IWS18 - Call for Presentations
Submission deadline:Tuesday, 26 August 2025
Submission guidelines
ABOUT THE EVENT
The Information Warfare Summit (IWS) is Oklahoma's premiere cybersecurity event. IWS18 is presented by the InfraGard Oklahoma Members Alliance (IOMA). IWS brings together 600+ cybersecurity professionals to learn from best-in-industry content focused on the latest developments in cyber. IWS gives attendees an opportunity to network, exchange ideas, explore key topics of interest, and broaden their horizons. All so they can collect the skills and knowledge needed to bolster their value as cyber professionals.
EVENT FORMAT
IWS18 will be offered as an in-person event. All speakers will be required to present in person in Edmond, OK.
ABOUT INFRAGARD OKLAHOMA MEMBERS ALLIANCE
The InfraGard Oklahoma Members Alliance (IOMA) is Oklahoma's leading cybersecurity organization for cyber and critical infrastructure professionals driven by our mission to share threat information and help to secure a safer Oklahoma. Our more than 580 members and associates are safeguarding the future for our children.
TARGET AUDIENCE
IWS is open to critical infrastructure, cybersecurity, and technology professionals in all stages of their careers. The vast majority of our attendees are Oklahoma's cyber professionals.
SESSION TYPES
Breakouts (50 minutes): A ~40-minute presentation and ~10 minute Q&A.
Panel Discussions (50 minutes): A ~40-minute topics discussion and ~10 minute Q&A. Small group roundtable discussions or exercises with one to four panelists/speakers.
SPEAKER BENEFITS
Complimentary All Access Pass to IWS, speaker gift, and promotion in conference marketing materials including the event website and on social media.
IWS18 NON-COMMERCIAL POLICY
Presentations must be vendor neutral.
CONTENT AREAS
Priority will be given to session submissions that align with one or more of the specific topic categories listed below. Top submissions relay timely, real-world experiences that are actionable and relevant to our audience. *Other topic areas may be considered but are not guaranteed priority consideration.
Topic categories
- *Other (Please Specify)
- Careers
- Cloud security
- Cyber leadership and ethics
- Drones
- Frameworks, standards and guidelines
- General security
- Governance, risk, and compliance (GRC)
- Hacking
- SecOps and threat response
- Software security