2019 poster session
Cybersecurity & Awareness Fair

Poster Contest Information 2021

POSTER SESSION GUIDELINES

COMPETITION INFORMATION
Mission: The goal of this contest is to raise awareness among the fair’s audience in a cybersecurity related topic. We have broken the contest into two main categories: Cyber Awareness and Cyber Problem-Solving Research.

The Cybersecurity Awareness poster is intended to educate attendees regarding a cybersecurity topic. The Cyber Problem-Solving Research poster is meant to explore the vulnerabilities of the cyber domain and to search for ways to reduce or eliminate cybersecurity risks. The team size is limited to a maximum of two members for the awareness poster and four members for the Problem-Solving poster.

Poster board topics: Emerging topics in the field of Cyber Security & Information Assurance, etc.:

Sample Topics

Zero Trust Cloud Security Mobile Security
Cryptocurrency Smart Coding Forensics
Biohacking Smart Cities SCADA
Protocols Election Security Cryptography
Physical Security Digital Profiles Malware
Quantum Cryptography Advanced Persistent Threats Satellite Security

 

Poster Specifications

Contestant/Team must submit their presentations using the required poster template.
Contestant/Teams that do not use the provided poster template will not be accepted.
The initial poster submission can be a DRAFT with placeholders for judges to review.
Contestants are highly encouraged to upload the latest drafts as work progresses.
Final poster for presentation at the event must be completed and uploaded no later than 10am on October 25, 2021. Late posters will not be accepted.

Thanks to the support and generosity of the Los Angeles Chapter of ISACA, winning teams will receive monetary prizes and a speaking slot at
the ISACA Los Angeles Spring Conference to be held the week of April 11th, 2022.

Cyber Security Problem-Solving Poster Team Prizes:
  • First Place: $1000
  • Second Place: $750
  • Third Place: $500
Cybersecurity Awareness Poster Team Prizes:
  • First Place: $350
  • Second Place: $250
  • Third Place: $150
  1. The Cyber Security and Awareness Fair committee will award each winner after the event. If it is a team, the award amount will be divided by the number of members.
  2. Depending on the size of the award, taxes may be applicable and are the responsibility of the winner.
  3. Decision(s) of the judge(s) is/are final.
IMPORTANT DATES AND DEADLINES
  • October 1, 2021 at 11:59 PM PST – Poster Submission Deadline. No late entries will be accepted.
  • October 8, 2021 - Students will be notified of their acceptance.
  • October 14, 2021 – Accepted students attend boot camp on how to present.
  • October 25, 2021 at 10 AM PST- Final poster, research paper, and presentation video link must be completed and uploaded. No late work will be accepted.
  • October 28, 2021 10 AM – 2 PM PST- Presentation for competition: full team must be available.
  • April 4, 2022 - Boot camp for presentation at ISACA Los Angeles Spring Conference.
  • April 12-16, 2022 - First place teams will be invited to present their award-winning poster at the ISACA Spring Conference (minimum 3 out of 4 must present for Problem-Solving)

ELIGIBILITY AND SUBMISSION INFORMATION
Eligibility to compete: Undergraduate and graduate college students currently enrolled at an accredited college listed on the Department of Education website with a .edu email address that is active for the semester or quarter of the contest.

Submit your entry here: Submission Link You do not need the research paper for initial submission on Oct 1,2021, it is due October 25th, 2021.

Required Template for Posters (Updated 9.16.21): Poster Template (PPT)

Questions regarding submission issues, email Mohammad Husain (mihusain@cpp.edu)

POSTER SPECIFICATIONS

  • Contestant/Team must submit their presentations using the required poster template.
  • Contestant/Teams that do not use the provided poster template will not be accepted.
  • The initial poster submission can be a DRAFT with placeholders for judges to review.
  • Contestants are highly encouraged to upload the latest drafts as work progresses.
  • Final poster for presentation at the event must be completed and uploaded no later than 10am on October 25, 2021. Late posters will not be accepted.

CYBER AWARENESS POSTER CRITERIA (limit 2 members)

