Call for Papers
All those working in the information and cybersecurity fields are invited to submit an abstract to present at CSSA 2021. We will have a number of industry experts sharing knowledge, but we would also like to invite you to share case studies of your experience in this field.
Standard presentations are short conversation starters of 20 minutes, providing enough information to encourage the audience to engage and seek further information.
Theme and focus areas
The theme for CSSA 2021 is Building the human firewall and our focus areas are as follows:
Following an intensive investigation to locate vulnerable infrastructures, an attack is then launched via remote access or remote desktop connections that have minimal security measures in place. Other methods include targeting servers, using botnets, including attachments and compromising supply chains to have a greater impact.
Cybercriminals are aware that a large number of staff and still working remotely. This means that not everyone may have the most suitable security measures in place that will protect them from a cyberattack.
Furthermore, phishing emails are also more sophisticated making it harder to determine legitimate emails from a malicious one. Despite recommendations to update software, operating systems and applications, as well as have an anti-virus in place, there is still a high risk of a cyberattack being a success.
While working remotely, devices are also more prone to be used by family members, adding another level of risk to devices, as if not monitored, you cannot see what they’re accessing via your work device.
People in cyber
Information and cybersecurity teams play a critical role in protecting the organisation and taking immediate action where they suspect foul play is at hand. We aim to take a look at who the people are that are behind the lines fighting the good fight, what their roles entail, lessons learnt, and recommended techniques they use.
New technologies such as artificial intelligence, machine learning, virtualisation, and cloud computing, are constantly being introduced or adapted to meet global demands. With these technologies come added risks, especially when there is much to learn about how extensive these technologies can be. It is therefore important to information individuals of these technologies and alert them to the benefits and risks, as well recommend best practices so that they cannot be exploited.
Proactive vs reactive response
Information and cybersecurity breaches happen so suddenly that in many cases security teams have a limited capacity to move from a reactive response to a proactive one. This focus area aims to provide guidance on how security teams can seek to be more proactive instead of constantly being caught on the backfoot.
Virtual Private Networks are often seen as a secure way to connect to an organisation’s network. They are intended to prevent sensitive information from getting into the wrong hands, and ensure that information and communication are not adapted. More importantly, they make sure that only eligible individuals are able to access the network by authenticating with their username and password. accessed by the wrong people, However, if an employee’s password is compromised, illegal access can quickly be gained to the network and sensitive information accessed.
Weaponising of AI
Artificial intelligence is being integrated into all forms of society. One of the main fields where it is being integrated is weapons. We aim to take a deeper look at how weapons that incorporates of AI are already being developed and forecast the risks involved in this powerful resource. There is also a need to police these type of technological advances and we look at what is currently in place and what urgent attention is required to securely manage this process.
You can submit your abstract by completing the online form. Submissions close Friday, 27 August 2021.
Selections for all submissions will be based on the following criteria:
- Alignment with the conference aims
- Interest and relevance to the Information and Cybersecurity community
- Potential to be engaging and enhance the symposium
- Quality of the submission – clarity and readability
- Sufficiency of information