Speaker Submission Form

Who is Submitting This Proposal?

Session Information

What Type of session are you submitting?

What topic best describes the presentation

Which level of audience is the presentation designed to address?

Speaker(s) Information

Additional Speaker

Call for Speakers

Speaker submissions are due by: Coming Soon

Confirmations will be sent by: Coming Soon

Presentation slides must be received by: Coming Soon

  • Presentation Subjects:

    We are seeking sessions that will relevant to an audience of experienced information security professionals from a variety of industries. Sessions should be solution oriented, proactive, and innovative, focusing on security as a vital part of the business landscape. Presentation can address any issue that InfoSec professionals might face; for example – business skills, technical updates, legal knowledge.

    Example Domains:
    • Mobile Security: Wireless, Mobile Apps, Tablets and Smartphones
    • Securing the End Users: Security Awareness Training, Social Media, Access Control
    • Application Security: Application Security, Security Development Lifecycle
    • Infrastructure: Endpoint Security, Network Security, Data Loss Prevention, Pen/Vulnerability Testing, Security Intelligence, Data Protection, Architecture
    • Threats & Response: Updates, Forensics, Law Enforcement, eDiscovery
    • Laws and Regulations: Legal Updates, GRC, Standards, Privacy Regulations
    • Business Skills for the Information Security Professional: Presenting the Business Case for Information Security, Career Paths for Information Security Professionals, Presentation Skills, Negotiation Skills
    • Risk Management: Integration with Enterprise Risk Management
    • Privacy: Cross Border Data, Breach Management
  • Audience:

    The audience will be comprised of 400+ knowledgeable information security practitioners. 70% have more than ten years of experience in the field. Job function and interests range from technical to management. 25% of the audience members are senior level professionals within their organizations (including director, VP, executive, and C-level). Attendees will include ISSA members from regional, national, and international chapters in addition to the general information security community.

    Sessions Options:
    • Breakout Sessions/Panels: Traditional sessions will be a maximum of 50 minutes and should allow ample time for questions and interaction. Sessions should be appropriate for experienced information security professionals.
    • Case Studies: Tell us how your organization is managing risk, privacy and security in the ever expanding and diversified IT landscape. How has your team embraced new technology such as mobile devices, big data and cloud technology in a way that takes advance of the business applications and still maintains security and privacy standards? Presenters are encouraged to bring together stakeholders from diverse disciplines (legal, business lines, IT, HR, etc.) to present a picture of obstacles, decisions and results. Session should give attendees practical advice and examples that they can use in their organizations.
  • Guidelines:

    Thank you for willingness to present at the ISSA International Conference. We will follow-up by the end of June with confirmation if your session is selected. Many factors go into the selection process; including review by our volunteer committee members, number of sessions submitted on a given subject and efforts to vary the prospective of presentations. Proposals may also be considered for other educational programs throughout the year.

    • Case studies and advanced level presentations for experienced professionals are strongly encouraged.
    • Remember this is an educational venue. Clearly stated learning objectives are a must to consider the submission complete.
    • Well-written abstracts improve your potential for selection.
    • Speaker(s) understand that some session proposals will be posted on-line and shared with other educational committees.
    • Practitioners are desired. Speakers from any company that sells or markets information security products or services should be responsible for information security within their organizations. A client may be submitted to present a case study.
    • Information submitted (biography, abstract, etc.) may be edited to conform to ISSA style guide.
    • A microphone(s) (if needed) and LCD projector will be available for each session. Please be prepared to use your own laptop. Should you choose to use a Mac, you will be responsible for providing a converter or any needed cable adapters.
    • All presentations must be educational in nature and may not promote any company, product or service.
    • ISSA does not pay travel expenses or honoraria. Speakers will receive a full conference pass and an opportunity to network and support the information security community.
Please feel free to contact William R. Crank @ programs@issa-midtn.org