Aligned with
This conference contributes to global sustainability by aligning its research discussions and academic sessions with key United Nations Sustainable Development Goals. It fosters knowledge exchange, innovation, and collaborative engagement.
This track focuses on the latest developments in cybersecurity tools designed to enhance threat detection and response capabilities. Researchers are invited to present innovative solutions that address contemporary challenges in the cybersecurity landscape.
This session explores the integration of artificial intelligence in cybersecurity practices, emphasizing machine learning algorithms for threat detection and response. Contributions should highlight the effectiveness and challenges of AI applications in securing IT systems.
This track aims to discuss methodologies and frameworks for secure software development, focusing on risk management and compliance. Papers should address best practices for integrating security throughout the software development lifecycle.
This session examines the unique security challenges posed by cloud computing environments and strategies for data protection. Researchers are encouraged to present findings on encryption techniques, access controls, and compliance frameworks in cloud security.
This track invites discussions on methodologies for vulnerability assessment and management in IT systems. Contributions should explore tools and techniques for identifying, prioritizing, and mitigating vulnerabilities effectively.
This session focuses on the development and implementation of incident response strategies in the face of cybersecurity threats. Papers should provide insights into best practices, case studies, and frameworks for effective incident management.
This track addresses the role of governance and policy in shaping cybersecurity practices within organizations. Researchers are invited to explore frameworks that promote compliance and enhance security posture.
This session highlights the role of automation in enhancing cybersecurity operations and incident response. Contributions should discuss tools and techniques that facilitate automated threat detection and remediation.
This track focuses on the design and architecture of secure IT systems that can withstand cyber threats. Papers should address architectural principles, security controls, and best practices for building resilient systems.
This session explores frameworks and methodologies for effective risk management in cybersecurity. Researchers are encouraged to present approaches that help organizations identify, assess, and mitigate cybersecurity risks.
This track examines emerging cybersecurity threats and the corresponding defense mechanisms that can be employed. Contributions should provide insights into new attack vectors and innovative strategies for safeguarding IT systems.
Due to heightened regional tensions and travel risks, the conference may be conducted in virtual-only mode. Updates regarding participation format will be communicated in advance.