CONFERENCE INFORMATION

**PRESENTATIONS AND TRAINING PROPOSALS ARE NOW BEING ACCEPTED**
Submission Due by February 28, 2019

22nd Annual New York State Cyber Security Conference
"Future-Proofing Cyber Security - Strategies for the Digital Age"
June 4 - 6, 2019
Empire State Plaza - Albany, NY

CONFERENCE BACKGROUND

June 2019 marks the 22nd annual New York State Cyber Security Conference (NYSCSC ‘19) and 13th Annual Symposium on Information Assurance (ASIA ‘19).  Share your experience and knowledge with this year's attendees by submitting a presentation and/or training proposal.  The 2019 conference will be held on June 4 and 5 with training sessions held on June 6.  The event takes place in Albany, New York, and is  co-hosted by the New York State Office of Information Technology Services (NYS ITS), the University at Albany School of Business, and The NYS Forum, Inc. Last year’s conference drew more than 1,300 attendees.

CONFERENCE OBJECTIVES 

• Increase overall cyber security awareness across a wide community of stakeholders in the public and private sectors
• Provide training and education that enhances technical knowledge and skills across that community
• Align with the NYS Homeland Security Strategic Plan to enhance cyber security capabilities
 
AUDIENCE

Attendees include all government levels, academia, businesses, not-for-profit organizations and citizens including;
  • Auditors
  • Business Managers
  • Critical Infrastructure
  • Owners and Operators
  • Educators
  • Executives
  • Information Security Professionals (CISO, ISO, Security Administrators, Cyber Incident Responders, Security Engineers, Computer Forensic Specialists)
  • Information Technology Professionals (CIO, IT Directors, System Administrators, Network Administrators, Web Developers, Application Programmers)
  • Law Enforcement
  • Lawyers
  • Process Improvement Managers
  • Project Managers
SUGGESTED PRESENTATION TOPICS

The following topics are suggestions, but other subjects are welcome. 
Proposals for training sessions are welcome as well. Training may be scheduled as either a half day (3 hours) or full day event (5-6 hours).
  • Access Management (MFA, PAM)
  • Advanced Analytics
  • APIs
  • Artificial Intelligence
  • Block Chain
  • Business Intelligence
  • Citizen Perspective on Security
  • Cloud Security
  • Compliance Issues
  • Computer Forensics
  • Containerization & Micro-services
  • Contingency Planning & Testing (Business Testing/Disaster Recovery/Incident Response)
  • Continuous Diagnostics & Mitigation (CDM)
  • C-Suite Cyber Concerns
  • Cyber Crime (e.g., Sociology of Hacking, Monetization of the Hack)
  • Defense in Depth Techniques
  • DMARC (Domain-Based Message Authentication, Reporting and Conformance)
  • Education sector focused
  • Latest Trends
  • Legal Issues (e.g., Impact of Data Breaches)
  • Metrics (Developing Security Metrics)
  • Mobile as a digital gateway
  • Network Segmentation/SD-WAN
  • Penetration Testing
  • Policy Privacy Concerns
  • Regulatory and Compliance Requirements (HIPAA, PCI, etc. )
  • Risk Compliance Assessments
  • Risk Management
  • Secure Application Design
PROPOSAL GUIDELINES
  • Proposals will be accepted for:
    • Individual or team presentations
    • Panel discussions – panel may be organized and submitted as a group by a panel coordinator, or an individual may submit his/her particular viewpoint to become part of a panel
    • Training sessions featuring real world scenarios and advanced techniques
  • Only product neutral presentations that are cyber security related will be considered 
  • More than one proposal may be submitted for consideration.
  • Breakout sessions will run 50 minutes, including 10 minutes for Q and A on June 4 and 5.
  • Training sessions will be half day (3 hours) or full day (5-6 hours) on June 6.
  • Presentation and training selections will be made based upon desired topics, flow of content, educational value and understanding of the content.
  • All selected content will be published in Conference publications and online.
  • Conference organizers will set the day and time for each presentation/training session, in order to optimize the sequencing and flow of content and tracks.
  • The NYS ITS Chief Information Security Office will notify all selected speakers in March 2019.
  • The NYS ITS CISO reserves the right to decline a submission for the 2019 Conference. 

The following guidelines apply to all sessions:
  • Presenters will have access to a laptop, projector and a single Wi-Fi connection for the duration of their session. 
  • Conference attendee data may not be collected or retained without  express authorization of the owner.
  • Sessions should not access or interfere with any device (e.g. mobile device, laptop, etc.) without express authorization of the owner.
  • Any demos conducted during a session must be pre-approved by the conference co-hosts.
  • Conference co-hosts, facility and staff assume NO cost or obligation, expressed or implied, for damage to, destruction of, or loss of any provided equipment or material used in the demonstration. 
HONORARIUM and REIMBURSEMENT

The conference does not pay honoraria or travel expenses.  Presenters are responsible for securing and paying for travel and lodging.

PRESENTER BENEFITS

All presenters receive a complimentary pass to the conference. Breakout session presenters are featured in conference publications. All presenters are featured on the NYS Office of Information Technology website. The above benefits do not extend to support staff or colleagues who may accompany the presenter.

T