Texas Cyber Summit

Call for Papers, Briefings, Trainings !

Open: ROUND 3

Final round closes: September 6th at 06:00pm

Round 3: Final round Closes Sept 6th, 2019


Call for Papers

The Texas Cyber Summit CFP has three acceptance phases. This way if you get your briefing submitted early, you wont have to wait until the end, or end up on the short list.  Also,  If you don’t make the first cut,  your briefing will still be in the running for the next two rounds - and as a bonus if we like your briefing, but feel it needs something, we will help you with some coaching and advice.


“Texas Cyber Summit does not pay for travel or lodging”

“Texas Cyber Summit does not accept product or vendor related pitches”

“If your briefing is a thinly-veiled advertisement” for a new product or service your company is offering, please do not apply. There are plenty of "vendor" conferences that will accept that nonsense, please submit to one of those, don’t waste our time or yours. If your briefing is accepted and you perform a bait and switch, you will be banned for life.


*All presentations must be submitted by the original authors.

We currently only accept submissions by original authors of the presentations. PR firms, speaking relation firms, and all other parties who are not direct authors of submitted presentations ARE NOT ALLOWED to submit materials on behalf of speakers or presenters. If it is obvious the author did not submit the briefing themselves, you will be banned for life.

We require direct contact with presenters to expedite questions from the reviewers and to fulfill Speaker Obligations as detailed on the Call for Papers Terms and Conditions. 

How long should the talk be?

The following time slots are available and it is expected that the presenters will budget time for audience participation and Q&A within this time frame:

  • Normal presentations: 60 minutes

  • Short presentations: 45 minutes

  • Training presentation Class: 120 minutes to 240 minutes


Presentations will be reviewed through a voting process by the Texas Cyber Summit Call for Papers - CFP Review Board. Submissions are rated on a one to ten scale by each of the reviewers in four areas, and the resulting scores are added up. Those submissions with the highest scores are considered first. The majority of finalized briefings will require a live video interview, via WEBEX prior to any final acceptance. In the case of topic overlap a lesser scoring submission may be selected to keep variety and diversity in the program. As the complexity and specialization of submissions grow more reviewers are added to the process. If your briefing does not meet all four selection criteria listed below it will be automatically rejected:

  • Technical Depth

  • Technical Breath

  • Technical Accuracy

  • Vetted Research, Lab Details, proof of concept, exploit code, exploit code details and live demonstrations.

People submitting a briefing proposal will receive an email notification that the Texas Cyber Summit review team has received the proposal generally within 45 days of receipt of the submission. Once the review and selection process has been completed you will receive an email confirmation of acceptance or rejection.

All presentations must be vendor neutral (no sales pitches for services or products are permitted). All sources of information, software, etc. should be properly cited.

What kind of talks are we looking for? 

This year’s topics are the following.  Anything that fits into or are closely related to these categories will be considered.

  -  Cryptography   -  Critical Infrastructure   -  Blue Team Tools   -  Endpoint Security   -  Red Team Attacks
  -  Encryption   -  Power Gen, Wind/Solar/Gas   -  GDPR & Complaince   -  Network Security   -  Smart Cities
  -  Threat Modeling   -  IDS Detection   -  Scada Systems   -  Women in Security   -  Industrial Control
  -  Cloud Security   -  Wireless and Mobile Security   -  Blue Team Tools   -  Attack of the Drones   -  IoT and Smart Devices
  -  Blue Team Defense   -  Emerging Technologies   -  Threat Intelligence   -  Threat Hunting   -  Reverse Engineering
  -  Red Team Tools   -  Red Team Tactics   -  Incident Response/Forensics   -  Identity Access Management   -  Malware

Things that get our attention:

“Briefings that are highly technical, reveal new vulnerabilities or methods are of more interest than a review of material covered many times before. We are striving to create a highly technical conference and any briefing that helps us reach this goal will be given extra attention.

“Submissions with detailed bibliographies acknowledging prior work in the space, distinguishing or highlighting how your presentation is different. We believe this is important to help move the security community to a more professional, inclusive and respected position.

“Since security is a technical field, hands-on demonstrations that visually explain the theory will assist greatly for the audience to grasp and learn the content. However, there are also times when the subject is more abstract and visual demos might not be best suited to explain the topic, consider the breath of your briefing prior to submission.”

Note: By speaking at Texas Cyber Summit you are granting us permission to distribute, disseminate, advertise, modify, market, include in other marketing materials and to show your presentation including but not limited to our website, Twitter, Facebook, Youtube, other media, printed and/or electronic ads, fliers, mailers, etc.

Logistics: The event takes place in San Antonio, Texas, starting October 10th to the 12th, please arrive early to the site. A special rate has been negotiated with the hotel, which you are welcome to take advantage of - however note Texas Cyber Summit keeps its ticket prices low so that we are open for more people to attend, unfortunately, as such, We will not be paying for travel, hotel or other expenses. You will receive a ticket to the event, ability to attend sessions when your not speaking, we provide some meals and entertainment, you will receive a Speaker Badge that allows special access as well as access to the event mixers. You will also receive promotion of your talk on social media, websites, and other forms of media coverage - at our expense.


Texas Cyber Summit