ICCWS Mini Tracks

The Mini Tracks for ICCWS

  • Securing the Artificial Intelligence (AI)
  • Security and Privacy of Mobile and Smartphone Platforms
  • Navigating the Nexus: Managing Governance, Risk, Compliance, and Policy in Modern Work Environments
Submit your Abstract to an Academic Conference

Securing the Artificial Intelligence (AI)

 
Mini Track Chair: Arun Mamgai, University of South Carolina, USA

Generative AI (Artificial Intelligence) has turned out to be a game changer after the introduction of ChatGPT, DALL-E, Bard, Gemini, GitHub Copilot in 2022 and 2023. Majority of organisations are trying to figure out their AI strategy, but the security of data, pipeline, LLMs is extremely critical. It's important that effective risk management strategies are evolved along with AI based solutions. Operational, infrastructure, and developmental security controls are required to ensure AI systems are operated in a secure manner.

Topics of interest include, but are not limited to:

  • Strong Security control for data training and application
  • Data Supply Chain
  • AI Transparency
  • Ethical AI
  • Zero Trust Access
  • Cloud & Data Security

Security and Privacy of Mobile and Smartphone Platforms

 
Mini Track Chair: Prof Nolu Mpekoa, University of Johannesburg, South Africa

Our daily lives are significantly impacted by mobile devices. These devices are utilised for a wide range of purposes in the military, government, education, and entertainment sectors. Due to the ease of use, individuals keep sensitive data and carry out sensitive operations making it a prime target for an attacker.

Because mobile devices are always powered on, they are the front lines of most phishing attacks. Smartphone applications can pose significant security and privacy risks because of how they collect and share data. Therefore, this track will look at work done around cybersecurity measures designed to protect sensitive information stored on and transmitted by laptops, smartphones, tablets, wearables, and other portable devices. Topics of interest include, but are not limited to:

  • Models of Privacy and Security Issues on Mobile Applications
  • An effective approach to mobile device management
  • Privacy and security of data on mobile devices
  • A Survey on Security for Mobile Devices
  • An Analysis of Smartphone Security Practices among

Navigating the Nexus: Managing Governance, Risk, Compliance, and Policy in Modern Work Environments

Dr Joe Adams
Dr Aunshul Rege

Mini Track Chair: Dr Joe Adams, Cyber By Design & Dr Aunshul Rege,Temple University, USA

As organizations increasingly embrace remote work, cloud computing, and bring-your-own-device (BYOD) networks, ensuring robust security compliance becomes paramount. This conference track explores strategies for establishing and maintaining governance, risk, compliance, and policy (GRCP) amidst these evolving paradigms and increasing regulatory requirements. Emphasizing the growing attention towards security frameworks and compliance, now enforced contractually across industries, presentations delve into the complexities of creating and enforcing policies that transcend organizational boundaries, necessitating extensive coordination between business units that do not usually concern themselves with security.

We invite submissions of papers detailing experiences in organizational management and dynamics that facilitated the achievement and sustainability of security compliance. Topics may include successful implementation of GRCP in remote work settings, effective utilization of cloud computing while maintaining GRCP, strategies for securing BYOD networks, comparative GRCP frameworks and models across organizations and countries, and evaluation and assessments of GRCP implementations.

Through sharing real-world experiences and best practices, this track aims to provide valuable insights into navigating the intricate landscape of modern work environments. By fostering discussion and collaboration, attendees will gain actionable strategies to enhance their organization's security posture in an era defined by remote connectivity and digital transformation.

Join us in exploring the nexus between technology, policy, and organizational dynamics to safeguard against evolving cybersecurity threats and ensure sustained security compliance.

  • Implementing an organizational risk management program
  • Creating a sustainable vulnerability management program in a constantly connected world
  • Managing service providers and cloud services
  • Managing organizational logging and auditing - how much is enough and how long to keep it?
  • Do It Yourself Governance, Risk, Compliance, and Policy - tracking compliance without breaking the budget