As part of our commitment to fostering a collaborative community focused on advancing IT security and governance leadership, we’ve outlined specific terms to ensure a clear understanding and mutual respect among all contributors. These conditions support our collective effort to develop leadership, share innovative solutions, and establish best practices within the field. Your willingness to participate signifies a shared goal of enhancing our professional community without expectation of financial compensation.

  1. Submission Terms: By submitting an abstract, speakers agree to allow the CISO Initiative to use their presentation in various formats and platforms, including the event website, materials, audio, and video recordings.
  2. Abstract Review: The CISO Initiative team has sole discretion over abstract reviews, with the selection process ongoing and decisions communicated via the specified email.
  3. Speaker Representation: Speakers confirm their presentation is original, free from plagiarism, and not a vendor-specific presentation or sales pitch.
  4. Attendance Rules: Associates of speakers, such as co-workers or PR representatives, must be approved registered attendees to access the session or the event.
  5. Schedule Flexibility: Speakers acknowledge that the CISO Initiative may adjust scheduled speaking times and that they should be prepared to present at any point during the event.
  6. Right to Rescind: The CISO Initiative reserves the right to cancel an accepted submission at any time without explanation.
  7. Presentation Template Requirement: Speakers are required to use the CISO Initiative’s summit-specific templates for their presentations to maintain a consistent and professional appearance across all sessions.
  8. Ownership of Presentations: All presentations delivered at the summit will become the property of The CISO Initiative, unless a confidentiality agreement specifies otherwise. This ensures that the content can be used for educational purposes and promotes the initiative’s goals.
  9. Feedback and Evaluation: Speakers consent to the collection and use of attendee feedback regarding their session. This feedback may be used by The CISO Initiative for quality improvement purposes, to guide future event content, and enhance participant experience. Speakers agree that this feedback is for internal use and any public disclosure of session evaluations will be anonymized unless specific consent is provided.
  10. No Compensation for Speakers: It is understood that speakers will not receive financial compensation for their participation in the summit. The CISO Initiative is built on the principle of community collaboration, with the goal of mutually developing leadership skills, solutions, and best practices within the IT security and governance field. Speakers are invited to contribute based on a shared commitment to advancing the profession and supporting peer growth without expectation of payment.