Call for Workshops

Filtering by: Call for Workshops

TRUSTe Privacy Risk Summit 2017
Jun
6
1:00 AM01:00

TRUSTe Privacy Risk Summit 2017

As the GDPR embeds a risk-based approach to privacy management and drives technological innovations in privacy management the TRUSTe 2017 Privacy Risk Summit will bring together the industry’s top thinkers, practitioners and solution providers to share emerging best practices and tools and models for success.

The Summit builds on TRUSTe’s reputation for high quality education programs to bring you a comprehensive program with three parallel conference tracks and 30+ speakers focusing on risks rising from technological and regulatory change and privacy risk management best practices.

We invite you to join us in San Francisco this summer for another packed day of inspiring keynotes, dynamic panel presentations and interactive workshops.

View Event →
CISSE 2017
Dec
2
5:00 PM17:00

CISSE 2017

Serving the Global Cybersecurity Education Community- Call for Papers and Presentations

For 21 years The Colloquium for Information Security Education (CISSE) has supported Cyber Security educators, researchers and practitioners in their efforts to improve curricula and foster discussion of current & emerging trends.

CISSE 2017 Session Proposals-Due 12/1/2016

Submission of proposals for participation in CISSE 2017 June 12-14 at the J.W. Marriott, Las Vegas, NV.  Submission topics can be related to career, graduate school, research, or education in the field of Cybersecurity. You can submit in more than one category, please make sure it is not a commercial for your program or company but rather something that we can all learn from.  

Call for Papers:  Please submit your unpublished original paper in the field of Cyber Security/Information Assurance with a focus on education.
 

Academic Papers- Due March 15, 2017
 
If your paper is chosen for presentation at our conference it will also be published in our Journal, The Colloquium for Information Systems Security Education and available on amazon.com.  Check out last year’s edition at: https://www.amazon.com/Journal-Colloquium-Information-Security-Education-ebook/  it is available as an e-book and softcover book.
 
All submissions must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to make their submissions geographically and institutionally anonymous and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review. 

Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will  require that at least one of the authors register and attend the conference to present the paper. 


Student Papers: Criteria for eligibility-All the following criteria must be met:Submitting author must opt-in to the competition during the regular submission process and follow all the instructions provided on the submission site.

The presenting author must be an undergraduate or graduate student of an educational institution of collegiate grade who is devoting more than half-time to studies within the institution, at the time the paper was written.
The Student must present the paper during the conference.
One lucky Student Paper will be selected for the Erich Spengler Student Cyber Paper-award!  The awardee will receive free registration, plus a travel and hotel stipend.

More Information about our 21st Annual Conference can be found at :  http://www.CISSE.INFO

View Event →
Women in Cybersecurity (WiCyS) 2017
Nov
6
11:59 PM23:59

Women in Cybersecurity (WiCyS) 2017

  • JW Marriott Tucson Starr Pass Resort & Spa, (map)
  • Google Calendar ICS

Submission of proposals for participation are in the following session categories (open until November 6th, 2016). Submission topics can be related to career, graduate school, research, or education in the field of Cybersecurity. 

  • Presentations
  • Birds of a Feather (BoF) Sessions 
  • Panels 
  • Workshops
  • Lightening Talks
  • Posters
View Event →
SANS Threat Hunting & Incident Response Summit 2017
Oct
21
11:59 PM23:59

SANS Threat Hunting & Incident Response Summit 2017

The Threat Hunting and Incident Response Summit (April 18-19, 2017) offers speakers opportunities for exposure and recognition as an industry leader. If you have something substantive, challenging, and original to offer, you are encouraged to submit a proposal. CFP submissions should detail how the proposed Threat Hunting and Incident Response case study, tool or technique can be utilized by attendees to increase their security posture. All Threat Hunting and Incident Response Summit presentations will be 30 minutes with 5 minutes for questions. 

View Event →
SANS Cyber Threat Intelligence Summit 2017
Sep
15
to Jan 30

SANS Cyber Threat Intelligence Summit 2017

  • Renaissance Arlington Capital View Hotel (map)
  • Google Calendar ICS

While Cyber Threat Intelligence is a relatively new field, we can draw upon classic intelligence approaches to better secure our organizations. Throughout the Summit, we'll be going old school by examining traditional intelligence methods and techniques; and applying them to cyber threat intelligence.

The Summit & Training will explore the following:

How classic intelligence approaches are applied to CTI analysis and production
Interesting perspectives and case studies that challenge CTI assumptions and result in a shift in understanding
Classic methods of producing Cyber Threat Intelligence
Implementing and making decisions based off of intelligence
Case studies on the application of cyber threat intelligence to a security or business problem
Innovative ways to utilize or analyze CTI with classic techniques
New tools developed to support or enable CTI

View Event →
OWASP AppSec California 2017
Sep
15
to Jan 22

OWASP AppSec California 2017

  • Annenberg Community Beach House (map)
  • Google Calendar ICS

A full day of training on various subjects by expert trainers kicks off the conference on January 23rd. World renowned speakers follow on days two and three.

