posted by organizer: TeleTrusT || 3915 views || tracked by 6 users: [display]

ISSE 2014 : Information Security Solutions Europe Conference


Conference Series : Information Security Solutions Europe
When Oct 14, 2014 - Oct 15, 2014
Where Brussels
Submission Deadline Apr 30, 2014
Notification Due May 30, 2014
Final Version Due Jul 31, 2014
Categories    information security   cyber security   trust services   security management

Call For Papers

Call for Contributions 2014

We are currently looking for presentations, round tables, panels and workshops to include within the ISSE 2014 programme. If you are interested please create an abstract and submit online, further details below.

Confirmed Keynote speaker:
•Stephan Somogyi, Senior Product Manager "Privacy issues", Google
How to Protect a big Player: the Privacy of Users

Invited Keynote speakers:
•Neelie Kroes, Vice-President of the European Commission
Digital agenda - the need for trustworthy IT security solutions from Europe
•Bruce Schneier, Cryptographer, computer security and privacy specialist & writer
Trustworthiness of the internet after our knowledge about the power of NSA

1. Information for Submissions

ISSE Target Attendee Groups
Researchers and Academics
Business or Risk Managers
Heads of IT Department
General Business Managers
Security/IT Managers Representatives from Government and Policy Makers
Legal/Compliance/Regulatory Professionals
Product Managers and Marketing Experts Consultants and Business Analysts
Systems Administrators
Technical Experts
(Developers, Architects)

ISSE 2014 Programme Topic Areas

•Trust Services, eID and Cloud Security
European trust services and eIdentity regulation, governance rules, standardization, interoperability of services and applications, architectures in the cloud, governance, risks, migration issues

• BYOD and Mobile Security
Processes and technologies for managing BYOD programs, smartphone/tablet security, mobile malware, application threats

• Cybersecurity, Cybercrime, Critical Infrastructures
Attacks & countermeasures against industrial Infrastructures; CERT/CSIRT – European & global developments, resilience of networks & services, surveillance techniques & analytics

• Security Management, CISO Inside
CISOs featuring the latest trends and issues in information security, risk mitigation, compliance & governance; policy, planning and emerging areas of enterprise security architecture

•Privacy, Data Protection, Human Factors
Issues in big data & cloud, privacy enhancing technologies, insider threats, social networking/engineering and security awareness programs

•Regulation & Policies
Governmental cybersecurity strategies, authentication, authorization &  accounting, governance, risk & compliance

2. Instructions for Submissions

Presentations at the ISSE conference are selected from abstracts submitted in response to this call for contributions. Speakers are selected by the programme committee solely on the merit of their submissions and position in the organisation.

The submissions to ISSE should be original research results, survey articles or case studies and position papers. Presentations promoting products will be rejected. If you are a vendor who wishes to present a successful case study at the conference, please contact Deborah Puxty-Ward at +44 01892 820936 or

How to submit
1. Submit a short abstract using the ISSE 2014 template form
2. Upload your submission (only as pdf) at

Deadline for submissions is Tuesday 15th April 2014

Every speaker will be charged a nominal fee of €350 to cover part of the costs related to their conference participation. The ISSE conference is hosted by EEMA and partnered by TeleTrusT, both Not-for-Profit organisations, and as such all costs incurred must be covered. The speaker fee covers two full days access to the conference, complimentary catering, networking opportunities, Evening Reception and inclusion of your paper submission to the ISSE conference proceedings. If your submission includes more than one presenter, all attendees will need to pay the €350 speaker fee. Speakers from the end-user-site will not be charged.

3. ISSE Publication

ISSE offers a publication of the accepted papers as printed proceedings in "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference".

If your submission is accepted for the publication, you are invited to create a paper of approximately 15 pages.

Steering Committee
Roger Dean (EEMA)
Jon Shamah (EEMA)
Norbert Pohlmann (TeleTrusT)
Holger Muehlbauer (TeleTrusT)

Programme Committee
Ammar Alkassar (TeleTrusT/Sirrix AG)
John Colley ((ISC)²)
Marijke De Soete (Security4Biz)
Jos Dumortier (KU Leuven)
Walter Fumy (Bundesdruckerei)
David Goodman (EEMA)
Michael Hartmann (SAP)
Marc Kleff (Unify)
Jaap Kuipers (Id Network)
Patrick Michaelis (AC – The Auditing Company)
Lennart Oly (ENX)
Norbert Pohlmann (TeleTrusT/if(is))
Bart Preneel (KU Leuven)
Helmut Reimer (TeleTrusT)
Wolfgang Schneider (Fraunhofer Institute SIT)
Marc Sel (PwC)
Jon Shamah (EEMA/EJ Consultants)
Franky Thrasher (Electrabel)
Erik R. van Zuuren (Deloitte)
Claire Vishik (Intel)

If you have any questions regarding the submission process, please contact

Marieke Petersohn
Project Coordinator
TeleTrusT – IT Security Association Germany
Tel.: +49 30 4005 4308


Vi Linh Tran-Graef
Project Assistant
TeleTrusT – IT Security Association Germany
Tel.: +49 30 4005 4307

Related Resources

CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
JoWUA SI 2021   JoWUA Special Issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges
MoWiN 2021   10th International Conference on Mobile & Wireless Networks
RDAAPS 2021   Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
ICBCT--EI and Scopus 2021   2021 3rd International Conference on Blockchain Technology (ICBCT 2021)--EI Compendex, Scopus
IJCIS 2020   International Journal on Cryptography and Information Security
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]