As the co-chair of this event I am letting you all know you have the opportunity to propose a topic to present at this event.
You are invited to the Capital of the World, New York City for the 4rd Annual Joint Cyber Security Conference on October 5th 2017. The event will be feature internationally recognized presentations delivered by security researchers, industry leaders and officials in Time Square!
Showcase your security expertise and share your knowledge –
October 5th, 2017 in New York City for the 4th Annual Joint Cyber
Security Conference. This is an
excellent opportunity to take advantage of unparalleled networking
opportunities with other information security professionals, industry experts,
and thought leaders from around the world, and get the exposure and recognition
you deserve.
October 5th, 2017 in New York City for the 4th Annual Joint Cyber
Security Conference. This is an
excellent opportunity to take advantage of unparalleled networking
opportunities with other information security professionals, industry experts,
and thought leaders from around the world, and get the exposure and recognition
you deserve.
Please submit your
proposal by 11:59 pm on August 7th, 2017 EDT.
proposal by 11:59 pm on August 7th, 2017 EDT.
Looking for proposals from security practitioners who want
to have real conversations about security: security analysts, engineers, and
administrators, developers, testers, results-focused QA researchers of all
kinds, chief security officers, leaders in risk and audit, and security data
scientists. If you’re on the front lines of defense with stories of great
success and worthy failure, especially if they provide clear ideas for what to
do next, let us hear from you. And while people need a sense of what’s
possible, bring concrete technical solutions above all else.
to have real conversations about security: security analysts, engineers, and
administrators, developers, testers, results-focused QA researchers of all
kinds, chief security officers, leaders in risk and audit, and security data
scientists. If you’re on the front lines of defense with stories of great
success and worthy failure, especially if they provide clear ideas for what to
do next, let us hear from you. And while people need a sense of what’s
possible, bring concrete technical solutions above all else.
Note: Names and company
affiliations will not be considered by the program committee during the first
round of review.
affiliations will not be considered by the program committee during the first
round of review.
Eligible Topics
We would like to cover all Security-related disciplines,
including:
including:
·
Analysis
Analysis
·
Education
Education
·
Engineering
Engineering
·
Forensic
Forensic
·
Governance
Governance
·
Network
Network
·
Operational
Operational
·
Physical
Physical
·
Policy
Policy
·
Social
Social
·
Technical
Technical
Submission Process & Requirements
·
The original author(s) of a presentation must
submit for the Call for Presentation. Third parties such as PR firms or speaker
representatives may not submit materials on behalf of a potential speaker or
speaking team.
The original author(s) of a presentation must
submit for the Call for Presentation. Third parties such as PR firms or speaker
representatives may not submit materials on behalf of a potential speaker or
speaking team.
·
New York Metro Joint Cyber Security Conference
(NYMJCSC) does not accept product or vendor-related pitches. .
New York Metro Joint Cyber Security Conference
(NYMJCSC) does not accept product or vendor-related pitches. .
·
Each submission must be completed in its
entirety the first time.
Each submission must be completed in its
entirety the first time.
·
New York Metro Joint Cyber Security Conference
(NYMJCSC) selection process is very competitive. Members of the NYMJCSC Review
Board score each submission as a group.
Submissions should clearly detail the concepts, ideas, findings, and
solutions a researcher or speaking team plans to present.
New York Metro Joint Cyber Security Conference
(NYMJCSC) selection process is very competitive. Members of the NYMJCSC Review
Board score each submission as a group.
Submissions should clearly detail the concepts, ideas, findings, and
solutions a researcher or speaking team plans to present.
·
Submissions that highlight new research, tools,
vulnerabilities, etc. are highly recommended and will be given priority.
Submissions that highlight new research, tools,
vulnerabilities, etc. are highly recommended and will be given priority.
·
Submissions that include Handouts and Live Demos
will also be given priority.
Submissions that include Handouts and Live Demos
will also be given priority.
·
Speakers may submit more than one proposal but
each proposal must be submitted via a separate submission form.
Speakers may submit more than one proposal but
each proposal must be submitted via a separate submission form.
·
Each submission must include detailed
bibliographies acknowledging prior work in the space, distinguishing or
highlighting how your presentation is different.
