Call for Papers

Filtering by: Call for Papers

12th Annual Symposium on Information Security (ASIA '17)
Jan
9
to Feb 28

12th Annual Symposium on Information Security (ASIA '17)

NYSCSC is organized jointly by the University at Albany, State University of New York (SUNY) School of Business and Forensics, Analytics, Complexity, Energy, Transportation & Security (FACETS) Center, the NYS Forum, Inc., and the Enterprise Information Security Office (EISO) of the NYS Office of Information Technology Services. This conference provides crucial knowledge that enables the attendees to stay attuned to cyber security threats and effectively meet the challenges we are facing.

Stay tuned in January for our ASIA '17 Call for Papers. Please send an email to [email protected] to submit your papers or if you would like to be put on a listserv to be updated about ASIA events.

View Event →
2017 (ISC)² SecureEvents
Dec
19
to Nov 3

2017 (ISC)² SecureEvents

(ISC)² Secure Events are a series of seminars that provide continuing education for our members - cyber, information, software and infrastructure security professionals - on the issues and challenges the industry faces today, and what may loom on the horizon. These events are typically held in one day in various cities across North America.  Secure Events give our members a unique, first-hand experience on emerging issues with engaging speakers, arming them with the latest information on current trends and hot-button topics as well as the opportunity to automatically earn CPEs. Members, as well as our sponsors, inform us that Secure Events are invaluable for networking, learning, and ensuring continued value within the roles that they deliver.  Certification is just the beginning, and we rely upon experts to help keep our members educated and informed. 
  
If you are a proven speaker in this field and offer valuable knowledge and subject matter expertise across cyber, information, software and infrastructure security arena that will help our members, we invite you to share your expertise and join our community.  
  
The Call for Speakers for the 2017 (ISC)² Secure Events is officially open.  Click on the link provided to submit your speaking proposal. 
 

View Event →
CISSE 2017
Dec
2
5:00 PM17:00

CISSE 2017

Serving the Global Cybersecurity Education Community- Call for Papers and Presentations

For 21 years The Colloquium for Information Security Education (CISSE) has supported Cyber Security educators, researchers and practitioners in their efforts to improve curricula and foster discussion of current & emerging trends.

CISSE 2017 Session Proposals-Due 12/1/2016

Submission of proposals for participation in CISSE 2017 June 12-14 at the J.W. Marriott, Las Vegas, NV.  Submission topics can be related to career, graduate school, research, or education in the field of Cybersecurity. You can submit in more than one category, please make sure it is not a commercial for your program or company but rather something that we can all learn from.  

Call for Papers:  Please submit your unpublished original paper in the field of Cyber Security/Information Assurance with a focus on education.
 

Academic Papers- Due March 15, 2017
 
If your paper is chosen for presentation at our conference it will also be published in our Journal, The Colloquium for Information Systems Security Education and available on amazon.com.  Check out last year’s edition at: https://www.amazon.com/Journal-Colloquium-Information-Security-Education-ebook/  it is available as an e-book and softcover book.
 
All submissions must be anonymized to allow for double-blind reviewing. Authors are expected to make a good faith effort to make their submissions geographically and institutionally anonymous and should not identify themselves either explicitly or by implication (e.g., through references or acknowledgments). Submissions violating formatting or anonymization instructions will be returned without review. 

Papers on original unpublished results may be at most 10 pages in length (single-column, single-spacing, at least 11 point font, with reasonable margins, including figures, tables, and references). Accepted papers will  require that at least one of the authors register and attend the conference to present the paper. 


Student Papers: Criteria for eligibility-All the following criteria must be met:Submitting author must opt-in to the competition during the regular submission process and follow all the instructions provided on the submission site.

The presenting author must be an undergraduate or graduate student of an educational institution of collegiate grade who is devoting more than half-time to studies within the institution, at the time the paper was written.
The Student must present the paper during the conference.
One lucky Student Paper will be selected for the Erich Spengler Student Cyber Paper-award!  The awardee will receive free registration, plus a travel and hotel stipend.

More Information about our 21st Annual Conference can be found at :  http://www.CISSE.INFO

View Event →
38th IEEE Symposium on Security and Privacy
Nov
4
11:59 PM23:59

38th IEEE Symposium on Security and Privacy

Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems.

  • Abstract submission deadline November 4, 2016  No Extensions
  • Paper submission deadline November 11, 2016  No Extensions
  • Early-reject notification and author appeal period January 13, 2017
  • Acceptance notification February 9, 2017
View Event →
SANS Threat Hunting & Incident Response Summit 2017
Oct
21
11:59 PM23:59

SANS Threat Hunting & Incident Response Summit 2017

The Threat Hunting and Incident Response Summit (April 18-19, 2017) offers speakers opportunities for exposure and recognition as an industry leader. If you have something substantive, challenging, and original to offer, you are encouraged to submit a proposal. CFP submissions should detail how the proposed Threat Hunting and Incident Response case study, tool or technique can be utilized by attendees to increase their security posture. All Threat Hunting and Incident Response Summit presentations will be 30 minutes with 5 minutes for questions. 

