New York Conferences 2023 - International Conference on Cyber Security
September 1-3, 2023
New York City

Submission Guidelines

We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Formatting Guidelines

Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
Topics of interest for submission include but are not limited to:

Security And Risk Management

The confidentiality, integrity, and availability of information; Security governance principles Compliance requirements Difficulties with information security law and regulation IT policies and procedures Risk-based management concepts

Asset Security

Managing requirements Data security restrictions Safeguarding privacy Asset's retention Categorization and possession of data

Security Architecture And Engineering

Engineering processes using secure design principles Fundamental concepts of security models Security capabilities of information systems Assessing and mitigating vulnerabilities in systems Cryptography Designing and implementing physical security

Communications And Network Security

Protecting network parts Protecting communication channels The use of layout values in network design and their protection

Identity and Access Management

Physical and logical access to assets Identification and authentication integrating third-party identification services with identity as a service Authorization mechanisms The identity and access provisioning lifecycle

Security Assessment and Testing

Vulnerability assessment and penetration testing Disaster recovery Business continuity plans Awareness training for clients

Security Operations

Understanding and supporting investigations Requirements for investigation types Logging and monitoring activities Securing the provision of resources Foundational security operations concepts Applying resource protection techniques Incident management Disaster recovery Managing physical security Business continuity

Software Development Security

Examining hazard evaluation Detecting weaknesses in source codes