posted by organizer: husakm || 1032 views || tracked by 2 users: [display]

NeSecOr 2024 : 1st Workshop on Network Security Operations

FacebookTwitterLinkedInGoogle

Link: http://www.cnsm-conf.org/2024/NeSecOr.html
 
When Oct 28, 2024 - Oct 31, 2024
Where Prague, Czech Republic
Submission Deadline Sep 6, 2024
Notification Due Sep 20, 2024
Final Version Due Sep 27, 2024
Categories    security   networking   management   automation
 

Call For Papers

Automation and orchestration represent a paradigm shift in how security operations are conducted. Automation involves the use of technology to perform tasks with minimal human intervention, streamlining processes such as threat detection, incident response, and system remediation. Orchestration goes a step further by integrating these automated tasks into a cohesive workflow, enabling seamless coordination across different security tools and systems. Together, these approaches can significantly improve the speed, accuracy, and efficiency of security operations.

The workshop will cover key topics including the fundamentals of security automation, the role of orchestration in creating unified security workflows, and best practices for implementing these technologies in a network security environment. Participants will gain hands-on experience with leading automation and orchestration platforms, explore real-world case studies, and engage in interactive sessions designed to solve practical security challenges.

Topics of Interest to the workshop include but are not limited to:

Network Security Management

Network monitoring, intrusion detection, incident triage
Asset management and vulnerability discovery
NetOps and SecOps, Network and Security Operations Centers (NOC, SOC)
Digital twins for security and resilience

Scalability and Interoperability in Network Security

Automation and orchestration of network security workflows
Security Orchestration, Automation, and Response (SOAR)
Cybersecurity Mesh Architecture (CSMA)
Large-scale deployments of network security tools

Resilience and Mitigation

Theoretical foundation of network and system resilience
Resilience assessment and modeling, attack impact assessment
Cyber situational awareness (CSA)
Attack mitigation and recovery

Applications in Specific Environments

Security and resilience in the Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Security and resilience in cloud, fog, and edge computing
Security and resilience in Critical Information Infrastructures (CII)
Security and resilience in healthcare, energy sector, industrial robotics, smart cities, etc.

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ITCAU 2024   2nd International Conference on Information Technology, Control and Automation
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI