[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: [Fwd: ISSE 2009: Call for Contributions]
FYI. -------- Original Message -------- Subject: ISSE 2009: Call for Contributions Date: Tue, 3 Mar 2009 15:33:04 +0100 From: Sophie Hellmann <sophie.hellmann@teletrust.de> Organization: TeleTrusT Deutschland e.V. CC: 'Sophie Hellmann' <sophie.hellmann@teletrust.de> Dear Colleague, As a leading information security professional your expertise is invaluable, so why not share it with your peers? If you're interested in presenting your case studies, research reports, survey articles, position papers or in contributing to round tables or panels at the ISSE Conference 2009, taking place from 6 ?? 8 October in The Hague, Netherlands, we'd like to hear from you. Submissions will be accepted until March 30^th . So, hurry! ISSE 2009 is again organized by ENISA, eema and TeleTrusT in cooperation with the Municipality of The Hague. More information can be found below and in the attached Call for Contributions. We are looking forward to your submissions and thank you for forwarding to your colleagues and peer professionals. Kind Regards, Sophie Hellmann ISSE Programme Manager ---------------------------------------------------------- Sophie Hellmann TeleTrusT Deutschland e.V. Tel: +49 173 3543069 E-Mail: sophie.hellmann@teletrust.de <mailto:sophie.hellmann@teletrust.de> http://www.teletrust.de ---------------------------------------------------------- logos Kopie** * * * * *ISSE 2009* *Information Security Solutions Europe Conference* *6 ?? 8 October 2009, The Hague, The Netherlands* * * *Call for Contributions* * * *Hosted by:* ?? Municipality of The Hague * * *Organised by:* ?? ENISA - The European Network and Information Security Agency ?? eema - The Independent European Association for e-Business ?? TeleTrusT - The Association for the Promotion of Trustworthiness of IT-Systems * * ISSE is the only independent, interdisciplinary, unbiased and European focused conference for the presentation and discussion of technical, commercial, organisational, legal and political concepts for information security as well as privacy and data protection. The focus of ISSE is on security as a part of business processes and electronic transactions. One of the biggest challenges today is to manage security in applications: issues like return on investment, total cost of ownership, risk management as well as interoperability are of great importance. In 2009 ISSE will focus on submissions on implemented security solutions and case studies from specific application areas and industry sectors: ?? eBusiness ?? financial sector and enterprise security ?? health care ?? eGovernment and public sector ?? private sector * * *This Call for Contributions is intended to?* ?call for papers and other contributions such as round tables, panels and plenaries. Papers can be accepted for the ISSE Book regardless whether they will be presented at ISSE 2009. * * *Target Groups:* Technical Experts (Developers, Architects) Researchers and Academics Heads of IT Department General Business Managers Implementers Systems Administrators Security/IT Managers Product Managers Representatives from government and Policy Makers Product Managers and Marketing Experts Legal/Compliance/Regulatory Professionals Consultants and Business Analysts Business or Risk Managers CEOs/CIOs/CSOs/CTOs IT Business Development and Sales Experts *Topics*** The submissions should be original research results, survey articles or case studies and position papers. *Product placement is unacceptable!* For ISSE 2009 we are especially interested in the following topics (others will be considered): *Identity and Access Management * e-Identification, Biometrics, Smart Tokens, ID-Cards, RFID, e-Passports * * *Security Management* Economics of Security, Risk Mitigation, Compliance and Governance * * *Network Security* Network-level Security Devices, Interconnectivity Devices, Protocols and Trends * * *Hackers and Threats* Awareness Raising, Social Engineering, Protection against Mail and Web Attacks, Vulnerability Assessment, Penetration Testing * * *Technical Solutions* Mobile & Wireless Security, Embedded Systems, Operating Systems, Virtualization, Endpoint Security Capabilities, Web Services Security * * *Privacy and Data Protection in Cyberspace* Privacy and Data Protection Issues in Web 2.0 Environments/Social Networks/Search Engines, Use of Privacy enhancing