New friendships will be born, new techniques for securing your environments and applications will be shared, as you become inspired by your peers.

View Event →
FTC Fall Technology Series: Smart TVs
Sep
15
to Dec 6

FTC Fall Technology Series: Smart TVs

Consumers enjoy recommendations based on their television viewing habits (“viewers who watched Mr. Robot… may enjoy Fight Club”), but who else knows what you’re watching? The golden age of television has arrived with the golden age of television tracking. In 2016, virtually all television delivery systems – smart TVs, streaming devices, game consoles, apps, and even old-fashioned set top boxes – track consumers’ viewing habits, and sometimes in new and unexpected ways. Television and streaming device manufacturers, software developers, and the advertising industry are collaborating to learn more about what consumers are watching. These collaborations are allowing advertisers to precisely target consumers and better understand what ads are working. Consumers may even find advertisements based on their television viewing habits appearing on their phones and desktop browsers. The Smart TV workshop will explore the following questions:

What are the roles of hardware manufacturers and software developers in creating tracking technologies?
What do consumers understand about how their entertainment preferences are being tracked, disclosed, and used for various purposes?
How are entertainment preferences being linked to individuals or to individuals’ device graphs?
How is the advertising industry using this information?
What are some best practices for addressing consumer privacy on entertainment systems?

View Event →
2016 ACSAC: Security & Privacy in the Internet of Things
Sep
15
to Dec 4

2016 ACSAC: Security & Privacy in the Internet of Things

  • Hilton Los Angeles/Universal City (map)
  • Google Calendar ICS

ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.

We solicit submissions that address the application of security technology, the implementation of systems, and lessons learned. While we are interested in a variety of topics, we especially encourage submissions in the area of our Hard Topic Theme for 2016, Security and Privacy in the Internet of Things

View Event →
CSX North America 2016 (an ISACA Cybersecurity event)
Sep
12
to Oct 16

CSX North America 2016 (an ISACA Cybersecurity event)

  • The Cosmopolitan Las Vegas (map)
  • Google Calendar ICS

Conducted either as a one-day or two-day event, CSX workshops place special emphasis on key cybersecurity topics and offer more in-depth and hands-on experiences than the standard session. Similar to the cyber tracks, the workshops are designed around varying levels of expertise, so that both beginners and experts can focus on the materials most beneficial to their organization.

 

View Event →
FTC Fall Technology Series: Drones
Sep
12
to Oct 12

FTC Fall Technology Series: Drones

Americans are increasingly familiar with drones, also known as Unmanned Aerial Systems (UAS). These devices have become one of consumers’ most popular technology purchases; some estimate nearly one million new drones will be purchased in 2016. The National Telecommunications and Information Administration (NTIA) is currently convening multi-stakeholder meetings to develop and communicate best practices for privacy, accountability, and transparency issues regarding commercial and private drone use. We expect these meetings will provide important input for the Commission’s event. The drones workshop will explore the following questions related to commercial uses of drones:

What are the uses and consumer benefits of drones for consumers today? Where is drone technology headed?
What are the unique privacy and security concerns associated with drone technologies and the data collected from them?
How are these concerns currently being addressed by businesses, self-regulatory efforts, and foreign regulators?
Is there a need for further guidance?

View Event →
SOURCE Seattle 2016
Sep
12
to Oct 11

SOURCE Seattle 2016

At SOURCE, we pride ourselves on having some of the best speakers in the world speak at our conferences. But we're about so much more than just great talks. We are pleased to offer the following trainings at the SOURCE Seattle Conference. These hand-picked courses are high-impact, high-value workshops that will prove invaluable in your jobs.

1) Metasploit Basics,

2) Application Security Risk for Executives and

3) Managers and InfoSec Train the Trainer.

The call for papers for SOURCE Seattle is currently OPEN. 

 

View Event →
ToorCon San Diego 2016
Sep
12
to Sep 30

ToorCon San Diego 2016

ToorCon San Diego 18 is now officially accepting talk submissions for it’s upcoming event on October 12th-16th, 2016. The first round of talks will be announced September 9th.

It’s that time of year again! ToorCon 18 is coming so get your code finished and submit a talk this time around. We’re letting you decide if you want to be a part of our 50-minute talks on Saturday, 20-minute talks on Sunday, and 75-minute talks for our Deep Knowledge Seminars on Friday depending on how much time you need to present your new ideas and techniques. We evaluate our submissions in the order that they’re received so submit your talk before time runs out!

View Event →