Warning: A non-numeric value encountered in /homepages/12/d577138721/htdocs/clickandbuilds/SecureBitsSecurityConference/wp-content/themes/thekeynote-v1-05/include/gdlr-admin-option.php on line 10

Warning: A non-numeric value encountered in /homepages/12/d577138721/htdocs/clickandbuilds/SecureBitsSecurityConference/wp-content/themes/thekeynote-v1-05/include/gdlr-admin-option.php on line 10
Call For Topics | Secure Bits Security Conference 2016
Warning: count(): Parameter must be an array or an object that implements Countable in /homepages/12/d577138721/htdocs/clickandbuilds/SecureBitsSecurityConference/wp-includes/post-template.php on line 259

Warning: count(): Parameter must be an array or an object that implements Countable in /homepages/12/d577138721/htdocs/clickandbuilds/SecureBitsSecurityConference/wp-includes/post-template.php on line 259

Warning: count(): Parameter must be an array or an object that implements Countable in /homepages/12/d577138721/htdocs/clickandbuilds/SecureBitsSecurityConference/wp-includes/post-template.php on line 259

Warning: count(): Parameter must be an array or an object that implements Countable in /homepages/12/d577138721/htdocs/clickandbuilds/SecureBitsSecurityConference/wp-includes/post-template.php on line 259
Security Simply Explained
|

Call For Topics

Requirement and Guidance for Submitting Topics

Propose Topics

We will accept topics from candidate speakers until July end, 2015. Submit your topics through the online form by clicking on the Submit button at the bottom of this page.

Topics Selection

Our technical team will go through a review process of topics until mid of Aug, 2015. Topics will be assessed based on our technical board’s topic selection criterion.

Announcement

Selected speakers will be contacted by Aug. 15th and the website will be updated with the names of the selected topics and speakers immediately afterwards.

Requirements

The conference is soliciting literature review, survey, business case study and research papers and
comments including, whilst not limited to, the following areas of interest:
  • Enterprise information security architecture
  • Identity Based Security
  • Information security audit
  • Information security management system
  • Information security policies
  • Information security standards
  • Information technology security audit
  • ITIL security management
  • Mobile security
  • Network Security Services
  • Privacy engineering
  • Privacy-enhancing technologies
  • Security information management
  • Security level management
  • Security service (telecommunication)
  • Exploitation analysis
  • Cloud security
  • Threat analysis

Ready To Submit Topics?

All topic submissions will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and presentability. English is the official language of the conference. We welcome topic submissions.