Women in CyberSecurity (WiCyS) 2019 will be held March 28-30 in Pittsburgh, PA.

WiCyS 2019 Call for Participation is Now Closed

BUT THERE’S STILL TIME TO APPLY FOR THE RESEARCH POSTER COMPETITION!

applications for research poster competition: DEC. 1, 2018 - JAN. 1, 2019

Deadline for CFP Entries: November 1, 2018

Acceptance Notifications CFP sent: December 1, 2018

"WiCyS aims to impact cyber workforce diversity through inspiring, recruiting, advancing, educating, retaining and investing in women," says Dr. Ambareen Siraj, Founder of WiCyS, which became a non-profit membership organization in 2018. Find out more about the many benefits of membership here.

To receive notification of Conference news, updates and deadlines, please Subscribe Here.

New in 2019!

Four NEW concurrent tracks:
Current Technology and Challenges | Looking Ahead | Best Practices | Career Development
Expanded Schedule - March 28, 29 and 30
Increased Number of Hands-On Workshops

Program Focus

By popular demand, the 2019 WiCyS annual conference will have a new expanded schedule to allow for greater participation from the women in cybersecurity community. Instead of three concurrent sessions, we will now have four. Tracks Include:

Current Technology and challenges

  • Current issues and challenges, Advances in research and development (R&D), experimental findings

Looking Ahead

  • Important technology/ R&D trends, challenges on the horizon, upcoming solutions, tomorrow's vision

Best Practices

  • Institutional/ Operational/ Academic best practices, tools, techniques, approaches

Career Development

  • Leadership, advancement, transition

Formats and Sessions

Each of the four Tracks offers a wealth of options in terms of formats and type of session!

Presentation.png

 

Presentations

Technical presentations highlight innovations, research & development projects, internships/co-ops experiences, service-learning and outreach projects, or other interesting experience related to cybersecurity. This is an opportunity to share that experience with others and perhaps inspire them to pursue similar opportunities. Technical Presentations are 45 minutes long, including time for Q&A.

256workshop.png

 

Workshops

Workshops are free hands-on sessions (technical/professional development) on any topic related to cybersecurity. Hands-on workshops in any cybersecurity area are welcome. The audience is can be students, educators, professionals and researchers (in any combination or by category). Workshops are 2 hours long.

256BOF.png

 

Birds-of-a-Feather (BOAF) Sessions

Birds of a Feather are informal discussion sessions on just about any topic related to cybersecurity, that elicit participant discussions. Presenters lead the discussion from audeince. These sessions can be a great way to share ideas and be introduced to current issues or trends in this area. BoaF sessions are 45 minutes long.

256lightning.png

 

Lightning Talks

Lightning talks highlight fresh ideas, unique perspectives, valuable experiences, and emerging trends in cybersecurity. Lightning Talks are five-minute presentations (with or without formal presentations) that aim to jump-start discussions and collaborations while soliciting feedback from the community.

256Panel.png

 

Panels

Panels provide opportunities to discuss a current relevant topic in cybersecurity. Panel organizers are responsible for selecting appropriate panelists to participate. In addition to the moderator, there can be up to 4 panelists, and each panel is 45 minutes long. Submit all names and their affiliation info along with the abstract.

256Posters.png

 

Posters

Poster Proposals for Student Research Poster Submission Dec. 1, 2018-Jan. 1, 2019

Students, have you worked on an interesting research project related to cybersecurity at school? It’s easy to create a poster. Share your ideas and experiences with others. You may win a travel award to attend a security conference of your choice. Student posters will be judged in THREE categories: Community College, Undergraduate, Graduate. Winners in all categories will be awarded a student travel grant for a future security conference and Runners Up will be awarded a Tech Gadget. 

To submit your application, click here.

Submission Instructions

The deadline to submit applications to participate in the WiCyS 2019 Program was November 1. The information below is for reference only.

WiCyS welcomes submissions of all types and from a wide range of presenters! Due to Conference time constraints, we greatly regret that not all submissions make it into the final program - however, please note: the WiCyS organization is collecting bios and photos of qualified member presenters for the new WiCyS Speakers Bureau, so watch for announcements!

All submissions are reviewed by the WiCyS 2019 Program Committee.

  1. FIRST, create or log in to an existing Easy Chair account - all submissions must be provided through Easy Chair.

  2. Submit a one-page Abstract with a few paragraphs explaining your ideas for participation in the Conference. You may submit multiple proposals in different categories and tracks.

  3. Identify the Type of activity or session in which you are applying to participate (i.e., Lightning Talk, Technical Presentation, Birds of a Feather, Workshop or Panel). See Session Formats for more detail.

  4. Identify the Topic Category (i.e., Today’s Technology, Looking ahead, Best practices, Career development). See Program Focus for more detail.

  5. Submissions can be related to career, graduate school, research, or education in the field of cybersecurity. WiCyS encourages you to consider the many issues, challenges and learnings that the community of cybersecurity students, industry professionals, academics and researchers experience every day. Students will want to hear about how others in the field have succeeded, what paths their careers have taken, and technological advancements and security issues. Students also love to receive in-depth technical training in the workshops. Career professionals with some years of experience are not only seeking guidance about issues of diversity, but also training and understanding about global cybersecurity trends as well as technical training. And everyone enjoys sharing ideas and knowledge in an interactive format.

  6. Accepted submissions must be presented by at least one of the submission authors.

  7. Check out examples of past accepted submissions at www.wicys.net/archive to see the programs from the last five years.

WHAT HAPPENS NEXT:

  1. Submissions are peer reviewed.

  2. All accepted proposals are notified by December 1, 2018.

  3. Accepted proposals receive ONE complimentary registration per submission, along with free lodging for two nights at the Conference Hotel (the Wyndham Grand in Pittsburgh, PA).

  4. Abstracts will be published in the Conference Program.

Send any questions to info@wicys.org