(ISC)² Security Congress Opens Call for Speakers

(ISC)² announced the opening of the call for speakers for the fifth annual (ISC)² Security Congress, September 28 – October 1 in Anaheim, Calif.

The goal of the (ISC)² Security Congress is to offer education, networking and career advancement opportunities to all levels of information security professionals—furthering the mission of the certification nonprofit itself.

This year, rapid technology changes will guide the crafting of the sessions—particularly when it comes to cloud usage and mobility—and the intersection between them.

“The mass migration of everyday objects becoming interconnected, or the ‘Internet of Things (IoT)’ as the industry has coined it, exemplifies the merger between traditional and logical security,” said W. Hord Tipton, CISSP, executive director of (ISC)², in a statement. “Security changes rapidly and ensuring that the professionals charged with protecting the business remain current is an essential business function.”

(ISC)² is accepting speaker submissions for information security tracks focused on:

• Cloud Security

• Swiss Army Knife

• Mobile Devices – Security and Management

• Governance, Regulation & Compliance

• Software Assurance & Application Security

• Malware

• Threats – Management, Detection, Intelligence & Mitigation

• Professional Development

• Forensics

• Healthcare Security

• Women in Security

• Identity/Access Management

The event will be once again colocated with the ASIS International 61st Annual Seminar and Exhibits (ASIS 2015). the (ISC)² Security Congress 2014 alone is expected to bring together more than 20,000 professionals worldwide from both the traditional and information security disciplines.

“Through these combined events, ASIS and (ISC)² are leveraging joint expertise and resources to present two events in the same location with one focus: to provide traditional and information security professionals with the knowledge, technology, and networking opportunities they need to excel in their careers and secure their organizations’ people, property and data,” Tipton added.

What’s Hot on Infosecurity Magazine?