The 17th International Conference for Internet Technology and Secured Transactions (ICITST-2022) will be held from the 6th to 8th of December, 2022.
The ICITST is an international refereed conference dedicated to the advancement of theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST-2022 aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The COVID-19 has put constraints on our daily life and there is ongoing travel concern in relation to the current pandemic. Taking into consideration the health and safety of all our participants, the ICITST-2022 will be held online.
Who should attend the ICITST?
- Undergraduates, Graduates/Postgraduates, researchers and Professionals who are working or studying Internet Security, Cyber Security, Information Security, Smart Cities, Access Control, Biometric System, Computer Forencis, Information Technology, Computer Science Laboratory, Ubi/Cloud Computing, Cloud Security, Internet Application and Technology, Multimedia and Web Services.
- Professionals and researchers responsible for security governance of information, IT security, researchers in organizations that deploy compliance of cybersecurity standards and guidelines.
- The information securty engineers, technicians, IT security professionals, IT management, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.
What you can expect at this year’s conference
We listened to all the great feedback we received from last year’s attendees and have incorporated some of their suggestions into ICITST-2022. Explore highly relevant sessions, led by industry’s and academic top experts. The sessions will giving you the ability to dive deeper into a topic, ask more questions and interact more with presenters. Attend Keynotes. Be inspired by presentations from thought leaders representing a wide range of disciplines within and outside the cyber security. Share a common interest to explore a specific security topic.