posted by organizer: TeleTrusT || 2676 views || tracked by 6 users: [display]

ISSE 2014 : Information Security Solutions Europe Conference


Conference Series : Information Security Solutions Europe
When Oct 14, 2014 - Oct 15, 2014
Where Brussels
Submission Deadline Apr 30, 2014
Notification Due May 30, 2014
Final Version Due Jul 31, 2014
Categories    information security   cyber security   trust services   security management

Call For Papers

Call for Contributions 2014

We are currently looking for presentations, round tables, panels and workshops to include within the ISSE 2014 programme. If you are interested please create an abstract and submit online, further details below.

Confirmed Keynote speaker:
•Stephan Somogyi, Senior Product Manager "Privacy issues", Google
How to Protect a big Player: the Privacy of Users

Invited Keynote speakers:
•Neelie Kroes, Vice-President of the European Commission
Digital agenda - the need for trustworthy IT security solutions from Europe
•Bruce Schneier, Cryptographer, computer security and privacy specialist & writer
Trustworthiness of the internet after our knowledge about the power of NSA

1. Information for Submissions

ISSE Target Attendee Groups
Researchers and Academics
Business or Risk Managers
Heads of IT Department
General Business Managers
Security/IT Managers Representatives from Government and Policy Makers
Legal/Compliance/Regulatory Professionals
Product Managers and Marketing Experts Consultants and Business Analysts
Systems Administrators
Technical Experts
(Developers, Architects)

ISSE 2014 Programme Topic Areas

•Trust Services, eID and Cloud Security
European trust services and eIdentity regulation, governance rules, standardization, interoperability of services and applications, architectures in the cloud, governance, risks, migration issues

• BYOD and Mobile Security
Processes and technologies for managing BYOD programs, smartphone/tablet security, mobile malware, application threats

• Cybersecurity, Cybercrime, Critical Infrastructures
Attacks & countermeasures against industrial Infrastructures; CERT/CSIRT – European & global developments, resilience of networks & services, surveillance techniques & analytics

• Security Management, CISO Inside
CISOs featuring the latest trends and issues in information security, risk mitigation, compliance & governance; policy, planning and emerging areas of enterprise security architecture

•Privacy, Data Protection, Human Factors
Issues in big data & cloud, privacy enhancing technologies, insider threats, social networking/engineering and security awareness programs

•Regulation & Policies
Governmental cybersecurity strategies, authentication, authorization &  accounting, governance, risk & compliance

2. Instructions for Submissions

Presentations at the ISSE conference are selected from abstracts submitted in response to this call for contributions. Speakers are selected by the programme committee solely on the merit of their submissions and position in the organisation.

The submissions to ISSE should be original research results, survey articles or case studies and position papers. Presentations promoting products will be rejected. If you are a vendor who wishes to present a successful case study at the conference, please contact Deborah Puxty-Ward at +44 01892 820936 or

How to submit
1. Submit a short abstract using the ISSE 2014 template form
2. Upload your submission (only as pdf) at

Deadline for submissions is Tuesday 15th April 2014

Every speaker will be charged a nominal fee of €350 to cover part of the costs related to their conference participation. The ISSE conference is hosted by EEMA and partnered by TeleTrusT, both Not-for-Profit organisations, and as such all costs incurred must be covered. The speaker fee covers two full days access to the conference, complimentary catering, networking opportunities, Evening Reception and inclusion of your paper submission to the ISSE conference proceedings. If your submission includes more than one presenter, all attendees will need to pay the €350 speaker fee. Speakers from the end-user-site will not be charged.

3. ISSE Publication

ISSE offers a publication of the accepted papers as printed proceedings in "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference".

If your submission is accepted for the publication, you are invited to create a paper of approximately 15 pages.

Steering Committee
Roger Dean (EEMA)
Jon Shamah (EEMA)
Norbert Pohlmann (TeleTrusT)
Holger Muehlbauer (TeleTrusT)

Programme Committee
Ammar Alkassar (TeleTrusT/Sirrix AG)
John Colley ((ISC)²)
Marijke De Soete (Security4Biz)
Jos Dumortier (KU Leuven)
Walter Fumy (Bundesdruckerei)
David Goodman (EEMA)
Michael Hartmann (SAP)
Marc Kleff (Unify)
Jaap Kuipers (Id Network)
Patrick Michaelis (AC – The Auditing Company)
Lennart Oly (ENX)
Norbert Pohlmann (TeleTrusT/if(is))
Bart Preneel (KU Leuven)
Helmut Reimer (TeleTrusT)
Wolfgang Schneider (Fraunhofer Institute SIT)
Marc Sel (PwC)
Jon Shamah (EEMA/EJ Consultants)
Franky Thrasher (Electrabel)
Erik R. van Zuuren (Deloitte)
Claire Vishik (Intel)

If you have any questions regarding the submission process, please contact

Marieke Petersohn
Project Coordinator
TeleTrusT – IT Security Association Germany
Tel.: +49 30 4005 4308


Vi Linh Tran-Graef
Project Assistant
TeleTrusT – IT Security Association Germany
Tel.: +49 30 4005 4307

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
IJCSITY 2017   International Journal of Computational Science and Information Technology
IEEE - ICISE - Ei 2018   2018 3rd International Conference on Information Systems Engineering (ICISE 2018)--IEEE Xplore, Ei Compendex
ICIT - Ei 2017   2017 International Conference on Information Technology (ICIT 2017)--Ei Compendex, Scopus
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
IH&MMSec 2018   ACM Workshop on Information Hiding and Multimedia Security
ICITA 2018   International Conference on Information Technology and Applications
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
ICSS 2017   3rd International Conference on Software Security