Presenting at the Cybersecurity and Privacy Professionals Conference individually or as part of a team is a wonderful way to share knowledge, experiences, ideas and information. We are seeking presentations on cybersecurity and privacy topics that would be of interest to higher education CISOs, CIOs, CPOs, and other security and privacy practitioners. Submit a proposal to share future directions, best practices, stories on successful collaborations, or solutions to community-wide issues of interest.
EDUCAUSE is committed to highlighting the diversity of perspective, opinion, and representation in our community. Our program committee therefore strives to develop a program that truly represents that diversity. Similarly, we are eager to expand our community of presenters by encouraging and supporting new voices in higher education cybersecurity and privacy. We’d like first-time presenters to feel energized and inspired to submit a proposal and share their ideas and experiences.
Please read this page carefully before you begin work on your proposal, and be sure to submit by the deadline: February 18, 2025.
Ready to get started? Just follow these simple steps:
- Find out how to create an excellent proposal by reading this page and the helpful tips in the EDUCAUSE Presenter Concierge pages. The program committee will hold office hours to help with proposals.
- Develop a proposal in one of the program tracks.
- Submit your proposal using the online submission form between January 27 and February 18,. Submitters will be notified about decisions in mid-March.
- If accepted, attend and present at the Cybersecurity and Privacy Professionals Conference, May 19–21, 2024, in Baltimore, MD. (Registration is required of all presenters.)
Guidelines for Submission
- ☐ Do not list presenters on a proposal without their commitment that they will participate and that they agree to the terms and conditions for participation.
- ☐ Profile Requirement: An EDUCAUSE profile is required in order to submit a proposal, present, and register for the event. Please take some time before submitting a proposal to ensure all presenters have profiles. Presenters can create or update their profiles on the EDUCAUSE membership page.
- ☐ Presenter Registration: All speakers must present in person. We are not able to accommodate online presenters onsite. Presenters are responsible for registering in advance for the conference, paying the registration fee, and securing and paying for travel and lodging. (Exceptions may include accepted full and half-day preconference workshop presenters, who may receive modest compensation in the form of an honorarium and a complimentary conference registration.)
- ☐ EDUCAUSE will not cover any additional costs such as travel and lodging expenses, online tools, assessments, books, or other presentation materials.
- ☐ Acceptance notifications will be sent in mid-March. All selected presenters must agree to and complete speaker agreement forms in order to be confirmed for a session.
- ☐ EDUCAUSE reserves the right to edit presentation titles and/or edit the session abstract for program publications.
- ☐ Proposal titles and abstracts cannot be changed after the review and selection process.
- ☐ Session Resources: Presenters will be required to upload their presentations and/or supporting materials and resources prior to the conference. These valuable resources will then be posted for attendees to access before and beyond the session.
A Special Note to Our Corporate Community
Are you or a co-presenter with a corporation and interested in presenting at this year’s event? EDUCAUSE values the insights from the corporate community.
- You can go through the CFP process and the program committee will determine acceptance to the program.
- You can contact [email protected] to purchase a Conference Partner Package that includes an Industry Insights Session, booth, branding, and more. Limited opportunities are available.
For guidance on creating a winning corporate CFP submission, see our tips here>>
- Ratings from accepted corporate sessions in previous years indicated that the topics were timely/hot/of significant interest to the community.
- Many of the accepted corporate presentations from past years were submitted with institutional partners. Try to pin down your institutional partners prior to submitting session proposals so that you can co-create the proposal and really elevate their voice. Our audience is keen to hear institutions talk about successful partnerships.
- Higher-rated sessions indicated that session outcomes clearly tied to the goals for the session.
- Higher-rated sessions represent diversity in perspective, opinion, and representation and the most interesting sessions are often ones that offer many different perspectives. Does my proposal reflect this?
- The session description should always paint a clear picture about what will happen in-session. This is your opportunity to expand beyond the abstract and tell the story behind the abstract. Adding creative session elements like a design-thinking exercise or activity for the audience helps. With so much competition around session space these days, it is just as important to have an innovative, engaging session as it is to have an innovative, engaging topic.
Proposal Submission
Within the CFP submission site you will be asked to provide the following information. In addition, each submission should include the names and biographies of the proposed presenter team.
