cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

25th Colloquium

October 4th to 6th, 2021

Nashville, Tennessee

25th Colloquium - Registration

For 25 years, the Colloquium for Information Systems Security Education (CISSE) provides the sole forum in which the members of the academic field of cybersecurity gather to present and discuss emerging trends and ideas. Our government and industry partners actively collaborate to provide information on persistent cyber issues. This balance serves to provide input for our stakeholders across disciplines to reinforce a shared mission.

In-person & Online

The 25th annual Colloquium will convene from October 4th to 6th, 2021 as an in-person and online program hosted at Sheraton Grand Nashville Downtown. To view all open calls and program updates, please click here. For an overview of conference topics, please click the toggle below.

Challenges in Teaching Cybersecurity

Ethics

As cybersecurity underpins many aspects of our digital society, cyber ethics education becomes a key resource students will use as they navigate their careers and make professional decisions. Forwarding the field by developing this aspect of the discipline is critical on many levels.

Legal Issues

Incorporating the legal aspects broadly in cybersecurity curriculum and providing courses with deeper focus on this topic has become more significant with the increased threats both external and internal that organizations face. All graduates face these issues as part of the challenges of their career, and will need significant preparation to engage with executive and inter-organization decision-makers.

Adversary Behavior

Helping students develop an understanding of the adversary sets cybersecurity apart from most technological disciplines. From robust coding and application architecture, to budgetary choices and policy decisions, considering adversarial behavior can help graduates mitigate risk across a range of scales and within a variety of roles in their careers.

Risk Management

With risk management as a fundamental discipline of the cybersecurity professional, graduates need a range of decision-making tools to prioritize, establish urgency, allocate budget, and make day to day technical decisions. Ensuring that academia is developing and providing robust conceptual frameworks for this work will help them create more stable environments and organizations.

Pedagogy

As cognitive sciences and the ability to create adaptive technical learning environments develop, cybersecurity programs have opportunities for enhancing, accelerating, and enriching the learning experience. Creating more engaging experiences, increasing retention rates, enhancing clarity of complex topics, and providing experiences that better simulate the expected workplace can be part of what transforms the discipline of cybersecurity and information assurance education.

Governance

With the expectations that the cybersecurity graduates from our programs will become leaders, conveying an understanding of cybersecurity, information, and technology governance. This provides them with the vision to adapt the policies of the organizations they work in response to legislation, standards, technological innovation, and a changing threat landscape.

The Colloquium

25th Colloquium

Registration is through our membership portal. As a hybrid event, options to register for in-person or online tracks are presented. If you have previously attended or held prior membership, but are unable to confirm your email address, please contact our team at events@thecolloquium.org to assist.

Register

In-person

Early Bird
March 17, 2021 through July 25, 2021

$525

Regular
July 26, 2021 through October 4, 2021

$625

Student (Undergraduate)
March 17, 2021 through October 4, 2021

$300

Online

Early Bird
March 17, 2021 through July 25, 2021

$400

Regular
July 26, 2021 through October 4, 2021

$500

Student (Undergraduate)
March 17, 2021 through October 4, 2021

$300

Interested in bulk registration? Please contact events@thecolloquium.org to arrange for your team and / or organization.

Refund Policy

To cancel and request a refund, please contact events@thecolloquium.org.

  • Full refund - cancelled prior to July 25th
  • 50% refund - cancelled prior to September 1st
  • No refund - cancelled on or after September 1st

At any time, registrations can be transferred or held for the 2022 conference.

Exceptions to the above policy are made for extenuating circumstances such as military deployment, death in family, or medical emergency. Contact events@thecolloquium.org, if needed.


The Colloquium
Conference Hotel

Sheraton Grand Nashville Downtown

623 Union Street Nashville, Tennessee 37219

$209 per night

Make a reservation

For questions regarding the event, registration, or open calls, please email events@thecolloquium.org.


More in this category: « 25th Colloquium - Call for Posters

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.

As a 501(c)(3), CISSE relies on member support. If you value our mission of service, please consider making a donation.

Donate Today

Recent Posts

  • 17 April 2021 Cyberspace Solarium Commission - Full 2020 Report The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus on a strategic approach to defending…
  • 03 March 2021 HAFNIUM targeting Exchange Servers with 0-day exploits Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these…