posted by organizer: husakm || 1312 views || tracked by 2 users: [display]

NeSecOr 2024 : 1st Workshop on Network Security Operations

FacebookTwitterLinkedInGoogle

Link: http://www.cnsm-conf.org/2024/NeSecOr.html
 
When Oct 28, 2024 - Oct 31, 2024
Where Prague, Czech Republic
Submission Deadline Sep 6, 2024
Notification Due Sep 20, 2024
Final Version Due Sep 27, 2024
Categories    security   networking   management   automation
 

Call For Papers

Automation and orchestration represent a paradigm shift in how security operations are conducted. Automation involves the use of technology to perform tasks with minimal human intervention, streamlining processes such as threat detection, incident response, and system remediation. Orchestration goes a step further by integrating these automated tasks into a cohesive workflow, enabling seamless coordination across different security tools and systems. Together, these approaches can significantly improve the speed, accuracy, and efficiency of security operations.

The workshop will cover key topics including the fundamentals of security automation, the role of orchestration in creating unified security workflows, and best practices for implementing these technologies in a network security environment. Participants will gain hands-on experience with leading automation and orchestration platforms, explore real-world case studies, and engage in interactive sessions designed to solve practical security challenges.

Topics of Interest to the workshop include but are not limited to:

Network Security Management

Network monitoring, intrusion detection, incident triage
Asset management and vulnerability discovery
NetOps and SecOps, Network and Security Operations Centers (NOC, SOC)
Digital twins for security and resilience

Scalability and Interoperability in Network Security

Automation and orchestration of network security workflows
Security Orchestration, Automation, and Response (SOAR)
Cybersecurity Mesh Architecture (CSMA)
Large-scale deployments of network security tools

Resilience and Mitigation

Theoretical foundation of network and system resilience
Resilience assessment and modeling, attack impact assessment
Cyber situational awareness (CSA)
Attack mitigation and recovery

Applications in Specific Environments

Security and resilience in the Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Security and resilience in cloud, fog, and edge computing
Security and resilience in Critical Information Infrastructures (CII)
Security and resilience in healthcare, energy sector, industrial robotics, smart cities, etc.

Related Resources

CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ICoSR 2025   2025 4th International Conference on Service Robotics
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
HUSO 2025   7th Canadian International Conference on Humanities & Social Sciences 2025
DBSec 2025   Conference on Data and Applications Security and Privacy
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
AIACT 2025   2025 9th International Conference on Artificial Intelligence, Automation and Control Technologies (AIACT 2025)