  • Clearly state the learning objective of the poster.
  • Relevance to the field of cyber security, information assurance and forensics – The topics need be related to the theme of the cyber security and awareness fair. For example - How someone can securely use computing and handheld devices in an Internet connected environment, how not to become a victim of cyber attacks, discussion of existing cyber attacks and defense techniques for computing and handheld devices including their communication networks.
  • Potential for practical impact - The topic should be real life application oriented. It should be a topic that can be easily communicated to a non-technical person who might be a user of that technology in real life. An audience should be able to relate it to everyday life and understand the implication of the topic presented.
  • Degree of originality – The importance of the study will be evaluated by the judges. Judges will consider the following questions:
o Does the study show originality or creativity in research design and/or interpretation?
o Does it address a new problem, or an old problem in a new way?
o Is the study and its results important?
o Does it shed new light on the issue at hand, or suggest important new methods, procedures, etc.?
o Does the study report a necessary and valuable replication of earlier work?
  • Does the abstract make a clear case for how the topic fits into a larger context?
  • Does the student address the issue of the study's importance to the field of cyber security, information assurance and forensics? (Please pay particular attention to these last two questions.)
  • Technical depth - This will measure whether the team has done adequate review of existing literature to present adequate information to the audience and be able to answer the queries of an audience.
  • Abstract must include 2 Citations in MLA format within the last three years.
  • Research paper 2-4 pages in length including abstract, introduction, methodology, results and discussion, conclusion and recommendation.
  • The overall quality of the submission – This attempts to evaluate the overall impression of the student’s research achievement. Judges will consider the following questions: Did the observations presented support the conclusions? Was there evidence of progress towards the goals & objectives? Was there evidence that the project led to learning beyond the classroom?
CYBER PROBLEM-SOLVING RESEARCH POSTER CRITERIA (limit 4 members)
  • Clear statement of the problem and its economic, social, and/or environmental implications for the international cybersecurity community.
  • Research plan and project narrative that describes how the proposed research will contribute to the solution or further understanding of the problem.
  • Brief discussion of existing scientific literature on the issue and how the proposed research differs from or enhances current activities.
  • Outline potential measurable outcomes. How will the research team track progress towards the stated outcomes and evaluate the overall impact of the project?
  • Summary of how the research solves the problem defined with evidence that the activities validated the hypothesis.
  • Suggested future research to foster the exchange of ideas, conduct joint research experiments, and/or provide training on cutting edge techniques.
  • Applicants should include a brief discussion on how these activities may facilitate new or strengthen existing collaborations, especially where young researchers or students may be involved.
  • Relevance to the field of cyber security, information assurance and forensics – The topics need be related to the theme of the cyber security and awareness fair. How someone can securely use computing and handheld devices in an Internet connected environment, how not to become a victim of a cyber attacks, discussion of existing cyber attacks and defense techniques for computing and handheld devices including their communication networks
  • Potential for practical impact - The topic should be real life application oriented. It should be a topic that can be easily communicated to a non-technical person who might be a user of that technology in real life. An audience should be able to relate it to everyday life and understand the implication of the topic presented.
  • Degree of originality – Originality is indispensable to the processes of creation and innovation at all levels. In evaluating originality, consider the three elements of scientific work: hypothesis, methods, and results. Submissions to this category must be based on an original hypothesis, backed by sound research using scientific methods, and needs to present the results as an original idea. Rather than summarizing what is already known into a new format, does this entry produce new knowledge through observations, experiments, or new approaches to solving existing problems in the field of cybersecurity, information assurance, or forensics?
  • Technical depth - This will measure whether the presenter(s) have completed a thorough review of the existing literature to present adequate information to the audience and be able to answer the queries of an audience.
  • Abstract must include 4 Citations in MLA format within the last three years.
  • Research paper 5-10 pages in length including abstract, introduction, literary review, methodology, results and discussion, conclusion and recommendation.
  • The overall quality of the submission – This attempts to evaluate the overall impression of the student’s research achievement. Judges will consider the following questions: Did the observations presented support the conclusions? Was there evidence of progress towards the goals & objectives? Was there evidence that the project led to learning beyond the classroom?
VIRTUAL REQUIREMENT
Top submissions in each category will be chosen for final presentation at the Cyber Security and Awareness Fair based on the abstract and poster draft submission. The final judging will be on October 28th, 2021. Contestant/Team must be available to virtually present content of their abstract from 10am-2pm on October 28th, 2022 and at the ISACA Spring Conference April 12-16 2022 (day TBD). Final judging for the winners will be held on the day of the event. Decision of the judges is final.

  • The virtual presentation will be during the event. Presenters are asked to prerecord the presentation and be available for live questions with the judges and audience members afterwards. All team members must attend the live question period.
  • Recording and posting of video specification will be provided to those presenting at the event during the boot camp on October 14, 2021.
  • Length of the video is 7 minutes for Cyber Awareness, 10 minutes for Cyber Problem Solving Research.
  • Each team member must present in the video. Do not go over allotted time.
  • Visual materials must be comprised of the abstract content and the poster only. Make sure content is capable of being easily read on a screen.
  • Contestant/Team will be given a 25-minute window for the judges will be in attendance of the zoom session.
  • The time allocated after the video will be for questions and answers with the judges.
PRESENTATION TIPS
  • Dress professionally.
  • Check your audio and lighting.
  • Establish eye contact as if you were in a physical room.
  • State the learning objective or statement of the problem and its economic, social, and/or environmental implications for the international cybersecurity community.
  • Prepare a short statement to walk the viewers through your figures to discuss your project.
  • Be prepared to briefly discuss your hypothesis, point out your work, address key pieces of data, and summarize your conclusions.
  • Point to specific parts of your poster as you explain your project.
  • Speak to the viewers, not your poster.
  • Keep in mind that you likely know much more about your project than the viewers. Don’t assume knowledge on their part.
  • Presentations should be discussed, rather than simply read.
RECOMMENDATIONS FOR THE POSTER
  • Properly identify in the abstract and on the poster the title of presentation, student(s) name(s), and school being represented.
  • Use a large enough fonts and colors to be visible by someone that is visually impaired. (W3C references)
  • Be sure to leave enough white space to allow people to focus on what is most important for them to see.
  • When using graphics, do not put too much information in one figure or chart.
  • When using text, avoid long sentences; instead use bulleted statements.
  • If using acronyms, provide definitions.