SEPTEMBER 22nd – 23rd, 2022 – AUSTIN, TEXAS
Three Rounds:
Round 1 – February 12th – ends April 1st (CLOSED)
Round 2 – April 15th – ends June 1st
Final Round – June 11th – ends July 31st
Closes July 31st at Midnight
The Texas Cyber Summit is a three day multi-track – novice to ninja technical cybersecurity event held annually with an expectation of over 1200 participants in-person. Note that the in-person will take place in September 22nd – 24th, and the Virtual Conference will take place in November 5th. Featuring five dedicated learning vertical tracks for the aspiring Cybersecurity novice to the expert operator. Deeply technical, research and management briefings that address the entire cyber threat landscape. The Texas Cyber Summit is held in Austin, Tx” and is a IRS 501C3 Non-Profit Organization.
Austin is home to more major fortune 500 companies then any State. It is home to Cyber Futures Command, Defense Logistics Agency, and Air force logistics. We host Specialized tracks include teaching, training, responsibilities, and ethics in specialized fields such as digital forensics, Scada, Supply Chain, Red Team Tools, Tactics and Procedures, Blue Team and the Art of Defense, and much more.
Briefings are 50 min and 25 min should include your Q&A time.
Trainings and Labs are 2-hr to 4-hr
Hands-On Workshops From – 1-hr to 4-hr
Lighting Talks – On-Site – 12-15 min on Friday
Onsite lighting talks will be Friday evening at 7pm in the main theater
Call for:
This is a call for “original” papers, devops, development, labs, briefings and presentations in pursuit of cybersecurity research, technology, techniques, concepts and the exploited. Unpublished presentations, papers, research, briefings receive extra points. Attendees want the latest in the Cybersecurity that includes tools, techniques, tactics, procedures, methods, hacking, exploits, criminology, fraud and forensic science, application development and security, Security management, Security engineering, computer science, as well as other papers in the following areas, non-exclusive list, if you have something outside the scope of those listed below please submit.
• Application Security
• DevSecOps
• Cloud Computing
• Database Security
• Risk management
• Cybersecurity trends
• Secure Architectures
• Exploit Development
• CISO, compliance and Governance
• Banking, Crypto and Bitcoin
• Network WAN/LAN/WIFI Security
• Networking Fundamentals
• Incident response IR and recovery
• Application Development Security
• Operating System operations, security
• Red Team Tools, Tactics, Procedures
• Blue Team Tools, Tactics, Procedures
• Malware reverse engineering
• Securing the Internet of Things
• Network Traffic Captures
• Oil, Gas, Wind, Solar and Power Gen
• Industrial Control System Security
• Cryptography Defense and Attacks
• Cybersecurity and diversity
• Intrusion, Malware and Forensics
• Data Collection and mining
• Data security, Big data Security, Data Lake
• NoSQL, Hadoop, Casandra, Hive, Qubole,
• Cybersecurity Supply Chain Attacks and Research
• Cybersecurity compliance, standards and guidelines
• Hacking the Universe, cloud, Fog, IoT and More
• Cybersecurity Interactive systems and training
• Cybersecurity curriculum, competitions, game theory
• Basic Networking and Cybersecurity Skill/knowledge transfer (Lighting Talks)
Important Requirements for Paper Submission
*** Important: Briefings that are accepted can not have been presented in the previous or preceding 30 days from the conference dates, you agree to abide by these terms.
The CFP Review Board grades submissions by double blind point system. Points are given for awesomeness, thoroughness, bleeding edge, ground breaking, uniqueness, techniques, tactics, procedures, methods, hacking, defense, offense and exploit dev. Presentations must contain original material from the original author and have not previously presented, however, we do accept presentations that have not previously been presented in the last four months, with the exception if they contain at least 20% difference and will not be presented again for at least sixty days after Texas Cyber Summit. This ensures the conference has unique briefings, not the same-old-same, which attendees are craving.
Logistics: Covid-19 Logistics and Attendance
Because no one can predict the status of the Covid-19 pandemic and any associated social distancing mitigations or requirements, we may change the in-person mask/distancing requirements, always refer to the main Covid19 page. All authors from accepted papers will be required to register on the virtual platform. In person speakers will be provided you with several gifts to help your in-person event even more enjoyable.
What we provide In-Person Speakers
Speaker Badge with VIP All Access
Invitation to the Speaker & VIP Mixer, food, beverages
Speaker and