Each submission must include detailed
bibliographies acknowledging prior work in the space, distinguishing or
highlighting how your presentation is different.
·
Individuals submitting a proposal will receive a
“Your submission for New York Metro Joint Cyber Security Conference 2017 has
been received”. After selections have been completed, all submitters will
receive an email confirmation of acceptance or rejection.
Individuals submitting a proposal will receive a
“Your submission for New York Metro Joint Cyber Security Conference 2017 has
been received”. After selections have been completed, all submitters will
receive an email confirmation of acceptance or rejection.
·
Speakers will be contacted directly if Review
Board members have any questions about a submission.
Speakers will be contacted directly if Review
Board members have any questions about a submission.
Review Board & Content Selection
The speaker selection committee is comprised of association
volunteers in various areas of the information security community. The Review
Board advises the conference on its strategic direction, reviewing, and
programming conference content and providing unparalleled insight into the attendees.
volunteers in various areas of the information security community. The Review
Board advises the conference on its strategic direction, reviewing, and
programming conference content and providing unparalleled insight into the attendees.
Each presentation will be reviewed using a basic point
system, each reviewer will be responsible for scoring the talk submission and
picking the best candidates for limited spots.
system, each reviewer will be responsible for scoring the talk submission and
picking the best candidates for limited spots.
·
1-3 Points – Creative and catchy title
1-3 Points – Creative and catchy title
·
1-3 Points – Clear and detailed learning
abstract/objectives/sources. This will be used by the speaker selection
committee and viewed by the attendee as to why to attend this talk, the more
complete the better.
1-3 Points – Clear and detailed learning
abstract/objectives/sources. This will be used by the speaker selection
committee and viewed by the attendee as to why to attend this talk, the more
complete the better.
·
1-3 Points – NYMJCSC Association Topic (Core
body of work/project from a member association)
1-3 Points – NYMJCSC Association Topic (Core
body of work/project from a member association)
* Speakers will be picked on these criteria
regardless of sponsorship if applicable
regardless of sponsorship if applicable
Required Information
You’ll be asked to include the following information for
your proposal. Proposed title
your proposal. Proposed title
·
Description of the presentation
Description of the presentation
·
Suggested main topic
Suggested main topic
·
Audience information:
Audience information:
o Who
is the presentation is for?
is the presentation is for?
o What
will they be able to take away?
will they be able to take away?
o What
prerequisite knowledge do they need?
prerequisite knowledge do they need?
·
For tutorial proposals: hardware installation,
materials, and/or downloads attendees will need in advance
For tutorial proposals: hardware installation,
materials, and/or downloads attendees will need in advance
·
Speaker(s): biography and hi-res headshot
(minimum 1400 pixels wide; required)
Speaker(s): biography and hi-res headshot
(minimum 1400 pixels wide; required)
Tips for Submitting a Successful Proposal
Help us understand why your presentation is the right one
for this conference. Please keep in mind that this event is by and for
professionals. All presentations and supporting materials must be respectful,
inclusive, and adhere to our Code of Conduct.
for this conference. Please keep in mind that this event is by and for
professionals. All presentations and supporting materials must be respectful,
inclusive, and adhere to our Code of Conduct.
·
Give your proposal a simple and straightforward
title.
Give your proposal a simple and straightforward
title.
·
Include as much detail about the presentation as
possible.
Include as much detail about the presentation as
possible.
·
Keep proposals free of marketing and sales,
including buzzword-heavy jargon and FUD
Keep proposals free of marketing and sales,
including buzzword-heavy jargon and FUD
·
Keep the audience in mind: they’re professional,
and already pretty smart.
Keep the audience in mind: they’re professional,
and already pretty smart.
·
Explain why people will want to attend and what
they’ll take away from it.
Explain why people will want to attend and what
they’ll take away from it.
·
Pick the right topic for your talk to be sure it
gets in front of the right program committee members.
Pick the right topic for your talk to be sure it
gets in front of the right program committee members.
·
Be authentic. Your peers need original ideas in
real-world scenarios, relevant examples, and knowledge transfer.
Be authentic. Your peers need original ideas in
real-world scenarios, relevant examples, and knowledge transfer.
To submit your Proposal go here http://nymjcsc.org/cfp-open/