March 2016 Volume 14 Issue 3 Crypto Wars II Fragmentation in Mobile Devices Mobile Application Security Mobile App Testing for the Enterprise Crypto Wars II MOBILE APPS October 2015 Volume 13 Issue 10 Planning for a Career in the Department of Defense Cybersecurity Workforce Information Security Career Path How I Got Here: My Unexpected Infosec Career Path; A Transition into Tech; Outside Looking In Improving Cybersecurity Workforce Capacity and Capability Addressing the Education-to-Workforce Disparity INFOSEC CAREER PATH May 2016 Volume 14 Issue 5 Do Data Breaches Matter? A Review of Breach Data and What to Do Next FedRAMP’s Database Scanning Requirement: The Letter and Spirit Smart Practices in Managing an Identity Auditing Project On the Costs of Bitcoin Connectivity ★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★ Do Data Breaches Matter? A Review of Breach Data and What to Do Next BREACH REPORTS: COMPARE/CONTRAST November 2015 Volume 13 Issue 11 2015 International Conference Report Help Your Users Protect against Family Member Fraud Do This, Not That: Career Advice from Top Infosec Professional Leaders Social Media and Security Some Comments on Next Generation Mass Surveillance Architecture SOCIAL MEDIA & SECURITY June 2016 Volume 14 Issue 6 Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting Information Security Concerns Addressing Data Privacy Regulation & Standards: A Process Blockchain: Legal Industry ★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★ Preparing for New Electronic Communication Privacy Laws LEGAL, PRIVACY, REGULATION January 2016 Volume 14 Issue 1 Promoting Public Cloud Workload Security: Legal and Technical Aspects Gaining Confidence in the Cloud Why Risk Management Is Hard Securing the Cloud SECURING THE CLOUD Promoting Public Cloud Workload Security: Legal and Technical Aspects July 2016 Volume 14 Issue 7 Social Media Impact: Is It Possible to Be Social and Secure? User-Managed Access: Do We Need Yet Another Standard? Social Media: The Danger Zone Stop Delivery of Phishing Emails Impact of Social Media on Cybersecurity Employment And How to Use It to Improve Your Career September 2015 Volume 13 Issue 9 Comprehensive National Cybersecurity Initiative Identity and Access Management: A Shield against Malicious Insiders and Advanced Persistent Threats Analyzing Temporal Patterns in Network Traffic: Models and Metrics for Situational Awareness and Security Information Assurance Adapting to New Metaphors ACADEMIA AND RESEARCH August 2016 Volume 14 Issue 8 Internet of Things: Trust Internet of Things: Security, Privacy and Governance Internet of Things: Arduino Vulnerability Analysis Internet of Things: Key Challenges to Overcome Cloud Dilemma? INTERNET OF THINGS Machine Learning: A Primer for Security February 2016 Volume 14 Issue 2 Using Data Breach Reports to Assess Risk Analysis Quality Security’s Seat at the Big Data Table Why Information Security Teams Fail Securing Data to Prevent Data Theft Protecting Your Data against Cyber Attacks in Big Data Environments BIG DATA / DATA MINING & ANALYTICS ISSA Journal Scholastic Writing Award for Best Student Article – 2016 – Join the Information Security Conversation
6
Embed
Join the Information Security Conversation · The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
March 2016Volume 14 Issue 3
Crypto Wars IIFragmentation in Mobile Devices
Mobile Application SecurityMobile App Testing for the Enterprise
Crypto Wars II
MOBILE APPS
October 2015Volume 13 Issue 10
Planning for a Career in the Department of Defense Cybersecurity Workforce
Information Security Career PathHow I Got Here: My Unexpected Infosec Career Path;
A Transition into Tech; Outside Looking In
Improving Cybersecurity
Workforce Capacity and Capability
Addressing the Education-to-Workforce Disparity
INFOSEC CAREER PATH
May 2016Volume 14 Issue 5
Do Data Breaches Matter? A Review of Breach Data and What to Do NextFedRAMP’s Database Scanning Requirement:
The Letter and SpiritSmart Practices in Managing an Identity Auditing Project
On the Costs of Bitcoin Connectivity
★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★
Do Data Breaches Matter?A Review of Breach Data and What to Do Next
BREACH REPORTS:COMPARE/CONTRAST
November 2015Volume 13 Issue 11
2015 International Conference ReportHelp Your Users Protect against Family Member Fraud
Do This, Not That: Career Advice from Top Infosec Professional Leaders
Social Media and Security
Some Comments on Next Generation
Mass SurveillanceArchitecture
SOCIAL MEDIA & SECURITY
June 2016Volume 14 Issue 6
Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting
Information Security ConcernsAddressing Data Privacy Regulation &
Standards: A ProcessBlockchain: Legal Industry
★ ★ ★ ISSA ★ ★ ELECTION ★ ★ 2016 ★ ★ ★
Preparing for New Electronic Communication
Privacy Laws
LEGAL, PRIVACY, REGULATION
January 2016Volume 14 Issue 1
Promoting Public Cloud Workload Security: Legal and Technical Aspects
Gaining Confidence in the CloudWhy Risk Management Is Hard
Securing the Cloud
SECURING THE CLOUD
Promoting Public Cloud Workload Security: Legal and Technical Aspects
July 2016Volume 14 Issue 7
Social Media Impact: Is It Possible to Be Social and Secure?