Themes and Tracks
Stronger Connections for Stronger Protections
The 2025 Cybersecurity and Privacy Professionals Conference theme, "Stronger Connections for Stronger Protections," will emphasize collaboration and the critical role it plays in advancing cybersecurity and privacy in higher education. In an increasingly complex and evolving digital landscape, the strength of our defenses relies on the bonds we build—within our teams, across institutions, and throughout the higher education, cybersecurity, and privacy communities. By fostering these deeper connections, we can leverage collective intelligence to anticipate and mitigate emerging threats, while ensuring that principled and trustworthy innovations are implemented that support our insitutional mission.
Conference Tracks
The program committee has identified five areas of focus (tracks). Concerns related to small colleges, AI, and privacy are spread across each of these track areas. Proposals will be selected to ensure that the conference program offers a comprehensive, noncommercial, objective, and diverse treatment of issues related to the theme and tracks of this conference. You may be invited to present in a format or track other than the one you selected.
Cybersecurity and privacy awareness, training, education, and communications are critical to successful information security and privacy programs. The Awareness, Education, and Human Factors track is a specialized segment within the Cybersecurity and Privacy Professionals Conference that delves deep into the strategies, tactics, and methodologies necessary for creating and managing cybersecurity and privacy awareness programs. The learning outcomes of this track will focus on:
-
Understand the Role of Human Behavior in Cybersecurity and Privacy: Learn how human factors, such as decision-making, risk perception, and behavior patterns, contribute to the vulnerabilities in cybersecurity and privacy practices.
-
Design Effective Awareness Programs: Gain practical skills in designing and implementing cybersecurity and privacy awareness programs tailored to diverse audiences, including faculty, staff, and students, for institutions of any size.
-
Promote a Security-Aware Culture: Discover strategies for fostering a culture of cybersecurity and privacy awareness across the institution, ensuring that security best practices are embedded into everyday actions.
-
Develop Targeted Training and Education Initiatives: Learn how to develop effective, engaging training materials and courses that address key cybersecurity risks, privacy protection, and compliance requirements.
-
Measure the Impact of Awareness Programs: Explore methods for assessing the effectiveness of awareness and education initiatives, including evaluating behavioral changes, knowledge retention, tangible decline in IT risk, and overall program success.
-
Understand the Ethical Implications of Cybersecurity and Privacy: Examine the ethical issues surrounding data protection, privacy rights, and the role of individuals in safeguarding sensitive information.
-
Address Specific Human Vulnerabilities: Identify common human errors and vulnerabilities, such as phishing attacks, weak passwords, and social engineering, and learn how to mitigate these risks through education and awareness.
-
Leverage Behavioral Science for Improved Security: Gain insights from behavioral science to design programs that influence security behavior positively, such as creating incentives for safe practices or reducing barriers to compliance.
-
Engage Stakeholders Effectively: Learn how to engage all stakeholders—faculty, staff, students, and leadership—in ongoing cybersecurity and privacy education, ensuring buy-in and participation across the institution.
-
Adapt Training for Evolving Threats: Understand how to keep awareness and training programs dynamic and up-to-date in response to emerging cybersecurity threats, new technologies, and changing privacy and cybersecurity legislation.
Attendees will be equipped with the tools and knowledge to create, implement, and assess effective cybersecurity and privacy education programs, helping reduce human risk factors and strengthen the overall security posture of their institutions.
The Governance track focuses on the critical role of governance in shaping the future of higher education. Sessions will address topics such as shared governance models, data-informed policy decision-making methods, risk management, regulatory compliance, financial stewardship, and strategic planning. Participants will gain insights into effective engagement, leadership accountability, crisis response, and the importance of governance in fostering a culture of equity and innovation. The learning outcomes of this track will focus on:
-
Understand the Role of Governance in Cybersecurity and Privacy: Gain a clear understanding of how effective governance frameworks influence cybersecurity and privacy outcomes, ensuring that institutional policies, procedures, and practices align with legal and regulatory requirements.
-
Develop Strategic Governance Frameworks: Learn how to create and implement governance structures that prioritize cybersecurity and privacy, ensuring that decision-making processes support institutional resilience and risk management.