Technologies, Transparency/Customer Awareness and legal Obligations, Concepts for Security Breach Notification * * *e-Government ?? Governance and Policy* Emerging Regulations, Legislations, national Security, Law Enforcement, Government Procurement * * *Enterprise Security Services* Authentication, Authorisation and Accounting, Data Leakage Protection, Enterprise Rights Management, Forensics, Security related Services *Emerging Applications* Digital Rights ?? Management, e-Voting, Service oriented Security, Security enabled Technologies, IPv6 *Future of Security Aspects and Technologies* European IT-Security Projects, Open Source Software & Security, Ubiquitous Computing, Emerging Crypto Developments, Trusted Computing *Critical Infrastructure Protection* * * *Cybercrime and Forensics, Fraud Detection & Prevention* *Instructions for Submissions*** Presentations and other contributions at ISSE conferences are invited as well as selected from abstracts submitted in advance. The process is completely neutral: speakers are solely selected on the merit of their submissions and their position in the organisation. ?? Please submit an extended abstract using the ISSE 2009 template (Download <http://www.teletrust.de/fileadmin/files/isse/Template_ISSE_2009.doc>) ?? If you want to submit a round table, a panel or a plenary please also use the ISSE 2009 template ?? Please submit a short speaker bio, full contact details of speaker and a list of speaking references in addition to your abstract ?? Please indicate the topic area of the presentation, the level of your presentation (basic, intermediate, technical), classification (such as case study, research report, survey article, position paper) as well as the target group you want to address (legal audience, technical audience, business audience) ?? Subject line of email MUST contain speaker's name, only electronic submissions will be reviewed ?? Please submit to: Sophie Hellmann, Programme Manager, TeleTrusT Deutschland e.V. /sophie.hellmann@teletrust.de <mailto:sophie.hellmann@teletrust.de>/ (receipt of submission will be confirmed by e-mail) Tel: +49 173 3543069 * * *Deadline for Submissions* *_March 30^th 2009_* * * *In case that you are invited as a speaker please note: *ISSE does not offer honorariums or reimburse travel expenses. Every speaker will be charged a nominal fee of 300 ? to cover a part of the costs related to your conference participation. *ISSE Book*** ISSE offers a publication of the accepted papers as printed proceedings in ??Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2009 Conference?. *Product placement is unacceptable! * *Web Site*** Regularly updated information about ISSE 2009 will be available at:*/ www.isse.eu.com <http://www.isse.eu.com>/** *(available shortly) *Sponsorship Opportunities*** If you are interested in sponsoring the event and in other promotional opportunities please contact Roger Dean, eema, at +44 (0) 7785 396 163 or /roger.dean@eema.org <mailto:roger.dean@eema.org>/.** *Steering Committee:*** Tim Mertens (ENISA, co-chairman) Ronald de Bruin (ENISA) Roger Dean (eema, co-chairman) John Hermans (eema) Frank Jorissen (eema) Wolfgang Schneider (TeleTrusT) Norbert Pohlmann (TeleTrusT) Helmut Reimer (TeleTrusT) * * *Programme Committee:*** * * * * Gunter Bitz, SAP (Germany) Ronny Bjones, Microsoft (Belgium) Lucas Cardholm, Ernst&Young (Sweden) Roger Dean, eema (United Kingdom) Ronald De Bruin, ENISA Jan De Clercq, HP (Belgium) Marijke De Soete, Security4Biz (Belgium) Jos Dumortier, KU Leuven (Belgium) Walter Fumy, Siemens (Germany) Robert Garskamp, Everett (The Netherlands) Riccardo Genghini, S.N.G. (Italy) John Hermans, KPMG (The Netherlands) Jeremy Hilton, Cardiff University (United Kingdom) Willem Jonkers, Philips Research (The Netherlands) Francisco Jordan, Safelayer (Spain) Frank Jorissen, McAfee (Belgium) N.N., BSI (Germany) Matt Landrock, Cryptomathic (Denmark) Madeleine McLaggan-van Roon, Dutch Data Protection Authority (The Netherlands) Tim Mertens, ENISA Norbert Pohlmann (chairman), University of Applied Sciences Gelsenkirchen (Germany) Bart Preneel, K.U. Leuven (Belgium) Helmut Reimer, TeleTrusT (Germany) Joachim Rie?, Daimler (Germany) Wolfgang Schneider, Fraunhofer Institute SIT (Germany) Jon Shamah, EJ Consultants (United Kingdom) Robert Temple, BT (United Kingdom) Arie van Bellen, ECP.NL (The Netherlands)
Call for Contributions_ISSE_2009.pdf
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]