Call For Papers & Stuff

The Texas Cyber Summit

Call for Papers, Trainings, Villages, Events & Entertainment

Closes August 14th at Midnight

The Texas Cyber Summit is a multi-track multi-day deeply technical cybersecurity event held annually with an expectation of over 8000 participants and is both in-person and virtually as in “Hybrid” mode this year. Featuring five dedicated learning tracks for the aspiring Cybersecurity novice to the expert operator and ninja. Deeply technical, research and management briefings that address the entire cyber threat landscape. The Texas Cyber Summit is held in San Antonio,TX in October Which is “Cyber Awareness Month”

San Antonio is home to Joint Base San Antonio hosting over 150 Government contractors supporting the US Government, Military, DoD and federal agencies, including the National Security Agency, FBI, AFOSI, DHS, Army Cyber Command, Army Medical Command, Defense Logistics Agency, and five Air force bases with a myriad of capabilities. We host Specialized tracks include teaching, training, responsibilities, and ethics in specialized fields such as digital forensics, Scada, Supply Chain, Red Team Tools, Tactics and Procedures, Blue Team and the Art of Defense, and much more.

  • Briefings are 30min to 50min and should include your Q&A time.
  • Trainings and Labs are 2-hr to 4-hr
  • Hands-On Workshops From – 1-hr to 4-hr
  • Virtual Workshops From 1-hr to 4-hrs
  • Lighting Talks – On-Site and Virtual – 12-15 min
    • Onsite lighting talks will be the evening of 10/29 at 7pm in the main theater
    • Virtual Lighting Talks are intended as knowledge transfer for beginners

Call for:
This is a call for “original” papers, development, labs, briefings and presentations in pursuit of cybersecurity research, technology, techniques, concepts and the exploited. Unpublished presentations, papers, research, briefings receive extra points. Attendees want the latest in the Cybersecurity field that includes tools, techniques, tactics, procedures, methods, hacking and exploits, criminology, fraud and forensic science, application development and security, Security management, Security engineering, computer science, as well as other papers in the following areas, non-exclusive list:

• Application Security
• DevSecOps
• Cloud Computing
• Database Security
• Risk management
• Cybersecurity trends
• Secure Architectures
• Exploit Development
• CISO and Governance
• Banking, Crypto and Bitcoin
• Network WAN/LAN/WIFI Security
• Networking Fundamentals
• Incident response IR and recovery
• Application Development Security
• Operating System operations, security
• Red Team Tools, Tactics, Procedures
• Blue Team Tools, Tactics, Procedures
• Malware reverse engineering
• Securing the Internet of Things
• Network Traffic Captures
• Oil, Gas, Wind, Solar and Power Gen
• Industrial Control System Security
• Cryptography Defense and Attacks
• Cybersecurity and diversity
• Intrusion, Malware and Forensics
• Data Collection and mining
• Data security, Big data Security
• NoSQL, Hadoop, Casandra, Hive, Qubole,
• Cybersecurity Supply Chain Attacks and Research
• Cybersecurity compliance, standards and guidelines
• Hacking the Universe, cloud, Fog, IoT and More
• Cybersecurity Interactive systems and training
• Cybersecurity curriculum, competitions, game theory
• Basic Networking and Cybersecurity Skill/knowledge transfer (Lighting Talks)


Important Requirements for Paper Submission
The CFP Review Board grades submissions by double blind point system. Points are given for cool, thorough, bleeding edge, ground breaking, uniqueness, techniques, tactics, procedures, methods, hacking, defense, offense and exploit dev. Presentations must contain original material from the original author and have not previously presented, however, we do accept presentations that have not previously been presented in the last four months, with the exception if they contain at least 20% difference and will not be presented again for at least sixty days after Texas Cyber Summit. This ensures the conference has unique briefings, not the same-old-same, which attendees are craving.

Important: 3 Rounds of CFP – Final Round now in Effect

There are three rounds to our Call for Papers – Final Round starts June 30th, and ends Aug 14th

  • Current Submission Deadline: Round 3 -Starts June 30th, round ends August 14th
  • Acceptance Notification: Round 3 – Aug 21st, 2021  (receive notifications)

Logistics: Covid-19 Logistics and Attendance

Because no one can predict the status of the Covid-19 pandemic and any associated social distancing mitigations or requirements,  we allow in person and virtual presentations of papers. All authors from accepted papers will be required to register on the virtual platform. In person attendance is not required, however if you wish to attend in person we will provide you with several gifts to help your in-person event even more enjoyable.

What we provide In Person Speakers

  • Speaker Badge with VIP Access
  • Invitation to the Speaker & VIP Mixer, food, beverages
  • Speaker presentation promotion, platform, recording.
  • Extra in-person or virtual badge for your guest
  • A speaker pack that includes some excellent stuff

What we provide Virtual Speakers

  • Speaker Virtual Badge with VIP Access
  • Speaker presentation promotion, platform, recording.
  • Extra virtual badge for your guest
  • Speaker virtual mixer and meet/greet
  • A speaker pack that includes a 2021 patch

Please note, We CAN NOT provide lodging, transportation or other expenses. We do have an awesome hotel discount. We hope you will consider joining us In-Person its going to be a lot of fun.