The call for presentation abstracts is now closed.
Applicants will be notified from 16 December 2016.
The Australian Cyber Security Centre is soliciting presentations for its third Conference to be held between 14-16 March 2017 in Canberra, Australia.
|18 November 2016||CFA Closes – Extended|
|16 December 2016||Speakers notified from this date|
|8 February 2017||Initial presentation slides due|
|4 March 2017||Final presentation slides due|
|10 March 2017||Presenters notified of presentation schedule|
The ACSC Conference Program Committee is willing to consider a wide range of potential topics in the broad information security discipline. Practical case studies and new, or unique research and techniques will be especially well received.
Submissions that incorporate the following forward looking approach will be looked upon favourably:
What are the cutting edge emerging issues that will be tomorrow’s problems?
Topics we expect to receive presentations on include:
- Real world intrusion case studies
- Implementation/maturity model of ASD’s Strategies to Mitigate Targeted Cyber Intrusions in a production environment
- Advanced techniques in file system, memory and network forensics/security
- Information security visualisation
- Establishing a CSIRT/SOC or security team
- Sector specific information security challenges
- Security policy development / alignment to standards
- Cloud security case studies or research
- Internet of things
- Security education and training approaches
- Dealing with information security at internet scale
- Security underpinning internet infrastructure
- Vulnerability discovery and remediation processes
- Secure coding
- Threat modelling
- Penetration testing
- Database security
- Cyber security incident response
- Coordinated industry action on APT
- Malware analysis
- Mobile device and app security
- Computer forensics
- Cyber ethics
- Legal aspects relating to cyber security
- Technical demonstrations
- Artificial intelligence/automation
- Cyber security open source tool development
- Contemporary and future cyber security issues
Please do not limit yourselves to the list above. If you have a great idea, please submit it!
Items to Include in Submission
All submissions must include the following information:
- Presenter’s name
- Presenter’s organisation, job title and biography
- Presentation title
- “Soundbyte” abstract – maximum 140 characters
- Full abstract – maximum of 200 words
- Duration of presentation (25 or 55 minutes)
- If applicable, please also include any links to previous presentations, slide decks, or papers
- Please include an estimate of how ‘technical’ your presentation will be. The following rating will be used:
⬣ = Very little technical knowledge required
⬣⬣ = Some technical knowledge is assumed
⬣⬣⬣ = Largely technical and/or detailed content aimed at technicians
(This is obviously subjective, but it is aimed to provide a very basic indicator to assist delegates in selecting sessions to attend).
- Presentations must be written in English
- Presentations should present original work, which ideally has not been published
- Presentations will be selected based on their originality, significance, correctness and clarity of presentation
How to Submit
Submitting your abstract is simple – follow the steps here. You will receive a response to your submission advising you of receipt of your abstract.
It is important for presentations to avoid vendor specific ‘product pitches/sales pitches’. If presentation proposals are considered to contain such material (product pitches/sales) they will more than likely be rejected early in the CFA review process. Further, vendors are reminded that there is no linkage between conference sponsorship and the opportunity to present at the conference.
The decision of the ACSC Conference Program Committee is final and no feedback will be provided.
It is important that submissions adhere to the dates listed above, and provide all relevant information in the submission to ensure the Program Committee can make an informed decision.
By entering the conference, you will enter an area where official photography and video recording may occur. By kindly agreeing to address the conference, you consent to such recording media and its release, publication, exhibition or reproduction by the ACSC. Following the event, the ACSC is more than happy to supply speakers with photographs of their address. Also, all presentations will be recorded and made available only to conference delegates following the conclusion of the event.
The Program Committee reserves the right to change scheduled speaking times as necessary. While every effort will be made to honour assigned times, Speakers may be called upon to present at any time during the conference.
There will be selected ICT journalists invited to attend the conference. This means there is potential media interest and the chance of media coverage of the content of presentations. Please keep this in mind as you prepare your materials.
In addition to the prestige of presenting at the third ACSC Conference, speakers will also enjoy the following benefits:
- ACSC Conference registration (Conference registrations are non-transferable)
- Return economy class (coach) airfares (best fare of the day) to Canberra for Australian based speakers^
- Return economy class (coach) airfares (best fare of the day) to Canberra for speakers based outside of Australia^
- Accommodation for the duration of the ACSC Conference
- Our heartfelt thanks will be conveyed at the annual speaker dinner
- Please note that this offer is limited to one speaker per presentation. Additional presenters will be responsible for their own airfares and accommodation, however we may choose to provide a complimentary registration – and of course our heartfelt thanks!
^ Please note any changes to flights after the original booking will be at the cost of the speaker.