Social Network For Security Executives: Network, Learn & Collaborate
I am highly excited to tell you the most exciting event and all the buzz of Annual Summit is back !
Further more I am more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks of this year.
Click here for more information on Call For Speakers
Below I will share a few details that could help you submit your papers-
Step 1 - Choose Your Speaking Slot
We believe in sharing knowledge which is short, great and impactful. We don't believe in restricting oneself from thoughts and sharing them, thus your talk will win the speaking slot most apt to your needs.
Step 2 - Choose The Domain Of Your Talk
You are the best judge of which domain you are most proficient, where you have new learning, which area you are confident about. One great way to decide between multiple options can be to choose a domain you love to listen to talks or even one that can be most helpful for information security officers.
Step 4 - Create An Awesome Topic
For this, previous year topics can always be very helpful in understanding both your best area of communication and the audience expectations. Here are a few-
Step 5 - Create Your Session Abstract
Your paper is always awesome, no doubt on that. However it's always handy to know what is expected to maximize the success. Our Review Board will consist of highly experienced information security experts from all over the world. They just love geeky security and innovative technology. So, quickly write down your papers and send it to us.
Quick Tips On Content Selection -
Step 6 - You Did It, Sit back and Relax
Great, You're done! Our review board will review the content and get back to you via mail.
P.S. - We are unable to alot speaking slot to everyone right now. We hope it's possible in future. For now our review board selects the speakers as mentioned above.
Step 7 - Declined? Ask Why
Incase we could not accept your paper this year, we are very sorry for that. However, you must know 'Why?' . Please mail us at pritha.aash@cisoplatform.com to know what went wrong. There is no reason why you should be disheartened, it is the constraints of time that bind us. We might take sometime to revert back but we will definitely do.Start afresh, keep amendments in mind and submit your proposal the year after-because most speakers get accepted eventually and we'd hate to miss you.
Step 7 - Accepted? Know Our Speaker Benefits
CISO Platform is proud to have you with us. Your comfort is our sole responsibility , your contributions will be well rewarded.
For any queries mail to pritha.aash@cisoplatform.com
Keep The Last Date In Mind Or Mobile
Keep forgetting? Great, the good news is it's absolutely normal and the other is there's a Google Calendar/Mobile Reminders. We hate to give dates, it's just the billions of exciting paper need to be reviewed way before the event.
Please fill in your nominations prior to last date as post that no submissions will be accepted.
You can submit proposals by filling up the Call for Papers here:
Click to Submit Your Papers and Fill The Form
*We strongly suggest that you submit your papers early as the window will close early if sufficient quality papers have been received.
Important Links
For all Speakers, 2013 click here
For submitting your paper, 2014 click here
More about Call For Speaker, 2014 click here
More about Annual Summit, 2014 click here
Have you made your paper submissions? Tell us what you'd like to hear at CISO Platform Annual Summit, 2014 in the comments below or create your discussion.
Started by Priyanka Aash Mar 3. 0 Replies 1 Like
What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 1 Like
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service
You need to be a member of CISO Platform to join the discussion!
Join CISO Platform