Upcoming Call for Papers
Browse upcoming tech conferences accepting submissions
Found 16 events
📍 Riyadh, Riyadh, SA
Black Hat Middle East & Africa 2025 - Entries Portal Start here Welcome to the Black Hat MEA 2025 entries portal. Here you can apply for a range of Black Hat MEA-related activities, including: Currently Open Call for Trainings Closing Date: Sunday, 27 May (23:00 KSA) Notification to Submitters: Tuesday, 6 May Call for Papers (Briefings) Closing Date: Sunday, 31 August (23:00 KSA) Notification to Submitters: Sunday, 14 September Call for Tools (Arsenals) Closing Date: Sunday, 31 August (23:00 KSA) Notification to Submitters: Sunday, 14 September
📍 Dresden, Saxony, DE
We are looking for presentations about all things infosec, research, ideas, war stories and whatever you want to share with the community.
📍 London, N/A, GB
The Black Hat Europe 2025 Briefings Call for Papers is Now Open!! Important Dates: Call for Papers Opens: June 11, 2025 (12:00 am Greenwich Mean Time UTC + 0h) Call for Papers Closes: August 11, 2025 (11:59 pm Greenwich Mean Time UTC + 0h) Notification to Submitters: late-September/early-October 2025 Briefings Dates/Location: December 10-11, 2025 (ExCel London, United Kingdom) If you have any questions about your submission, please email us at cfp@blackhat.com Speaker Participation Selected speakers will present in-person in London. Before beginning your submission, please refer to the following: Review the Track Descriptions, Resources & Sample Submissions, Speaker Benefits, and Terms here. Planning Document and Portal Navigation Guide To help you prepare your submission, please review the document below containing detailed submission information and FAQs. http://i.blackhat.com/BH-EU-25/BHEU25-CFP-Preparation-Form.pdf Please note this document is for planning purposes only. We do not accept submissions via e-mail. You must submit your proposal through the Black Hat Europe Call for Papers System. Before entering your submission into the system, please save it in a document to avoid losing your work in case of a system timeout. FAQs Can I submit more than one proposal? Yes, but each proposal must be submitted via a separate submission form. Can I submit files (whitepaper, slides, etc.)? Yes, but for security reasons, the "File Upload" field only accepts plain text documents. If your file/whitepaper is not compatible with this format, please provide a link to the file in the relevant submission field. How do I know that you received my submission? You will receive an email notification within 24 hours of receipt of the submission from noreply@email.blackhat.com. If you do not, first check your junk folder and then e-mail cfp@blackhat.com How many speakers can present a talk? Speaking teams are limited to 2. Additional speakers added to the submission will be listed as contributors on the Black Hat Website. If you have any questions or encounter issues, please email us at cfp@blackhat.com Thank you for taking the time to submit your research/proposed talk to Black Hat. Good luck!
📍 Park City, Utah, US
https://sessionize.com/apres-cyber-slopes-summit-2026/
📍 Taito-ku, Tokyo, JP
Thank you for showing an interest SECCON 14 Open Conference! SECCON is the largest CTF competition in Japan. We hold an in-person event called "Dennoh Kaigi" (電脳会議) alongside with SECCON CTF Final competition every year. Many workshops, presentations, and mini CTFs are gathered in Dennoh Kaigi. "Open Conference" is a presentations track of Dennoh Kaigi. At last year's SECCON Open Conference 13, various presentations were made, including on attack methods against browser extensions, the development of attack detection technology for connected cars using machine learning, and experiences taking on OSINT CTF. We are inviting proposals for presentations via a Call for Presentations. We're looking for presentations about technological research or tool around Cyber Security. We are also looking for any difficulty proposals and it is not needed that you have previous speaker experience. :) To submit your porposal, please visit: https://sessionize.com/seccon-14-openconference/ ----- [ Event Information] - Date : 28th Feburary 2026 and 1st March 2026 - Venue : HULIC ASAKUSABASHI bld., 1-22-16 Asakusabashi, Taito-ku, Tokyo - After-party : 1st March 2026 at HULIC HALL & CONFERENCE [ Application Period ] - Application due date : 16th January 2026, 23:59 JST. - Notification : 26th January 2026 Submissions before the following dates will receive the result and comments earlier than the final due. You are welcomed to refine and re-submit your proposal while the CFP opened. - 1st period : 17th October 2025, 23:59 JST. ( Notification : 27th October 2025 ) - 2nd period : 21th November 2025, 23:59 JST. ( Notification : 1st December 2025 )
📍 Vasco da Gama, Goa, IN
