Thank you to everyone who has submitted an abstract – we will be in touch soon.Call for Papers is now CLOSED
Conference Program Topic Guidelines will include but not be limited to:
Critical Infrastructure Protection:
- Developing CI Policy, including as NSM22 and CIRCIA
- CNI Threat and Vulnerability Analysis
- Energy Infrastructure Security
- Transport Infrastructure Security
- Telecomms Infrastructure Security
- International and National Agency Co-operation
- Emergency Preparedness and Response Coordination
- Identity Management & Access Control
- The Human Factor – Operator Protection
- Information exchange and interoperability
- Securing Waterside and Maritime Infrastructure – Whether that’s Oil and Gas Refineries, LNG, Ports, Power Stations
- Ariel Assets – What’s the Future? – Fixed Wing, Rotor Craft, UAV’s, Satellites
- Perimeter Security – Do long perimeters mean weak security?
- Flooding – Prevention is better than the cure, but we also need the cure!
- Planning for Disaster – Risk Management and Resilience
- Surveillance Systems – How Do We Manage Multiple Systems?
- Human Assets – Selection, Training, Motivation
- PPPs
- Critical Communications
- Emerging and Future Threats, Identification and Management
- Security and Resilience in Design
- Modelling, Simulation and Metrics
- Standardisation for Improving CIP Solutions
Critical Information Infrastructure Protection / Cyber Security:
- Cyber security aspects on critical infrastructures (e.g. energy, telcos, transport, banks, health)
- CIIP Policy
- Cyber security strategies
- Alerting systems and information exchange platforms for cross-border NIS cooperation
- Integrated situational awareness; Data collection, abstraction, visualisation
- Governance models, practices and escalation procedures for cyber crisis management
- International NIS cooperation for incident management and response
- Legal aspects of NIS cooperation and information sharing
- Industrial Control Systems / SCADA security / ICS-CERT
- Incident reporting
- Information sharing
- Public Private co-operation
- Critical applications security