{"id":34,"date":"2019-03-18T19:30:29","date_gmt":"2019-03-18T19:30:29","guid":{"rendered":"https:\/\/meetings.informs.org\/wordpress\/2022security\/?page_id=34"},"modified":"2022-05-19T17:15:39","modified_gmt":"2022-05-19T17:15:39","slug":"submit","status":"publish","type":"page","link":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/","title":{"rendered":"Submit a Presentation"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-34\" data-postid=\"34\" class=\"themify_builder_content themify_builder_content-34 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_65ae717 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_26f898e first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_90814bd  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p>Submit a presentation to be part of a session during the 2022 INFORMS Conference on Security. Your presentation proposal should answer the listener\u2019s basic questions: \u201cWhat will I learn from this session? What information\/knowledge\/ideas will I come away with?\u201d Please describe in detail what you will cover during your presentation.<\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447\" class=\"hs-cta-node hs-cta-d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447\"><!-- [if lte IE 8]><\/p>\n<div id=\"hs-cta-ie-element\"><\/div>\n<p><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/3449182\/d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447\"><img loading=\"lazy\" decoding=\"async\" id=\"hs-cta-img-d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447\" class=\"hs-cta-img alignnone\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/3449182\/d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447.png\" alt=\"Submit a presentation\" width=\"288\" height=\"48\"><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(3449182, 'd92a2d8b-f0c0-4c7e-9dd9-616c8aef5447', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<p><strong>Topics Include:<\/strong><\/p>\n    <\/div>\n<\/div>\n<!-- \/module text -->        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_tatt815\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_7086815 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_bxo6984   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <ul>\n<li>Artificial Intelligence, Machine Learning, and Data Security<\/li>\n<li>Critical Infrastructure, Cyber Security, and Physical Security<\/li>\n<li>Defense and Military Applications<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_k02q815 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_8b74789   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <ul>\n<li>Electric Grid and Energy Systems Security<\/li>\n<li>Homeland Security<\/li>\n<li>Transportation and Supply Chain Security<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_czn3606 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_rrn9792  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Important Dates<\/h3>\n<h4>Presentation Proposal Submission Deadline<strong><br><\/strong><\/h4>\n<p><strong>July 1, 11:59pm EDT<\/strong><br>For Contributed and Invited Proposals (rolling acceptance).<\/p>\n<h4>Speaker Registration Deadline<\/h4>\n<p><strong>July 8, 11:59pm EDT<br><\/strong>If a speaker is not registered by July 15, 2022 they will be notified that their presentation will be removed from the program.\u00a0<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_kvdm545 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_pnv6547 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_dfiw852  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2><span style=\"font-weight: normal;\">Proposal Guidelines (Size\/Length)<\/span><\/h2>\n<p>Presentation proposals have a maximum length of 750 characters (approximately &nbsp;70 words). Titles have a maximum length of 150 characters.<\/p>\n<ul>\n<li>Letters, numbers, and *common math symbols accepted.<\/li>\n<li>All proposals must be in English.<\/li>\n<li>Do not include title or author information in the body of your abstract.<\/li>\n<\/ul>\n<p>Review your presentation proposal and check for typographical and spelling errors, coherence. Proposals will be published exactly as entered if accepted.<\/p>\n<p>*Use only \u201ctext pad\u201d when entering math symbols.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_5i6c47 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_a286f2a tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_58d2199 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_36fe53e  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Submit Early!<\/h3>\n<h4>Contributed Presentations<\/h4>\n<p>If you wish to contribute a proposal and have NOT received an invitation from a Session Chair, submit your proposal for contributed presentation. Submitters will be notified of acceptance by the end of July.<\/p>\n<h5>Contributed Topics Include:<\/h5>    <\/div>\n<\/div>\n<!-- \/module text -->        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_khqs892\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_91mr893 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_4u00732   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <ul>\n<li>Critical infrastructure protection<\/li>\n<li>Cybersecurity<\/li>\n<li>Data analytics<\/li>\n<li>Data security and privacy<\/li>\n<li>Disaster preparedness and recovery<\/li>\n<li>Emergency preparedness<\/li>\n<li>Food security<\/li>\n<li>Healthcare security<\/li>\n<li>Homeland security<\/li>\n<li>IoT and medical devices<\/li>\n<li>Interdisciplinary applications<\/li>\n<li>Law enforcement<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_pf86894 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_48b8846   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <ul>\n<li>Machine learning and artificial intelligence<\/li>\n<li>Military applications<\/li>\n<li>National security<\/li>\n<li>Network resilience<\/li>\n<li>Pandemics<\/li>\n<li>Physical security<\/li>\n<li>Power system cyber-security and resilience<\/li>\n<li>Public health security<\/li>\n<li>Risks and opportunities of quantum computing<\/li>\n<li>Supply chain security<\/li>\n<li>Transportation security<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n        <!-- module text -->\n<div  class=\"module module-text tb_ia0a998  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Invited Presentations<\/h3>\n<p>Presenters will be notified by email to submit their individual proposals after the Session Chair has submitted the session. If you have not received an invitation to submit from a Session Chair, you will not be able to login through the system.<\/p>\n<h4>Session Chairs<\/h4>\n<p>Session Chairs will be notified by email to submit any missing information once the session title has been submitted. Please note if you are chairing more than one session you may receive more than one email. Please retain this information as it will be your access to the system.<\/p>\n<h5>Cluster Chair Entry Deadline<\/h5>\n<p><strong>June 1, 11:59pm EDT<br><\/strong>Cluster Chairs must enter Session Chairs by this date.<\/p>\n<h5>Session Entry Deadline<\/h5>\n<p><strong>June 15, 11:59pm EDT<\/strong><br>Session Chairs must enter Presenters by this date.\u00a0<em>Applies to Session Chairs Only<\/em>.<\/p>\n<p>If you have not received an invitation to submit from a Chair, you will not be able to log in through the system as a Session Chair.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_gbeb86  repeat \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Questions?<\/h2>\n<p>Contact <a href=\"mailto:meetings@informs.org\">meetings@informs.org<\/a>.<\/p>\n<h2>Last Day for Changes<\/h2>\n<p>Last day to make changes to existing proposals is <strong>July 15, 2022<\/strong>.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_o3o5584 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Submit a presentation to be part of a session during the 2022 INFORMS Conference on Security. Your presentation proposal should answer the listener\u2019s basic questions: \u201cWhat will I learn from this session? What information\/knowledge\/ideas will I come away with?\u201d Please describe in detail what you will cover during your presentation. Topics Include: Artificial Intelligence, Machine [&hellip;]<\/p>\n","protected":false},"author":1001077,"featured_media":440,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-34","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Submit a Presentation - 2022 INFORMS Conference on Security<\/title>\n<meta name=\"description\" content=\"View program topics to craft the perfect presentation proposal to submit for the 2022 INFORMS Conference on Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Submit a Presentation\" \/>\n<meta property=\"og:description\" content=\"View program topics to craft the perfect presentation proposal to submit for the 2022 INFORMS Conference on Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/\" \/>\n<meta property=\"og:site_name\" content=\"2022 INFORMS Conference on Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/INFORMSpage\/\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-19T17:15:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"136\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@INFORMS\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/\",\"name\":\"Submit a Presentation - 2022 INFORMS Conference on Security\",\"isPartOf\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"datePublished\":\"2019-03-18T19:30:29+00:00\",\"dateModified\":\"2022-05-19T17:15:39+00:00\",\"description\":\"View program topics to craft the perfect presentation proposal to submit for the 2022 INFORMS Conference on Security.\",\"breadcrumb\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#primaryimage\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"contentUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"width\":400,\"height\":136},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submit a Presentation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\",\"name\":\"2022 INFORMS Conference on Security\",\"description\":\"Arlington, VA | August 29-30, 2022\",\"publisher\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization\",\"name\":\"2022 INFORMS Conference on Security\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"contentUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"width\":400,\"height\":136,\"caption\":\"2022 INFORMS Conference on Security\"},\"image\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/INFORMSpage\/\",\"https:\/\/x.com\/INFORMS\",\"https:\/\/www.instagram.com\/informs_orms\",\"https:\/\/www.linkedin.com\/groups\/82644\/profile\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Submit a Presentation - 2022 INFORMS Conference on Security","description":"View program topics to craft the perfect presentation proposal to submit for the 2022 INFORMS Conference on Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/","og_locale":"en_US","og_type":"article","og_title":"Submit a Presentation","og_description":"View program topics to craft the perfect presentation proposal to submit for the 2022 INFORMS Conference on Security.","og_url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/","og_site_name":"2022 INFORMS Conference on Security","article_publisher":"https:\/\/www.facebook.com\/INFORMSpage\/","article_modified_time":"2022-05-19T17:15:39+00:00","og_image":[{"width":400,"height":136,"url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@INFORMS","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/","name":"Submit a Presentation - 2022 INFORMS Conference on Security","isPartOf":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website"},"primaryImageOfPage":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#primaryimage"},"image":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#primaryimage"},"thumbnailUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","datePublished":"2019-03-18T19:30:29+00:00","dateModified":"2022-05-19T17:15:39+00:00","description":"View program topics to craft the perfect presentation proposal to submit for the 2022 INFORMS Conference on