posted by organizer: Vzt15 || 632 views || tracked by 6 users: [display]

CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics

FacebookTwitterLinkedInGoogle

Link: http://www.iaria.org/conferences2016/CYBER16.html
 
When Oct 9, 2016 - Oct 13, 2016
Where Venice, Italy
Abstract Registration Due Jun 30, 2016
Submission Deadline Aug 30, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 15, 2016
Categories    cyber security assessment   cyber risk management   cyber training technologies   cyber security data analytics
 

Call For Papers

Cyber Security has emerged as a topic of great importance to both the public and private sector. It represents an area of significant risk to almost any entity, and must be carefully managed as part of overall organizational risk management. Assessing the cyber security readiness posture of an organization is a critical first step to improving cyber security and driving down risk. Related to improving cyber security, efficient hiring, training, and re-training of a sufficient quantity and quality of cyber security staff is a tremendous challenge for decision makers. Frequently scarce resources are invested in trying to attain these objectives with poor results, resulting in elevated cyber risk rather than an improvement. Thus, it is essential for an organization to avail itself of the best approaches for and to continually assess the cyber security readiness posture of the organization. This includes instituting the best cyber security policies, utilizing the most effective technologies to improve cyber security, and availing of the best training approaches and technologies, including virtual cyber ranges. Data analytics is relevant to cyber security assessment and dynamic training scoring.

## Topic of interest include, but are not limited to, the following:
Cyber Security Assessment of Organizations and Technologies
Cyber Risk Management and Organizational Resilience
Cyber Security Training Technologies
Cyber Security Evaluation Technologies
Virtual Cyber Ranges
Automation and Data Analytics for Cyber Technology

## Important Dates:
- Submit Abstract of proposed paper by June 23, 2016
- Registration Deadline: August 15
- Submit Paper by August 18, 2016
- Deadline for Camera Ready version by September 10, 2016

## Contribution Types:
- Regular papers [in the proceedings, digital library]
- Short papers (work in progress) [in the proceedings, digital library]
- Posters: two pages [in the proceedings, digital library]
- Posters: slide only [slide-deck posted on www.iaria.org]
- Presentations: slide only [slide-deck posted on www.iaria.org]
- Demos: two pages [posted on www.iaria.org]

## Paper Format
- See http://www.iaria.org/format.html
- Before submission, please check and comply with the editorial rules
:http://www.iaria.org/editorialrules.html

## Publications
- Extended versions of selected papers will be published in IARIA Journals
:http://www.iariajournals.org
- Print proceedings will be available via Curran Associates, Inc.
:http://www.proceedings.com/9769.html
- Articles will be archived in the free access ThinkMind Digital Library
:http://www.thinkmind.org

## Paper Submission
- Please send your paper to Dr. Thomas Klemas at tklemas@alum.mit.edu

## Registration
- Each accepted paper needs at least one full registration, before the camera-ready manuscript can be included in the proceedings.
- Registration fees are available at http://www.iaria.org/registration.html

## Contact
- Chair: Dr. Thomas Klemas (tklemas@alum.mit.edu), SimSpace, Boston, USA
- Logistics: steve@iaria.org

Related Resources

ICIEM 2016   International Conference on Integrated Environmental Management for Sustainable Development
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
ECCWS 2017   16th European Conference on Cyber Warfare and SecurityECCWS 2017
JIP SI: Computer Security Technologies 2017   Journal of Information Processing, Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
ICOA NTWG RFI 2017   International Civil Aviation Organization New Technology Working Group Request For Information
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security