(ISC)² is delighted to announce that the Call for Presentations for the first series of (ISC)² Secure Summits EMEA is now open for submissions until 13 February.

As cloud, dev ops and smart everything take over the infrastructure on which economies are moving forward, the security risks continue to spiral out of control. In 2017 (ISC)² Secure Summits will be visiting major centres across EMEA to enhance understanding of how to stem the tide. These events bring thought leaders and front-line information and cybersecurity professionals together for a two-day programme of presentations and educational workshops that address the key technical trends driving companies today.

In order to be considered, please submit your proposal by 
13 February

© Copyright 2017. (ISC)² Inc. All Rights Reserved. 
All contents of this site constitute the property of (ISC)², Inc. and may not be copied, reproduced or distributed without prior written permission.

Submit your Proposal

Submit your Proposal

Call for Speakers is NOW CLOSED

What we are looking for

  • cutting-edge, relevant topics on preventing, mitigating, and managing the complex and emerging issues facing today's cyber security practitioners.

  • strong content and actionable takeaways to ensure that cyber security professionals will benefit

  • keynote presentations but also hands-on practical workshops, case studies, best practices -Managerial or in-depth technical presentations

  • Legal, Compliance, GDPR (on country or regional level)

  • IoT

  • Digital Forensics

  • Encryption

  • Biometrics authentication

  • Cognitive Security

  • Industrial Control Security

  • Risk assessment techniques/approaches

  • Cyber Threat Intelligence

  • Cloud Security, Mobile Application Security

  • SSL/TLS

  • SDN, SDS (Software defined networks/storage)

  • Advanced Threat Detection

  • Threat information sharing

  • AI applications for security (analysis and defense),

  • Big data and security

Who can submit

If you are a proven speaker in this field and offer valuable knowledge and subject matter expertise across cyber, information, software and the infrastructure security arena that will help our members, we invite you to share your expertise and join our community.

No proposal from a vendor organisation related to the sale of its product/s or services will be considered and preference will be given to submissions that are unique to this Summit

Key topics we’re interested in

  • Processes, Strategies and Methods that companies have implemented and that work for them

  • Privacy, ISMS, law

  • BCM

  • Supply Chain Attack

  • Managed security services

  • Security Culture, Behaviour & Awareness

  • Identity Management

  • Mobile Threat

  • Real Live Hacking Experience - live demo

  • Data analytics

  • Forward-looking perspective

  • Transferable, practical learning that delegates can take away to implement in their workplace

  • Innovative approaches to common and emerging concerns

  • Real experience and lessons learned with case studies and/or anecdotal content

Speaker Benefit

All confirmed speakers receive complimentary admission to the full Secure Summit including the evening reception. Speakers will also receive a 50% discounted pass for a colleague to attend the Secure Summit.

Call for Speakers is NOW CLOSED

Fix the following errors:
Hide