-
Foster Engagement: Explore strategies for engaging senior and executive leadership in cybersecurity and privacy governance, emphasizing the importance of top-down commitment and accountability in managing risk.
-
Align Cybersecurity and Privacy with Institutional Goals: Learn how to integrate cybersecurity and privacy into broader institutional strategies, aligning risk management efforts with organizational values, mission, and long-term objectives.
-
Implement Risk Management and Compliance Processes: Gain practical knowledge on developing and enforcing effective risk management strategies that support compliance with cybersecurity regulations, standards, and frameworks (e.g., NIST, GDPR, HIPAA).
-
Strengthen Accountability and Transparency in Governance: Explore methods for establishing clear roles, responsibilities, and accountability mechanisms within the governance structure to enhance transparency and decision-making effectiveness.
-
Navigate Legal and Regulatory Compliance: Understand the complex landscape of cybersecurity and privacy regulations, and learn how to establish governance practices that ensure ongoing compliance with relevant laws and standards.
-
Create a Culture of Security and Privacy: Learn how governance can play a pivotal role in cultivating a culture of security and privacy throughout the organization, ensuring that policies are not just compliance-driven but embedded in everyday practices. Understand the contrast and relationship of security and privacy and why it is unique in the higher education environment.
-
Respond to Crisis and Emerging Threats: Develop strategies for crisis management and effective governance responses to cybersecurity incidents and emerging privacy challenges, ensuring resilience and institutional continuity.
-
Evaluate and Improve Governance Structures: Gain insights into ongoing evaluation of governance structures, identifying areas for improvement and adapting to changes in the cybersecurity and privacy landscape.
Attendees will leave with actionable strategies to strengthen governance structures and enhance institutional effectiveness in an increasingly complex landscape. Attendees will be equipped with the knowledge and strategies to strengthen governance in cybersecurity and privacy, ensuring that their institutions not only comply with regulations but also foster a secure and resilient environment for all stakeholders.
The Transformational Leadership track explores how cybersecurity and privacy leaders can effectively transform policy into practice and awareness into action within higher education institutions, regardless of institutional size. This track examines how leaders navigate the complex journey from strategic planning to operational execution, building the bridges necessary to convert security frameworks into living programs that respond to real-world challenges. Programs will focus on the unique challenges faced by CISOs and security directors in higher education as they work to create responsive, resilient security cultures while influencing key stakeholders and managing limited resources. The learning outcomes of this track will focus on:
-
Developing Future Leaders: Examine innovative approaches to cultivating cybersecurity and privacy leadership skills, including strategies for workforce development, building talent pipelines, and fostering leadership across diverse teams and institutions.
-
Leading Change and Organizational Influence: Analyze effective strategies for driving cybersecurity and privacy transformation within higher education institutions. This includes influencing stakeholders, aligning with institutional strategic plans, building consensus, securing resources, and overcoming resistance to change.
-
Bridging the Gap Between Policy and Action: Explore how to translate cybersecurity and privacy policies into effective action and transform awareness into proactive cultural behaviors across all levels of an institution, regardless of its size. Developing governance structures that enable action and transparency.
-
Crisis Leadership and Incident Response: Navigate teams through incidents, organizational and budget changes, and evolving threat landscapes.
-
Cross-Institution Collaboration and Partnerships: Establish effective cybersecurity and privacy partnerships (internal, external), building consortiums and networks, sharing resources and expertise, and developing shared service models.
This track encourages diverse perspectives from leaders of all levels who are passionate about shaping the future of cybersecurity and/or privacy in higher education.
The Navigating Compliance with Confidence track addresses the unique regulatory landscape of higher education, where institutions of all sizes must protect sensitive information while complying with diverse laws and standards such as FERPA, HIPAA, GDPR, and CCPA. This track explores the latest strategies for meeting regulatory obligations, managing risk, and fostering a culture of accountability and responsibility within higher education. Attendees will gain insights into building robust compliance programs that ensure data privacy, security, and institutional resilience. Practical guidance will be offered on auditing practices, breach notification requirements, and managing compliance across increasingly complex digital infrastructures. The learning outcomes of this track will focus on:
-
Understand Key Cybersecurity and Privacy Regulations: Gain a comprehensive understanding of major regulations impacting higher education, such as GDPR, CCPA, FERPA, HIPAA, and emerging laws and their implications for institutional compliance.