Welcome to the 16th Edition of Nullcon Goa Nullcon is an annual security conference held in Goa, India, dedicated to showcasing the diverse talents within the information security industry. It is a platform for freshers and experts to share their groundbreaking research and innovations with the cybersecurity community. The conference highlights the latest developments in both offensive and defensive security technologies, inviting researchers and hackers from around the world to present the 'Next Big Thing' in security. Research Categories: - New Research - Current Research - Desi Jugaad Submission Topics (but not limited to): • Satellites • Networks • Forensics • Hardware • Embedded • ICS/SCADA • Smart Cities • Blockchain Checkout Speaker Benefits / Submission Guidelines: https://nullcon.net/goa-2026/cfp For any further information, feel free to reach out to us at cfp@nullcon.net
📍 Tel Aviv, Israel, IL
https://msrndcdn360.z6.web.core.windows.net/bluehat/bluehatil/2026/RB/CFP_Guidelines.pdf
📍 Lausanne, Vaud, CH
As we believe that any topic in IT security can prove to be interesting, we are not limiting the CFP to any specific areas of research. Nevertheless, we are not interested in any marketing presentations and will therefore ignore any such proposals. This CFP will process: * Talks which are expected to be 45 minutes long * Trainings which are expected to be 1-3 days (8h / day) long The talks will take place on the 19th & 20th of March 2026 at the Swiss Tech Convention Center in Lausanne. The trainings will take place between the 16th and 18th of March 2026 at the Swiss Tech Convention Center in Lausanne. For any additional information, please visit https://insomnihack.ch To follow updates regarding the conference, please follow us on Twitter : https://twitter.com/1ns0mn1h4ck
📍 Boston, Massachusetts, US
ISDFS is an IEEE technically supported premier event that brings together industry professionals, academics, and engineers to exchange information and ideas on digital forensics, cybersecurity, cyber security, big data privacy and security, artificial intelligence in security and forensics, software engineering, signal processing, and computer science in general. The symposium will be held by “Endicott College” in Boston, Massachusetts, USA, and will be available ONLINE as well. Special sessions, workshops, tutorials, keynotes, panel discussions, posters, and oral presentations will be included in the symposium program. All papers will be reviewed by at least three independent reviewers (single-blinded review). Accepted full papers will be submitted for publication in IEEE Xplore Digital Library. Topics within the scope of the symposium include, but are not limited to, the following areas: Digital Forensics Cyber Security Cybersecurity Data Privacy Cryptography Artificial Intelligence (AI) / Machine Learning (ML) Big Data Computer Science Digital Forensics Digital Forensics Process Model, Information Systems and Crime Analysis, Business Application of Digital Forensics, Digital Forensics Techniques and Tools, Legal and Policy Issues Related to Digital Forensics, Digital Forensics Case Studies, Database Forensics, Cloud Forensics, Mobile & Multimedia Forensics, Network Forensics, Digital Forensics Training and Education, Big Data and Digital Forensics, Cyber Forensics, Digital Forensics Tool Testing and Validation Process, Digital Forensics Trends, Digital Forensics & Law, Anti and Counter Forensics, Data Hiding and Recovery, Cyber Crime Investigations, Cyber Culture & Cyber Terrorism, Incident Response, Information Warfare & Critical Infrastructure Protection. Cybersecurity Steganography and Steganalysis, Cybersecurity Education, Cyber Security Education, Secure Multiparty Computation, Biometric Approaches, Computer Security, Mobile Communications Security, Operating System Security, Trusted Computing, Network Security, Wireless Security, Database Security, IPTV Security, E-commerce Protocols, Content filtering and tracing, Distributed System Security, Security Weaknesses on Information Technologies, Secure Code Development, Penetration Tests, Intrusion Detection Systems, Malicious Codes and spyware, Viruses, Spyware, Spamware, Scam, Energy/Cost/Efficiency of Security in Clouds, Security Risk Models and Clouds, Security Standards and Practices. Data Privacy Digital Signature, Certified Electronic Mail, Certificates and Certificate Management, Standards, Protocols, Trust Models, Key and Identity Management, Digital Signature Policies and Law, Validity of Digital Signature in Government, Finance, and Commerce, Effects of Digital Signature on Digital Signature Law, Responsibilities for Opponents to ESSP in Law in Digital Signature, Discrepancy between Digital Signatures, Judgments related to Digital Signatures, Digital Signature Law in Other Countries. Cryptography Block