Contact Us   |   Print Page   |   Sign In   |   Register
Call for Speakers: 2018 ISSA International Conference

 

Securing Tomorrow Today
October 17-18, 2018
Georgia World Congress Center
Atlanta, Georgia, USA
#ISSAConf

 

Call for Speakers is Now Closed

For any questions, please contact Sean Bakke

Dates and Deadline:

Call for Speakers opened May 31, 2018
Speaker submissions are due June 22, 2018
Confirmations will be sent by July 11, 2018

About ISSA:

The Information Systems Security Association (ISSA)® is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, hospitality, financial, and government.

About the Conference Theme: Securing Tomorrow Today

Every day, cyber threats become increasingly intricate and difficult to detect. No cyber security professional can become an expert on these dangers without continued efforts to educate themselves on the industry’s latest trends and technologies. 
We look forward to welcoming you and over 1,000 of your colleagues and peers in Atlanta as we discuss topics ranging from incident response, to emerging technologies, to business skills for the information security professional. Join us at the 2018 ISSA International Conference and we’ll help you prepare to Secure Tomorrow Today

Presentation Subjects:

We are seeking sessions that will be relevant to an audience of experienced information security professionals from a variety of industries. Sessions should be solution oriented, proactive, and innovative, focusing on security as a vital part of the business landscape.

  • Application and Data Security
  • Cloud Security
  • Security Awareness
  • Security and Privacy Collaboration
  • Email & Endpoint Security
  • GRC
  • Professional Development
  • Emerging Technologies
  • Bridging the Business Gap
  • Women in Security
  • Network Security
  • Threat Intelligence
  • Incident Response/Forensics
  • Identity Access Management
  • Encryption
  • Critical Infrastructure/ICS
  • Cyber Crime
  • Wireless and Mobile Security
  • IoT
  • Data Loss Prevention
  • Malware

Audience:

The audience will be comprised of over 1,000+ knowledgeable information security practitioners. Job function and interests range from technical to management. About 60% of the audience members are senior level professionals within their organizations (including director, VP, executive, and C-level). Attendees will include ISSA members from regional, national, and international chapters in addition to the general information security community.

Session Options:

  • Breakout Sessions/Panels: Traditional sessions will be a maximum of 50 minutes (Panels 50 to 75 minutes) and should allow ample time for questions and interaction. Sessions should be planned to address the conference theme and be appropriate for experienced information security professionals.

Guidelines:

Thank you for your willingness to present at the ISSA International Conference. We will follow-up by July 11 with confirmation if your session is selected. Many factors go into the selection process; including review by our volunteer committee members, number of sessions submitted on a given subject and efforts to vary the prospective of presentations. Proposals may also be considered for other educational programs throughout the year.

  • Remember this is an educational venue. Clearly stated learning objectives are a must to consider the submission complete.
  • Well-written abstracts improve your potential for selection.
  • Speaker(s) understand that some session proposals will be posted on-line and shared with other educational committees.
  • Practitioners are desired. Speakers from any company that sells or markets information security products or services should be responsible for information security within their organizations. A client may be submitted to present a case study.
  • Information submitted (biography, abstract, etc.) may be edited to conform to ISSA style guide.
  • Microphone(s) (if needed) and LCD projector will be available for each session. Please be prepared to use your own laptop. Should you choose to use a Mac, you will be responsible for providing a converter or any needed cable adapters.
  • All presentations must be educational in nature and may not promote any company, product or service.
  • ISSA does not pay travel expenses or honoraria. Speakers will receive a full conference pass and an opportunity to network and support the information security community.
  • Presentation slides are subject to review by the Conference Planning Committee.

Check Speaker FAQ here.

 

Community Search
Sign In


Calendar

8/22/2018 » 8/23/2018
Peak Cyber

9/3/2018
HackIstanbul 2018 CTF - Preselection Stage

9/9/2018
HackIstanbul 2018 CTF - CTF Challenge




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information