| |||||||||||||||
ISSE 2014 : Information Security Solutions Europe ConferenceConference Series : Information Security Solutions Europe | |||||||||||||||
Link: http://isse.eu.com/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Contributions 2014
We are currently looking for presentations, round tables, panels and workshops to include within the ISSE 2014 programme. If you are interested please create an abstract and submit online, further details below. Confirmed Keynote speaker: •Stephan Somogyi, Senior Product Manager "Privacy issues", Google How to Protect a big Player: the Privacy of Users Invited Keynote speakers: •Neelie Kroes, Vice-President of the European Commission Digital agenda - the need for trustworthy IT security solutions from Europe •Bruce Schneier, Cryptographer, computer security and privacy specialist & writer Trustworthiness of the internet after our knowledge about the power of NSA 1. Information for Submissions ISSE Target Attendee Groups CEOs/CIOs/CSOs/CTOs Researchers and Academics Business or Risk Managers Heads of IT Department General Business Managers Security/IT Managers Representatives from Government and Policy Makers Legal/Compliance/Regulatory Professionals Product Managers and Marketing Experts Consultants and Business Analysts Implementers Systems Administrators Technical Experts (Developers, Architects) ISSE 2014 Programme Topic Areas •Trust Services, eID and Cloud Security European trust services and eIdentity regulation, governance rules, standardization, interoperability of services and applications, architectures in the cloud, governance, risks, migration issues • BYOD and Mobile Security Processes and technologies for managing BYOD programs, smartphone/tablet security, mobile malware, application threats • Cybersecurity, Cybercrime, Critical Infrastructures Attacks & countermeasures against industrial Infrastructures; CERT/CSIRT – European & global developments, resilience of networks & services, surveillance techniques & analytics • Security Management, CISO Inside CISOs featuring the latest trends and issues in information security, risk mitigation, compliance & governance; policy, planning and emerging areas of enterprise security architecture •Privacy, Data Protection, Human Factors Issues in big data & cloud, privacy enhancing technologies, insider threats, social networking/engineering and security awareness programs •Regulation & Policies Governmental cybersecurity strategies, authentication, authorization & accounting, governance, risk & compliance 2. Instructions for Submissions Presentations at the ISSE conference are selected from abstracts submitted in response to this call for contributions. Speakers are selected by the programme committee solely on the merit of their submissions and position in the organisation. The submissions to ISSE should be original research results, survey articles or case studies and position papers. Presentations promoting products will be rejected. If you are a vendor who wishes to present a successful case study at the conference, please contact Deborah Puxty-Ward at +44 01892 820936 or deborah.puxty@eema.org How to submit 1. Submit a short abstract using the ISSE 2014 template form 2. Upload your submission (only as pdf) at http://isse2014.teletrust.de Deadline for submissions is Tuesday 15th April 2014 Every speaker will be charged a nominal fee of €350 to cover part of the costs related to their conference participation. The ISSE conference is hosted by EEMA and partnered by TeleTrusT, both Not-for-Profit organisations, and as such all costs incurred must be covered. The speaker fee covers two full days access to the conference, complimentary catering, networking opportunities, Evening Reception and inclusion of your paper submission to the ISSE conference proceedings. If your submission includes more than one presenter, all attendees will need to pay the €350 speaker fee. Speakers from the end-user-site will not be charged. 3. ISSE Publication ISSE offers a publication of the accepted papers as printed proceedings in "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference". If your submission is accepted for the publication, you are invited to create a paper of approximately 15 pages. Steering Committee Roger Dean (EEMA) Jon Shamah (EEMA) Norbert Pohlmann (TeleTrusT) Holger Muehlbauer (TeleTrusT) Programme Committee Ammar Alkassar (TeleTrusT/Sirrix AG) John Colley ((ISC)²) Marijke De Soete (Security4Biz) Jos Dumortier (KU Leuven) Walter Fumy (Bundesdruckerei) David Goodman (EEMA) Michael Hartmann (SAP) Marc Kleff (Unify) Jaap Kuipers (Id Network) Patrick Michaelis (AC – The Auditing Company) Lennart Oly (ENX) Norbert Pohlmann (TeleTrusT/if(is)) Bart Preneel (KU Leuven) Helmut Reimer (TeleTrusT) Wolfgang Schneider (Fraunhofer Institute SIT) Marc Sel (PwC) Jon Shamah (EEMA/EJ Consultants) Franky Thrasher (Electrabel) Erik R. van Zuuren (Deloitte) Claire Vishik (Intel) If you have any questions regarding the submission process, please contact Marieke Petersohn Project Coordinator TeleTrusT – IT Security Association Germany isse@teletrust.de Tel.: +49 30 4005 4308 or Vi Linh Tran-Graef Project Assistant TeleTrusT – IT Security Association Germany isse@teletrust.de Tel.: +49 30 4005 4307 |
|