Call For Proposals

 

Extended Deadline is 5:00pm (Pacific) on November 18, 2011

If you have any questions regarding proposals, contact Dr. Javier Torner at .


The SecureIT 2012 Program Committee requests proposals for presentations for the SecureIT 2012 Information Technology and Network Security Conference March 18-20, 2012 in Ontario, California .


Conference presentations will address the technical, management, and curriculum development aspects of information security and assurance. Presentation formats will include individual and panel presentations for 75 minute presentations. The Program Committee also will consider proposals for half-day pre-conference workshops.


About the Conference
SecureIT 2012 provides an avenue for the dissemination of recent and emerging issues in the highly dynamic filed of information security and assurance. The conference provides an opportunity to learn from recognized professionals in the filed about new and emerging tools, trends, legislation, and strategies for addressing information security issues.


Who will be there?
Business, industry, and higher education CEOs, CIOs, CTOs, VPs of Technology, directors of IT, directors of technology, systems architects, network administrators, network security officers, ISOs, CSOs, financial managers, system developers, webmasters, faculty in computer science and information & decision sciences, and more.


Presentation Topics
Presentations can cover any aspect of information security and assurance within one of three identified tracks: 1) Information Security Management; 2) Information Security Operational Practices and Technologie; and 3) Research and Curriculum Development. Topic of collaborative projects between higher education institutions and collaborations of higher education institution with industry are encouraged.


Although not limited to the following, topic areas for presentations may include:


Information Security Management:

• Governance, Policy and Compliance
• Risk Management/ Risk Assessments
• Strategic Planning for Security
• Information Security and Cloud Computing
• Security Awareness and Training

Information Security Operational Practices and Technologies:

• Incident Response and Digital Investigations
• Wireless Access Security

• PKI and Encryption
• Application security
• Campus enterprise security solutions

• Virtual environments

Research and Curriculum Development:

• Innovative Curriculum Programs in Information Security
• Partnerships between Community Colleges, Universities and     Businesses
• Research projects in Information Security

All proposals must be submitted by completing the Call for Proposals Application.


The Program Committee will review the proposals and send acceptance notifications for all tracks by December 16, 2011. All SecureIT 2012 presenters must return the speaker's agreement, register for the conference and pay appropriate fees by the specified deadline in order to be included in the final program.

Proposals submitted to the Research and Curriculum Development track will be reviewed by a Faculty Program Sub-Committee.  Selected presenters, in particular faculty members, may opt to have their proposal submitted for consideration for publication to the International Information Management Association (IIMA.org). In this case, presenters will be required to submit their paper following the IIMA guidelines. Information will be provided on the acceptance notification.


PLEASE NOTE: Proposals submitted by vendors should be on an information security topic and should not contain any marketing material for a company or product.

Presentation descriptions should be no more than 200 words, and speakers are expected to submit their presentation for posting to the conference website by March 9, 2012.. The presentation description will be used by the Program Committee for selection purposes and, if selected, an edited version of this text will be used in the conference program.


Vendors interested in exhibiting or sponsoring an event at the conference should contact O.J. Sutherland () or Sher Sutherland () at . Executive Events (www.execevents.com) to reserve space. Be sure to act fast as exhibit space is limited.


If you have any questions about the conference or the call for proposals and/or papers, please send an email to .


We look forward to seeing you at the SecureIT 2012 Conference in Ontario, California!

Dr. Javier Torner
Interim Associate Vice President and

University Information Security Officer
California State University, San Bernardino
Chair, SecureIT 2012 Program Committee

 

Past Conferences: 2003   2004   2005   2006   2007  2008  2009  2010  2011