Call for Presentations

Conference theme: Empowering network defense teams with the latest in threat intelligence, automation, and orchestration

Early submission deadline has passed. Round two of the CfP is open. 
(Extra benefits allocated to proposals received by the early submission deadline of 14 June. The CFP will remain open through 31 July.)

(Individuals submitting an abstract for review will need to sign-up for a user account first. Once your account has been confirmed, you'll be able to log in using the credentials sent to your email and submit your proposal.) 

We invite you to join the conversation. If you have ideas and experiences which you feel would be helpful to people who are responsible for setting their organization's cyber strategy, please submit an abstract. Presentations should target a technical audience from various disciplines, such as security teams, commercial security vendors, open-source security developers, CSIRTs, and maintainers of open security standards.

Stories of how your organization successfully integrated threat intelligence, automation, and/or orchestration techniques to tangibly improve your security, stories of failed efforts and lessons learned, ideas for fresh approaches, new research findings, as well as analyses of policy trends are all welcome.

 Topics of Interest

 Vital role of threat intelligence & information sharing 

  • Classifying and prioritizing based on the latest threat insights, data, incidents
  • Issues impacting the sharing and usage of threat intelligence data (both domestically and internationally)
  • Success and failure stories using specific technologies and strategies for sharing and using threat intelligence
  • Recommendations on how to validate and qualify the shared information
  • Techniques for dealing with large amounts of threat intelligence
  • Value of public and private partnerships (cutting through the slow-moving defense bureaucracy)

Evolution of automation & orchestration

  • The orchestration journey including process and outcome improvements
  • Gaps and problems faced by enterprises without security automation
  • Proactive vs. reactive automation practices
  • Emerging exchange standards for automating data
  • Best and worst tasks for security automation
  • How an orchestrated incident response function works in practice
  • Risks and vulnerabilities with the rising convenience of automation
  • New automation metrics opportunities

New players in defense / Future trends / Solutions & technology in waiting

  • Last techniques to manage cyber threats with AI and automation
  • Evolving tools used as automation technologies grows
  • Security playbooks with a set of actions with different variables
  • Incident response planning
  • The future defense landscapes / trends are set to impact the enterprise, security professionals and companies
  • Autonomous defense systems
  • Emerging open source and open standards
  • Trust in autonomy
  • Shareable workflows
  • What impact the new waves of AI-powered solutions and products will have on our community

Presentation Formats

We plan to accept proposals for either 25-45 minutes standalone presentations or panel discussions that are 60-90 minutes in length (including time for Q&A).

  • Panel proposals (60-90 minutes with 2-4 speakers) should feature expert speakers offering diverse perspectives and insights on a topic aligned with the conference theme. They are ideal for research results, best practices or tool development, innovative ideas or perspectives on future trends. Each panel should account for at least 15 minutes of question and answer time.

  • Standalone presentation proposals should be meaningful and result-oriented.  Presentations will include between 25-45 minutes and should also include time for questions and answers.

Proposal Requirements 

Individuals submitting an abstract for review will need to sign-up for a user account first. Once your account has been confirmed, you'll be able to log in using the credentials sent to your email and submit your proposal. Each proposal must contain the following information:

  • Presentation title (18-word limit): Your title should clearly indicate the topic of your presentation and do so in a way that attracts potential attendees.
  • Presentation summary (75-word limit): If the proposal is accepted, this summary will be published on the conference website and in marketing communications.
  • Abstract (between 500-1000 words): Include a detailed session description explaining the topic, as well as any outlining relevant methods for audience interaction and engagement.
  • Learning objectives: Provide at least two clear learning objectives and/or concrete expected outcomes for participants.
  • Speaker(s) name, job title, affiliation, contact details (address, email and phone), bio (200-word limit), and photo.

Speaker Registration

Accepted proposals received by the early submission deadline of 14 June are guaranteed to receive a complimentary pass to attend both Borderless Cyber and Cyber Next Summit. Accepted proposals received between 15 June-31 July may be subject to a speaker registration fee. 

Onsite Speaking Opportunities

Lightning talk sessions will take place during the conference. These talks will be limited to 5-10 minutes in length. Lightning talk submissions will open onsite during the conference.

Dates to Remember

  • CFP opens: 1 May 2019
  • Early submission deadline: 14 June 2019
  • Late submission deadline: 31 July
  • Conference Dates: 8-10 October 2019

 Contact with any questions.