User-Managed Access: Do We Need Yet Another Standard?
Social Media: The Danger ZoneStop Delivery of Phishing Emails
Impact of Social Media on Cybersecurity Employment
And How to Use It to Improve Your Career
September 2015Volume 13 Issue 9
Comprehensive National Cybersecurity InitiativeIdentity and Access Management:
A Shield against Malicious Insiders and Advanced Persistent Threats
Analyzing Temporal Patterns in Network Traffic: Models and Metrics for Situational Awareness and Security
Information Assurance Adapting to New Metaphors
ACADEMIA AND RESEARCH
August 2016Volume 14 Issue 8
Internet of Things: Trust Internet of Things: Security, Privacy and Governance
Internet of Things: Arduino Vulnerability AnalysisInternet of Things: Key Challenges to Overcome
Cloud Dilemma?
INTERNET OF THINGS
Machine Learning: A Primer for Security
February 2016Volume 14 Issue 2
Using Data Breach Reports to Assess Risk Analysis Quality
Security’s Seat at the Big Data TableWhy Information Security Teams FailSecuring Data to Prevent Data Theft
ProtectingYour Data
against Cyber Attacks in
Big DataEnvironments
BIG DATA / DATA MINING & ANALYTICS
ISSA Journal
Scholastic Writing Awardfor Best Student Article
– 2016 –
Join the Information Security
Conversation
The Information Systems Security Association, Inc. (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. With active participation from individuals and chapters all over the world, the ISSA is the largest international, not-for-profit association specifically for security professionals. Members include practitioners at all levels of the security field in a broad range of industries, such as communications, education, healthcare, manufacturing, financial, and government.
The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved.
ISSA Journal Scholastic Writing Award for Best Student ArticleThe ISSA Journal Editorial Advisory Board is inaugurating an annual $1,000 ISSA Journal Scholastic Writing Award for the best article submitted by a current college/university student.
The submission period is now open and the Board will accept articles until October 1, 2016. We encourage students to follow the published editorial calendar but will consider any submission that is focused on information security.
The Board will select the best article that meets our professional standards for publication and will feature it in the December 2016 issue of the ISSA Journal. Recipient must be attending an accredited college or university full time and actively pursuing a degree. Submit your article and proof of enrollment to [email protected] by October 1, 2016.
Please review our editorial guidelines and editorial calendar. For more information: ISSA.org => Learn => Journal.
Questions can be directed to to Joel Weise, ISSA Journal Award Committee, at [email protected].
DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLOBALLY
THE MONTHLY PUBLICATION OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION
2016 Editorial CalendarJanuary
Securing the Cloud
FebruaryBig Data / Data mining & Analytics
MarchMobile Apps
AprilMalware Threat Evolution
MayBreach Reports – Compare/Contrast
JuneLegal, Privacy, Regulation
JulySocial Media Impact
August Internet of Things
SeptemberPayment Security
OctoberCybersecurity Careers & Guidance
NovemberPractical Application and Use of
Cryptography
DececemberSecurity Architecture
THE MONTHLY PUBLICATION OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION
ISSA Journal Scholastic Writing Award for Best Student Article
Application
Please submit this application with your article to [email protected]
APPLICANT
Name [first and last]: _____________________________________________________________
The ISSA Journal welcomes submissions by information security professionals that will inform and educate their peers about issues and trends in the industry. Articles are peer-reviewed, based on the following criteria: •Relevant – suitable for a security practitioner, our chief audience (does include C-level) •Timely – in sync with current trends, technologies, and industry issues•Useful – leans toward practical insights rather than general perspectives •Credible – carefully cites sources, knowledgeable of industry thinkers, demonstrates scholarly awareness• Innovative – covers subject matter that piques the curiosity of our readers
Please adhere to the following guidelines:
1. The ISSA Journal will not accept articles promoting one company, business, or piece of software. They must be vendor-neutral – describing technologies and trends – not selling a product.
