Call for Abstracts

The call for presentations is now closed.

The theme for the 2018 ACSC Conference is From Security to Resilience.

Under this theme, the Conference will focus on a number of different issues, including cybercrime; business process compromise; protecting control systems; technological disrupters; and skills, education, and the cyber workforce.

We are now seeking abstracts from speakers on these broad topics. We’ve identified a number of areas under each topic which you might like to consider — but don’t feel you’re limited to these. If you have an interesting piece of research or a great case study or a new idea, we’re keen to hear about it.

1. Cybercrime

Some areas you might like to consider include:

  • current and emerging cybercrime threats;
  • techniques for investigating cybercrime;
  • industry responses to cybercrime incidents;
  • the cost of systemic cybercrime; and
  • how to protect yourself against cybercrime.

2. Cyber deterrence, attribution and foreign interference

Some areas you might like to consider include:

  • current and emerging threats;
  • cyber deterrence – can it work;
  • the pros and cons of attribution – from a diplomatic perspective; and
  • industry responses to foreign interference.

3. Business Process Compromise

Some areas you might like to consider include:

  • threats targeting the supply chain;
  • security of managed service providers;
  • data spills, cloud data and test systems;
  • monitoring and responding to threats at scale; and
  • challenges in dealing with distributed environments.

4. Protecting Control Systems and Critical Government Services

Some areas you might like to consider include:

  • designing systems with cyber security in mind;
  • Critical Infrastructure Protection;
  • trends in critical infrastructure cyber security regulation;
  • the role of artificial intelligence in control system security and process optimisation;
  • emerging technologies for cybersecurity of control systems; and
  • business continuity, preparedness level, and exercises.

5.Technological Disrupters

Some areas you might like to consider include:

  • horizon scanning for likely technological disrupters;
  • the future of Operating Systems security;
  • medical Device Security;
  • AI in security;
  • Software Defined Networking (SDN);
  • Internet of Things (IoT);
  • Secure DevOps; and
  • Bring Your Own Device (BYOD) and Enterprise Mobility.

6. Education, Skills and the Cyber Workforce

Some areas you might like to consider include:

  • developing a cyber workforce in Australia;
  • diversity in cyber security, including increasing the number of women in the field
  • identifying and measuring skills gaps; and
  • training and education, including:
  • the education system (primary, secondary and tertiary studies)
  • educating the public; and
  • increasing awareness within organisations.

In developing your abstract, we encourage you to include a focus on resilience.

We are also open to abstracts which include the presentation of training modules for delegates to participate in.

Important Dates

21 December 2017  CFA Open
31 January 2018  CFA Closes
14 February 2018  Speakers notified from this date
27 February 2018  Speakers to accept offer and register
5 March 2018  Initial presentation slides due
19 March 2018  Final presentation slides due
26 March 2018  Final notification of program schedule

Items to Include in Submission

All submissions must include the following information:

  • Presenter’s name
  • Presenter’s organisation, job title and biography
  • Presentation title
  • “Soundbyte” abstract – maximum 140 characters
  • Full abstract – maximum of 200 words
  • Duration of presentation (25 or 55 minutes)
  • If applicable, please also include any links to previous presentations, slide decks, or papers
  • Please include an estimate of how ‘technical’ your presentation will be. The following rating will be used:

       = Very little technical knowledge required
⬣⬣    = Some technical knowledge is assumed
⬣⬣⬣ = Largely technical and/or detailed content aimed at technicians

(This is obviously subjective, but it is aimed to provide a very basic indicator to assist delegates in selecting sessions to attend).

  • Presentations must be written in English
  • Presentations should present original work, which ideally has not been published
  • Presentations will be selected based on their originality, significance, correctness and clarity of presentation

 

Key Disclaimers

It is important for presentations to avoid vendor specific ‘product pitches/sales pitches’. If presentation proposals are considered to contain such material (product pitches/sales) they will more than likely be rejected early in the CFA review process. Further, vendors are reminded that there is no linkage between conference sponsorship and the opportunity to present at the conference.

The decision of the ACSC Conference Program Committee is final and no feedback will be provided.

It is important that submissions adhere to the dates listed above, and provide all relevant information in the submission to ensure the Program Committee can make an informed decision.

If your submission is accepted, ACSC will not be liable for any costs incurred while attending the conference as a speaker.

By entering the conference, you will enter an area where official photography and video recording may occur. By kindly agreeing to address the conference, you consent to such recording media and its release, publication, exhibition or reproduction by the ACSC. Following the event, the ACSC is more than happy to supply speakers with photographs of their address.

The Program Committee reserves the right to change scheduled speaking times as necessary. While every effort will be made to honour assigned times, Speakers may be called upon to present at any time during the conference.

There will be selected journalists invited to attend the conference. This means there is potential media interest and the chance of media coverage of the content of presentations. We also intend to take footage of all presentations for use (including possible public distribution) throughout the following 12 months. Please keep this in mind as you prepare your materials.