The Rocky Mountain Information Security Conference Organizing Committee is proud to announce the Call for Presentations for the Rocky Mountain Information Security Virtual Conference on Wednesday and Thursday, June 9th and 10th, co-hosted by the ISSA Denver and ISACA Denver Chapters.
If your presentation is selected for inclusion in the conference, you will be informed in late-February/early March. Those selected to present will receive a complimentary registration for the virtual conference.
We will have LIVE, Simu-live with Live Q&A, and Recorded sessions. Presenters must be open to all options. Presentations must be able to be used for on-demand after the live conference dates. Live presentation and Q&A will be using our virtual conference platform for ease and consistency.
Vendor-specific only presentations and sales pitches will not be considered for this call for presentations. Please contact Stacey Pina at (303) 325-3531 or firstname.lastname@example.org regarding vendor presentation slots. Deviations from this theme will not be tolerated. Under no circumstances will a presentation geared towards a single commercial product be accepted.
Visit our website for more information: www.rmisc.org
Guidelines for submission:
RMISC is looking for presentations covering a variety of current and future Information Technology Security, IT Auditing, IT Governance, Risk and Compliance, Management and Legal Issues and Emerging Trends topics.
Presentations should be geared toward one of the following tracks: AppSec, Architecture / How To, Audit, Risk & Compliance, Emerging Trends, Privacy, Security Management, Soft Skills, Threat Intel, Vendor Track
Presentations should be in-depth and focused on a specific issue or technology. Please try to stay away from overviews or summaries. Sessions will be 45 in total length, including Q&A.
Hands-on demos and case studies with actionable outcomes are encouraged. Participants want to take-away skills and information that they can use.
Presentation lengths will be in 45-minute blocks plus 15 minutes for Q&A. If warranted, a presentation may be given two 60-minute (including Q&A) blocks. Please plan the content of your presentations accordingly.
For a partial list of security and auditing subjects, click here; however, do not feel obligated to choose a topic from this list in which to categorize your paper.
All session speakers will receive a complimentary full conference registration
If you haven't logged in before, you'll be able to register.
Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.