Member Presentations: A Member Presentation is a proposal of either a panel or standalone presentation, or workshop proposal, of FS-ISAC members and/or FS-ISAC
staff. Panels are limited to three (3) participants and one (1) moderator. There is no cost to FS-ISAC members for speaking sessions. FS-ISAC does not reimburse any travel expenses or pay
speaker fees. Questions regarding content should be sent to the FS-ISAC Content Committee at firstname.lastname@example.org.
Please note: Member submissions that include a sponsor will be
considered sponsored sessions. Sponsored sessions are required to fill out the Solution Providers CFP.
Submissions are evaluated by the Content Committee, which comprises FS-ISAC members and staff.
Submissions are evaluated by the Content Committee, consisting of FS-ISAC staff and member subject matter experts.
Tips for Selection:
Selection and Timeliness of the Topic
Is this topic important to Summit attendees? Are member firms struggling to get their arms around it? The Committee assesses both the technical merits and potential interest of
the presentation proposal.
Educational Value of the Topic
Attendees appreciate hearing real implementation stories - both domestically and internationally. Members like to leave the Summit equipped with alternative approaches
and “lessons learned”, something to take back to the office.
Develop a Unique Approach to the Topic
Recognize that your professional peers may be submitting their proposals on a similar topic. Do you have a fresh approach to drive interest this year?
Showcase the Scope of Expertise of any Co-Speakers, Moderators or Panelists
You should be very well-versed on the topic and equally skilled at presenting. The Committee will be looking for evidence that the speaker is an expert. Are you
considered an expert on this topic by your professional peers?
We will discard:
Incomplete or poorly written/underdeveloped submissions
Submissions from/including Solution Providers
Suggested Presentation Topics Include:
Distributed Ledger, for tracking
Digital identities and behavioral biometrics
Digital and cryptocurrencies for cross-border/international payments
Emerging job titles and jobs: Expanding how we define cybersecurity
Threats and Attacks
Advanced cybercrime and nation-state attacks
Under-identified or unidentified assets
Mobile/BYOD and cross-channel attacks
BEC: How to protect customers
IoT: When everything is connected, nothing is protected
Orchestration and automation
Improving technology and security
Security as a business function
Intersection for fraud and security
Governance & Risk Management
Regulatory changes and cross-border (state to state and international) harmonization