Presenters

CALL FOR PRESENTATIONS

**PRESENTATIONS AND TRAINING PROPOSALS ARE NOW BEING ACCEPTED**

CALL FOR PRESENTATIONS -- SUBMIT ONLINE

Submissions Due by February 19, 2018

Share your experience and knowledge with this year's attendees by submitting a presentation and/or training proposal.  The 2018 conference will be held on June 5 and 6 with training sessions held on June 7. 

SUGGESTED PRESENTATION TOPICS

The following topics are suggestions, but other subjects are welcome. 
Proposals for training sessions are welcome as well. Training may be scheduled as either a half day (3 hours) or full day event (5-6 hours).

  • Access Management (MFA, PAM)

  • Advanced Analytics

  • APIs

  • Artificial Intelligence

  • Biometrics Block Chain

  • Business Intelligence

  • Citizen Perspective on Security

  • Cloud Security

  • Compliance Issues

  • Computer Forensics

  • Contingency Planning & Testing (Business Testing/Disaster Recovery/Incident Response)

  • Continuous Diagnostics & Mitigation (CDM)

  • C-Suite Cyber Concerns

  • Cyber Crime (e.g., Sociology of Hacking, Monetization of the Hack)

  • Defense in Depth Techniques

  • DMARC (Domain-Based Message Authentication, Reporting and Conformance)

  • Latest Trends

  • Legal Issues (e.g., Impact of Data Breaches)

  • Metrics

  • Mobile as a digital gateway

  • Network Segmentation

  • Penetration Testing

  • Policy Privacy Concerns

  • Risk Management

  • Secure Application Design

  • Security Awareness and User Behavior

  • Supply Chain Security

  • Third Party Security Management

  • Threat Landscape

  • Virtualization

  • Wireless Security

PROPOSAL GUIDELINES

  • Proposals will be accepted for:

    • Individual or team presentations

    • Panel discussions – panel may be organized and submitted as a group by a panel coordinator, or an individual may submit his/her particular viewpoint to become part of a panel

    • Training sessions featuring real world scenarios and advanced techniques

  • Only product neutral presentations that are cyber security related will be considered 

  • More than one proposal may be submitted for consideration.

  • Breakout sessions will run 50 minutes, including 10 minutes for Q and A on June 5 and 6.

  • Training sessions will be half day (3 hours) or full day (5-6 hours) on June 7.

  • Presentation and training selections will be made based upon desired topics, flow of content, educational value and understanding of the content.

  • All selected content will be published in Conference publications and online.

  • Conference organizers will set the day and time for each presentation/training session, in order to optimize the sequencing and flow of content and tracks.

  • The NYS ITS Enterprise Information Security Office will notify all selected speakers in March 2018.

  • The NYS ITS EISO reserves the right to decline a submission for the 2018 Conference. 


The following guidelines apply to all sessions:

  • Presenters will have access to a laptop, projector and a single Wi-Fi connection for the duration of their session. 

  • Conference attendee data may not be collected or retained without  express authorization of the owner.

  • Sessions should not access or interfere with any device (e.g. mobile device, laptop, etc.) without express authorization of the owner.

  • Any demos conducted during a session must be pre-approved by the conference co-hosts.

  • Conference co-hosts, facility and staff assume NO cost or obligation, expressed or implied, for damage to, destruction of, or loss of any provided equipment or material used in the demonstration. 

HONORARIUM and REIMBURSEMENT

The conference does not pay honoraria or travel expenses.  Presenters are responsible for securing and paying for travel and lodging.

PRESENTER BENEFITS

All presenters receive a complimentary pass to the conference. Breakout session presenters are featured in conference publications. All presenters are featured on the NYS Office of Information Technology website. The above benefits do not extend to support staff or colleagues who may accompany the presenter.