Share Your Insight and Expertise: We are calling all Annual Partners, members, and industry leaders to share your cybersecurity knowledge and experience through a dynamic and leading-edge presentation. Share preliminary results of on-going research!
Your presentations can range from introductory to advanced or from operational to strategic.
A session can be a formal presentation of a successful implementation, administrative solution, or technical solution.
Topic content must focus on information security and may range from introductory to advanced or from operational to strategic.
Each program session will last 50 minutes, including 10 minutes for Q&A.
The audience will be managers responsible for security policy and administrative decisions and technicians responsible for security implementation and effectiveness.
All proposals will be reviewed by the Security Conference Committee and proposal respondents will be notified of decisions on or after the first week of December.
Speaker Expectations, Travel, and Lodging: Presenters are responsible for securing and paying for travel and lodging. Speakers are encouraged to attend the full conference. Registration fees are waived for speakers.
Potential Tracks for 2023 include:
Technology Innovations
Evolving Threat Landscape
Program Effectiveness
Regulatory & Compliance
Third Party / Supply Chain Risk Management
Incident Management & Operations
Cyber Resiliency
Identity & Access Management
Topic Ideas:
Share new research in cybersecurity.
Diversity, Equity and Inclusion, where to find new talent
Strategies for tracking and compliance with changing regulatory requirements such as CMMS, GLBA Safeguards rule and the numerous state privacy laws.
Zero Trust: Implementing it through Organizational Change Management, analytics, software, logs, and monitorship
API Security
Cloud Security Control Oversight and Compliance
Cyber Security Reporting to Executives including trends and forecasting
Blockchain and Security: E.g., Finney attack, race attack, 51% attack, eclipse attack, Sybil attack, DDoS, routing attack, DAO attack, parity multisig parity attack
AI and Machine Learning
How to Spot a Scam: Crypto, how to read whitepapers, Rug Pull scams, Discord scams, Wallets
NFTs: What are they? What is utility? What should you look out for?
Metaverse: What is the metaverse? Why is it important to understand what it is? How do you scan your persons into the metaverse and should you do it?
What are the potential consequences of the metaverse and having your likeness in it?1) What are the risks?
2) Why are they risks?
And most importantly:
3) How do we realistically mitigate or eliminate them – without ‘my company is the answer’ being the core response.
Cyber insurance and alternative options
Blockchain and cryptocurrency attacks
BYOD policies
Cloud attacks
Insider attacks
IoT attacks
Machine learning and AI attacks
Outdated hardware
Phishing attacks
Ransomware attacks
Software vulnerabilities
Using AI to take surgical actions autonomously; because quite frankly, humans aren’t<