**PRESENTATION AND TRAINING PROPOSALS ARE NOW BEING ACCEPTED**
Sumbissions Due by March 2, 2020
Share your experience and knowledge with this year's attendees by submitting a presentation and/or training proposal. The 2020 conference will be held on June 2 and 3 with training sessions held on June 4.
SUGGESTED PRESENTATION TOPICS
The following topics are suggestions, but other subjects are welcome.
Proposals for training sessions are welcome as well. Training may be scheduled as either a half day (3 hours) or full day event (5-6 hours).
- Access Management (MFA, PAM)
- Advanced Analytics
- Artificial Intelligence
- Block Chain
- Business Intelligence
- Citizen Perspective on Security
- Cloud Security
- Compliance Issues
- Computer Forensics
- Containerization & Micro-services
- Contingency Planning & Testing (Business Testing/Disaster Recovery/Incident Response)
- Continuous Diagnostics & Mitigation (CDM)
- C-Suite Cyber Concerns
- Cyber Crime (e.g., Sociology of Hacking, Monetization of the Hack)
- Defense in Depth Techniques
- DMARC (Domain-Based Message Authentication, Reporting and Conformance)
- Education Sector Focus
- Finance Sector Focus
- Health Sector Focus
- Latest Trends
- Legal Issues (e.g., Impact of Data Breaches)
- Metrics (Developing Security Metrics)
- Mobile as a digital gateway
- Network Segmentation/SD-WAN
- Penetration Testing
- Policy Privacy Concerns
- Regulatory and Compliance Requirements (HIPAA, PCI, etc. )
- Risk Compliance Assessments
- Risk Management
- Secure Application Design
- Proposals will be accepted for:
- Individual or team presentations
- Panel discussions - panel may be organized and submitted as a group by a panel coordinator, or an individual may submit his/her particular viewpoint to become part of a panel
- Training sessions featuring real world scenarios and advanced techniques
- Only product neutral presentations that are cyber security related will be considered
- More than one proposal may be submitted for consideration.
- Breakout sessions will run 50 minutes, including 10 minutes for Q and A on June 2 and 3.
- Training sessions will be half day (3 hours) or full day (5-6 hours) on June 4.
- Presentation and training selections will be made based upon desired topics, flow of content, educational value and understanding of the content.
- All selected content will be published in Conference publications and online.
- Conference organizers will set the day and time for each presentation/training session, in order to optimize the sequencing and flow of content and tracks.
- The NYS ITS Chief Information Security Office will notify all selected speakers by April 1, 2020.
- The NYS ITS CISO reserves the right to decline a submission for the 2020 Conference.
The following guidelines apply to all sessions:
- Presenters will have access to a laptop, projector and a single Wi-Fi connection for the duration of their session.
- Conference attendee data may not be collected or retained without express authorization of the owner.
- Sessions should not access or interfere with any device (e.g. mobile device, laptop, etc.) without express authorization of the owner.
- Any demos conducted during a session must be pre-approved by the conference co-hosts.
- Conference co-hosts, facility and staff assume NO cost or obligation, expressed or implied, for damage to, destruction of, or loss of any provided equipment or material used in the demonstration.
HONORARIUM and REIMBURSEMENT
The conference does not pay honoraria or travel expenses. Presenters are responsible for securing and paying for travel and lodging.
All presenters receive a complimentary pass to the conference. Breakout session presenters are featured in conference publications. All presenters are featured on the NYS Office of Information Technology website. The above benefits do not extend to support staff or colleagues who may accompany the presenter.