Blue Team Con 2024 – Call for Papers
We’re excited that you’re interested in presenting at our conference this year.
Blue Team Con will take place at the Fairmont Chicago in Chicago, IL on september 6-8, 2024
Read all the information below before filling out the CFP form found at the bottom of this page.
All submissions must be received by 11:59PM CDT on March 17, 2024.
Session Categories
We’ve identified nine categories into which we’ll categorize talks. As always, we recognize that red teaming is a part of a comprehensive cybersecurity defense program. Red team talks are certainly welcome but please ensure they are focused on practical application of red teaming techniques in a defensive program.
Our nine categories are:
- Application Security / DevSecOps – How do we bring better cybersecurity practices in our software and product development? Topics may include threat modeling, secure architecture, code level security analysis and more.
- Career and Community – The cybersecurity community is great but we can be better. Starting or growing a career can be challenging. This track will feature topics related to career development and improving the cybersecurity community.
- Global Cyber Policy and Defense – Cyber defenses are on the minds of politicians, policy makers, and national defense teams around the globe. This track will focus on those global topics.
- Threat Intel and DFIR – Threat Intelligence, Digital Forensics, and Incident Response are critical to modern cybersecurity programs. Share your best tips and ideas in this track.
- Management / Leadership – What’s it like to lead a cybersecurity team or program. What are things we should be thinking about from budgets, to board conversations, to team structure and strategy. You’ll find the answers in this track.
- Threat Hunting and Red Teaming – Actively seeking out threats in our environments or key weaknesses that could expose us to attacks continue to be important facets of organization cybersecurity programs. This track will cover those topics.
- Security Operations and Tools – The heart of almost any cybersecurity program is the day to day operations and tooling. SIEM, IAM, WAFs, Firewalls, EDR/MDR/XDR, Attack Surface Management, and so many other topics would all fit in this track.
- Vulnerability Management – Eliminating security vulnerabilities in our environments is a constant goal for security professionals. So how do you identify them, how do you ensure they get fixed, what about prioritization? Those are the types of topics that fit this track.
CFP Review Process
Blue Team Con anonymizes all submissions before they are sent to our CFP Review Board for selection. Only the title, length of presentation, abstract, and additional presentation information are provided and all identifying names, pronouns, etc. included in the abstract will be removed. Our goal is remove any unintended bias from our review process. Submissions are scored by the board and those scores are used to determine which proposals are selected. We do additionally choose a number of backup proposals since inevitably life happens and speakers have to cancel from time to time.
To help encourage the sharing of new ideas and perspectives, Blue Team Con will reserve a percentage of our speaking slots for speakers who’ve never spoken at a conference before. No specific track will be reserved and first time speakers will not be identified in the program, but it is one more way we hope to increase the diversity of voices and perspectives shared in our community.
We’ve also introduced our CFP Resources page. Here you will find tips on writing a strong submission, comments on what we look for, and even request feedback on your proposal before you submit (must be requested by March 10). Click Here to visit the CFP Resources page.
CFP Submission Agreements
Please be aware that by submitting a CFP and being accepted, you agree to the following:
- The submitter(s) will review and adhere to the Code of Conduct.
- You will show up (in-person) on time and give your presentation at the scheduled time slot. (Except in the event of understandable, unforeseen circumstances.)
- Any content submitted is wholly owned by the submitting party and Blue Team Con asserts no ownership of the content.
- If selected, you will submit a headshot photograph (or acceptable avatar) that can be posted on the Blue Team Con website and in the printed program.
- Audience members may potentially take pictures of you and your slides, unless expressly stated otherwise at the start of the presentation.
- You will provide us with a valid email address that you monitor regularly where you will receive official communications.
- Any honorarium will be paid after the conference has ended.
- You will respond by the specified deadline to the acceptance email with all asks of accepted speakers. You are not confirmed as a speaker until these tasks are complete.
- You will bring your own presenting hardware (e.g., laptop) to present your talk. Blue Team Con will provide projectors, screens, and an HDMI connection. You will identify any additional hardware requirements in the space provided in your submission.
If you have any questions, please feel free to email us at [email protected].
Speaker Benefits:
Any accepted speakers who attend and speak at Blue Team Con receive:
- A free ticket to the entire conference.
- A $200 honorarium.
- A group dinner invite if present on the evening of September 6th.
Submit Your Proposal
The Blue Team Con 2024 Call for Papers has officially ended. Notifications will go out in the next several weeks. Good luck to all that submitted!