join the information security conversation · the issa journal welcomes submissions by information...

6
March 2016 Volume 14 Issue 3 Crypto Wars II Fragmentation in Mobile Devices Mobile Application Security Mobile App Testing for the Enterprise Crypto Wars II MOBILE APPS October 2015 Volume 13 Issue 10 Planning for a Career in the Department of Defense Cybersecurity Workforce Information Security Career Path How I Got Here: My Unexpected Infosec Career Path; A Transition into Tech; Outside Looking In Improving Cybersecurity Workforce Capacity and Capability Addressing the Education-to-Workforce Disparity INFOSEC CAREER PATH May 2016 Volume 14 Issue 5 Do Data Breaches Matter? A Review of Breach Data and What to Do Next FedRAMP’s Database Scanning Requirement: The Letter and Spirit Smart Practices in Managing an Identity Auditing Project On the Costs of Bitcoin Connectivity ★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★ Do Data Breaches Matter? A Review of Breach Data and What to Do Next BREACH REPORTS: COMPARE/CONTRAST November 2015 Volume 13 Issue 11 2015 International Conference Report Help Your Users Protect against Family Member Fraud Do This, Not That: Career Advice from Top Infosec Professional Leaders Social Media and Security Some Comments on Next Generation Mass Surveillance Architecture SOCIAL MEDIA & SECURITY June 2016 Volume 14 Issue 6 Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting Information Security Concerns Addressing Data Privacy Regulation & Standards: A Process Blockchain: Legal Industry ★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★ Preparing for New Electronic Communication Privacy Laws LEGAL, PRIVACY, REGULATION January 2016 Volume 14 Issue 1 Promoting Public Cloud Workload Security: Legal and Technical Aspects Gaining Confidence in the Cloud Why Risk Management Is Hard Securing the Cloud SECURING THE CLOUD Promoting Public Cloud Workload Security: Legal and Technical Aspects July 2016 Volume 14 Issue 7 Social Media Impact: Is It Possible to Be Social and Secure? User-Managed Access: Do We Need Yet Another Standard? Social Media: The Danger Zone Stop Delivery of Phishing Emails Impact of Social Media on Cybersecurity Employment And How to Use It to Improve Your Career September 2015 Volume 13 Issue 9 Comprehensive National Cybersecurity Initiative Identity and Access Management: A Shield against Malicious Insiders and Advanced Persistent Threats Analyzing Temporal Patterns in Network Traffic: Models and Metrics for Situational Awareness and Security Information Assurance Adapting to New Metaphors ACADEMIA AND RESEARCH August 2016 Volume 14 Issue 8 Internet of Things: Trust Internet of Things: Security, Privacy and Governance Internet of Things: Arduino Vulnerability Analysis Internet of Things: Key Challenges to Overcome Cloud Dilemma? INTERNET OF THINGS Machine Learning: A Primer for Security February 2016 Volume 14 Issue 2 Using Data Breach Reports to Assess Risk Analysis Quality Security’s Seat at the Big Data Table Why Information Security Teams Fail Securing Data to Prevent Data Theft Protecting Your Data against Cyber Attacks in Big Data Environments BIG DATA / DATA MINING & ANALYTICS ISSA Journal Scholastic Writing Award for Best Student Article – 2016 – Join the Information Security Conversation

Upload: others

Post on 04-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Join the Information Security Conversation · The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and

March 2016Volume 14 Issue 3

Crypto Wars IIFragmentation in Mobile Devices

Mobile Application SecurityMobile App Testing for the Enterprise

Crypto Wars II

MOBILE APPS

October 2015Volume 13 Issue 10

Planning for a Career in the Department of Defense Cybersecurity Workforce

Information Security Career PathHow I Got Here: My Unexpected Infosec Career Path;

A Transition into Tech; Outside Looking In

Improving Cybersecurity

Workforce Capacity and Capability

Addressing the Education-to-Workforce Disparity

INFOSEC CAREER PATH

May 2016Volume 14 Issue 5

Do Data Breaches Matter? A Review of Breach Data and What to Do NextFedRAMP’s Database Scanning Requirement:

The Letter and SpiritSmart Practices in Managing an Identity Auditing Project

On the Costs of Bitcoin Connectivity

★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★

Do Data Breaches Matter?A Review of Breach Data and What to Do Next

BREACH REPORTS:COMPARE/CONTRAST

November 2015Volume 13 Issue 11

2015 International Conference ReportHelp Your Users Protect against Family Member Fraud

Do This, Not That: Career Advice from Top Infosec Professional Leaders

Social Media and Security

Some Comments on Next Generation

Mass SurveillanceArchitecture

SOCIAL MEDIA & SECURITY

June 2016Volume 14 Issue 6

Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting

Information Security ConcernsAddressing Data Privacy Regulation &

Standards: A ProcessBlockchain: Legal Industry

★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★

Preparing for New Electronic Communication

Privacy Laws

LEGAL, PRIVACY, REGULATION

January 2016Volume 14 Issue 1

Promoting Public Cloud Workload Security: Legal and Technical Aspects

Gaining Confidence in the CloudWhy Risk Management Is Hard

Securing the Cloud

SECURING THE CLOUD

Promoting Public Cloud Workload Security: Legal and Technical Aspects

July 2016Volume 14 Issue 7

Social Media Impact: Is It Possible to Be Social and Secure?

