Call for Papers

If you’re interested in presenting at the upcoming CSSA events, please complete the form.

Deadline for submissions - Friday, 31 August 2022

Our focus areas are as follows:


Following an intensive investigation to locate vulnerable infrastructures, an attack is then
launched via remote access or remote desktop connections that have minimal security
measures in place. Other methods include targeting servers, using botnets, including
attachments and compromising supply chains to have a greater impact.

Remote work

Cybercriminals are aware that a large number of staff and still working remotely. This means
that not everyone may have the most suitable security measures in place that will protect
them from a cyberattack.

Furthermore, phishing emails are also more sophisticated making it harder to determine
legitimate emails from a malicious one. Despite recommendations to update software,
operating systems and applications, as well as have an anti-virus in place, there is still a high
risk of a cyberattack being a success.

While working remotely, devices are also more prone to be used by family members, adding
another level of risk to devices, as if not monitored, you cannot see what they’re accessing
via your work device.

People in cyber

Information and cybersecurity teams play a critical role in protecting the organisation and
taking immediate action where they suspect foul play is at hand. We aim to take a look at
who the people are that are behind the lines fighting the good fight, what their roles entail,
lessons learnt, and recommended techniques they use.

Emerging technologies

New technologies such as artificial intelligence, machine learning, virtualisation, and cloud
computing, are constantly being introduced or adapted to meet global demands. With these
technologies come added risks, especially when there is much to learn about how extensive
these technologies can be. It is therefore important to information individuals of these
technologies and alert them to the benefits and risks, as well recommend best practices so
that they cannot be exploited.

Proactive vs reactive response

Information and cybersecurity breaches happen so suddenly that in many cases security
teams have a limited capacity to move from a reactive response to a proactive one. This
focus area aims to provide guidance on how security teams can seek to be more proactive
instead of constantly being caught on the backfoot.


Virtual Private Networks are often seen as a secure way to connect to an organisation’s
network. They are intended to prevent sensitive information from getting into the wrong
hands, and ensure that information and communication are not adapted. More importantly,
they make sure that only eligible individuals are able to access the network by
authenticating with their username and password. accessed by the wrong people, However,
if an employee’s password is compromised, illegal access can quickly be gained to the
network and sensitive information accessed.

Weaponising of AI

Artificial intelligence is being integrated into all forms of society. One of the main fields
where it is being integrated is weapons. We aim to take a deeper look at how weapons that
incorporates of AI are already being developed and forecast the risks involved in this
powerful resource. There is also a need to police these type of technological advances and
we look at what is currently in place and what urgent attention is required to securely
manage this process.

Please complete this online form and we will contact you about possible speaker opportunities.

Register to attend CSSA 2022