posted by organizer: TeleTrusT || 4829 views || tracked by 7 users: [display]

ISSE 2014 : Information Security Solutions Europe Conference


Conference Series : Information Security Solutions Europe
When Oct 14, 2014 - Oct 15, 2014
Where Brussels
Submission Deadline Apr 30, 2014
Notification Due May 30, 2014
Final Version Due Jul 31, 2014
Categories    information security   cyber security   trust services   security management

Call For Papers

Call for Contributions 2014

We are currently looking for presentations, round tables, panels and workshops to include within the ISSE 2014 programme. If you are interested please create an abstract and submit online, further details below.

Confirmed Keynote speaker:
•Stephan Somogyi, Senior Product Manager "Privacy issues", Google
How to Protect a big Player: the Privacy of Users

Invited Keynote speakers:
•Neelie Kroes, Vice-President of the European Commission
Digital agenda - the need for trustworthy IT security solutions from Europe
•Bruce Schneier, Cryptographer, computer security and privacy specialist & writer
Trustworthiness of the internet after our knowledge about the power of NSA

1. Information for Submissions

ISSE Target Attendee Groups
Researchers and Academics
Business or Risk Managers
Heads of IT Department
General Business Managers
Security/IT Managers Representatives from Government and Policy Makers
Legal/Compliance/Regulatory Professionals
Product Managers and Marketing Experts Consultants and Business Analysts
Systems Administrators
Technical Experts
(Developers, Architects)

ISSE 2014 Programme Topic Areas

•Trust Services, eID and Cloud Security
European trust services and eIdentity regulation, governance rules, standardization, interoperability of services and applications, architectures in the cloud, governance, risks, migration issues

• BYOD and Mobile Security
Processes and technologies for managing BYOD programs, smartphone/tablet security, mobile malware, application threats

• Cybersecurity, Cybercrime, Critical Infrastructures
Attacks & countermeasures against industrial Infrastructures; CERT/CSIRT – European & global developments, resilience of networks & services, surveillance techniques & analytics

• Security Management, CISO Inside
CISOs featuring the latest trends and issues in information security, risk mitigation, compliance & governance; policy, planning and emerging areas of enterprise security architecture

•Privacy, Data Protection, Human Factors
Issues in big data & cloud, privacy enhancing technologies, insider threats, social networking/engineering and security awareness programs

•Regulation & Policies
Governmental cybersecurity strategies, authentication, authorization &  accounting, governance, risk & compliance

2. Instructions for Submissions

Presentations at the ISSE conference are selected from abstracts submitted in response to this call for contributions. Speakers are selected by the programme committee solely on the merit of their submissions and position in the organisation.

The submissions to ISSE should be original research results, survey articles or case studies and position papers. Presentations promoting products will be rejected. If you are a vendor who wishes to present a successful case study at the conference, please contact Deborah Puxty-Ward at +44 01892 820936 or

How to submit
1. Submit a short abstract using the ISSE 2014 template form
2. Upload your submission (only as pdf) at

Deadline for submissions is Tuesday 15th April 2014

Every speaker will be charged a nominal fee of €350 to cover part of the costs related to their conference participation. The ISSE conference is hosted by EEMA and partnered by TeleTrusT, both Not-for-Profit organisations, and as such all costs incurred must be covered. The speaker fee covers two full days access to the conference, complimentary catering, networking opportunities, Evening Reception and inclusion of your paper submission to the ISSE conference proceedings. If your submission includes more than one presenter, all attendees will need to pay the €350 speaker fee. Speakers from the end-user-site will not be charged.

3. ISSE Publication

ISSE offers a publication of the accepted papers as printed proceedings in "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference".

If your submission is accepted for the publication, you are invited to create a paper of approximately 15 pages.

Steering Committee
Roger Dean (EEMA)
Jon Shamah (EEMA)
Norbert Pohlmann (TeleTrusT)
Holger Muehlbauer (TeleTrusT)

Programme Committee
Ammar Alkassar (TeleTrusT/Sirrix AG)
John Colley ((ISC)²)
Marijke De Soete (Security4Biz)
Jos Dumortier (KU Leuven)
Walter Fumy (Bundesdruckerei)
David Goodman (EEMA)
Michael Hartmann (SAP)
Marc Kleff (Unify)
Jaap Kuipers (Id Network)
Patrick Michaelis (AC – The Auditing Company)
Lennart Oly (ENX)
Norbert Pohlmann (TeleTrusT/if(is))
Bart Preneel (KU Leuven)
Helmut Reimer (TeleTrusT)
Wolfgang Schneider (Fraunhofer Institute SIT)
Marc Sel (PwC)
Jon Shamah (EEMA/EJ Consultants)
Franky Thrasher (Electrabel)
Erik R. van Zuuren (Deloitte)
Claire Vishik (Intel)

If you have any questions regarding the submission process, please contact

Marieke Petersohn
Project Coordinator
TeleTrusT – IT Security Association Germany
Tel.: +49 30 4005 4308


Vi Linh Tran-Graef
Project Assistant
TeleTrusT – IT Security Association Germany
Tel.: +49 30 4005 4307

Related Resources

IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
NeTCoM 2023   15th International Conference on Networks & Communications
ICCDA--Ei 2023   2023 The 7th International Conference on Computing and Data Analysis (ICCDA 2023)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ACIE--EI 2023   2023 The 3rd Asia Conference on Information Engineering (ACIE 2023)
DATE 2023   Design, Automation, and Test in Europe
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)