Prospective authors are encouraged to submit original contributions from a broad range of relevant topics, which include but are not limited to the following:
Track |
Sample Topics |
Cybersecurity – General |
- Information security
- Cyber technologies
- Cryptography
- Blockchain
- Machine learning and AI in cybersecurity
- Cybersecurity trends
- Data mining and analytics for cybersecurity
- Cloud computing and security
- Malware analysis and detection
- Case studies in cybersecurity
- Identity management and access control
- Emerging trends in cybersecurity
|
Building and Managing Cyber Resilience |
- Cyber resilience
- Cyber threat intelligence
- Threat hunting
- Digital forensics
- Incident detection and response
- Cybersecurity standards and guidelines
- Cyber operations and SOC
- DevSecOps
- Risk management
- Trusted systems
- Data provenance
- Management and governance
- Response and recovery
- Fault tolerance
- Gamification in cybersecurity
|
Human & Legal Aspects |
- Management and human resources
- Security and privacy requirements analysis
- Security administration
- Information security culture
- Security and privacy policy compliance
- Risk and threat perception and assessment
- Security and privacy attitudes and behaviour
- Insider threats
- Motives for misuse
- Electronic espionage and surveillance
- Data protection and law
- Security and privacy protection metrics
- Social engineering and other human-related risks
- Psychology of cybersecurity
- Organisational politics and cybersecurity
- CISO challenges & governance
- Cyber forensics & cybercrime
- Cyber welfare and security
- Human centric cybersecurity / usable security
- Biometrics and cybersecurity
- Societal impacts and ethics
- Interplay of technical and socio-technical issues in cybersecurity
- Cybersecurity in the information systems development process
|
Cybersecurity Education and Research |
- Effectiveness of SETA programmes
- Public awareness and understanding
- Internet safety and hygiene
- Cybersecurity and diversity
- Innovative approaches to cybersecurity education
- Cybersecurity curriculum design
- Cybersecurity competitions e.g. hackathons
- Emerging needs for cybersecurity curriculum
- Teaching cases
- Methodological issues and challenges in cybersecurity / cybercrime research
- Ethical issues and challenges in cybersecurity / cybercrime research
|
Infrastructure |
- Cyber infrastructure
- Cyber systems
- Industrial control system (ICS) security
- Internet of Things (IoT), Industrial Internet of Things (IIoT) and Cyber Physical Systems (CPS) security
- Smart cities
- eHealth systems
- Communication and security networks
- Network security
- Supply chain cybersecurity research
- Systems engineering for cybersecurity
- Security-as-a-Service
|