CYBERWEST 2015 : CYBERWEST: the Southwest Cybersecurity Summit
Call For Papers
Meeting Today’s Challenges - Shaping the Future
March 25-26, 2015
Information technology has become ubiquitous. Personal devices, shopping, entertainment, telecommunications, manufacturing, supply chains, enterprise networks and critical infrastructure; virtually every aspect of our national economy depends on digital systems and networks. As a society we have plunged into a world of ever expanding connectedness in business, government and our personal lives without sufficient consideration for the consequences.
In its most recent survey the Pew Research Internet Project reported that 61% of the respondents agreed that a major attack causing widespread harm would occur by 2025. One of the respondents said: “connectedness begets vulnerability.” It is abundantly clear that hacking, theft, fraud, spying and other bad behaviors are rampant on networks today, and that measures must be taken by all to protect networks and data, prevent breaches and, if unsuccessful, have resilience to recover from attacks.
The purpose of CYBERWEST is to bring together Government, commercial industry and academia to:
- Exchange information and learn in areas of policy and strategy; and technology and R&D; workforce training and education; economic, legal, regulatory and insurance
- Discuss cybersecurity issues and to focus on applied cybersecurity (i.e. implementing the NIST framework, R&D, legal and regulatory perspectives, state and local approaches)
- Present content that attendees can take back and use in their organizations
The planning committee is seeking presentations that are aligned with the theme of the event and address cybersecurity in the following topics:
Supply chain security and resilience
Critical infrastructure and control systems
Cyber defense and mitigation
Attribution, recovery and resilience (time cost and other factors); trends in tools to identify and thwart cyber-attacks; detect breaches; assist in rapid recovery
Cyber implications for corporate Boards
Role of corporate governance, audit, compliance, assurance, risk management; cyber insurance, current trends, effectiveness, risk, metrics; privacy issues, economic cost and reputational effects
methodologies and structures; detection, trends, and protective measures; mandatory versus voluntary breach disclosures, regulatory implications
NIST Cybersecurity Framework implementation
Use cases and/or case studies
Cyber ranges: design and use
Testing tools and models, distributed/neutral environments, attack propagation and defensive methodologies
Education and training
cyber workforce training, non-cyber workforce training, general population, STEM and cyber education
Research and development advances
Deadline for submission is January 5, 2015.
Abstracts of presentations must be submitted electronically at the following link: http://application.ndia.org/abstracts/5A06. AFEI is an affiliate of the National Defense Industrial Association and this is NDIA’s standard abstract submittal process.
Submittal instructions: Submitters must complete all required fields for the abstract to be submitted. Once the submission form is complete, click on the Preview button at the bottom of the page to review the submission for correctness, completeness and readability (Note: When cutting and pasting text use this feature to be sure the form has not altered paragraphing or spacing.) When satisfied click the submit button. You should then be taken back to the AFEI event page Http://www.afei.org/events/5A06.
SELECTION and NOTIFICATION
Selection of abstracts for presentation will be made by the program committee. Presentation abstracts must be submitted by January 5, 2015. Submitters will be notified of the planning committee decision by January 30, 2015 via e-mail. Abstracts not selected for this event may be nominated for presentation at future AFEI sessions or NDIA Cyber Division events.
A number of sponsorship opportunities are available for this event. Sponsors have logos on materials, display tables and opportunity to speak during Lunchtime Lightning Rounds. For more information contact Tammy Kicker via e-mail at AFEIevents@afei.org.
This event is organized by the Association for Enterprise Information in partnership with Embry-Riddle Aeronautical University (ERAU), Prescott Campus, College of Security and Intelligence; the Center for Aviation and Aerospace Leadership, ERAU Worldwide; Arizona State University Applied Research Laboratory; the Arizona Cyber Threat Response Alliance (ACTRA) and the Arizona InfraGard; and Interos Solutions, Polsinelli, and the NDIA Cyber Division.
For more information contact Tammy Kicker via e-mail at AFEIevents@afei.org