2. All articles must be the original work of the author, and cannot have appeared in other publications. You will be asked to sign an affidavit to that effect.
3. Major articles run between 1,800 and 3,000+ words, unless otherwise specified by the editor. 4. Where appropriate, articles should be written for an international audience. 5. Articles will be peer-reviewed by a panel of experts in the security field to insure the quality, accuracy,
and relevance of the work.6. All accepted manuscripts are edited for adherence to Journal format and style, clarity, succinctness,
syntax, and punctuation. Please write clearly and concisely (see Style Guide).7. Authors are encouraged to supply relevant artwork (charts, diagrams, and maps) that help to clarify
points in the article. Please include the artwork as separate .tif, .jpg or .eps files (300 dpi @ 100% or greater resolution).
8. The ISSA Journal requires proper references so readers can locate the key information sources used when writing the article. Cite foundational books, articles, or URLs of publicly accessible information sources used and footnote in text or include at the end of the document (see Style Guide).
9. It is the ISSA Journal’s policy to include the author’s email address so that readers may contact him or her directly with questions or comments. If this is a problem, please contact the editor.
10. Please include a short biography at the end of your article – just a couple of lines saying who you are and what you do is fine. See past issues for examples.
11. Please send articles via attached files to [email protected]. DOC or RTF is best. Please do not send article as PDF. Include Submission Checklist with your article.
12. All articles become the property of the ISSA Journal for a period of 12 months, after which copyright reverts to the author. Author will be required to sign copyright release.
Please follow Style Guide on page 2.Thank you for your submission and your support of the ISSA Journal!
The Information Systems Security Association, Inc. is an international organization that acts as the “Global Voice of Information Security.” The ISSA Journal is published to support ISSA’s
mission of promoting management practices that will ensure the confidentiality, integrity and availability of organizational information resources.
ISSA Journal Style GuideThe ISSA Journal ascribes to The Chicago Manual of Style for standard American English usage, mechanics, grammar, and publishing conventions.
Citations:Footnotes:
1. Branden R. Williams, “Data Flow Made Easy,” ISSA Journal (March 2008).2. Albert J. Marcella, Jr. and Doug Menedez, Cyber Forensics: A Field Manual for Collecting, Examining
and Preserving Evidence of Computer Crimes (New York: Auerbach Publications, 2008), www.taylorandfrancisgroup.com.
References at end (alphabetical):
— Marcella, A. J. and Menedez, D. 2008. Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes. New York: Auerbach Publications, www.taylorandfrancisgroup.com.
— Williams, B. R., March 2008. Data Flow Made Easy. ISSA Journal.
MechanicsAmerican English spelling and punctuation:
Organization not organisation; authorization not authorisation
Double quotes: found at the “bottom of the well.”
Commas and periods inside quote marks: evil doers, “bad actors,” and bad guys
Semi-colons and exclamation marks outside quote marks: evil doers and “bad guys”; “halt”!
Serial comma: this, that, and the other (before the and)
No contractions: do not use don’t; I’ll => I will; exception “Let’s”
GrammarPronoun agreement will be enforced:
A user and his; a user and her; a user and his or her; but not a user and their
Correct: Users find their computers the most vulnerable.
The ISSA Journal welcomes your submissions. Please ensure your article adheres to the following criteria by checking the boxes and
include with your submission:
Content:
n Short, concise abstract (approx. 100 words)n Suitable for a security practitioner n In sync with current trends, technologies, and industry issuesn Leans toward practical insights rather than general perspectives n Cites sources, knowledgeable of industry thinkers, scholarly awareness n References n Footnotesn Covers subject matter that piques the curiosity of our security professionalsn Vendor-neutral, does not promote one company, business, or piece of software n Must not be marketing materialsn Word count between 1,800 and 3,000+ words unless specified by editorn Relevant illustrations, images, charts, diagrams
Adherence to ISSA Journal format and style:
n Standard American English spellings and usagen Standard American English mechanics and punctuation
Author info:
n Short bio (40 words or less)n Photo (2"x3" 300 dpi min.)n Contact email