Contact Us   |   Print Page   |   Sign In   |   Register
Call for Speakers: 2016 ISSA International Conference


Survival Strategies in a Cyber World 
November 2-3, 2016
Hyatt Regency Dallas
Dallas, Texas, USA


Call for Speakers is Now Closed. 

Lend your expertise to the ISSA International Conference. We are seeking solution-oriented, proactive, and innovative speakers who will drive the future of security as a vital part of the business landscape.

The ISSA International Conference takes place November 2-3, 2016 in Dallas, Texas. Click here for more information.

For any questions, please contact Leah Lewis.

Dates and Deadline:

Call for Speakers will open February 1, 2016
Speaker submissions are due March 18, 2016
Confirmations will be sent by April 15, 2016
Presentation slides must be received by September 30, 2016

About ISSA:

The Information Systems Security Association (ISSA)® is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, hospitality, financial, and government.

Presentation Subjects:

We are seeking sessions that will be relevant to an audience of experienced information security professionals from a variety of industries. Sessions should be solution oriented, proactive, and innovative, focusing on security as a vital part of the business landscape. Presentation can address any issue that infosec professionals might face; for example - business skills, technical updates, legal knowledge.

  • Mobile Security: Wireless, Mobile Apps, Tablets and Smartphones
  • Securing the End Users: Security Awareness Training, Social Media, Access Control
  • Application Security: Application Security, Security Development Lifecycle
  • Infrastructure: Endpoint Security, Network Security, Data Loss Prevention, Pen/Vulnerability Testing, Security Intelligence, Data Protection, Architecture
  • Threats & Response: Updates, Forensics, Law Enforcement, eDiscovery
  • Laws and Regulations: Legal Updates, GRC, Standards, Privacy Regulations
  • Business Skills for the Information Security Professional: Presenting the Business Case for Information Security, Career Paths for Information Security Professionals, Presentation Skills, Negotiation Skills


The audience will be comprised of 600-800 knowledgeable information security practitioners. 70% have more than ten years of experience in the field. Job function and interests range from technical to management. About 60% of the audience members are senior level professionals within their organizations (including director, VP, executive, and C-level). Attendees will include ISSA members from regional, national, and international chapters in addition to the general information security community.

Session Options:

  • Breakout Sessions/Panels: Traditional sessions will be a maximum of 50 minutes and should allow ample time for questions and interaction. Sessions should be planned to address the conference theme and be appropriate for experienced information security professionals.
  • Workshops: This option allows for longer sessions to dive deep into a specific subject or training. Two - 50 minute back to back sessions following the same break schedule as the rest of the conference attendees. Please be specific on the time needed and what attendees will learn from devoting extra time to your sessions.
  • Case Studies: Tell us how your organization is managing risk, privacy and security in the ever expanding and diversified IT landscape. How has your team embraced new technology such as mobile devices, big data and cloud technology in a way that takes advantage of the business applications and still maintains security and privacy standards? Presenters are encouraged to bring together stakeholders from diverse disciplines (legal, business lines, IT, HR, etc.) to present a picture of obstacles, decisions and results. Session should give attendees practical advice and examples that they can use in their organizations. Up to five presenters will be provided passes to the event.


Thank you for your willingness to present at the ISSA International Conference. We will follow-up by the end of May with confirmation if your session is selected. Many factors go into the selection process; including review by our volunteer committee members, number of sessions submitted on a given subject and efforts to vary the prospective of presentations. Proposals may also be considered for other educational programs throughout the year.

  • Case studies, interactive workshops, and advanced level presentations for experienced professionals are strongly encouraged.
  • Remember this is an educational venue. Clearly stated learning objectives are a must to consider the submission complete.
  • Well-written abstracts improve your potential for selection.
  • Speaker(s) understand that some session proposals will be posted on-line and shared with other educational committees.
  • Practitioners are desired. Speakers from any company that sells or markets information security products or services should be responsible for information security within their organizations. A client may be submitted to present a case study.
  • Information submitted (biography, abstract, etc.) may be edited to conform to ISSA style guide.
  • Microphone(s) (if needed) and LCD projector will be available for each session. Please be prepared to use your own laptop. Should you choose to use a Mac, you will be responsible for providing a converter or any needed cable adapters.
  • All presentations must be educational in nature and may not promote any company, product or service.
  • ISSA does not pay travel expenses or honoraria. Speakers will receive a full conference pass and an opportunity to network and support the information security community.
  • Presentation slides are due by September 30, 2016 for review by the Conference Planning Committee.

If your session is not selected, and your firm is still interested in sponsorship speaking opportunities, the 2016 Media Kit outlines three speaking options at the Gold Level and Platinum Level  sponsorships. For details, email Joe Cavarretta.

Community Search
Sign In


Cornerstones of Trust

ISSA International Series Webinar: Cloud Services and Enterprise Integrations

8/4/2018 » 8/9/2018
Black Hat USA 2018

10/17/2018 » 10/18/2018
2018 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information