Ciphers, Stream Ciphers, Public Key Cryptography, Quantum Cryptography, Elliptic Curve Cryptography, Algebraic Curves in Cryptography, Homomorphic Encryption, Cryptographic Protocols, Zero-Knowledge, Secret Sharing, Cryptanalysis, Hash Functions, Applications of Coding Theory in Cryptography Smart Card Applications and Security, Cryptographic Hardware and Embedded Systems, Special Purpose Hardware for Attacking Cryptographic Systems, Side-Channel Analysis and Countermeasures, Pairing Based Cryptography, Key and Identity Management. Artificial Intelligence (AI) / Machine Learning (ML) Artificial Intelligence, Artificial/Deep Learning, Machine Learning, Data Science, AI and ML in Information, System and Cybersecurity, AI and ML in Privacy, AI and ML in Cybersecurity Applications, AI and ML in Steganography, AI and ML in Cryptography, AI and ML in 4G, LTE, and 5G networks, AI and ML in Operating System Security, AI and ML in Database Security. Big Data Big Data Security, Big Data Forensics, robust deep learning, secure deep learning/machine learning, multi-party computing, edge/fog computing, energy consumptions, high performance, heterogeneous resources, cloud models, heterogeneous architecture, telehealth, resource allocation, load balance, multimedia, and QoS. Computer Science Artificial Intelligence, Artificial/Deep Learning, Cloud Computing, Data Mining/Big Data, High-Performance Computing, Internet of Things, Virtual and Augmented Reality, Secure Systems, Signal/Image/Video Processing, Human-Machine Interaction, Bioinformatics, Robotics, Social Networks, Algorithms and Data Structures, Game Theory, Soft Computing, Natural Language Processing, Operating System, Computer Graphics, Programming Languages, Software Engineering, Theory of Computation.
📍 Arlington, VA, US
We are looking forward to SO-CON 2026 from April 13 - 18, 2026 in Arlington, VA, USA. SO-CON 2026 features talks, trainings, and networking events focused on identity-based security and Attack Paths. It kicks off the week with a two-day main conference and ends with a selection of four-day adversary tactics and fundamentals training courses. The Call for Presenters (CFP) is open from October 1st to November 15, 2026 at 23:59 ET. We invite submissions for 50-minute sessions (~45 minutes of content and 5 minutes for Q&A) that delve into the complexities of identifying, executing, and protecting against modern attack paths. Some suggested topics we would love to see: Novel research of Attack Paths Usage of BloodHound and OpenGraph Applications of Attack Path Management Identity Provider Attacks and Defenses (Active Directory, Entra ID, Okta, etc) Hybrid Attack Paths Federated Identity Attack Paths and solutions for managing attack paths across multiple identity providers Exploring the potential of AI and ML for automating attack path discovery in offensive and defensive applications CI/CD Pipeline Security SaaS Application Identity Models Cookie and Session Theft Techniques Anything else where you've done something interesting with Attack Path Management, but please no product pitches CFP Review Process SO-CON ensures a fair and impartial review process by anonymizing all CFP submissions before they are sent to our CFP Review Board. We carefully remove any identifying information, including names, pronouns, and affiliations, from the title, description, and outline. The CFP Review Board then evaluates the anonymized submissions using a comparative rating system based on the ELO method. This system allows reviewers to objectively assess submissions against one another, considering alignment with the conference theme, content quality, and originality. Based on these ratings, the SO-CON team will curate a dynamic conference agenda that reflects the most compelling and thematically relevant topics that includes contributions from the open CFP, SpecterOps employees, and invited speakers. We will also choose a number of backup proposals in case any speakers have to cancel. Selected speakers will be contacted directly via the Sessionize CFP portal to confirm their participation. CFP Submission Agreements Please be aware that by submitting to the CFP and being accepted, you agree to the following: The submitter(s) will review and adhere to the Code of Conduct. You will show up (in-person) on time and give your presentation at the scheduled time slot. (Except in the event of understandable, unforeseen circumstances.) Any content submitted is wholly owned by the submitting party and SO-CON asserts no ownership of the content. You grant Specter Ops Inc. the rights to reproduce, distribute, advertise and show your presentation including but not limited to the SO-CON website, printed and/or electronic advertisements, and all other mediums. Audience members may potentially take pictures of you and your slides, unless