-
Implement Compliance Frameworks: Learn to apply frameworks such as NIST, ISO 27001, and CIS Controls to build robust, compliant cybersecurity and privacy programs that align with regulatory requirements.
-
Develop Risk Assessment and Management Skills: Acquire skills to conduct thorough risk assessments, identify areas of noncompliance, and implement mitigation strategies to protect institutional data and privacy.
-
Navigate Data Protection Requirements: Understand best practices for data lifecycle including handling, storing, processing, and deprovisioning data in ways that protect privacy, prevent unauthorized access, and maintain compliance with data protection regulations.
-
Conduct Compliance Audits and Assessments: Learn methodologies for internal and external compliance audits, understand how to evaluate security controls, and improve compliance posture based on audit findings.
-
Establish Incident Response and Reporting Protocols: Understand and develop protocols for the regulatory requirements surrounding incident response, breach notification, and reporting, ensuring timely and compliant responses to security incidents.
-
Train and Educate Stakeholders on Compliance: Develop strategies for educating staff, faculty, and students on compliance responsibilities, fostering a culture of accountability and awareness throughout the institution.
-
Prepare for Regulatory Changes and Future Compliance Needs: Learn how to anticipate, adapt to, and prepare for future compliance challenges as privacy and cybersecurity legislation evolves.
-
Balance Compliance with Institutional Goals: Gain strategies for maintaining compliance without sacrificing institutional agility, innovation, or academic freedom, achieving a balance that supports organizational goals.
-
Establish a Culture of Compliance and Privacy: Develop initiatives that foster a culture of privacy and compliance institution-wide, empowering all staff to take ownership of data protection and security. Focus on embedding these principles into the institution's core values.
Attendees of sessions in this track will glean the skills and knowledge necessary to build, maintain, and scale effective cybersecurity and privacy compliance programs, ensuring institutional integrity and resilience in an evolving regulatory landscape. Attendees will be equipped with actionable tools to support compliance while advancing the mission of higher education in a responsible, secure, and ethically sound manner.
The Evolving Technologies and Practices track delves into the latest advancements and strategies that are reshaping operational excellence and training practices in higher education. As institutions navigate an increasingly complex environment of digital transformation, evolving student needs, and demands for operational efficiency, this track explores how technology and optimized practices can drive institutional success and enrich the educational experience. The learning outcomes of this track will focus on:
-
Understand Key Technologies: Gain knowledge of current and emerging technologies, such as artificial intelligence, machine learning, and Zero Trust architectures, and their applications in protecting sensitive institutional data and personal or controlled unclassified information.
-
Implement Effective Practices: Learn best practices for safeguarding information across digital environments, focusing on data minimization, secure data storage, and their relation to regulatory compliance.
-
Enhance Security Operations and Incident Response: Develop skills in setting up and managing robust security operations, including threat monitoring, risk assessment, and incident response procedures.
-
Apply Risk Management and Compliance Strategies: Explore strategies for identifying, assessing, and mitigating cybersecurity and privacy risks while ensuring compliance with regulatory requirements and institutional policies.
-
Address Human Factors in Cybersecurity and Privacy: Understand the role of human behavior in cybersecurity and privacy vulnerabilities and learn methods for fostering a security- and privacy-aware culture among staff, faculty, and students.
-
Design Scalable Programs: Gain insights into creating scalable and adaptable security and privacy programs tailored to institutional size, budget, and risk profile.
-
Assess Cybersecurity Resilience and Recovery: Learn techniques for evaluating an institution’s cybersecurity resilience and implementing recovery protocols to minimize downtime and data loss during a cyber incident.
-
Leverage Data Analytics and Automation: Understand the role of data analytics and automation in enhancing cybersecurity operations, from threat detection to compliance reporting. Learn about privacy-enhancing technologies that preserve privacy of individuals across large integrated data systems.
-
Develop a Proactive Strategy: Leave with actionable insights for building proactive cybersecurity and privacy strategies that align with institutional goals, ensuring long-term protection and resilience.
