March 2016Volume 14 Issue 3
Crypto Wars IIFragmentation in Mobile Devices
Mobile Application SecurityMobile App Testing for the Enterprise
Crypto Wars II
MOBILE APPS
October 2015Volume 13 Issue 10
Planning for a Career in the Department of Defense Cybersecurity Workforce
Information Security Career PathHow I Got Here: My Unexpected Infosec Career Path;
A Transition into Tech; Outside Looking In
Improving Cybersecurity
Workforce Capacity and Capability
Addressing the Education-to-Workforce Disparity
INFOSEC CAREER PATH
May 2016Volume 14 Issue 5
Do Data Breaches Matter? A Review of Breach Data and What to Do NextFedRAMP’s Database Scanning Requirement:
The Letter and SpiritSmart Practices in Managing an Identity Auditing Project
On the Costs of Bitcoin Connectivity
★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★
Do Data Breaches Matter?A Review of Breach Data and What to Do Next
BREACH REPORTS:COMPARE/CONTRAST
November 2015Volume 13 Issue 11
2015 International Conference ReportHelp Your Users Protect against Family Member Fraud
Do This, Not That: Career Advice from Top Infosec Professional Leaders
Social Media and Security
Some Comments on Next Generation
Mass SurveillanceArchitecture
SOCIAL MEDIA & SECURITY
June 2016Volume 14 Issue 6
Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting
Information Security ConcernsAddressing Data Privacy Regulation &
Standards: A ProcessBlockchain: Legal Industry
★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★
Preparing for New Electronic Communication
Privacy Laws
LEGAL, PRIVACY, REGULATION
January 2016Volume 14 Issue 1
Promoting Public Cloud Workload Security: Legal and Technical Aspects
Gaining Confidence in the CloudWhy Risk Management Is Hard
Securing the Cloud
SECURING THE CLOUD
Promoting Public Cloud Workload Security: Legal and Technical Aspects
July 2016Volume 14 Issue 7
Social Media Impact: Is It Possible to Be Social and Secure?
User-Managed Access: Do We Need Yet Another Standard?
Social Media: The Danger ZoneStop Delivery of Phishing Emails
Impact of Social Media on Cybersecurity Employment
And How to Use It to Improve Your Career
September 2015Volume 13 Issue 9
Comprehensive National Cybersecurity InitiativeIdentity and Access Management:
A Shield against Malicious Insiders and Advanced Persistent Threats
Analyzing Temporal Patterns in Network Traffic: Models and Metrics for Situational Awareness and Security
Information Assurance Adapting to New Metaphors
ACADEMIA AND RESEARCH
August 2016Volume 14 Issue 8
Internet of Things: Trust Internet of Things: Security, Privacy and Governance
Internet of Things: Arduino Vulnerability AnalysisInternet of Things: Key Challenges to Overcome
Cloud Dilemma?
INTERNET OF THINGS
Machine Learning: A Primer for Security
February 2016Volume 14 Issue 2
Using Data Breach Reports to Assess Risk Analysis Quality
Security’s Seat at the Big Data TableWhy Information Security Teams FailSecuring Data to Prevent Data Theft
ProtectingYour Data
against Cyber Attacks in
Big DataEnvironments
BIG DATA / DATA MINING & ANALYTICS
ISSA Journal
Scholastic Writing Awardfor Best Student Article
– 2016 –
Join the Information Security
Conversation
The Information Systems Security Association, Inc. (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. With active participation from individuals and chapters all over the world, the ISSA is the largest international, not-for-profit association specifically for security professionals. Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial, and government.
The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved.
ISSA Journal Scholastic Writing Award for Best Student ArticleThe ISSA Journal Editorial Advisory Board is inaugurating an annual $1,000 ISSA Journal Scholastic Writing Award for the best article submitted by a current college/university student.
The submission period is now open and the Board will accept articles until October 1, 2016. We encourage students to follow the published editorial calendar but will consider any submission that is focused on information security.
The Board will select the best article that meets our professional standards for publication and will feature it in the December 2016 issue of the ISSA Journal. Recipient must be attending an accredited college or university full time and actively pursuing a degree. Submit your article and proof of enrollment to [email protected] by October 1, 2016.
Please review our editorial guidelines and editorial calendar. For more information: ISSA.org => Learn => Journal.
Questions can be directed to to Joel Weise, ISSA Journal Award Committee, at [email protected].
DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLOBALLY
THE MONTHLY PUBLICATION OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION
2016 Editorial CalendarJanuary
Securing the Cloud
FebruaryBig Data / Data mining & Analytics
MarchMobile Apps
AprilMalware Threat Evolution
MayBreach Reports – Compare/Contrast
JuneLegal, Privacy, Regulation
JulySocial Media Impact
August Internet of Things
SeptemberPayment Security
OctoberCybersecurity Careers & Guidance
NovemberPractical Application and Use of
Cryptography
DececemberSecurity Architecture
THE MONTHLY PUBLICATION OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION
ISSA Journal Scholastic Writing Award for Best Student Article
Application
Please submit this application with your article to [email protected]
APPLICANT
Name [first and last]: _____________________________________________________________
Contact email: __________________________________________________________________
Program of study: ______________________________________________________________
ISSA member? Chapter? __________________________________________________________Membership is not required to submit an article.
