Deadline for Presentation Proposals: 9 June
Borderless Cyber has been an important forum for security in which practitioners and researchers get together to discuss and share insights about grand challenges, projects and lessons learnt in cybersecurity. This year, we are broadening the conversation to include security, privacy and work that intersects the two topics.
Security remains a fundamental challenge in society and this venue continues to be a key forum for discussing and learning from each other on cybersecurity matters. Security is not privacy, but security is an important aspect of privacy. For too long, these two communities have often been separated. We invite industry, government, and academics alike to join this conversation. If you have ideas, research and experiences that you believe would add to the conversation, we want to hear it and we hope you will consider submitting a proposal. We seek abstracts for presentation proposals (up to 500 words) that present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of security and/or privacy. Your presentation can be on security or privacy only, or a topic that explores both.
There is no charge for selected speakers to attend the conference. Please refer to the Conference Terms and Conditions for more speaker related information, including granting OASIS a royalty-free license to use, reproduce, and distribute any recording and materials associated with your Borderless Cyber presentation.
Topics of Interest
The Programme Committee is particularly interested in submissions addressing the following topics, but not limited to:
Building and deploying security and/or privacy enabling technologies. This could include proof of concepts or production environment tools for: anonymous communication, autonomous vehicles, advanced intrusion detection systems, cyber deception, supply chain, mission assurance, blockchain, cloud, IoT, etc.
Lessons learnt from small, mid and large scale R&D projects or efforts in security and privacy topics.
Use cases for new, emerging or unexplored challenges in security or privacy. This could include specialist security and privacy research with new insights into topics such as: threat detection, cyber deception, security visualisation, penetration testing, access control, authentication, data analytics, differential privacy, post-quantum, disinformation, synthetic media (such as neural rendering), generative AI, personal data analysis, drones, computer vision, game-theory approaches, privacy, forensics, medical privacy, etc.
Standards and Interoperability in security and privacy. This could include how tested open standards fit within the current landscape, newly released or future standards and gaps in the interoperability that need to be filled.
Interdisciplinary research/projects/guidelines (e.g. economics, law, ethics, psychology, etc.).
Measurement and benchmarking of real-world security and privacy systems. How do we determine whether security and privacy performs according to our requirements?
Operationalising security and privacy. Making sure that human considerations such as regulation and policy gel well with technical implementations remains a challenge. How do we know that deploying our systems will work in practice?
Automation in security and privacy. This could include a review of successful infrastructure and security tools that enable quick, automated, and synchronised responses without human intervention, the importance of sharing information and coordinating responses, and the role of global collaboration.
Responsible innovation and ethics in security and privacy. We encourage talks that examine or present novel or insightful viewpoints on ethical considerations.
Miscellaneous topics on security or privacy. Have we missed anything? Let us know and convince us.
The lists of topics are not exhaustive, but illustrative. Stories of how your organisation integrated privacy and security to tangibly improve your security, stories of failed efforts and lessons learnt, ideas for fresh approaches, new research findings, as well as analyses of policy trends are all welcome.
Presentation Types
Single presentations will be 25-45 minutes long (including time for Q&A).
Accepted presentations may run concurrently with others.
Panels are 45-90-minute discussions with a moderator and a team of panelists (no more than four panelists).
The panel moderator should submit the proposal along with the list of proposed panelists.
Accepted panel discussions may also run concurrently with other panels.
Required information
● Proposal title and abstract (up to 400-500 words) along with presentation outline
● At least two audience take-aways
● Speaker(s) contact details and bio (up to 200 words)
● Desired presentation type
The Program Committee will review all proposals and reserves the right to adapt or restructure submissions to ensure an interesting and compelling program. Marketing presentations will not be considered.
Key dates
● Proposals due by: 9 June
● Notifications will be sent by: 7 July
● Accepted presentations draft slide deck, demonstration, and/or other presentation materials by: 1 August
● Conference Dates: 11-12 September