TexasCyberSummit

San Antonio, Texas October 12, 2018, October 13, 2018, October 14, 2018

https://www.texascybersummit.org

CFP closed at  June 25, 2018 19:06 UTC
  (Local)

TEXAS CYBER SUMMIT

Who: Calling all Cyber Security, IT and industry professionals, college students and the cyber enthusiast community.

What: Cyber Security focused conference loaded with informational break out sessions, hands on training, Capture the Flag competition,  world renowned speakers and cutting edge research papers. 

When: October 12-14th, 2018. Schedule coming soon.

Where: San Antonio, Texas, USA - Wyndham River Walk Hotel

Why: To learn and explore the vast world of cyber security and network with people from around the world that share your interests. 

Briefings Schedule / Agenda

Track 1 - Cyber 101

Track 2 - Critical Infrastructure

Track 3 - Red Team

Track 4 - Blue Team

Track 5 - Breaking Cyber

CFP Description

Texas Cyber Summit Call for Papers

NOTE:  This CFP will have three acceptance phases.   This way if you get your talk submitted early.  You wont have to wait until the end to be notified.  Also,  If you don’t make the first cut.  Your talk will still be in the running for the next two.  We will run each phase for 45 days.  The first CFP phase will run April 25 - June 25.  The second will run June 25 - July 25.  And the third will run July 25- Sept 25

IF YOU WANT TO SUBMIT A PROPOSAL TO PRESENT, PLEASE NOTE

“TCS does not accept product or vendor related pitches for the main conference venue.

“If your talk is a thinly-veiled advertisement for a new product or service your company is offering, please do not apply.

SUBMISSION REQUIREMENTS

All presentations must be submitted by the original authors.

We currently only accept submissions by original authors of the presentations. PR firms, speaking relation firms, and all other parties who are not direct authors of submitted presentations ARE NOT ALLOWED to submit materials on behalf of speakers or presenters. 

We require direct contact with presenters to expedite questions from the reviewers and to fulfill Speaker Obligations as detailed on the Call for Papers Terms and Conditions. 

How long should the talk be?

The following time slots are available and it is expected that the presenters will budget time for audience participation and Q&A within this time frame:

Normal presentations: 60 minutes

Short presentations: 30 minutes

SELECTION CRITERIA

Presentations will be reviewed through a voting process by the Review Board. Submissions get rated on a one to five scale by each of the reviewers in four areas, and the resulting scores are added up. Those submissions with the highest scores are considered first. In the case of topic overlap a lesser scoring submission may be selected to keep variety in the program. As the complexity and specialization of submissions grow more reviewers are added to the process.

People submitting a talk proposal will get email notification that the TCS review team has received the proposal generally within 48-72 hours of receipt of the submission. Once the review and selection process has been completed you will receive an email confirmation of acceptance or rejection.

All presentations must be vendor neutral (no sales pitches for services or products are permitted). All sources of information, software, etc. should be properly cited.

What kind of talks are we looking for? 

This year’s tracks are the following.  Anything that fits into or are closely related to these categories will be considered.

*Track 1 - Cyber 101 

*Track 2 - Critical Infrastructure

*Track 3 - Red Team

*Track 4 - Blue Team

*Track 5 - Breaking Cyber

Things that get our attention:

“Talks that are more technical or reveal new vulnerabilities are of more interest than a review of material covered many times before. We are striving to create a high-end technical conference and any talk that helps reach this goal will be given extra attention.

“Submissions with detailed bibliographies acknowledging prior work in the space, distinguishing or highlighting how your presentation is different. We believe this is important to help move the security community to a more professional and respected position. 

“Since security is a technical field, hands-on demonstrations that visually explain the theory assist greatly for the audience to grasp and learn the content. However, there are also times when the subject is more abstract and visual demos might not be best suited to explain the topic.”

Note: By speaking at TCS you are granting us permission to distribute, advertise and show your presentation including but not limited to our website, Twitter, Facebook, printed and/or electronic ads, fliers, mailers, etc.

THANK YOU!

Attendees (0)

Be the first to announce you'll be attending TexasCyberSummit!

I'm Attending!