posted by organizer: dchesebrough || 7205 views || tracked by 14 users: [display]

CYBERWEST 2015 : CYBERWEST: the Southwest Cybersecurity Summit

FacebookTwitterLinkedInGoogle

Link: http://www.afei.org/events/5A06
 
When Mar 25, 2015 - Mar 26, 2015
Where Phoenix, AZ
Submission Deadline Jan 5, 2015
Notification Due Jan 30, 2015
Final Version Due Mar 1, 2015
Categories    cyber   computer science   security   communications
 

Call For Papers

CYBERWEST
Meeting Today’s Challenges - Shaping the Future
March 25-26, 2015
Phoenix, AZ


Information technology has become ubiquitous. Personal devices, shopping, entertainment, telecommunications, manufacturing, supply chains, enterprise networks and critical infrastructure; virtually every aspect of our national economy depends on digital systems and networks. As a society we have plunged into a world of ever expanding connectedness in business, government and our personal lives without sufficient consideration for the consequences.

In its most recent survey the Pew Research Internet Project reported that 61% of the respondents agreed that a major attack causing widespread harm would occur by 2025. One of the respondents said: “connectedness begets vulnerability.” It is abundantly clear that hacking, theft, fraud, spying and other bad behaviors are rampant on networks today, and that measures must be taken by all to protect networks and data, prevent breaches and, if unsuccessful, have resilience to recover from attacks.

PURPOSE
The purpose of CYBERWEST is to bring together Government, commercial industry and academia to:
- Exchange information and learn in areas of policy and strategy; and technology and R&D; workforce training and education; economic, legal, regulatory and insurance
- Discuss cybersecurity issues and to focus on applied cybersecurity (i.e. implementing the NIST framework, R&D, legal and regulatory perspectives, state and local approaches)
- Present content that attendees can take back and use in their organizations

TOPICS
The planning committee is seeking presentations that are aligned with the theme of the event and address cybersecurity in the following topics:

Supply chain security and resilience

Critical infrastructure and control systems

Cyber defense and mitigation
Attribution, recovery and resilience (time cost and other factors); trends in tools to identify and thwart cyber-attacks; detect breaches; assist in rapid recovery

Cyber implications for corporate Boards
Role of corporate governance, audit, compliance, assurance, risk management; cyber insurance, current trends, effectiveness, risk, metrics; privacy issues, economic cost and reputational effects

Information sharing
methodologies and structures; detection, trends, and protective measures; mandatory versus voluntary breach disclosures, regulatory implications

NIST Cybersecurity Framework implementation
Use cases and/or case studies

Cyber ranges: design and use
Testing tools and models, distributed/neutral environments, attack propagation and defensive methodologies

Education and training
cyber workforce training, non-cyber workforce training, general population, STEM and cyber education

Research and development advances

Innovative strategies

SUBMISSION
Deadline for submission is January 5, 2015.

Abstracts of presentations must be submitted electronically at the following link: http://application.ndia.org/abstracts/5A06. AFEI is an affiliate of the National Defense Industrial Association and this is NDIA’s standard abstract submittal process.

Submittal instructions: Submitters must complete all required fields for the abstract to be submitted. Once the submission form is complete, click on the Preview button at the bottom of the page to review the submission for correctness, completeness and readability (Note: When cutting and pasting text use this feature to be sure the form has not altered paragraphing or spacing.) When satisfied click the submit button. You should then be taken back to the AFEI event page Http://www.afei.org/events/5A06.

SELECTION and NOTIFICATION
Selection of abstracts for presentation will be made by the program committee. Presentation abstracts must be submitted by January 5, 2015. Submitters will be notified of the planning committee decision by January 30, 2015 via e-mail. Abstracts not selected for this event may be nominated for presentation at future AFEI sessions or NDIA Cyber Division events.

SPONSORING
A number of sponsorship opportunities are available for this event. Sponsors have logos on materials, display tables and opportunity to speak during Lunchtime Lightning Rounds. For more information contact Tammy Kicker via e-mail at AFEIevents@afei.org.

ORGANIZER
This event is organized by the Association for Enterprise Information in partnership with Embry-Riddle Aeronautical University (ERAU), Prescott Campus, College of Security and Intelligence; the Center for Aviation and Aerospace Leadership, ERAU Worldwide; Arizona State University Applied Research Laboratory; the Arizona Cyber Threat Response Alliance (ACTRA) and the Arizona InfraGard; and Interos Solutions, Polsinelli, and the NDIA Cyber Division.

CONTACT
For more information contact Tammy Kicker via e-mail at AFEIevents@afei.org

Related Resources

PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
NECO 2018   7th International Conference of Networks and Communications
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ICDMML 2019   【ACM ICPS EI SCOPUS】2019 International Conference on Data Mining and Machine Learning
Special Topics on Cybersecurity 2019   Special Topics on Cybersecurity - The 5th International Conference on Communication, Management and Information Technology
ISCSAI 2018   2018 International Symposium on Computer Science and Artificial Intelligence
ACSAC 2018   Annual Computer Security Applications Conference
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
CSS 2018   10th International Symposium on Cyberspace Safety and Security
MBE journal SCI 2019   Special issue on Biological Models for Cybersecurity in journal Mathematical Biosciences and Engineering