posted by organizer: dchesebrough || 6768 views || tracked by 14 users: [display]

CYBERWEST 2015 : CYBERWEST: the Southwest Cybersecurity Summit


When Mar 25, 2015 - Mar 26, 2015
Where Phoenix, AZ
Submission Deadline Jan 5, 2015
Notification Due Jan 30, 2015
Final Version Due Mar 1, 2015
Categories    cyber   computer science   security   communications

Call For Papers

Meeting Today’s Challenges - Shaping the Future
March 25-26, 2015
Phoenix, AZ

Information technology has become ubiquitous. Personal devices, shopping, entertainment, telecommunications, manufacturing, supply chains, enterprise networks and critical infrastructure; virtually every aspect of our national economy depends on digital systems and networks. As a society we have plunged into a world of ever expanding connectedness in business, government and our personal lives without sufficient consideration for the consequences.

In its most recent survey the Pew Research Internet Project reported that 61% of the respondents agreed that a major attack causing widespread harm would occur by 2025. One of the respondents said: “connectedness begets vulnerability.” It is abundantly clear that hacking, theft, fraud, spying and other bad behaviors are rampant on networks today, and that measures must be taken by all to protect networks and data, prevent breaches and, if unsuccessful, have resilience to recover from attacks.

The purpose of CYBERWEST is to bring together Government, commercial industry and academia to:
- Exchange information and learn in areas of policy and strategy; and technology and R&D; workforce training and education; economic, legal, regulatory and insurance
- Discuss cybersecurity issues and to focus on applied cybersecurity (i.e. implementing the NIST framework, R&D, legal and regulatory perspectives, state and local approaches)
- Present content that attendees can take back and use in their organizations

The planning committee is seeking presentations that are aligned with the theme of the event and address cybersecurity in the following topics:

Supply chain security and resilience

Critical infrastructure and control systems

Cyber defense and mitigation
Attribution, recovery and resilience (time cost and other factors); trends in tools to identify and thwart cyber-attacks; detect breaches; assist in rapid recovery

Cyber implications for corporate Boards
Role of corporate governance, audit, compliance, assurance, risk management; cyber insurance, current trends, effectiveness, risk, metrics; privacy issues, economic cost and reputational effects

Information sharing
methodologies and structures; detection, trends, and protective measures; mandatory versus voluntary breach disclosures, regulatory implications

NIST Cybersecurity Framework implementation
Use cases and/or case studies

Cyber ranges: design and use
Testing tools and models, distributed/neutral environments, attack propagation and defensive methodologies

Education and training
cyber workforce training, non-cyber workforce training, general population, STEM and cyber education

Research and development advances

Innovative strategies

Deadline for submission is January 5, 2015.

Abstracts of presentations must be submitted electronically at the following link: AFEI is an affiliate of the National Defense Industrial Association and this is NDIA’s standard abstract submittal process.

Submittal instructions: Submitters must complete all required fields for the abstract to be submitted. Once the submission form is complete, click on the Preview button at the bottom of the page to review the submission for correctness, completeness and readability (Note: When cutting and pasting text use this feature to be sure the form has not altered paragraphing or spacing.) When satisfied click the submit button. You should then be taken back to the AFEI event page Http://

Selection of abstracts for presentation will be made by the program committee. Presentation abstracts must be submitted by January 5, 2015. Submitters will be notified of the planning committee decision by January 30, 2015 via e-mail. Abstracts not selected for this event may be nominated for presentation at future AFEI sessions or NDIA Cyber Division events.

A number of sponsorship opportunities are available for this event. Sponsors have logos on materials, display tables and opportunity to speak during Lunchtime Lightning Rounds. For more information contact Tammy Kicker via e-mail at

This event is organized by the Association for Enterprise Information in partnership with Embry-Riddle Aeronautical University (ERAU), Prescott Campus, College of Security and Intelligence; the Center for Aviation and Aerospace Leadership, ERAU Worldwide; Arizona State University Applied Research Laboratory; the Arizona Cyber Threat Response Alliance (ACTRA) and the Arizona InfraGard; and Interos Solutions, Polsinelli, and the NDIA Cyber Division.

For more information contact Tammy Kicker via e-mail at

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ACII 2018   Advanced Computational Intelligence: An International Journal
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
GreeNet Symposium - SGNC 2018   9th Symposium on Green Networking and Computing (SGNC 2018)
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
IJRAP 2018   International Journal of Recent advances in Physics
MIX-AI 2018   MIX Summit and Conference on Artificial Intelligence and Machine Learning
DLS 2018   1st Deep Learning and Security Workshop
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
IoT & AI Summit 2018   5th IoT & AI Summit 2018