Security.","breadcrumb":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#primaryimage","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","contentUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","width":400,"height":136},{"@type":"BreadcrumbList","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/submit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/meetings.informs.org\/wordpress\/2022security\/"},{"@type":"ListItem","position":2,"name":"Submit a Presentation"}]},{"@type":"WebSite","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/","name":"2022 INFORMS Conference on Security","description":"Arlington, VA | August 29-30, 2022","publisher":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/meetings.informs.org\/wordpress\/2022security\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization","name":"2022 INFORMS Conference on Security","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","contentUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","width":400,"height":136,"caption":"2022 INFORMS Conference on Security"},"image":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/INFORMSpage\/","https:\/\/x.com\/INFORMS","https:\/\/www.instagram.com\/informs_orms","https:\/\/www.linkedin.com\/groups\/82644\/profile"]}]}},"builder_content":"<p>Submit a presentation to be part of a session during the 2022 INFORMS Conference on Security. Your presentation proposal should answer the listener\u2019s basic questions: \u201cWhat will I learn from this session? What information\/knowledge\/ideas will I come away with?\u201d Please describe in detail what you will cover during your presentation.<\/p> <p><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/3449182\/d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447\"><img loading=\"lazy\" decoding=\"async\" id=\"hs-cta-img-d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/3449182\/d92a2d8b-f0c0-4c7e-9dd9-616c8aef5447.png\" alt=\"Submit a presentation\" width=\"288\" height=\"48\"><\/a><\/p> <p><strong>Topics Include:<\/strong><\/p>\n<ul> <li>Artificial Intelligence, Machine Learning, and Data Security<\/li> <li>Critical Infrastructure, Cyber Security, and Physical Security<\/li> <li>Defense and Military Applications<\/li> <\/ul>\n<ul> <li>Electric Grid and Energy Systems Security<\/li> <li>Homeland Security<\/li> <li>Transportation and Supply Chain Security<\/li> <\/ul>\n<h3>Important Dates<\/h3> <h4>Presentation Proposal Submission Deadline<strong><br><\/strong><\/h4> <p><strong>July 1, 11:59pm EDT<\/strong><br>For Contributed and Invited Proposals (rolling acceptance).<\/p> <h4>Speaker Registration Deadline<\/h4> <p><strong>July 8, 11:59pm EDT<br><\/strong>If a speaker is not registered by July 15, 2022 they will be notified that their presentation will be removed from the program.\u00a0<\/p>\n<h2>Proposal Guidelines (Size\/Length)<\/h2> <p>Presentation proposals have a maximum length of 750 characters (approximately &nbsp;70 words). Titles have a maximum length of 150 characters.<\/p> <ul> <li>Letters, numbers, and *common math symbols accepted.<\/li> <li>All proposals must be in English.<\/li> <li>Do not include title or author information in the body of your abstract.<\/li> <\/ul> <p>Review your presentation proposal and check for typographical and spelling errors, coherence. Proposals will be published exactly as entered if accepted.<\/p> <p>*Use only \u201ctext pad\u201d when entering math symbols.<\/p>\n<h3>Submit Early!<\/h3> <h4>Contributed Presentations<\/h4> <p>If you wish to contribute a proposal and have NOT received an invitation from a Session Chair, submit your proposal for contributed presentation. Submitters will be notified of acceptance by the end of July.<\/p> <h5>Contributed Topics Include:<\/h5>\n<ul> <li>Critical infrastructure protection<\/li> <li>Cybersecurity<\/li> <li>Data analytics<\/li> <li>Data security and privacy<\/li> <li>Disaster preparedness and recovery<\/li> <li>Emergency preparedness<\/li> <li>Food security<\/li> <li>Healthcare security<\/li> <li>Homeland security<\/li> <li>IoT and medical devices<\/li> <li>Interdisciplinary applications<\/li> <li>Law enforcement<\/li> <\/ul>\n<ul> <li>Machine learning and artificial intelligence<\/li> <li>Military applications<\/li> <li>National security<\/li> <li>Network resilience<\/li> <li>Pandemics<\/li> <li>Physical security<\/li> <li>Power system cyber-security and resilience<\/li> <li>Public health security<\/li> <li>Risks and opportunities of quantum computing<\/li> <li>Supply chain security<\/li> <li>Transportation security<\/li> <\/ul>\n<h3>Invited Presentations<\/h3> <p>Presenters will be notified by email to submit their individual proposals after the Session Chair has submitted the session. If you have not received an invitation to submit from a Session Chair, you will not be able to login through the system.<\/p> <h4>Session Chairs<\/h4> <p>Session Chairs will be notified by email to submit any missing information once the session title has been submitted. Please note if you are chairing more than one session you may receive more than one email. Please retain this information as it will be your access to the system.<\/p> <h5>Cluster Chair Entry Deadline<\/h5> <p><strong>June 1, 11:59pm EDT<br><\/strong>Cluster Chairs must enter Session Chairs by this date.<\/p> <h5>Session Entry Deadline<\/h5> <p><strong>June 15, 11:59pm EDT<\/strong><br>Session Chairs must enter Presenters by this date.\u00a0<em>Applies to Session Chairs Only<\/em>.<\/p> <p>If you have not received an invitation to submit from a Chair, you will not be able to log in through the system as a Session Chair.<\/p>\n<h2>Questions?<\/h2> <p>Contact <a href=\"mailto:meetings@informs.org\">meetings@informs.org<\/a>.<\/p> <h2>Last Day for Changes<\/h2> <p>Last day to make changes to existing proposals is <strong>July 15, 2022<\/strong>.<\/p>","_links":{"self":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/users\/1001077"}],"replies":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":77,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":677,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/34\/revisions\/677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/media\/440"}],"wp:attachment":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}