Securing the Artificial Intelligence (AI)
Mini Track Chair: Arun Mamgai, University of South Carolina, USA
Generative AI (Artificial Intelligence) has turned out to be a game changer after the introduction of ChatGPT, DALL-E, Bard, Gemini, GitHub Copilot in 2022 and 2023. Majority of organisations are trying to figure out their AI strategy, but the security of data, pipeline, LLMs is extremely critical. It's important that effective risk management strategies are evolved along with AI based solutions. Operational, infrastructure, and developmental security controls are required to ensure AI systems are operated in a secure manner.
Topics of interest include, but are not limited to:
- Strong Security control for data training and application
- Data Supply Chain
- AI Transparency
- Ethical AI
- Zero Trust Access
- Cloud & Data Security
Security and Privacy of Mobile and Smartphone Platforms
Mini Track Chair: Prof Nolu Mpekoa, University of Johannesburg, South Africa
Our daily lives are significantly impacted by mobile devices. These devices are utilised for a wide range of purposes in the military, government, education, and entertainment sectors. Due to the ease of use, individuals keep sensitive data and carry out sensitive operations making it a prime target for an attacker.
Because mobile devices are always powered on, they are the front lines of most phishing attacks. Smartphone applications can pose significant security and privacy risks because of how they collect and share data. Therefore, this track will look at work done around cybersecurity measures designed to protect sensitive information stored on and transmitted by laptops, smartphones, tablets, wearables, and other portable devices. Topics of interest include, but are not limited to:
- Models of Privacy and Security Issues on Mobile Applications
- An effective approach to mobile device management
- Privacy and security of data on mobile devices
- A Survey on Security for Mobile Devices
- An Analysis of Smartphone Security Practices among
Navigating the Nexus: Managing Governance, Risk, Compliance, and Policy in Modern Work Environments
Mini Track Chair: Dr Joe Adams, Cyber By Design & Dr Aunshul Rege,Temple University, USA
As organizations increasingly embrace remote work, cloud computing, and bring-your-own-device (BYOD) networks, ensuring robust security compliance becomes paramount. This conference track explores strategies for establishing and maintaining governance, risk, compliance, and policy (GRCP) amidst these evolving paradigms and increasing regulatory requirements. Emphasizing the growing attention towards security frameworks and compliance, now enforced contractually across industries, presentations delve into the complexities of creating and enforcing policies that transcend organizational boundaries, necessitating extensive coordination between business units that do not usually concern themselves with security.
We invite submissions of papers detailing experiences in organizational management and dynamics that facilitated the achievement and sustainability of security compliance. Topics may include successful implementation of GRCP in remote work settings, effective utilization of cloud computing while maintaining GRCP, strategies for securing BYOD networks, comparative GRCP frameworks and models across organizations and countries, and evaluation and assessments of GRCP implementations.
Through sharing real-world experiences and best practices, this track aims to provide valuable insights into navigating the intricate landscape of modern work environments. By fostering discussion and collaboration, attendees will gain actionable strategies to enhance their organization's security posture in an era defined by remote connectivity and digital transformation.
Join us in exploring the nexus between technology, policy, and organizational dynamics to safeguard against evolving cybersecurity threats and ensure sustained security compliance.
- Implementing an organizational risk management program
- Creating a sustainable vulnerability management program in a constantly connected world
- Managing service providers and cloud services
- Managing organizational logging and auditing - how much is enough and how long to keep it?
- Do It Yourself Governance, Risk, Compliance, and Policy - tracking compliance without breaking the budget
Interdisciplinary Research in Cybersecurity
Mini Track Chair: Dr. Char Sample, Marshall University, USA
The dynamic and interconnected nature of cyber security touches and influences many aspects of life. This inter-relatedness suggests that other disciplines might influence, or even possibly impact, cyber events. For example, geo-political events, environmental events, culture, psychology or economic disciplines may offer new ideas on how cyber events are viewed and understood. These disciplines also, provide models and frameworks that, when applied to cybersecurity may possibly provide new solutions to long standing challenges. This track is dedicated to crossing the traditional disciplines of academia and examining cyber events within the context of another academic discipline.
Topics of interest include, but are not limited to:
- Decision science and cybersecurity
- Data science in cybersecurity
- Natural disasters and cyber events
- Conflict and cyber events
- Environmental resources and cyber events
- Financial events and cyber events
- Cyber-Physical systems security
- Complexity modeling in cybersecurity