16th Iberoamerican Seminar on Information Technology Security
Purpose and scope:
This year’s edition of the Ibero-American Seminar on Information Technology Security, with the slogan “Computerizing society in a secure way,” will present the experiences and research carried out in the field of cybersecurity. It will be a meeting between members of the Ibero-American community of scholars, businesspeople, students and representatives of national and international organizations, where they will discuss and exchange experiences, serving as a platform to broaden the knowledge of the participants and strengthen the relationships among them.
Thematic areas
Antimalware
Antivirus technologies and development. Malware behavior and trends. Malware detection and analysis techniques.
Information security management
Security implementation and management. Policies, regulations, standards, methodologies. Security in the software development process (SecOps). Computer forensics and auditing. Ethical hacking and security assessment. Innovative techniques for the detection of security vulnerabilities. Ethical and legal aspects of computer security. Risk management, contingency and recovery plans. Security metrics. Incident management. Security certifications.
Network, System and Application Security
Security architecture and services. Security in servers, services and network devices. Physical security. Privacy in wireless networks and Internet. Security for mobile devices. Open source security solutions. Identity and access control, authentication techniques and systems. Cloud security. Security in e-commerce and e-government. Blockchain. Cryptography. Public key infrastructures. Security in web applications, mobile and internet of things, emerging technologies.
Cybersecurity
Vulnerabilities, threats and experiences in dealing with cases of cybercrime, cyberattacks, cyberespionage. Security in industrial environments and critical infrastructures. Management of security operations centers and threat intelligence. Application of artificial intelligence and data science to cybersecurity. Automation of cybersecurity controls. Standardization of cyber threat intelligence sharing.