EDUCATIONAL INSTITUTION
Name: ________________________________________________________________________
Address: ___________________________________________ State _____ Zip __________
Phone number for Registrar: ______________________________________________________
Accredited? If yes, by which organization? ___________________________________________
Signature: ____________________________________________ Date: ________________
The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and trends in the industry. Articles are peer-reviewed, based on the following criteria: •Relevant – suitable for a security practitioner, our chief audience (does include C-level) •Timely – in sync with current trends, technologies, and industry issues•Useful – leans toward practical insights rather than general perspectives •Credible – carefully cites sources, knowledgeable of industry thinkers, demonstrates scholarly awareness• Innovative – covers subject matter that piques the curiosity of our readers
Please adhere to the following guidelines:
1. The ISSA Journal will not accept articles promoting one company, business, or piece of software. They must be vendor-neutral – describing technologies and trends – not selling a product.
2. All articles must be the original work of the author, and cannot have appeared in other publications. You will be asked to sign an affidavit to that effect.
3. Major articles run between 1,800 and 3,000+ words, unless otherwise specified by the editor. 4. Where appropriate, articles should be written for an international audience. 5. Articles will be peer-reviewed by a panel of experts in the security field to insure the quality, accuracy,
and relevance of the work.6. All accepted manuscripts are edited for adherence to Journal format and style, clarity, succinctness,
syntax, and punctuation. Please write clearly and concisely (see Style Guide).7. Authors are encouraged to supply relevant artwork (charts, diagrams, and maps) that help to clarify
points in the article. Please include the artwork as separate .tif, .jpg or .eps files (300 dpi @ 100% or greater resolution).
8. The ISSA Journal requires proper references so readers can locate the key information sources used when writing the article. Cite foundational books, articles, or URLs of publicly accessible information sources used and footnote in text or include at the end of the document (see Style Guide).
9. It is the ISSA Journal’s policy to include the author’s email address so that readers may contact him or her directly with questions or comments. If this is a problem, please contact the editor.
10. Please include a short biography at the end of your article – just a couple of lines saying who you are and what you do is fine. See past issues for examples.
11. Please send articles via attached files to [email protected]. DOC or RTF is best. Please do not send article as PDF. Include Submission Checklist with your article.
12. All articles become the property of the ISSA Journal for a period of 12 months, after which copyright reverts to the author. Author will be required to sign copyright release.
Please follow Style Guide on page 2.Thank you for your submission and your support of the ISSA Journal!
The Information Systems Security Association, Inc. is an international organization that acts as the “Global Voice of Information Security.” The ISSA Journal is published to support ISSA’s
mission of promoting management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
The ISSA Journal Submission Guidelines
[email protected] • www.issa.org
ISSA Journal Style GuideThe ISSA Journal ascribes to The Chicago Manual of Style for standard American English usage, mechanics, grammar, and publishing conventions.
Citations:Footnotes:
1. Branden R. Williams, “Data Flow Made Easy,” ISSA Journal (March 2008).2. Albert J. Marcella, Jr. and Doug Menedez, Cyber Forensics: A Field Manual for Collecting, Examining
and Preserving Evidence of Computer Crimes (New York: Auerbach Publications, 2008), www.taylorandfrancisgroup.com.
References at end (alphabetical):
— Marcella, A. J. and Menedez, D. 2008. Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes. New York: Auerbach Publications, www.taylorandfrancisgroup.com.
— Williams, B. R., March 2008. Data Flow Made Easy. ISSA Journal.
MechanicsAmerican English spelling and punctuation:
Organization not organisation; authorization not authorisation
Double quotes: found at the “bottom of the well.”
Commas and periods inside quote marks: evil doers, “bad actors,” and bad guys
Semi-colons and exclamation marks outside quote marks: evil doers and “bad guys”; “halt”!
Serial comma: this, that, and the other (before the and)
No contractions: do not use don’t; I’ll => I will; exception “Let’s”
GrammarPronoun agreement will be enforced:
A user and his; a user and her; a user and his or her; but not a user and their
Correct: Users find their computers the most vulnerable.
The ISSA Journal welcomes your submissions. Please ensure your article adheres to the following criteria by checking the boxes and
include with your submission:
Content:
n Short, concise abstract (approx. 100 words)n Suitable for a security practitioner n In sync with current trends, technologies, and industry issuesn Leans toward practical insights rather than general perspectives n Cites sources, knowledgeable of industry thinkers, scholarly awareness n References n Footnotesn Covers subject matter that piques the curiosity of our security professionalsn Vendor-neutral, does not promote one company, business, or piece of software n Must not be marketing materialsn Word count between 1,800 and 3,000+ words unless specified by editorn Relevant illustrations, images, charts, diagrams
Adherence to ISSA Journal format and style:
n Standard American English spellings and usagen Standard American English mechanics and punctuation
Author info:
n Short bio (40 words or less)n Photo (2"x3" 300 dpi min.)n Contact email
n Signed copyright release form
The ISSA Journal Submission Checklist