posted by organizer: TeleTrusT || 5219 views || tracked by 8 users: [display]

ISSE 2014 : Information Security Solutions Europe Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Solutions Europe
 
Link: http://isse.eu.com/
 
When Oct 14, 2014 - Oct 15, 2014
Where Brussels
Submission Deadline Apr 30, 2014
Notification Due May 30, 2014
Final Version Due Jul 31, 2014
Categories    information security   cyber security   trust services   security management
 

Call For Papers

Call for Contributions 2014

We are currently looking for presentations, round tables, panels and workshops to include within the ISSE 2014 programme. If you are interested please create an abstract and submit online, further details below.


Confirmed Keynote speaker:
•Stephan Somogyi, Senior Product Manager "Privacy issues", Google
How to Protect a big Player: the Privacy of Users

Invited Keynote speakers:
•Neelie Kroes, Vice-President of the European Commission
Digital agenda - the need for trustworthy IT security solutions from Europe
•Bruce Schneier, Cryptographer, computer security and privacy specialist & writer
Trustworthiness of the internet after our knowledge about the power of NSA

1. Information for Submissions

ISSE Target Attendee Groups
CEOs/CIOs/CSOs/CTOs
Researchers and Academics
Business or Risk Managers
Heads of IT Department
General Business Managers
Security/IT Managers Representatives from Government and Policy Makers
Legal/Compliance/Regulatory Professionals
Product Managers and Marketing Experts Consultants and Business Analysts
Implementers
Systems Administrators
Technical Experts
(Developers, Architects)


ISSE 2014 Programme Topic Areas

•Trust Services, eID and Cloud Security
European trust services and eIdentity regulation, governance rules, standardization, interoperability of services and applications, architectures in the cloud, governance, risks, migration issues


• BYOD and Mobile Security
Processes and technologies for managing BYOD programs, smartphone/tablet security, mobile malware, application threats


• Cybersecurity, Cybercrime, Critical Infrastructures
Attacks & countermeasures against industrial Infrastructures; CERT/CSIRT – European & global developments, resilience of networks & services, surveillance techniques & analytics


• Security Management, CISO Inside
CISOs featuring the latest trends and issues in information security, risk mitigation, compliance & governance; policy, planning and emerging areas of enterprise security architecture


•Privacy, Data Protection, Human Factors
Issues in big data & cloud, privacy enhancing technologies, insider threats, social networking/engineering and security awareness programs


•Regulation & Policies
Governmental cybersecurity strategies, authentication, authorization &  accounting, governance, risk & compliance



2. Instructions for Submissions

Presentations at the ISSE conference are selected from abstracts submitted in response to this call for contributions. Speakers are selected by the programme committee solely on the merit of their submissions and position in the organisation.

The submissions to ISSE should be original research results, survey articles or case studies and position papers. Presentations promoting products will be rejected. If you are a vendor who wishes to present a successful case study at the conference, please contact Deborah Puxty-Ward at +44 01892 820936 or deborah.puxty@eema.org

How to submit
1. Submit a short abstract using the ISSE 2014 template form
2. Upload your submission (only as pdf) at http://isse2014.teletrust.de

Deadline for submissions is Tuesday 15th April 2014

Every speaker will be charged a nominal fee of €350 to cover part of the costs related to their conference participation. The ISSE conference is hosted by EEMA and partnered by TeleTrusT, both Not-for-Profit organisations, and as such all costs incurred must be covered. The speaker fee covers two full days access to the conference, complimentary catering, networking opportunities, Evening Reception and inclusion of your paper submission to the ISSE conference proceedings. If your submission includes more than one presenter, all attendees will need to pay the €350 speaker fee. Speakers from the end-user-site will not be charged.

3. ISSE Publication

ISSE offers a publication of the accepted papers as printed proceedings in "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference".

If your submission is accepted for the publication, you are invited to create a paper of approximately 15 pages.

Steering Committee
Roger Dean (EEMA)
Jon Shamah (EEMA)
Norbert Pohlmann (TeleTrusT)
Holger Muehlbauer (TeleTrusT)

Programme Committee
Ammar Alkassar (TeleTrusT/Sirrix AG)
John Colley ((ISC)²)
Marijke De Soete (Security4Biz)
Jos Dumortier (KU Leuven)
Walter Fumy (Bundesdruckerei)
David Goodman (EEMA)
Michael Hartmann (SAP)
Marc Kleff (Unify)
Jaap Kuipers (Id Network)
Patrick Michaelis (AC – The Auditing Company)
Lennart Oly (ENX)
Norbert Pohlmann (TeleTrusT/if(is))
Bart Preneel (KU Leuven)
Helmut Reimer (TeleTrusT)
Wolfgang Schneider (Fraunhofer Institute SIT)
Marc Sel (PwC)
Jon Shamah (EEMA/EJ Consultants)
Franky Thrasher (Electrabel)
Erik R. van Zuuren (Deloitte)
Claire Vishik (Intel)

If you have any questions regarding the submission process, please contact

Marieke Petersohn
Project Coordinator
TeleTrusT – IT Security Association Germany
isse@teletrust.de
Tel.: +49 30 4005 4308

or

Vi Linh Tran-Graef
Project Assistant
TeleTrusT – IT Security Association Germany
isse@teletrust.de
Tel.: +49 30 4005 4307

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
CSW 2024   2024 3rd International Conference on Cyber Security
LAJC 2024   Latin-American Journal of Computing
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
Hacktivity 2024   Hacktivity 2024 - IT Security Festival
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)