CONFERENCE INFORMATION

**PRESENTATIONS AND TRAINING PROPOSALS ARE NOW BEING ACCEPTED**
Submission Deadline: March 28, 2025

27th Annual New York State Cybersecurity Conference
June 3 - 4, 2025
Empire State Plaza - Albany, NY
CONFERENCE BACKGROUND

June 2025 marks the 27th annual New York State Cybersecurity Conference (NYSCSC ‘25) and 19th Annual Symposium on Information Assurance (ASIA ‘25). Share your experience and knowledge with this year's attendees by submitting a presentation and/or training proposal. The 2025 conference will be held on June 3 and 4 with training sessions held on June 5. The event takes place in Albany, New York, and is co-hosted by the New York State Office of Information Technology Services (NYS ITS), the University at Albany, and The NYS Forum, Inc. Last year’s conference drew more than 1,600 attendees.

CONFERENCE OBJECTIVES

• Increase overall cybersecurity awareness across a wide community of stakeholders in the public and private sectors
• Provide training and education that enhances technical knowledge and skills across that community
• Align with the NYS Homeland Security Strategic Plan to enhance cybersecurity capabilities

AUDIENCE

Attendees include all government levels, academia, businesses, not-for-profit organizations and citizens including;
  • Auditors
  • Business Managers
  • Critical Infrastructure
  • Owners and Operators
  • Educators
  • Executives
  • Information Security Professionals (CISO, ISO, Security Administrators, Cyber Incident Responders, Security Engineers, Computer Forensic Specialists)
  • Information Technology Professionals (CIO, IT Directors, System Administrators, Network Administrators, Web Developers, Application Programmers)
  • Law Enforcement
  • Lawyers
  • Process Improvement Managers
  • Project Managers
SUGGESTED PRESENTATION TOPICS

The following topics are suggestions, but other subjects are welcome.
Proposals for training sessions are welcome as well. Training may be scheduled as either a half day (3 hours) or full day event (5-6 hours).
  • Access Management (MFA, PAM)
  • Advanced Analytics
  • APIs
  • Artificial Intelligence
  • Block Chain
  • Business Intelligence
  • Citizen Perspective on Security
  • Cloud Security
  • Compliance Issues
  • Computer Forensics
  • Containerization & Micro-services
  • Contingency Planning & Testing (Business Testing/Disaster Recovery/Incident Response)
  • Continuous Diagnostics & Mitigation (CDM)
  • C-Suite Cyber Concerns
  • Cyber Crime (e.g., Sociology of Hacking, Monetization of the Hack)
  • Cyber Insurance
  • Defense in Depth Techniques
  • DMARC (Domain-Based Message Authentication, Reporting and Conformance)
  • Education Sector Focus
  • Finance Sector Focus
  • Health Sector Focus
  • Latest Trends
  • Legal Issues (e.g., Impact of Data Breaches)
  • Metrics (Developing Security Metrics)
  • Mobile as a digital gateway
  • Network Segmentation/SD-WAN
  • Penetration Testing
  • Policy Privacy Concerns
  • Regulatory and Compliance Requirements (HIPAA, PCI, etc. )
PROPOSAL GUIDELINES
  • Proposals will be accepted for:
    • Individual or team presentations
    • Panel discussions – panel may be organized and submitted as a group by a panel coordinator, or an individual may submit his/her particular viewpoint to become part of a panel
    • Training sessions featuring real world scenarios and advanced techniques
  • Only product neutral presentations that are cyber security related will be considered
  • More than one proposal may be submitted for consideration.
  • Breakout sessions will run 50 minutes, including 10 minutes for Q and A on June 3 and 4.
  • Training sessions will be half day (3 hours) or full day (5-6 hours) on June 5.
  • Presentation and training selections will be made based upon desired topics, flow of content, educational value and understanding of the content.
  • All selected content will be published in Conference publications and online.
  • Conference organizers will set the day and time for each presentation/training session, in order to optimize the sequencing and flow of content and tracks.
  • The NYS ITS CISO reserves the right to decline a submission for the 2025 Conference.

The following guidelines apply to all sessions:
  • Presenters will have access to a laptop, projector and a single Wi-Fi connection for the duration of their session.
  • Conference attendee data may not be collected or retained without express authorization of the owner.
  • Sessions should not access or interfere with any device (e.g. mobile device, laptop, etc.) without express authorization of the owner.
  • Any demos conducted during a session must be pre-approved by the conference co-hosts.
  • Conference co-hosts, facility and staff assume NO cost or obligation, expressed or implied, for damage to, destruction of, or loss of any provided equipment or material used in the demonstration.
HONORARIUM and REIMBURSEMENT

The conference does not pay honoraria or travel expenses.  Presenters are responsible for securing and paying for travel and lodging.

PRESENTER BENEFITS

All presenters receive a complimentary pass to the conference. Breakout session presenters are featured in conference publications. All presenters are featured on the NYS Office of Information Technology website. The above benefits do not extend to support staff or colleagues who may accompany the presenter.

T