posted by organizer: Vzt15 || 1077 views || tracked by 6 users: [display]

CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics


When Oct 9, 2016 - Oct 13, 2016
Where Venice, Italy
Abstract Registration Due Jun 30, 2016
Submission Deadline Aug 30, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 15, 2016
Categories    cyber security assessment   cyber risk management   cyber training technologies   cyber security data analytics

Call For Papers

Cyber Security has emerged as a topic of great importance to both the public and private sector. It represents an area of significant risk to almost any entity, and must be carefully managed as part of overall organizational risk management. Assessing the cyber security readiness posture of an organization is a critical first step to improving cyber security and driving down risk. Related to improving cyber security, efficient hiring, training, and re-training of a sufficient quantity and quality of cyber security staff is a tremendous challenge for decision makers. Frequently scarce resources are invested in trying to attain these objectives with poor results, resulting in elevated cyber risk rather than an improvement. Thus, it is essential for an organization to avail itself of the best approaches for and to continually assess the cyber security readiness posture of the organization. This includes instituting the best cyber security policies, utilizing the most effective technologies to improve cyber security, and availing of the best training approaches and technologies, including virtual cyber ranges. Data analytics is relevant to cyber security assessment and dynamic training scoring.

## Topic of interest include, but are not limited to, the following:
Cyber Security Assessment of Organizations and Technologies
Cyber Risk Management and Organizational Resilience
Cyber Security Training Technologies
Cyber Security Evaluation Technologies
Virtual Cyber Ranges
Automation and Data Analytics for Cyber Technology

## Important Dates:
- Submit Abstract of proposed paper by June 23, 2016
- Registration Deadline: August 15
- Submit Paper by August 18, 2016
- Deadline for Camera Ready version by September 10, 2016

## Contribution Types:
- Regular papers [in the proceedings, digital library]
- Short papers (work in progress) [in the proceedings, digital library]
- Posters: two pages [in the proceedings, digital library]
- Posters: slide only [slide-deck posted on]
- Presentations: slide only [slide-deck posted on]
- Demos: two pages [posted on]

## Paper Format
- See
- Before submission, please check and comply with the editorial rules

## Publications
- Extended versions of selected papers will be published in IARIA Journals
- Print proceedings will be available via Curran Associates, Inc.
- Articles will be archived in the free access ThinkMind Digital Library

## Paper Submission
- Please send your paper to Dr. Thomas Klemas at

## Registration
- Each accepted paper needs at least one full registration, before the camera-ready manuscript can be included in the proceedings.
- Registration fees are available at

## Contact
- Chair: Dr. Thomas Klemas (, SimSpace, Boston, USA
- Logistics:

Related Resources

SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
DMCS 2017   DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17)
MISC.conf 2017   MISC.conf Security Conference
Watermarking for DRM 2017   Recent Advances in Multimedia Watermarking for Multimedia Digital Rights Management
RCPS-2018   Francesco Flammini
EJEMS - 3 2017   European Journal of Economics and Management Sciences
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
ECSA 2017   11th European Conference on Software Architecture