Call for Speakers

The ISACA Atlantic Provinces Chapter’s 2018 Information Security and Risk Conference call for speakers is now open. Don’t miss this opportunity to share your knowledge and build your reputation as a thought leader. You will join professionals who gain insights into the latest best practices, challenges, and emerging trends. Submit your proposal today and lead the information systems discussion at in Halifax, Nova Scotia.

We are looking for dynamic presenters who can provide hands-on and real-world learning, as well as dive deeply into today’s most important issues in IS audit, assurance, compliance, risk and security. Be creative and innovative in your proposal!

Speakers who are selected, receive a full two-day pass to the event.


Attendees have made it clear that having session presentations available PRIOR to the event is a significant benefit and helps them get the most out of each session. In addition, session surveys show that speakers who do not make their presentations available prior to the event often receive lower ratings.

Attendees today are looking for more out of their conference education experience—more hands-on learning, more interaction with the presenter, and more opportunities to dive deeper into certain topic areas. We strongly encourage you to consider new ways to incorporate these types of interactions while you are developing your session. Be sure to indicate in your submission how you intend to deliver this interactive type of learning environment.

To improve the chance that your session submission is selected, please clearly demonstrate the following criteria:


  • The topic of the session is timely for the industry today.
  • Attendees will able to relate to the content and apply what they have learned in their roles.
  • The topic must be something that will attract attendees.


  • The subject matter is cutting-edge or presents new ideas.
  • The content provides a thought-leadership perspective for the conference attendees.
  • Content is presented in a creative and engaging way.


  • The abstract and title of the session demonstrate the intent in a clear and concise way—feel free to be creative.
  • Learning objectives are well-defined.
  • The learning level of the presentation is clearly defined and supported by the learning objectives.


  • The presenter is knowledgeable and experienced on the topic submitted.
  • The presenter will use different ways to engage the attendees throughout the session.
  • The submission is complete and the presenter is committed to meeting all requirements and expectations.

Topic Areas for the Conference

The ISACA Atlantic Provinces Chapter Information Security & Risk Conference is the premier conference for Audit/Assurance, COBIT, Compliance, Risk, Security, and Strategy/Governance professionals in Atlantic Canada. The list below is neither complete nor restrictive, but rather is intended to stimulate ideas and describe timely topics that might be addressed in session proposals.

IS Audit & Assurance

  • Software Assurance: Threats, Vulnerabilities and Controls
  • Auditing Social Media Policies
  • The ERM and Audit Partnership
  • Implementing Effective Controls for BYOD
  • Understanding and Using SOC Reports
  • The Benefits of Continuous Monitoring
  • Effective Audit Sampling Procedures
  • A Holistic Approach to IT Auditing
  • Auditing in the Cloud
  • SAP Implementation Assurance
  • Shadow IT: Risk & Audit Consideration

Security/Cyber Security

  • Effective Defense Strategies for Cyber Security Threats
  • Implement and Sustain Security Awareness Programs
  • Third Party Compliance With Data Security and Privacy Policies
  • Incident Response Plans in Action: Case Study
  • Importance of a Cohesive Information Security Program
  • The Evolving Threat Landscape
  • Emerging Technology and Security Trends
  • Cyber Security and SAP
  • Threat Intelligence
  • Auditing Against the NIST Cyber Security Framework
  • Internet of Things (IOT)
  • Ransomware

Integrated Risk Management

  • Managing Social Media Risks
  • Understanding and Managing the Risk Associated with Emerging Technologies
  • Embedding an IT Risk Management Culture within the Organization
  • Turning Risk into Results – Managing Risks for Better Performance
  • Enterprise Risk Management for Cloud Computing
  • Risk Assessments of Outsourced Service Providers
  • Network Security Risks and Controls Framework
  • Auditing IT Governance – A Practical Guide
  • Governance, Risk, and Compliance (GRC) Framework – A Comprehensive Approach to Compliance

Big Data, Data Analytics & Visualization

  • Effective Data Destruction Practices
  • Modern Data Analytics
  • Big Data: Audit and Governance
  • Embedding Data Analytics in Fraud Auditing
  • Data Classification and Privacy Compliance
  • Enabling IT Audit with Big Data & Analytics
  • Managing and Classifying Big Data
  • Big Data: Risks and Rewards
  • Make your DLP Program Work
  • A Risk Based Approach to Data Governance

Submitting a Proposal

To submit a proposal for this year’s conference, simply e-mail the following information to

  • Name
  • Organization / Title
  • E-mail address
  • Phone
  • A brief and concise overview of your professional history. You will be able to upload a copy of your full bio, head shot photo and other supporting documents (e.g. c.v., resume, recognition, etc…) later in the submission process
  • Please provide a brief and concise overview of your prior public speaking engagements with contact information
  • Title for your presentation
  • Topic area (IS Audit & Assurance, Security/Cyber Security, Integrated Risk Management, Big Data, Data Analytics & Visualization)
  • Abstract of your topic
  • Learning level (beginner, intermediate, advanced managerial, advanced technical)
  • Have you delivered this presentation before? If yes, when and where?

The call for speakers deadline as part of our second round is August 17, 2018.