View Event →
7th ACM CODASPY 2017
Sep
18
11:59 PM23:59

7th ACM CODASPY 2017

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area.

 

The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. 

View Event →
PrivacyCon
Sep
16
to Oct 3

PrivacyCon

The FTC is seeking research presentations on consumer privacy and security issues. We are seeking empirical research, rather than opinion pieces on law and policy. You must transmit your submission, together with your confidentiality request, only through our Accellion secure file transfer system. To do so, you must first send an email by no later than 11:59pm Eastern Time onSeptember 28, 2016, to [email protected]

(link sends e-mail) with the subject line “PrivacyCon - Request for Confidential Treatment of Research Submission.” You should receive a reply email within two business days with instructions for the secure electronic submission of encrypted documents using Accellion.  We must receive your submission and confidentiality request through Accellion by no later than 11:59pm Eastern Time on October 3, 2016. Your confidentiality request must identify the specific portions of your submission for which confidential treatment is being requested, and the legal or factual basis for your request.  See Commission Rule 4.9(c). If the General Counsel grants your request for confidential treatment, your submission will not be made publicly available, except as required by law.  

View Event →
Black Hat 2017
Sep
16
to Oct 30

Black Hat 2017

  • Mandalay Bay Convention Center (map)
  • Google Calendar ICS

Call for Papers opens: September 7, 2016
Call for Papers closes: October 31, 2016
Notifications to Authors Start: Week of January 16, 2017
Terms are subject to change

Submit proposals by completing a submission form on the Call for Papers (CFP) server at https://asia-briefings-cfp.blackhat.com/. All applicants must read and agree to the Call for Papers Submission Requirements prior to making a submission. All submissions must be received on or before October 31, 2016 at 23:59 Pacific Time.

WHAT ARE THE BLACK HAT BRIEFINGS?

The Black Hat Briefings were created more than 20 years ago to provide computer security professionals a place to learn the very latest in information security risks, research, and trends. Presented by the brightest in the industry, the Briefings cover everything from critical information infrastructure to widely used enterprise computer systems to the latest InfoSec research and development and everything in between. The Briefings are vendor-neutral, allowing the presenters to speak candidly about real problems and potential solutions across both the public and private sectors.

SESSION TYPES

25-minute presentations
50-minute presentations

View Event →
North America CACS Conference 2017 (an ISACA event)
Sep
15
to Nov 16

North America CACS Conference 2017 (an ISACA event)

  • 3708 Las Vegas Boulevard South Las Vegas Boulevard Las Vegas, NV, 89109 United States (map)
  • Google Calendar ICS

re you an industry expert, thought-leader or passionate professional willing to share your experiences, insights and knowledge with colleagues and peers? Be a part of the North America CACS 2017 program!

The Call for Speakers is open from now until 17 November, 2016!Take advantage of this great opportunity for you to lead a hot-button session and expand your business network. Selected speakers will receive complimentary conference registration along with many other valuable perks.

Find out more on the North America CACS Call for Speakers page.

View Event →
B-Sides San Diego 2017
Sep
15
to Nov 24

B-Sides San Diego 2017

January 13th and 14th, 2017 hosted by National University!
The Call for Papers is out now!!!
 Sign up now to give your talk. All are welcome! First timers, experienced speakers, students; bring your ideas, and share! https://goo.gl/4fL09K

CFP - https://docs.google.com/forms/d/e/1FAIpQLSeno0rT8pbeSiNgUVUuHsVYQVcH_1lyEQLvKCMpKBP-FEdldg/viewform?c=0&w=1

 the call for papaers will close on November 25 2016. 

View Event →
FTC's PrivacyCon 2017
Sep
15
to Jan 11

FTC's PrivacyCon 2017

he FTC is now issuing a new Call for Presentations for the next PrivacyCon. The Call for Presentations asks a number of specific questions to stimulate further research and build on the success of the first PrivacyCon. 

In addition to expanding upon the previous research presented, we hope to delve into areas we were not able to focus on at this year’s forum, such as the harms associated with privacy violations, attack vectors and trends, uptake of ad blocker tools, and the costs of malware.

Researchers, academics and others who wish to submit a presentation for review can access the Call for Presentations, which also provides information on how to submit your presentation to the FTC for consideration.

Email questions to [email protected](link sends e-mail).   

The FTC is looking forward to the next PrivacyCon and to receiving presentation proposals.

View Event →
2016 ACSAC: Security & Privacy in the Internet of Things
Sep
15
to Dec 4

2016 ACSAC: Security & Privacy in the Internet of Things

  • Hilton Los Angeles/Universal City (map)
  • Google Calendar ICS

ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.

