The Texas Cyber Summit is a multi-track multi-day deeply technical cybersecurity event held annually with an expectation of over 5000 participants and is both in-person and virtually “Hybrid” mode this year. Featuring five dedicated learning tracks from the aspiring Cybersecurity novice to the expert operator. Deeply technical, research and management briefings that address the entire cyber threat landscape. The Texas Cyber Summit is held in San Antonio,TX in October Which is “Cyber Awareness Month”
San Antonio is home to Joint Base San Antonio hosting over 150 Government contractors supporting the US Government, Military, DoD and federal agencies, including the National Security Agency, FBI, DHS, Army Cyber Command, Army Medical Command, Defense Logistics Agency, and five Air force bases with a myriad of capabilities. We host Specialized tracks include teaching, training, responsibilities, and ethics in specialized fields such as digital forensics, Red Team Tools, Tactics and Procedures, Blue Team and the Art of Defense, and much more.
This is a call for “original” papers, labs, briefings and presentations in pursuit of cybersecurity research, technology, techniques, concepts and the exploited. Unpublished presentations, papers, research, briefings receive extra points. Attendees want the latest in the Cybersecurity field that includes tools, techniques, tactics, procedures, methods, hacking and exploits, criminology, fraud and forensic science, application development and security, Security management, Security engineering, computer science, as well as other papers in the following areas, non-exclusive list:
• Cloud Computing
• AppSec, DevSecOps
• Database Security
• Risk management
• Cybersecurity trends
• Secure Architectures
• Exploit Development
• CISO and Governance
• Banking, Crypto and Bitcoin
• Network WAN/LAN/WIFI Security
• Incident response IR and recovery
• Application Development Security
• Red Team Tools, Tactics, Procedures
• Blue Team Tools, Tactics, Procedures
• Malware reverse engineering
• Securing the Internet of Things
• Oil, Gas, Wind, Solar and Power Gen
• Industrial Control System Security
• Cryptography Defense and Attacks
• Cybersecurity and diversity
• Intrusion, Malware and Forensics
• Data mining and big data Security
• Cybersecurity Supply Chain Attacks and Research
• Cybersecurity compliance, standards and guidelines
• Hacking the Universe, cloud, Fog, IoT and More
• Cybersecurity Interactive systems and training
• Cybersecurity curriculum, competitions, game theory
Important Requirements for Paper Submission
The CFP Review Board grades submissions by double blind point system. Points are given for cool, thorough, bleeding edge, ground breaking, uniqueness, techniques, tactics, procedures, methods, hacking, defense, offense and exploit dev. Presentations must contain original material from the original author and have not previously presented, however, we do accept presentations that have not previously been presented in the last sixty days, and contain at least 20% difference and will not be presented again for at least sixty days. This ensures the conference has unique briefings, not the same-old-same, which attendees are craving.
There are three rounds to our Call for Papers – CFP, the first rounds ended April 11th, The second round is May 15th, 2021, the third and final round ends July 1st at midnight, Three rounds gives your briefing that much more opportunity to get picked up, so submit early.
Because no one can predict the status of the Covid-19 pandemic and any associated social distancing mitigations or requirements, we allow in person and virtual presentations of papers. All authors from accepted papers will be required to register on the virtual platform. In person attendance is not required, however if you wish to attend in person we will provide you with several gifts to help your in-person event even more enjoyable.
We can not provide lodging, transportation or other expenses. We hope you will consider joining us In-Person its going to be a lot of fun.
Call for Papers - Oil, Gas, Wind, Solar - IoT Hacking/Securing - Red Team - Blue Team - Cloud Defense/Hacking
Pre-Con Training is a paid training that leads to career development or certification. Do not submit unless you speak with the organizers first.