Through this track, attendees will be equipped with practical skills and knowledge to strengthen their institutions' cybersecurity and privacy practices, fostering a safer and more resilient digital environment.
Delivery Choices
You should select the delivery format that best fits your session structure and presentation style. Note: Although EDUCAUSE will make every effort to honor your preference for delivery format, we reserve the right to reassign the format based on space and program balance.
This type of session works best if your primary objective is to offer a tour or provide an overview of an innovative product or service. Select this delivery format if you want to showcase a product or service you implemented, built, or created. This is a great way to tell your “it worked for us” story. These will be either 20-minute or 45-minute sessions. You may have a maximum of two presenters for this session type.
Discussion sessions are opportunities for event attendees to share campus challenges and solutions through conversational exchange. By actively engaging audience participants in dialogue about hot topics or broad issues, presenters of these sessions will rely on the collective community experience among session attendees. There is no room for "sage on the stage" in a facilitated discussion session; this is a chance to have organic, topically relevant, peer-to-peer learning experiences at the conference. These will be 45-minute sessions. You may have a maximum of two facilitators for this session type.
These sessions are opportunities to share topics of interest, lessons learned, foresight, or evidence of impact related to a conference theme. Presenters, whether one person or a group, should include ways to actively engage the audience in the session. If you are proposing a panel, it should represent two or more opposing viewpoints for a lively group discussion. The best panels and group presentations have diversity in perspective, opinion, and representation and the most interesting sessions are often ones that offer many different perspectives. These will be either 20-minute or 45-minute sessions. You may have a maximum of four presenters/panelists for this session type.
Posters give participants and presenters the opportunity to share and examine problems, issues, and solutions in a casual, personal environment. Poster presenters are expected to engage with individuals, either one-on-one or in small groups, for short periods of time throughout the time slot allocated. Presenters will use a physical poster display to visually present their topics. There will be multiple poster sessions happening at the same time, allowing for attendees to visit many posters and peruse the various topics. These will be 45-minutes. You may have a maximum of two presenters for this session type.
Session Title, Abstract, Engagement Strategies, and Takeaways
Session Title
Create a short title that is creative, yet descriptive. We ask that you do not use institution, company, or product names anywhere in the title.
Abstract
This is a short description of what your session is about. If your proposal is accepted, the abstract is what most attendees will use to make decisions about which sessions to attend. What can you say that will encourage your colleagues to attend your session?
Session Takeaways and Participant Engagement Strategies
Clear session outcomes/takeaways and creative engagement strategies are essential components of every session. Proposal reviewers will closely examine and rate each proposed session's takeaways, which should clearly describe what participants will know or be able to do as a result of participating in the session. A successful proposal must also include the specific and creative ways in which the presenter(s) will engage with participants.
Session Description
This is where you get to more fully describe the plan for your session and the importance, relevance, value, uniqueness, and/or interest to our community of higher education professionals. You’ll describe how the session will unfold (timetable), the key findings or points you will present, supporting evidence, and so forth.
Keywords
These are areas of specific interest and will help attendees fine-tune their personalized schedules. Optional: You will be asked to provide three keywords or short phrases that relate to your presentation.
Submitter Comments: We have an open field for you to provide any comments you would like the Program and Selection Committees to know.
Selection Process
Proposals are selected to ensure the conference offers a comprehensive, non-promotional, not commercially biased, objective, and diverse program. Proposals that clearly describe innovative and creative work will receive the highest priority in the selection process. Attention will also be given to heterogeneity of institutions/organizations, presenters, and geographic location.
The identity of proposal submitters and proposed presenters will be hidden during the main review process. Proposals will be reviewed by peer reviewers and the conference Program Committee using the following selection criteria:
- ☐ Relevance of Topic: Is the topic of relevance, importance, value, and/or interest to higher education?
- ☐ Session Outcomes Achievability: Is there alignment between the stated session outcomes and the proposal description?
- ☐ Quality of Submission: Does the proposal demonstrate quality, as measured by accuracy, clarity, comprehensiveness, and depth of demonstrated understanding of the topic?
- ☐ Engagement/Knowledge Transfer: Does the proposal provoke discussion, audience engagement, and/or facilitate knowledge transfer and development of new competency?