WiCyS 2019: National Women in CyberSecurity Conference Wyndham Pittsburgh, PA, United States, March 27-30, 2019 |
Conference website | http://www.wicys.net |
Submission link | https://easychair.org/conferences/?conf=wicys2019 |
Abstract registration deadline | November 1, 2018 |
Submission deadline | November 1, 2018 |
The Call for Participation for 2019 Women in CyberSecurity Conference (WiCyS ’19) is now closed EXCEPT for student research poster submission, which will close Jan 1st.
WiCyS aims to impact cyber workforce diversity through inspiring, recruiting, advancing, educating, retaining and investing in women.
Women in CyberSecurity 2019 (WiCyS):
Dates: March 28-30
Location: Pittsburgh, PA
Host: WiCyS Organization and Carnegie Mellon University
Submission Link: https://easychair.org/conferences/?conf=wicys2019
Important Dates:
Submissions Open: Saturday, September 1, 2018
Submissions Close: Thursday, November 1, 2018
Notification of status: Saturday, December 1, 2018
Student Research Poster Submissions Open: Saturday, December 1, 2018
Student Research Poster Submissions Close: Tuesday, January 1, 2019
WiCyS 2019 Organizers
-----------------------------
General Chair
-
Dr. Ambareen Siraj, Founder WiCyS
Co-Chairs:
-
Dr. Janell Straach, Chair of the Board WiCyS
-
Dr. Greg Shannon, Carnegie Mellon University
Leads: Operations and Logistics
-
Taly Walsh, Executive Director WiCyS
-
Michele Tomasic, Carnegie Mellon University
Program Co-Chairs
-
Lisa Lafleur, Raytheon
-
Celeste Matarazzo, Lawrence Livermore National Laboratory
-
Dr. Ashley Podhradsky, Dakota State University
-
Colleen Riccinto, Cyber Talent Search
Overview
-----------
The 2019 WiCyS annual conference will have a new expanded schedule to allow for greater participation from our community. Instead of three concurrent sessions, we will now have four. Tracks Include:
· Today's Technology and Challenges: Current issues and challenges, Advances in research and development (R&D), experimental findings
· Looking Ahead: Important technology/R&D trends, challenges on the horizon, upcoming solutions, tomorrow's vision
· Best Practices: Institutional/Operational/Academic best practices, tools, techniques, approaches
· Career Development: Leadership, advancement
Within these tracks, we will still have our traditional five sessions:
· Lightning Talks
· Technical Presentations
· Birds of a Feather
· Workshops
· Panels
Format
-----------
Lightning Talks: Lightning talks highlight fresh ideas, unique perspectives, valuable experiences, and emerging trends in cybersecurity. Lightning Talks are five-minute presentations (with or without formal presentations) that seek to jump-start discussions and collaborations while soliciting feedback from the community.
Technical Presentations: Technical presentations highlight innovations, research & development projects, internships/co-ops experiences, service-learning and outreach projects, or other interesting experience related to cybersecurity. This is an opportunity to share that experience with others and perhaps inspire them to pursue similar opportunities. Technical Presentations are 45 minutes long, including time for Q&A.
Birds of a Feather: Birds of a Feather are informal discussion sessions on just about any topic related to cybersecurity, that elicit participant discussions. Presenters lead the discussion from audience. These sessions can be a great way to share ideas and be introduced to current issues or trends in this area. BoaF sessions are 45 minutes long.
Workshops: Workshops are free hands-on sessions (technical/professional development) on any topic related to cybersecurity. Hands-on workshops in any cybersecurity area are welcome. The audience is can be students, educators, professionals and researchers (in any combination or by category). Workshops are 2 hours long.
Panels: Panels provide opportunities to discuss a current relevant topic in cybersecurity. Panel organizers are responsible for selecting appropriate panelists to participate. In addition to the moderator, there can be up to 4 panelists and each panel is 45 minutes long. Submit all names and their affiliation info along with the abstract.
Student Research Poster: Posters provide opportunities for students to present their work for the audience at WiCyS in poster format. Winners in both Undergrad and grad catagory receive travel support for future security conference of choice. Runner Ups receive Tech prizes.
If you wish to submit a proposal but would like to see examples of past accepted submissions, visit www.wicys.org and click on Archive to see the programs from the last five years. Send any questions to info@wicys.org
Submission Format
-----------------
Authors can submit multiple proposals in different categories and tracks. Submission will be peer reviewed and all accepted proposals will be notified by December 1st. Accepted proposals will receive ONE complimentary registration (per accepted work) with lodging at the conference hotel.
ll submissions need to be submitted through EasyChair. Authors have to create an account in EasyChair to submit an abstract of their proposal. Authors need to identify what type of submission they are applying to (Lightning Talk, Technical Presentation, Birds of a Feather, Workshop or Panel) AND which track (Today’s Technology, Looking ahead, Best practices, Career development). An abstract should be a few paragraphs that highlight the proposed work.