CFP
We are looking for speakers to share their knowledge of cyberattacks (disruption, destruction, and degrading systems) and information operations threats with a cyber component, including, but not limited to, hack and leak operations and coordinated inauthentic behavior. Briefings will be selected for their unique insight, timeliness, and importance. We are especially interested in case studies of specific threats.
In order to ensure timely content, we will review proposals up to a month before the event; however, content may be chosen at any time before that. The deadline for submissions is 11:59 PM (ET) on Friday, September 27th, 2024.
We are especially interested in speakers that can provide insight into the following subjects:
Cyberattacks (disruption, destruction, and degrading) and information operations in conflict zones such as Ukraine)
Threats to elections
Major hack and leak operations credited to nebulous organizations
Emerging threats to critical infrastructure
Cyberattacks and information operations against civil society and dissident communities
Updates on known cyberattack and information operations operators and activity such as Volt Typhoon, Sandworm, and Berserk Bear.
The next generation of cyberattack and information operations TTPs
Cyberattack threats to sectors and industries that are not regularly targeted
Cyberattack and information operations capability associated with the People’s Republic of China
CYBERWARCON will pay $500 for each full 30-minute talk. Multiple speakers collaborating on a talk may split the payment. Lightning round talks are excluded from payments. Everyone gets killer swag!
All speakers must present at CYBERWARCON in person.
GUIDELINES
All submissions must include:
Author Name(s)
Author Email(s)
Title of Proposed Talk
Author Title(s)
Organization(s)
Contact Information (Address, Phone, E-mail address)
Biography (No more than 200 words and may include professional history, honors, training, etc. This is a chance to prove you know what you’re talking about.)
Intent to present Regular Talk or Lightning Talk (Regular Talk: 30 minutes | Lightning Talk: 10-minute talk only)
Abstract (A thorough outline of the content you wish to cover)
Accepted submissions will:
Focus specifically on cyberattacks (disruption, destruction, ICS targeting, etc) and information operations through cyber means.
Demonstrate unique insight rather than just promise it
Accepted submissions will not:
Be entirely derivative of other known work (using and citing others is great, but please say something new)
Be a vendor pitch. Your logo can be plastered on the slides, but leave it at that.
To learn about the team reviewing proposals, please see Review Board.