User-Managed Access: Do We Need Yet Another Standard?

Social Media: The Danger ZoneStop Delivery of Phishing Emails

Impact of Social Media on Cybersecurity Employment

And How to Use It to Improve Your Career

September 2015Volume 13 Issue 9

Comprehensive National Cybersecurity InitiativeIdentity and Access Management:

A Shield against Malicious Insiders and Advanced Persistent Threats

Analyzing Temporal Patterns in Network Traffic: Models and Metrics for Situational Awareness and Security

Information Assurance Adapting to New Metaphors

ACADEMIA AND RESEARCH

August 2016Volume 14 Issue 8

Internet of Things: Trust Internet of Things: Security, Privacy and Governance

Internet of Things: Arduino Vulnerability AnalysisInternet of Things: Key Challenges to Overcome

Cloud Dilemma?

INTERNET OF THINGS

Machine Learning: A Primer for Security

February 2016Volume 14 Issue 2

Using Data Breach Reports to Assess Risk Analysis Quality

Security’s Seat at the Big Data TableWhy Information Security Teams FailSecuring Data to Prevent Data Theft

ProtectingYour Data

against Cyber Attacks in

Big DataEnvironments

BIG DATA / DATA MINING & ANALYTICS

ISSA Journal

Scholastic Writing Awardfor Best Student Article

– 2016 –

Join the Information Security

Conversation

Page 2: Join the Information Security Conversation · The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and

The Information Systems Security Association, Inc. (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. With active participation from individuals and chapters all over the world, the ISSA is the largest international, not-for-profit association specifically for security professionals. Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial, and government.

The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved.

ISSA Journal Scholastic Writing Award for Best Student ArticleThe ISSA Journal Editorial Advisory Board is inaugurating an annual $1,000 ISSA Journal Scholastic Writing Award for the best article submitted by a current college/university student. 

The submission period is now open and the Board will accept articles until October 1, 2016. We encourage students to follow the published editorial calendar but will consider any submission that is focused on information security.

The Board will select the best article that meets our professional standards for publication and will feature it in the December 2016 issue of the ISSA Journal. Recipient must be attending an accredited college or university full time and actively pursuing a degree. Submit your article and proof of enrollment to [email protected] by October 1, 2016.

Please review our editorial guidelines and editorial calendar. For more information: ISSA.org => Learn => Journal.

Questions can be directed to to Joel Weise, ISSA Journal Award Committee, at [email protected].

DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLOBALLY

THE MONTHLY PUBLICATION OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION

2016 Editorial CalendarJanuary

Securing the Cloud

FebruaryBig Data / Data mining & Analytics

MarchMobile Apps

AprilMalware Threat Evolution

MayBreach Reports – Compare/Contrast

JuneLegal, Privacy, Regulation

JulySocial Media Impact

August Internet of Things

SeptemberPayment Security

OctoberCybersecurity Careers & Guidance

NovemberPractical Application and Use of

Cryptography

DececemberSecurity Architecture

Page 3: Join the Information Security Conversation · The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and

THE MONTHLY PUBLICATION OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION

ISSA Journal Scholastic Writing Award for Best Student Article

Application

Please submit this application with your article to [email protected]

APPLICANT

Name [first and last]: _____________________________________________________________

Contact email: __________________________________________________________________

Program of study: ______________________________________________________________

ISSA member? Chapter? __________________________________________________________Membership is not required to submit an article.

EDUCATIONAL INSTITUTION

Name: ________________________________________________________________________

Address: ___________________________________________ State _____ Zip __________

Phone number for Registrar: ______________________________________________________

Accredited? If yes, by which organization? ___________________________________________

Signature: ____________________________________________ Date: ________________

Page 4: Join the Information Security Conversation · The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and

The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and trends in the industry. Articles are peer-reviewed, based on the following criteria: •Relevant – suitable for a security practitioner, our chief audience (does include C-level) •Timely – in sync with current trends, technologies, and industry issues•Useful – leans toward practical insights rather than general perspectives •Credible – carefully cites sources, knowledgeable of industry thinkers, demonstrates scholarly awareness• Innovative – covers subject matter that piques the curiosity of our readers

Please adhere to the following guidelines:

1. The ISSA Journal will not accept articles promoting one company, business, or piece of software. They must be vendor-neutral – describing technologies and trends – not selling a product.

