<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2540529&fmt=gif"/>

Call for papers

KEY DATES

Conference: 28 May 2025
Workshops: 27 May 2025

SUBMISSION DEADLINES

Submissions open: now
Submissions close: 13 December 2024

PRESENTATION DEADLINES

Presentation draft deadline: 10 May 2025
Presentation deadline: 24 May 2025

Who can submit

Anyone who is an expert in cyber security, has practical and relevant experience to share about mitigating the risks of cyber security, or has a product-independent case study to showcase. Please also read the guidelines below before submitting your proposal.

What should your submission look like:

  • Talk title
  • Short synopsis
  • Two to three take-away benefits for delegates attending
  • Short bio of the presenter
  • Hi-res colour head-and-shoulders photo (min 300 DPI)

Please send your submission to Ros Hinchcliffe, ros@itweb.co.za on or before 13 December 2024.

For our 2025 event, we are looking for presenters and panelists on the following topics:

  • Advanced persistent threat (APTs)
  • AI-enabled cyber threats
  • Application security
  • Cloud security management
  • (Critical) infrastructure security
  • Cyber leadership
  • Cyber resilience
  • Cyber risk management
  • Cybersecurity as a service
  • Cyber security compliance frameworks
  • Cyber security for SMEs
  • Cyber security professional health and wellness
  • Cyber warfare
  • Data security/privacy
  • Data retention/destruction
  • Deep fakes and misinformation
  • DevSecOps
  • Generative AI for security
  • Human-centric cybersecurity
  • Identity and access management
  • Mobile/5G security
  • OT/IoT security
  • Quantum computing/post-quantum encryption
  • Ransomware defence and recovery strategies
  • Secure-by-design
  • Security awareness training programmes
  • Security platformisation
  • The business of security
  • The CISO/Board relationship
  • The evolving roles in the cyber security team
  • The security skills shortage
  • Third party/supply chain security
  • Vulnerability management
  • Zero Trust architectures

Guidelines

Please be advised that if you wish to submit a paper for the plenary or the track sessions, sales pitches will not be considered. You are kindly requested to submit a paper that focuses on your chosen topic without referencing your company’s products or solutions (if you are a solution provider).

Where possible, we would request that you put forward a senior representative who is an industry expert and not a sales or marketing executive.

End-user speakers are encouraged to focus on case studies and the practical application of the subject rather than the theory. If you are a solution provider, we recommend that you invite a client to give a joint presentation with you, as these presentations are popular and will be given preference in terms of position on the programme.

Presentations should be content-rich and content should be up-to-date and relevant to the target audience. A breakdown of expected job titles and industry sectors can be provided on request.