Sponsors

 

No pictures to show

 

Follow Us

Upcoming events

Menu
Log in


Call for Session Ideas: Cybersecurity Capabilities and Careers Summit (3CS)

  • June 24, 2025
  • 12:00 PM
  • June 23, 2026
  • 11:59 PM
  • Various locations

Registration


Register


Call For Session Ideas

2025 Session Ideas accepted until 11:59 pm on August 10, 2025

Cybersecurity Capabilities and Careers Symposia (3CS) sessions explore or document innovative ideas, evidence-based practices, and demonstration of techniques and technologies for raising the capability maturity of the cybersecurity workforce. Proposers of sessions for 3CS are encouraged to submit a brief statement describing their session idea. Student proposals are warmly welcomed!

The lead author of an accepted session proposal is eligible for stipends to participate in a 3CS event. If you elect to attend in person and evaluate sessions throughout the event, you are eligible to receive a travel stipend of up to $3,000 based on the distance from your home to the workshop venue. 

Stipend funding is limited, and the amounts are determined by the federal per diem rates for travel to the city on the dates of the event. In addition to meeting the eligibility requirements, stipend availability is determined by the date of proposal acceptance and availability of funding from 3CS sponsors.

Submit your session idea as soon as possible to ensure funds are available to support your attendance. When you register, you will be asked to select a date to attend a Proposal Development Workshop. During this workshop and the following panel review and mentoring program, you will receive guidance and assistance in developing your proposal for the conference to meet the requirements for leading your session at an upcoming 3CS event. 

There are three types of 3CS Sessions. When registering your idea, please indicate which type of session you have in mind, though the session type may change when you meet with your proposal development mentoring team.

  • Dialogue sessions:  A dialogue session is an exchange of ideas between experts and stakeholders, facilitated by the session moderator, highlighting different points of view, experiences, and expertise on a problem or area related to cybersecurity practices, including designing, developing, evaluating, learning, teaching, or performing cybersecurity roles and functions. Dialogue proposals should specify a problem limiting the development of cybersecurity capability maturity that is not well understood or addressed. The proposal should also include 3-5 thought-provoking, open-ended questions that will gather insights and experiences from session attendees about the factors that are the likely and substantive causes of this problem as well as potential interventions that can impact the influence of causal factors to bring about a desired change in the problem. The goal of a Dialogue is to discover common themes and ideas for a future systematic study. 
  • Evidence-Based Practice Sessions: Methods or interventions that data shows to be effective or ineffective in achieving a specific outcome. Proposals should specify how the method or intervention has impacted individual competence development or organizational effectiveness, preferably referencing the population studied and the correlation or effect size of the intervention factors on the level or degree of a desirable outcome or outcomes. Methods or interventions can be protocols or procedures for professional practice or curriculum or instructional designs for use by educators or trainers. 
  • Demonstrations: Technical demonstrations that showcase the capabilities and features of the technology or technique for raising cybersecurity capability maturity, preferably including a hands-on experience for the audience. Breakouts based on the proposed session type

REGISTER NOW to submit your session idea!


This material is based on work supported by the National Science Foundation (NSF) under Grant Number DUE-1204533DUE-1601150, and DUE-2054753Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of NSF.

© 2025 National CyberWatch Center PRIVACY POLICY / TERMS OF USE



Powered by Wild Apricot Membership Software