We solicit submissions that address the application of security technology, the implementation of systems, and lessons learned. While we are interested in a variety of topics, we especially encourage submissions in the area of our Hard Topic Theme for 2016, Security and Privacy in the Internet of Things

View Event →
Security B-Sides Philly 2016
Sep
15
to Oct 30

Security B-Sides Philly 2016

  • Drexel University Cybersecurity Institute (map)
  • Google Calendar ICS

The technical and academic presentations at BSides Philadelphia are given in the spirit of peer review and advanced knowledge dissemination. This allows the field of Information Security to grow in breadth and depth and continue in its pursuit of knowledge and insight.

there will be multiple tracks for talks. topics can range from complete or partial research, tool developments, best practice and lessons learned. topics can include-
information technology, mobile security, network security, web application security, biometrics, malware, hardware hacking, massive abuse of technology etc.
call for papers will close on October 31 2016. 

View Event →
Security B-Sides Boise 2016
Sep
15
to Sep 30

Security B-Sides Boise 2016

WHAT: Security BSides Boise 2016 Call for Presentations/Papers
WHO: Your awesome 45 minute presentation on a security/tech/hacking topic. 
WHEN: Deadline for submissions: September 30th 23:59:59 MST
Poster Tracks: New this year will be a Poster Tracks. There will be three 45-60 minute blocks of time where accepted posters and their creators will be available to discuss their topic with attendees in a social setting. The goal of these poster sessions will be to help the community build a solid foundation of security knowledge and also to help younger/less experienced speakers to work on public speaking. The setting of this will be a social hour where attendees can visit each poster and presenter while having a refreshment.  

View Event →
Security B-Sides DFW 2016
Sep
14
to Sep 29

Security B-Sides DFW 2016

Security B-Sides Dallas/Fort Worth (BSidesDFW) 2016 Call for Papers Presentation of approx 45 minutes (including time for Q&A). aNY KIND OF Product/Service Marketing/Advertising presentations will be rejected.Conference language is English WHEN: Deadline for submissions: Midnight CDT 30 Sep 2016 Event date, 05 Nov 2015 Speakers must provide their own lodging and transportation. Speakers must provide notice of cancellation in the event of conflict. All information should be emailed to [email protected]
 

View Event →
Privacy + Security Forum
Sep
14
to Oct 23

Privacy + Security Forum

Guiding Principles

When selecting proposals, we will be guided by our foundational principles for the Forum:

We want to ensure that all speakers are highly experienced and high-caliber. We generally will not accept speakers who lack extensive experience and name-recognition.

All speakers should focus on substance and keep promotion to a bare minimum. A very brief mention of products and services is fine, but the Forum aims to avoid the more significantly promotional talks common at some other events. If speakers engaging in too much promotion, they will not be invited back.

Speakers should be interactive and engage the audience. Hands-on activities, using scenarios, and other techniques to facilitate the involvement of the audience is strongly encouraged. We understand that not all presentations lend themselves to interaction, and we are not rigidly requiring interaction. But we have a strong preference for proposals with interactive sessions.

Speakers should provide sophisticated and useful content.  We strive for rigor and practical takeaways. Even in Level 101 sessions, information should not be very basic and easy.

Speakers should be mindful that the audience consists of seasoned professionals with different backgrounds, from law to technology. Sessions should provide real value to the audience and should be respectful of the audience’s extensive experience. Jargon should be avoided wherever possible.

Sessions should aim for a good balance in speaker backgrounds. We are aiming to unite privacy and security, so we will look most favorably on session proposals that session proposals that are inclusive of both privacy and security as well as speakers with different backgrounds (law, technology, academic, policymaker, etc.).

View Event →
SecurityWeek's 2016 Industrial Control Systems (ICS) Cyber Security Conferenc
Sep
14
to Oct 23

SecurityWeek's 2016 Industrial Control Systems (ICS) Cyber Security Conferenc

  • Georgia Tech Hotel & Conference Center (map)
  • Google Calendar ICS

The official Call for Papers (presentations) for the 2016 Industrial Control Systems (ICS) Cyber Security Conference, being held October 24 – 27, 2016 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA is now open.  

Submissions must include proposed presentation title, an informative session abstract, including learning objectives for attendees if relevant; and contact information and bio for the proposed speaker. All speakers must adhere to the 100% vendor neutral / no commercial policy of the conference. If speakers cannot respect this policy, they should not submit a proposal.

View Event →
SOURCE Seattle 2016
Sep
12
to Oct 11

SOURCE Seattle 2016

At SOURCE, we pride ourselves on having some of the best speakers in the world speak at our conferences. But we're about so much more than just great talks. We are pleased to offer the following trainings at the SOURCE Seattle Conference. These hand-picked courses are high-impact, high-value workshops that will prove invaluable in your jobs.

1) Metasploit Basics,

2) Application Security Risk for Executives and

3) Managers and InfoSec Train the Trainer.

The call for papers for SOURCE Seattle is currently OPEN. 

 

View Event →
THOTCON - Chicago's Hacking Conference
Sep
11
8:30 PM20:30

THOTCON - Chicago's Hacking Conference

THOTCON (pronounced \ˈthȯt\ and taken from THree - One - Two) is a small venue hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial event looking to provide the best conference possible on a very limited budget. 

THOTCON 0x8 will be have 2 tracks over two days and over 1100 attendees. It will be held on Thursday, May 4th and Friday, 5th, 2017. The after party will be held at the same venue 2 hours after the end of the conference.

View Event →