Call for Papers & Proposals
Submission Deadline: 9 April 2024

Conference, exhibition and networking on the security trends of today, tomorrow and beyond tomorrow

Since 2011, the ISDs has been one of the most important national meet-ups for IT security experts, security managers and user companies. The topics are always oriented to the current needs and challenges of companies for whom digital security is essential, and closely integrate the lessons and developments of the IT security industry.

Up until 9 April 2024, interested applicants can submit a paper on one of the focus topics via the open Call for Papers. We are looking for papers that present a current project, that showcase an incident and its prevention or lessons learned, or that demonstrate how IT security can be improved or made more efficient.

All submissions will be assessed and ranked by our programme team. We intend to inform all applicants by the end of May 2024 as to whether their application was successful and whether their presentation will be included in the ISDs 2024 programme.

In addition to the Call for Papers, in 2024 we are also actively issuing a Call for Proposals. In order to get even closer to the real world of users, we offer you the opportunity to submit topic requests in line with our four focal points. You can also use our form for this purpose until 9 April 2024.

Key Facts

  • Presentations should have a duration of approximately 30 minutes
  • Languages: German or English
  • Product, advertising and marketing will NOT be accepted
  • We are looking for reports on experiences and solutions to concrete problems from a technical, legal or organisational point of view
  • Strategies, advantages and findings from concrete projects should also be highlighted
  • For the audience, there should be a clear gain in knowledge and concrete possibilities for implementation in their own company
  • The deadline for applications is 9 April 2024

The 2024 Focal Topics

Cybercrime and cyber resilience

With ever-increasing digitalisation, the question is no longer just how to ward off attacks on your own company, but how to develop a cyber resilience strategy. Attackers are becoming more and more professional, and the idea of never falling victim to an attack with good protective measures is becoming increasingly utopian. What is much more important instead is to set up your own infrastructure and processes in such a way that attacks which hit the company are quickly detected and cause as little damage as possible to ongoing operations. To achieve this, it is needed to understand what types of attacks are currently occurring (ransomware, phishing, etc.) and which concepts can be used to achieve cyber resilience.

Gamechanger AI

With the current developments in algorithms and available hardware, artificial intelligence can be seen as one of the megatrends of 2024. It can also prove to be a game changer for cybersecurity. Attackers are using it to improve and automate their attacks more and more, but AI can also assist in defence. At the same time, AI itself can also become the target of attacks. AI can detect spam emails in the mailbox or unusual behaviour and data flows within IT more quickly and efficiently - and thus warn security officers of attacks at an early stage. This enables companies to initiate countermeasures at a quicker level. Artificial intelligence also relieves IT teams of routine tasks, which are under great strain due to a shortage of staff and specialists.

Security everywhere

From cars all the way to toothbrushes - more and more objects are connected to the Internet and to other devices. Packed with sensors and wireless interfaces, data security and the protection of user data often fall by the wayside. Automated attacks on IoT devices have now outnumbered attacks on traditional IT and often provide the point of entry into protected networks. Proven and new security concepts can be used to securely leverage the possibilities of networking.

Secure digital infrastructures & secure basic services

Secure digital infrastructures and secure basic services form the foundation for secure digital applications and digital transformation. Historically evolved infrastructures must be securely positioned for new applications and against modern attacks. It is not only the technical implementation that plays a role here, but also the legal framework and acceptance by users and the market.

Submission

    Call for Papers: Submission of a paperCall for Proposals: Submission of a desired topic

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

    Yes, I accept the privacy policy
    We process your personal data provided in this form exclusively for the purpose of responding to and processing your application. For further information, please see our privacy policy..

     

     

    captcha