Contact Us   |   Print Page   |   Sign In   |   Register
Call for Speakers: 2017 ISSA International Conference


Digital Danger Zone 
October 9-11, 2017
Sheraton San Diego Hotel and Marina
San Diego, California, USA


Call for Speakers is Now Closed

For any questions, please contact Leah Lewis.

Dates and Deadline:

Call for Speakers will open January 16, 2017
Speaker submissions are due March 13, 2017
Confirmations will be sent by April 14, 2017
Presentation slides must be received by September 4, 2017

About ISSA:

The Information Systems Security Association (ISSA)® is dedicated to developing and connecting cybersecurity leaders globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, hospitality, financial, and government.

About the Conference Theme: Digital Danger Zone

Each day, cyber threats become increasingly intricate and difficult to detect. Over the past year, we saw that with the rise of device connectivity came boundless opportunities for malicious hackers to attack device vulnerabilities. No cyber security professional can become an expert on these digital dangers without continued efforts to educate themselves on the industry’s latest trends and technologies. 

We look forward to welcoming you and over 800 of your colleagues and peers in San Diego as we discuss topics ranging from incident response to application security to business skills for the information security professional. Join us at the 2017 ISSA International Conference and we’ll help you navigate the Digital Danger Zone.

Presentation Subjects:

We are seeking sessions that will be relevant to an audience of experienced information security professionals from a variety of industries. Sessions should be solution oriented, proactive, and innovative, focusing on security as a vital part of the business landscape. Presentation can address any issue that infosec professionals might face; for example - business skills, technical updates, legal knowledge.

  • Mobile Security: Wireless, Mobile Apps, Cloud Security, Tablets and Smartphones
  • Securing the End Users: Security Awareness Training, Social Media, Access Control
  • Application Security: Application Security, Security Development Lifecycle
  • Infrastructure: Endpoint Security, Network Security, Data Loss Prevention, Pen/Vulnerability Testing, Security Intelligence, Data Protection, Architecture
  • Incident Response: Updates, Forensics, Law Enforcement, eDiscovery, Threat Intelligence
  • Laws and Regulations: Legal Updates, GRC, Standards, Privacy Regulations, Digital Supply Chain
  • Business Skills for the Information Security Professional: Presenting the Business Case for Information Security, Presentation Skills, Negotiation Skills, Communication Skills
  • Career Development for the Information Security Professional: Career Paths for Information Security Professionals, Leadership Development, Personal and Professional Growth and Development


The audience will be comprised of knowledgeable information security practitioners with over 700 conference attendees in 2016. 70% have more than ten years of experience in the field. Job function and interests range from technical to management. About 60% of the audience members are senior level professionals within their organizations (including director, VP, executive, and C-level). Attendees will include ISSA members from regional, national, and international chapters in addition to the general information security community.

Session Options:

  • Breakout Sessions/Panels: Traditional sessions will be a maximum of 50 minutes and should allow ample time for questions and interaction. Sessions should be planned to address the conference theme and be appropriate for experienced information security professionals.
  • Workshops: This option allows for longer sessions to dive deep into a specific subject or training. Two - 50 minute back to back sessions following the same break schedule as the rest of the conference attendees. Please be specific on the time needed and what attendees will learn from devoting extra time to your sessions.
  • Case Studies: Tell us how your organization is managing risk, privacy and security in the ever expanding and diversified IT landscape. How has your team embraced new technology such as mobile devices, big data and cloud technology in a way that takes advantage of the business applications and still maintains security and privacy standards? Presenters are encouraged to bring together stakeholders from diverse disciplines (legal, business lines, IT, HR, etc.) to present a picture of obstacles, decisions and results. Session should give attendees practical advice and examples that they can use in their organizations. Up to five presenters will be provided passes to the event.


Thank you for your willingness to present at the ISSA International Conference. We will follow-up by April 14 with confirmation if your session is selected. Many factors go into the selection process; including review by our volunteer committee members, number of sessions submitted on a given subject and efforts to vary the prospective of presentations. Proposals may also be considered for other educational programs throughout the year.

  • Case studies, interactive workshops, and advanced level presentations for experienced professionals are strongly encouraged.
  • Remember this is an educational venue. Clearly stated learning objectives are a must to consider the submission complete.
  • Well-written abstracts improve your potential for selection.
  • Speaker(s) understand that some session proposals will be posted on-line and shared with other educational committees.
  • Practitioners are desired. Speakers from any company that sells or markets information security products or services should be responsible for information security within their organizations. A client may be submitted to present a case study.
  • Information submitted (biography, abstract, etc.) may be edited to conform to ISSA style guide.
  • Microphone(s) (if needed) and LCD projector will be available for each session. Please be prepared to use your own laptop. Should you choose to use a Mac, you will be responsible for providing a converter or any needed cable adapters.
  • All presentations must be educational in nature and may not promote any company, product or service.
  • ISSA does not pay travel expenses or honoraria. Speakers will receive a full conference pass and an opportunity to network and support the information security community.
  • Presentation slides are due by September 4, 2017 for review by the Conference Planning Committee.
Community Search
Sign In


ISSA Mid-Atlantic Conference

ISSA Thought Leadership Series Webinar

Cornerstones of Trust

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information