posted by organizer: Vzt15 || 4905 views || tracked by 6 users: [display]

CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics

FacebookTwitterLinkedInGoogle

Link: http://www.iaria.org/conferences2016/CYBER16.html
 
When Oct 9, 2016 - Oct 13, 2016
Where Venice, Italy
Abstract Registration Due Jun 30, 2016
Submission Deadline Aug 30, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 15, 2016
Categories    cyber security assessment   cyber risk management   cyber training technologies   cyber security data analytics
 

Call For Papers

Cyber Security has emerged as a topic of great importance to both the public and private sector. It represents an area of significant risk to almost any entity, and must be carefully managed as part of overall organizational risk management. Assessing the cyber security readiness posture of an organization is a critical first step to improving cyber security and driving down risk. Related to improving cyber security, efficient hiring, training, and re-training of a sufficient quantity and quality of cyber security staff is a tremendous challenge for decision makers. Frequently scarce resources are invested in trying to attain these objectives with poor results, resulting in elevated cyber risk rather than an improvement. Thus, it is essential for an organization to avail itself of the best approaches for and to continually assess the cyber security readiness posture of the organization. This includes instituting the best cyber security policies, utilizing the most effective technologies to improve cyber security, and availing of the best training approaches and technologies, including virtual cyber ranges. Data analytics is relevant to cyber security assessment and dynamic training scoring.

## Topic of interest include, but are not limited to, the following:
Cyber Security Assessment of Organizations and Technologies
Cyber Risk Management and Organizational Resilience
Cyber Security Training Technologies
Cyber Security Evaluation Technologies
Virtual Cyber Ranges
Automation and Data Analytics for Cyber Technology

## Important Dates:
- Submit Abstract of proposed paper by June 23, 2016
- Registration Deadline: August 15
- Submit Paper by August 18, 2016
- Deadline for Camera Ready version by September 10, 2016

## Contribution Types:
- Regular papers [in the proceedings, digital library]
- Short papers (work in progress) [in the proceedings, digital library]
- Posters: two pages [in the proceedings, digital library]
- Posters: slide only [slide-deck posted on www.iaria.org]
- Presentations: slide only [slide-deck posted on www.iaria.org]
- Demos: two pages [posted on www.iaria.org]

## Paper Format
- See http://www.iaria.org/format.html
- Before submission, please check and comply with the editorial rules
:http://www.iaria.org/editorialrules.html

## Publications
- Extended versions of selected papers will be published in IARIA Journals
:http://www.iariajournals.org
- Print proceedings will be available via Curran Associates, Inc.
:http://www.proceedings.com/9769.html
- Articles will be archived in the free access ThinkMind Digital Library
:http://www.thinkmind.org

## Paper Submission
- Please send your paper to Dr. Thomas Klemas at tklemas@alum.mit.edu

## Registration
- Each accepted paper needs at least one full registration, before the camera-ready manuscript can be included in the proceedings.
- Registration fees are available at http://www.iaria.org/registration.html

## Contact
- Chair: Dr. Thomas Klemas (tklemas@alum.mit.edu), SimSpace, Boston, USA
- Logistics: steve@iaria.org

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FQAS 2025   SS Inf. Retrieval and Knowledge Management for Risk-Based Decision (FQAS'2025) in Bulgaria
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ICCNS 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
Collection_DependXAIdata 2025   Topical Collection on Dependable and Reliable Datasets for Explainable Artificial Intelligence and Cyber Security Research
AEIS 2025   2025 5th International Conference on Advanced Enterprise Information System (AEIS 2025)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
SeRIM 2025   1st International Workshop on Security and Risk in Identity Management
ETACS 2025   Workshop on Education, Training and Awareness in Cybersecurity
IEEE ICETT 2025   IEEE--2025 11th International Conference on Education and Training Technologies (ICETT 2025)