2. All articles must be the original work of the author, and cannot have appeared in other publications. You will be asked to sign an affidavit to that effect.

3. Major articles run between 1,800 and 3,000+ words, unless otherwise specified by the editor. 4. Where appropriate, articles should be written for an international audience. 5. Articles will be peer-reviewed by a panel of experts in the security field to insure the quality, accuracy,

and relevance of the work.6. All accepted manuscripts are edited for adherence to Journal format and style, clarity, succinctness,

syntax, and punctuation. Please write clearly and concisely (see Style Guide).7. Authors are encouraged to supply relevant artwork (charts, diagrams, and maps) that help to clarify

points in the article. Please include the artwork as separate .tif, .jpg or .eps files (300 dpi @ 100% or greater resolution).

8. The ISSA Journal requires proper references so readers can locate the key information sources used when writing the article. Cite foundational books, articles, or URLs of publicly accessible information sources used and footnote in text or include at the end of the document (see Style Guide).

9. It is the ISSA Journal’s policy to include the author’s email address so that readers may contact him or her directly with questions or comments. If this is a problem, please contact the editor.

10. Please include a short biography at the end of your article – just a couple of lines saying who you are and what you do is fine. See past issues for examples.

11. Please send articles via attached files to [email protected]. DOC or RTF is best. Please do not send article as PDF. Include Submission Checklist with your article.

12. All articles become the property of the ISSA Journal for a period of 12 months, after which copyright reverts to the author. Author will be required to sign copyright release.

Please follow Style Guide on page 2.Thank you for your submission and your support of the ISSA Journal!

The Information Systems Security Association, Inc. is an international organization that acts as the “Global Voice of Information Security.” The ISSA Journal is published to support ISSA’s

mission of promoting management practices that will ensure the confidentiality, integrity and availability of organizational information resources.

The ISSA Journal Submission Guidelines

[email protected]  •  www.issa.org

Page 5: Join the Information Security Conversation · The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and

ISSA Journal Style GuideThe ISSA Journal ascribes to The Chicago Manual of Style for standard American English usage, mechanics, grammar, and publishing conventions.

Citations:Footnotes:

1. Branden R. Williams, “Data Flow Made Easy,” ISSA Journal (March 2008).2. Albert J. Marcella, Jr. and Doug Menedez, Cyber Forensics: A Field Manual for Collecting, Examining

and Preserving Evidence of Computer Crimes (New York: Auerbach Publications, 2008), www.taylorandfrancisgroup.com.

References at end (alphabetical):

— Marcella, A. J. and Menedez, D. 2008. Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes. New York: Auerbach Publications, www.taylorandfrancisgroup.com.

— Williams, B. R., March 2008. Data Flow Made Easy. ISSA Journal.

MechanicsAmerican English spelling and punctuation:

Organization not organisation; authorization not authorisation

Double quotes: found at the “bottom of the well.”

Commas and periods inside quote marks: evil doers, “bad actors,” and bad guys

Semi-colons and exclamation marks outside quote marks: evil doers and “bad guys”; “halt”!

Serial comma: this, that, and the other (before the and)

No contractions: do not use don’t; I’ll => I will; exception “Let’s”

GrammarPronoun agreement will be enforced:

A user and his; a user and her; a user and his or her; but not a user and their

Correct: Users find their computers the most vulnerable.

Page 6: Join the Information Security Conversation · The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and

The ISSA Journal welcomes your submissions. Please ensure your article adheres to the following criteria by checking the boxes and

include with your submission:

Content:

n Short, concise abstract (approx. 100 words)n Suitable for a security practitioner n In sync with current trends, technologies, and industry issuesn Leans toward practical insights rather than general perspectives n Cites sources, knowledgeable of industry thinkers, scholarly awareness n References n Footnotesn Covers subject matter that piques the curiosity of our security professionalsn Vendor-neutral, does not promote one company, business, or piece of software n Must not be marketing materialsn Word count between 1,800 and 3,000+ words unless specified by editorn Relevant illustrations, images, charts, diagrams

Adherence to ISSA Journal format and style:

n Standard American English spellings and usagen Standard American English mechanics and punctuation

Author info:

n Short bio (40 words or less)n Photo (2"x3" 300 dpi min.)n Contact email

n Signed copyright release form

The ISSA Journal Submission Checklist