<div dir="ltr"><span id="m_-6672883152371201766gmail-docs-internal-guid-81f993de-7fff-9ce3-2488-f4224b74b113"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:10pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">*apologies if you have received multiple copies of this email</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">*********************************************************************</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:16pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">ICISS 2022</span></p><p dir="ltr" style="line-height:1.656;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">18th International conference on Information Systems Security</span></p><p dir="ltr" style="line-height:1.656;text-align:justify;margin-top:0pt;margin-bottom:0pt"><a href="https://www.icissconf.org/" target="_blank" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">https://www.icissconf.org/</span></a><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">16-20 Dec 2022 | IIT Tirupati, Andhra Pradesh, India</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">*********************************************************************</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The 18th edition of the international conference on Information Systems Security (ICISS 2022) to be held at IIT Tirupati in hybrid mode. ICISS is one of the premier conferences organized by the research community in the area of Cyber Security in India. The conference is typically hosted by the IITs/IISc or other premier institutions from India (</span><a href="https://icissconf.org/history.html" target="_blank" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">https://icissconf.org/history.html</span></a><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">). ICISS 2022 will be held between December 16-20, 2022.  </span></p><br><p dir="ltr" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The conference is now open for online participation as well. Please refer to the</span><a href="https://icissconf.org/registration.html" target="_blank" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(74,134,232);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">registration page</span></a><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(74,134,232);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">for registration fee and the attached flyer for further details about the conference.</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Highlights of the conference:</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Keynote Speakers: </span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Visit </span><a href="https://www.icissconf.org/keynote.html" target="_blank" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">here</span></a><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> for more details on the keynote talks</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:10pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">The rise of cyber physical security - in light of cyber physical systems</span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">, Dr. Chandrakant Patel (HP Chief Engineer, Senior Fellow, USA)</span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Research and engineering challenges in blockchain and Web3</span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">, Dr. Ashish Kundu (Head Cyber Security Research, Cisco Research, USA)</span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Security and privacy in federated learning</span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">, Prof. Ling Liu (College of computing, Georgia Institute of Technology, USA)</span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Web3 and the interoperability of asset networks</span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">, Dr. Thomas Hardjono (CTO MIT-Connection Science, USA)</span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:10pt"><span style="font-size:12pt;background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Technology transfer from security research projects: A personal perspective</span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">, Prof. N. Asokan (David R. Cheriton Chair, University of Waterloo, Canada)</span></p></li></ul><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Exciting Panel Discussion: </span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Cybersecurity challenges in Nation Security</span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> - a team led by Dr. Anil Kapoor (Retd) DG, Information Systems, Indian Army.</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Tutorials: </span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">For more details access the tutorial page </span><a href="https://www.icissconf.org/events-tutorials.html" target="_blank" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">here</span></a></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:10pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Techniques of Malware Design and Deployment (Kaspersky) - 12hrs </span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">An introduction to Mitre Att&ck Framework (Qualys) - 3 hrs</span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">An overview of encrypted traffic analysis for cyber security (Vehere Technologies) - 3 hrs</span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:10pt"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Secure digital transformation leveraging Aadhar (eMudhra) – 3 hrs</span></p></li></ul><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Accepted Papers - </span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">16 </span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> high quality accepted papers from the authors across the globe</span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. </span><span style="background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;font-size:12pt;font-family:"Times New Roman";vertical-align:baseline;white-space:pre-wrap">View the list of accepted papers in the conference </span><a href="https://www.icissconf.org/accepted_papers.html" target="_blank" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">here</span></a></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Invited Talks</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:10pt;margin-bottom:0pt"><span style="font-size:12pt;background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Advanced Persistent Threats: A Study in Indian Context, </span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Mr. Himanshu Dubey, QuickHeal Security Labs, India</span></p></li><li dir="ltr" style="margin-left:11pt;list-style-type:disc;font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><p dir="ltr" role="presentation" style="line-height:1.38;text-align:justify;margin-top:0pt;margin-bottom:10pt"><span style="font-size:12pt;background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline">Securing Cyber-Physical and IoT Systems in Smart Living Environments,</span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline"> Prof. Sajal Das, Daniel St. Clair Endowed Chair, Missouri University of Science and Technology, USA</span></p></li></ul><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The conference also includes a PhD forum. </span><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">For the complete details of conference schedule and the registration, please visit the conference website. </span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Conference Venue</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Indian Institute of Technology Tirupati,</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Yerpedu mandal, Tirupati District, Andhra Pradesh, India 517 619</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><a href="https://www.icissconf.org/" target="_blank" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Times New Roman";background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">https://www.icissconf.org/</span></a></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"> </p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Times New Roman";color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Looking forward to seeing at ICISS-2022 at IIT Tirupati</span></p></span><br><div><br></div><div>Regards,</div><div>Organizing Committee</div><font color="#888888"><div>ICISS 2022</div></font></div>