed.

About ISSA:

The Information Systems Security Association (ISSA)® is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, hospitality, financial, and government.

Presentation Subjects:

We are seeking sessions that will relevant to an audience of experience information security professionals from a variety of industries. Sessions should be solution oriented, proactive, and innovative, focusing on security as a vital part of the business landscape. Presentation can address any issue that infosec professionals might face; for example - business skills, technical updates, legal knowledge.

  • Mobile Security: Wireless, Mobile Apps, Tablets and Smartphones
  • Securing the End Users: Security Awareness Training, Social Media, Access Control
  • Application Security: Application Security, Security Development Lifecycle
  • Infrastructure: Endpoint Security, Network Security, Data Loss Prevention, Pen/Vulnerability Testing, Security Intelligence, Data Protection, Architecture
  • Threats & Response: Updates, Forensics, Law Enforcement, eDiscovery
  • Laws and Regulations: Legal Updates, GRC, Standards, Privacy Regulations
  • Business Skills for the Information Security Professional: Presenting the Business Case for Information Security, Career Paths for Information Security Professionals, Presentation Skills, Negotiation Skills

Audience:

The audience will be comprised of 600-800 knowledgeable information security practitioners. 70% have more than ten years of experience in the field. Job function and interests range from technical to management. 25% of the audience members are senior level professionals within their organizations (including director, VP, executive, and C-level). Attendees will include ISSA members from regional, national, and international chapters in addition to the general information security community.

Sessions Options:

  • Breakout Sessions/Panels: Traditional sessions will be a maximum of 50 minutes and should allow ample time for questions and interaction. Sessions should be planned to address the conference theme and be appropriate for experienced information security professionals.
  • Workshops: This option allows for longer sessions to dive deep into a specific subject or training. Two - 50 minute back to back sessions following the same break schedule as the rest of the conference attendees. Please be specific on the time needed and what attendees will learn from devoting extra time to your sessions.
  • Case Studies: Tell us how your organization is managing risk, privacy and security in the ever expanding and diversified IT landscape. How has your team embraced new technology such as mobile devices, big data and cloud technology in a way that takes advance of the business applications and still maintains security and privacy standards? Presenters are encouraged to bring together stakeholders from diverse disciplines (legal, business lines, IT, HR, etc.) to present a picture of obstacles, decisions and results. Session should give attendees practical advice and examples that they can use in their organizations. Up to five presenters will be provided passes to the event.

Dates and Deadline:

Speaker submissions are due March 21, 2014
Confirmations will be sent by May 31, 2014
Presentation slides must be received by September 30, 2014

Guidelines

Thank you for willingness to present at the ISSA International Conference. We will follow-up by the end of May with confirmation if your session is selected. Many factors go into the selection process; including review by our volunteer committee members, number of sessions submitted on a given subject and efforts to vary the prospective of presentations. Proposals may also be considered for other educational programs throughout the year.

  • Case studies, interactive workshops, and advanced level presentations for experienced professionals are strongly encouraged.
  • Remember this is an educational venue. Clearly stated learning objectives are a must to consider the submission complete.
  • Well-written abstracts improve your potential for selection.
  • Speaker(s) understand that some session proposals will be posted on-line and shared with other educational committees.
  • Practitioners are desired. Speakers from any company that sells or markets information security products or services should be responsible for information security within their organizations. A client may be submitted to present a case study.
  • Information submitted (biography, abstract, etc.) may be edited to conform to ISSA style guide.
  • A microphone(s) (if needed) and LCD projector will be available for each session. Please be prepared to use your own laptop. Should you choose to use a Mac, you will be responsible for providing a converter or any needed cable adapters.
  • All presentations must be educational in nature and may not promote any company, product or service.
  • ISSA does not pay travel expenses or honoraria. Speakers will receive a full conference pass and an opportunity to network and support the information security community.
  • Presentation slides are due September 30, 2014 for review by the Conference Planning Committee.

Please feel free to contact Kate Kanapeaux /+1 503 274 4110 at ISSA Headquarters should you have any questions.

  
Current Page
  
Unvisited
  
Valid
  
Missing or invalid required information
1
2
3
| Save and Continue Later

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/26/2016
Secure360-Wisconsin

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information