expressly stated otherwise at the start of the presentation. You will submit a headshot photograph (or avatar) that can be posted on the SO-CON website, social media, and any printed materials. You will provide us with a valid email address that you monitor regularly where you will receive official communications. Any honorarium will be paid after the conference has ended. You will respond by the specified deadline to the acceptance email with all asks of accepted speakers. You are not confirmed as a speaker until these tasks are complete. You will bring your own presenting hardware (e.g., laptop) to present your talk. SO-CON will provide projectors, screens, internet, and an HDMI connection. You will identify any additional hardware requirements in the space provided in your submission. Visa Sponsorship Speakers from many countries are eligible for a visa wavier (see https://www.dhs.gov/visa-waiver-program-requirements). However, if your home country is not part of this program, SO-CON is currently unable to sponsor your entry into the United States. International speakers must possess or obtain the necessary entry visas independently to speak at SO-CON. Submission Guidelines If you’d like to submit a proposal, please visit https://sessionize.com/socon-2026/ during the CFP submission period (October 1 - November 15, 2025). You may edit your submission anytime during the CFP submission period. After this time, you will only be able to view the status of your submission. Important Dates CFP opens: October 1, 2025 at 00:00 ET CFP closes: November 15, 2025 at 23:59 ET Final speaker notifications: December 2025 Talks: April 13-14, 2026 Trainings: April 15-18, 2026 If you have any questions, please feel free to email us at socon@specterops.io
📍 Prague, Czechia, CZ
https://www.papercall.io/bsidesprg2026
📍 Riyadh, Riyadh, SA
Submit your research, showcase your innovation, and be part of the global dialogue! Choose from one of 5 Blocks / 31 Forums, each designed to explore actionable pathways to a sustainable energy future. Learn more at https://wpcenergy2026.org/programme/
📍 Riyadh, Riyadh, SA
The abstract submission deadline was in September 2025. However, the program details are available, and registration for the April 2026 event is still open.
📍 Miami Beach, FL, US
Submit your cutting-edge research, red team tactics, or blue team defenses to HackMiami Conference 2026. We’re seeking talks on malware, AI security, exploit development, digital forensics, and underground economies. Join the South Florida hacker community and share your skills with an international audience of researchers, makers, and breakers. cfp@hackmiami.com
📍 Göteborg, Västra Götaland, SE
We warmly welcome you to submit a talk for Security Fest 2026, taking place May 28-29 (Thursday, Friday) at Elite Park Avenue Hotel in Gothenburg, Sweden. This year marks our 0o10-year anniversary (10 years, 8 conferences)! Security Fest is a Technical Cybersecurity Conference By the community, for the community: Since 2016, Security Fest has been all about bringing together cyber security professionals, researchers, students, and tinkerers from around the world to share knowledge, solve challenges, and have fun doing it. Set in the heart of Gothenburg at the start of Swedish summer, Security Fest is a vibrant, technical conference featuring: One track, two days A sponsor area and unique villages (red/blue team, arcade, soldering, chill area and more) An electronic badge An epic day-one party with dinner, quiz and entertainment A speaker's dinner the night before the event The event is arranged entirely by volunteers, all security professionals, and is funded by sponsors and ticket sales. No speaker slots are paid for or sold. Talk Guidelines We are looking for technical talks with a clear connection to cybersecurity, whether your background is in offensive research, secure development, hardware hacking, blue teaming, privacy, cryptography, vulnerability research or anything in between. Talks should be technical and non-commercial. We do not accept vendor talks or marketing content. Standard talk duration: 40 minutes (including Q&A) The opening keynote: 60 minutes All proposals are anonymized during review, so please do not include your name in the abstract (your bio is the right place for that) Tips for Your Submission Submit more than one proposal if you can! It increases your chances of getting selected. Make sure the title and abstract clearly describe what your talk is about and what the audience will take away from it. Vague or overly brief abstracts are hard to evaluate, so be specific! Include links to previous talks (videos/slides) if available. Our review board is made up of experienced security professionals and generalists who evaluate submissions based on technical depth, clarity, and relevance.