Join Login

Membership and collaboration facilitated by Member 365.


Join Login

Membership and collaboration facilitated by Member 365.

24th Colloquium

June 14th to 17th, 2020

Baltimore, MD

24th Colloquium - Call for Papers

The 2020 conference of the Colloquium on Information Systems Security Education (CISSE) celebrates its 24th year as the senior and premier conference on Cybersecurity Education.

The conference will be held in Baltimore, MD, June 14th to 17th, 2020. Participating in the Colloquium are representatives from education, industry, and government with an interest in conducting productive conversations, present new ideas, and improve the content and curricula for cybersecurity teaching.

The theme for the 24th Colloquium will be:

Privacy, Ethics, and APTs

(Asymmetric and Persistent Threats)

Interested parties are invited to submit papers and posters, propose round tables, and submit relevant proposals for consideration of the Colloquium.

Paper Submission Guidelines

To be considered for presentation at the 2020 CISSE Conference, please submit an original, unpublished paper in the field of Cybersecurity Education by January 31, 2020 for one of the following tracks.

Selected papers will also be published in our bi-annual Journal. Papers that have been presented at the 2020 Colloquium will also be considered for further development and publication.

Papers should present a well-formed and capably written idea, which advances the field of cybersecurity, and which is adequately contextualized and sufficiently supported by the literature. The implications for general application should be clear as well as their advantage and importance to the at-large purposes of the field. Conclusions should be supported by analytic means, either empirical or subjectively derived through commonly accepted methods. Graphic, or tabular support is encouraged.

Please download the following template for your submission:

Please note the word count range of 3,000 to 4,000 (8-10 pages), with bibliographies that reflect sufficient consideration of the literature with a no-more-than 250 word abstract. Be sure that all photos, graphs and illustrations have a print resolution of no less than 300 dpi.

For additional information, please toggle the menu below:

Paper Tracks

Academic Papers are invited in the following areas:


With California privacy laws coming into effect in January 2020, and a period of experience with the GDPR on which they are modeled, it is timely to take a look at their effectiveness, issues that other jurisdictions have encountered with their implementation, and other privacy initiatives adopted by other states and countries, along with other issues related to privacy.


Ethics is a required piece of the cybersecurity curriculum, but presents a persistent challenge of definition and substance. "[The ethics of Cybersecurity] is actually a rather under-developed topic within ICT ethics, where the majority of published work discusses issues such as 'big data' and privacy or ethical issues of surveillance. In those cases, cybersecurity is usually only instrumentally discussed as a tool to protect (or undermine) privacy." 1 "[T]he ethical issues and dilemmas that the technological experts face in their daily life are to an insufficient degree represented in the literature." 1 Papers are encouraged which address these challenges and others within the field of Cybersecurity ethics.

Asymmetric and Advanced Persistent Threats

Recent events, an up-coming election cycle, and concerns about foreign cyber influence provide a timely opportunity to explore Advanced Persistent Threats (APTs). The nature of social media and threats to elections undermines our way of life. As educators we should be leading the way in researching, assessing, and developing curriculum and awareness of these areas.

Education Methods, Tools, and Innovations

This track is focused on the application of methods, tools, and innovations to teaching Cybersecurity in the classroom and beyond. It may include discussion of Cyber Operations Centers, Cyber-ranges, specialized tools and techniques, or teaching methods. The papers should include specific detail, as may include discussion of pros and cons, issues encountered, or ideas in the conceptual phase, but requiring additional planning and input before potential implementation.

Student Papers

Student papers may fit into one of the above tracks, or a related area of Cybersecurity. Students must be enrolled in a degree seeking program. One student will be chosen as the "Erich Spengler Student Paper of the Year" and receive free registration, 3 nights at the hotel and a travel stipend of $500 (winner to be notified by late April).

Please submit papers to:

1 Yaghmaei, Emad and van de Poel, Ibo and Christen, Markus and Gordijn, Bert and Kleine, Nadine and Loi, Michele and Morgan, Gwenyth and Weber, Karsten, Canvas White Paper 1 – Cybersecurity and Ethics (October 4, 2017). Available at SSRN: or

Workshops and Round Tables

Participants wishing to propose a workshop or round table in the context of the conference themes (see paper tracks) may submit a proposal no later than January 31, 2020 to:


Faculty, Students and Researchers are invited to submit a short abstract request for the poster sessions. Posters should cover the above themes, or related areas within Cybersecurity.

Poster sessions are non-commercial presentations of topics of interest to the community. The goal of the poster session is to stimulate conversations in the community. Posters present an opportunity to contribute to the conversation without the full process of formal review and the topic and time constraints of formal papers and conference sessions. Poster presenters are encouraged to provide previews of works in progress, new concepts for consideration, and classroom techniques.

Awards will be presented for Best Poster, Best Poster Runner Up, Best Student Poster, Best Student Poster Runner Up.

Poster submissions are due no later than May 15, 2020 to:

Note: Please indicate if the submission is a student poster

Curriculum Presentations

This years' Colloquium will feature presentations of Master Classes and Curriculum Walk-Throughs with experienced instructors who are willing to share with their colleagues.

Master Class Panels

Master Class panels are panels of instructors who have experience teaching a course in a particular topic where they have brought an innovative approach to their teaching. The panel will discuss and compare approaches including evaluations and observations.

Course Walk-Through

A Course Walk-Through is a quick (<20 min) walk of the course Syllabus, including the description, outcomes, major topics, assessments / assignments, materials used, typical course approach, and typical students. The goal is to give new instructors ideas about how courses may be constructed and allow experienced instructors to compare to their own efforts.

Program Walk-Through

A Program Walk-Through is a quick review of a programs curriculum and flow, it includes an overview of the outcomes, the students, the courses, and special features. It includes a brief discussion of the reasoning behind the program choices.

Instructors interested in participating in Master Class Panels or Curriculum walk-throughs should submit their interest including:

  • The course type (basic, elective, focus area)
  • Course level (lower / upper division, Graduate)
  • Course titles
  • For Programs, the level (AA, BA / BS, Minor, Certificate, Graduate) and the program focus
Note: Walk-throughs are not pitches for commercial courses, books, or courses mainly following a standardized curriculum.

Submit interest in participating no later than March 15, 2020 to:

Last modified on Tuesday, 29 October 2019 18:33

More in this category: 24th Colloquium - Registration »

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.

24th Colloquium

June 14 to 17th - Baltimore Inner Harbor, Maryland


Recent Posts