Submitting Proposals
Thank you for your interest in becoming a guest speaker at the 2023 Information Security Symposium. This year's theme is Evolve - meeting the increased need for security in an ever-changing world. We invite you to participate in the Information Security Symposium to exchange ideas and information with fellow peers and professionals.
The Information Security Symposium at UC Davis seeks presenters to share their experiences and knowledge in highly interactive learning sessions. Please submit your proposal on or before April 15, 2023.
When preparing to complete your proposal submission, please include information about the speaker(s), a short bio, session title, track, and overview description. (This information will be included in the program, unless you request it be omitted). In April, after the schedule has been finalized, we will request additional details such as photos, file links, LinkedIn information, etc.
Please click here to submit a proposal for the 2023 Information Security Symposium.
Symposium Tracks
Before you submit a proposal, please review the tracks below to identify which is most applicable to your session and expertise. There are seven learning tracks to address both technical and non-technical information security and privacy topics. Proposals should address cutting edge practices, success stories, solutions, or future directions across the University of California and government information security landscape. The symposium provides lectures, panel discussions, and hands-on labs to participants.
Lecture and panel discussions are 45 minutes or 90 minutes, and hands-on labs are scheduled for up to 105 minutes. Breaks and lunches have already been factored in separately.
Below are the different tracks and session ideas:
-
Security Architecture, Engineering, and Operations
-
Examples include: The Moving Perimeter; ZeroTrust/AggieTrust; Segmentation; IAM; PAM; IGA; Securing the Cloud (IaaS, PaaS, SaaS); Authentication
-
-
Governance, Risk, and Compliance
-
Examples include: Risk Assessments; Vendor Risk Assessments; Audits; 3rd-party Assessments; Regulations (i.e. PCI-DSS, CJIS, NIST); IS-3; Privacy & Compliance
-
-
Healthcare Security
-
Examples include: Cloud Adoption; Home Health; Digital Co-Lab; Cloud Innovation Strategies to Improve Patient Outcome; HIPAA; Patient Authentication
-
-
Research Security
-
Examples include: Cloud Security; Virtual Desktops for CJIS & Regulatory Compliance
-
-
Security Tools and Services
-
Examples include: 3rd-Party PEN Tests; PCI ASV/QSV; MSSP; 3rd-Party Risk Assessment/VRA; Outsourced Source-Code Testing
-
-
Security Fundamentals
-
Examples include: Security Basics, Phishing & Social Engineering Protection; OWASP Top 10
-
-
Security Professional Development
-
Examples include: Diversity, Equity, & Inclusion; Security Training & Certifications,
-
Promoting Diversity, Equity, and Inclusion (DEI) in the field of information security is a key priority of our event. As you consider a proposal topic, we invite you to consider how your proposal addresses or promotes DEI.
Selection Process
All submissions will be reviewed by the Information Security Symposium Curriculum Committee. Proposals will be selected to ensure the event offers a comprehensive, non-commercial, objective, and diverse treatment of issues related to the learning tracks and key topics. Submitters will be notified of their proposal status in April 2023.
Registration Fees
Registration is complimentary this year for all participants. Please be advised that all presenters, vendors, and volunteers need to register in advance.