Call for Speakers

  • Become a Speaker

    If you are an information security practitioner or thought leader, Infosecurity and ISACA invite you to submit your proposal to facilitate a session at the forward-looking inaugural edition of Infosecurity ISACA North America 2019.

    Closed Now

  • Key Dates

    Submissions open: Tuesday January 22, 2019

    Submissions close: Tuesday March 19 (Extended! Closing Monday March 25) NOW CLOSED

    Submissions reviewed: March & April 2019

    Successful submitter notified: April 2019

  • Why Speak

    Be seen as a leader within the information security community, raise your profile and advance your career by sharing your knowledge and expertise. We are accepting presentations at five different levels, from beginner to advanced managerial.

    Speakers who are selected to present at the conference will receive the following benefits:

    • Complimentary registration* for the conference – up to a $1,550 value! This includes the opportunity to earn up to 16.5 CPE hours for conference participation (complimentary registration is given to 1 speaker per session only)
    • Additional CPE hours for the session they present (CPE hours for speakers are earned at five times the presentation time for the first presentation of the topic or an extensively modified topic)
    • *Complimentary registration is not transferable or able to be used as a credit. Registration for the pre- and post-workshops are not included with complimentary conference registration.
    • Any speaker who receives an average score of 4.75 or higher on the session surveys will also receive special formal recognition from ISACA HQ and will be named as a Top-Rated Speaker on the ISACA conference web page at the conclusion of the conference.
  • Phase 1: Speaker Proposals

    Submit an abstract of your presentation topic clearly stating your methodology for audience engagement and identifying learning objectives and learning level. Please see the description of learning levels and proposal process.

    Phase 2: Notifications

    You will receive a notification whether your proposal has been accepted. If your proposal is not accepted, the basis may be that a large number of proposals were received in the same topic area or proposed learning level.

    Phase 3: Presentations

    Along with your acceptance notification, you will receive instructions for drafting your presentation. Once submitted, your presentation will be reviewed to ensure that the offering is at the appropriate learning level and that it fosters audience interaction.

  • FAQ's

    How long should my presentation be?

    In addition to a 25-minute or 50-minute session, an option for a Master’s Series is possible. Master’s Series sessions are offered for an extended length of time (at least two hours). This allows in-depth coverage of a topic and more time for discussion.

    What formats are available?

    • Break-out session
    • Panel
    • Geek Street: 45 minutes long sessions (enable a deep-dive into new technical research/topic)
    • Hands-on lab

    What conference tracks are available?

    • Track 1: Emerging security tools & techniques
    • Track 2: Cyber threat intelligence & technologies
    • Track 3: Cybersecurity leadership & development
    • Track 4: Security risk & compliance
    • Track 5: Data analytics enhancing cybersecurity Exhibition Hall Geek Street

    What should I do if my proposed topic is not listed as one of the conference tracks?

    If your proposal aligns with one of the tracks, but is not specifically listed, simply submit it under the most appropriate track. Do you have an idea for a track that is not listed that should be offered at this conference? We want to know! Submit your new track idea under the “New Ideas” category and tell us why you think it should be included

    How can I make my presentation stand out?

    Engage your audience through hands-on learning, tailor your presentation to them and align the learning objectives with the abstract. Also, attendees have made it clear that having session presentations available prior to the event is a significant benefit and helps them get the most out of each session.

    Will you review presentations beforehand?

    Yes, once submitted we will review your presentation and if there are questions or concerns regarding the content, we will collaborate with you.

    How do you calculate Top-Rated Speakers?

    This score will be calculated from the average score of the questions on the session survey that are specifically related to the speaker and the presentation. At least 20 attendees must respond to the session’s survey in order to qualify. Further, the top 5 rated speakers of the conference may be invited back to present at a future ISACA conference.

  • Become a Speaker

    Be a part of this exciting collaboration of two global information security leaders.

    Closed now

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.