ISC(2) Austin Chapter Call For Articles

Our members are looking for information in the following areas. If you have the following types of information to share, we’d be thrilled to make it available to our members. Please contact us to submit your article on these or other interesting topics.

Some Topics of Interest

  • Member interest survey
  • Audience interest survey
  • Link ByLaws to ByLaws post and link from Membership web page
  • Photos and bios of leaders to our website
  • Did Bart add the bar and grid under the green bar in the Membership page?
  • How to perform an information security risk assessment
  • Meeting PCI-DSS Compliance Requirements
  • Information Security Conferences in Austin and Central Texas
  • Low Cost CPE’s
  • Free CPE’s
  • Employment Opportunities for Information Security Professionals in Central Texas
  • Information Security Organizations In Austin and Central Texas
  • About our members
  • GDPR
  • Privacy
  • So You Want A Job In Information Security
  • Call for Speakers
  • Call for Articles/Blog posts
  • Is ISC(2) Membership For You?
  • Consulting Skills
  • Other Timely, Interesting, Engaging, Informative, and Inspiring Subjects

Submission Guidelines

Submitted articles should be:

    • 300 words or more
    • Create Section titles to improve readability of articles longer than 300 words
    • No section of an article greater than 300 words between section titles
    • Use AMI Headline tool to produce high quality headline and section titles
    • Use readability analyzer to validate it’s easy to read

Call For Speakers

February 2017 blockchain discussion moderator Bart Lauwers

If you’re able to deliver value to our members and guests in one or more of the following areas, please contact us.

Our intention for speakers is to educate everyone from expert to novice while keeping it entertaining and interesting for everyone.

1. Networking opportunities

2. Staying abreast of trends in information security:

  • insight into cloud
  • seeing abreast of threats
  • threat vectors
  • how threats change
  • staying in front of different threats
  • getting a handle on how to control or understand the kill chain

3. Enabling consultants to tell clients:

  • what they should be looking for
  • so they can make the best choice of where to put their available information security funds
  • what they should be protecting against
  • how to protect themselves
  • How to assess third-party risk

4. Enabling security analysts to know:

  • Where to be looking out
  • Where to go threat hunting
  • What you’ve learned from different threats in the past
  • What kind of technology investment or training is most valuable
  • What 3rd party tools are worth more consideration
© Copyright 2023, (ISC)² Austin Chapter. All Rights Reserved. (ISC)², CISSP, SSCP, CAP, ISSAP, ISSEP, ISSMP, CSSLP, HCISPP and CBK are registered certification, service, and trademarks of International Information System Security Certification Consortium, Inc.

Disclaimer: (ISC)² does not own, operate, or moderate this website. All content of this site, exclusive of licensed trademarks and trade dress is the property of (ISC)² Austin Chapter, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².”