Central Alabama ISSA Logo Central Alabama ISSA

Ready to Share Your Expertise?

Submit your speaker proposal and help advance the cybersecurity knowledge of our community.

Submit Speaker Proposal

Call for Speakers

Central Alabama ISSA is always looking for engaging speakers to present at our monthly chapter meetings and annual Southeast Cybersecurity Conference (SCS). If you have expertise in information security and want to share your knowledge, we'd love to hear from you!

Who Should Speak?

  • Security professionals with real-world experience
  • Researchers presenting new findings or methodologies
  • Vendors demonstrating innovative security solutions (non-sales focused)
  • Academic experts in cybersecurity fields
  • Industry thought leaders on emerging trends

Topics of Interest

We're interested in a wide range of cybersecurity topics, including but not limited to:

Threat Intelligence & Analysis
Cloud Security
Application Security
Network Security
Identity & Access Management
Incident Response & Forensics
Security Architecture
Compliance & Risk Management
Zero Trust Security
DevSecOps
Security Awareness & Training
Emerging Technologies (AI/ML Security, IoT, etc.)

Submission Requirements

To be considered as a speaker, please submit the following information:

Speaker Biography

Brief professional bio (150-200 words) including relevant experience and credentials

Presentation Title

Clear, engaging title that reflects the content of your talk

Abstract

Detailed description of your presentation (300-500 words) including key takeaways

Presentation Format

Specify format: presentation, demo, workshop, or panel discussion

Technical Level

Indicate audience level: beginner, intermediate, or advanced

Time Requirements

Typical sessions are 45-60 minutes including Q&A

Presentation Guidelines

Content Standards

  • Content must be educational and relevant to cybersecurity professionals
  • Presentations should be vendor-neutral (no direct sales pitches)
  • Include practical takeaways and actionable insights
  • Use real-world examples and case studies when possible
  • Respect confidentiality and avoid disclosing sensitive information

Technical Requirements

  • Presentations should be in PowerPoint, PDF, or web-based format
  • Test any demos beforehand and have backup plans
  • Provide slides to organizers at least 48 hours before presentation
  • Arrive 30 minutes early for setup and tech check
  • We provide projector, screen, and audio equipment

Code of Conduct

  • Maintain a professional and respectful environment
  • Foster inclusive dialogue and encourage questions
  • Follow responsible disclosure practices
  • Comply with all applicable laws and ethical guidelines

Selection Process

Our program committee reviews all speaker submissions based on:

  • Relevance and timeliness of the topic
  • Quality and depth of content
  • Speaker qualifications and experience
  • Diversity of topics and perspectives
  • Audience interest and applicability

Selected speakers will be notified within 2-3 weeks of submission. We typically schedule presentations 1-3 months in advance.