Security, assurance and privacy challenges abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be technical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance, and privacy. To that effect, we welcome participation in the 25th Annual Security Conference.
Themes
The conference welcomes submissions from academia, industry, and government addressing both theoretical and practical aspects of cybersecurity. Indicative themes include: Access control and authentication, Legal and regulatory aspects, Digital Resilience, Mobile device security, Awareness and education methods, Network security, Biometric technologies and impacts, Organizational issues and governance, Cloud and big data security, Policy, standards and compliance, Cybercrime and misuse, Privacy protection and practices, Digital forensics, Public attitudes and understanding, Human aspects of security, Trust management, Audit and risk analysis, Systems Theoretical Approaches to Security, Cyber-Money Laundering & Cybercrime, Cybersecurity Insurance, Cyber-Enabled Fraud and any form of cyber-enabled financial crime.
Paper submissions: February 15, 2026 (Template)
Author notification: On a rolling basis
Author registration: March 1, 2026
Participation can be in the following categories:
a) Full-paper submissions
In this submission mode you are uploading a full paper for double-blind, peer-review. Full papers that are accepted following the double-blind, peer-review will be published, upon the agreement of the author(s), in the Scopus-indexed Journal of Information Systems Security (https://jissec.org).
Full papers for the conference must:
Be between 5,000 - 7,500 words, including figures, tables, references, and appendices and should follow the JISSec author instructions available at https://www.jissec.org/author-instructions.
b) Short submissions
These submissions present research in progress or simply an idea that aims to generate some discussion on the conference floor. In this submission mode, you can submit an Abstract (between 200 to 400 words), or Short Paper (between 1,000 - 2,500 words), with a view to potentially developing a full paper after the event.
Short Papers will undergo a limited peer review, whereas Abstracts will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted short submissions will be included in the conference proceedings.
Authors of accepted Abstracts and Short Papers will have the opportunity to extend these to full papers, subject to further post-conference review by JISSec. Abstracts and Short Papers that are not developed into full papers will be published via the Information Institute’s open access online repository.
Short submissions should use this template and use the APA formatting style for References (http://www.apastyle.org).
c) Case Studies
Case study papers document a cybersecurity breach. The length of the case study can be anywhere between 5-10,000 words. Case study submissions will be reviewed by the conference chairs to ensure relevance and credibility. The author names and titles of accepted case study papers will be included in the conference proceedings.